Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 2 weeks ago | 36 mins Fast Track Your Cyber Insurance Initiatives With Identity Protection Narendran Vaideeswaran (CrowdStrike), Paul Byrne (CrowdStrike), Kelly Butler (Marsh Specialty) Modern attacks like ransomware have been around for quite some time. According to the 2021 CrowdStrike Global Security Attitude Survey, 66% of organiz... 5 days ago | 81 mins Protecting organization data against cyber attacks, threats and data breaches Glen D. Singh, Cybersecurity Author and Trainer Tune into this session to learn about the importance of identifying and protecting various types of assets within organizations and how using a multi-... 1 month ago | 45 mins How data protection relates to cyber security, an interview with Kerissa Varma Kerissa Varma Kerissa Varma, Group CISO of Old Mutual Limited, is interviewed by the Economist Impact about data protection and how this related to cyber security, ... 1 month ago | 40 mins How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 1 month ago | 36 mins The Top Data Leaks, Cyberattacks, and Insider Hacks of 2021 (and 2022 Outlook) James E. Lee, COO, Identity Theft Resource Center and Dihan Rosenburg, Senior Product Marketing Manager. Spirion Cyber breaches reached an all-time high in 2021. No matter what industry you operate in, last year’s expansive breaches left wide-ranging impacts on o... 5 months ago | 59 mins Research Findings: 1 in 7 Ransomware Extortion Attacks Leak Critical OT Data Daniel Kapellman Zafra, Manager Mandiant Threat Intelligence The increase in ransomware and multifaceted extortion in 2021 resulted in a surprising risk to Operational Technology. A new study by Mandiant Threat ... 3 months ago | 52 mins 3 Steps to Protect Cloud Data in the Wake of the Pfizer Data Leak Hank Schless and Mahesh Rachakonda, Lookout We often associate breaches with corporate espionage and advanced threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has act... 5 months ago | 37 mins Introduction to confidential computing on public clouds with Ubuntu Chris Huffman - VP of Public Sector, Ijlal Loutfi - Security Product Manager Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers an... 4 weeks ago | 47 mins Data Leaks in the Automotive Supply Chain: The Race Against Cyber Threats Ep 1 Vijay Kishnani, Lead Cybersecurity Engineer at CybelAngel We investigated critical external cyber threats among the world’s leading auto companies in the first half of 2021. Join us to see what we found. Fro... 7 months ago | 22 mins Load more