Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Criteria for Selecting the Right Threat Detection & Incident Response Solution Nick Cavalancia - Techvangelism | George Anderson - Secureworks | Cat Coode - Binary Tattoo | Dom Glavach - CyberSN.com Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR... 3 weeks ago | 46 mins How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 2 weeks ago | 63 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 2 weeks ago | 64 mins Why Hackers Hack: Episode 1 - The Profile Tyler Moffitt, Snr Security Analyst, Opentext Security Solutions Hacking has become a common term in today's digital world, but not all hackers are the same. In this webinar, we will explore the different types of h... 7 days ago | 55 mins Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 2 weeks ago | 49 mins 5 Email Attacks to Watch For: How Threat Actors Are Targeting You Crane Hassold, Director of Threat Intelligence, Abnormal Security As organizations implement more advanced security tools, attackers have changed tactics. The email attacks of today are not what we saw a decade ago—o... 14 hours ago | 53 mins Navigating Cybersecurity Threats, Challenges and Innovation in 2023 Augusto Barros, Cyber Security Evangelist; Findlay Whitelaw, Insider Threat; Kayzad Vanskuiwalla, Customer Success The threat landscape will continue to change creating new challenges for organizations. How will threats that are relevant today evolve in 2023? Will... 1 day ago | 46 mins Threat Landscape Discussion with PolySwarm and Anomali Christopher Elisan, PolySwarm | Luke Amery, Anomali | Stree Naidu, Anomali This Q&A discussion featured Christopher Elisan, VP of Threat Intelligence at PolySwarm, Luke Amery, Solution Architect ANZ at Anomali, and is moderat... 17 hours ago | 27 mins The Art of Cybersecurity Warfare Matt Lembright, Etay Maor The right SASE platform is ideal for internal threat hunting, allowing full visibility and control over your security posture. But your security tea... 23 hours ago | 41 mins Load more