Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Devising the Right Data Loss Prevention Strategy: ML & The Human Factor Connie Stack - CEO, Next DLP and Dr Rebecca Wynn - CISO, Click Solutions Group In 2023, data is dynamic. In a world of hybrid working, people, users and the data they create, manipulate and share across seemingly endless channels... June 7, 2023 4:00pm Ransomware Groups Negotiation Tactics: What You Need to Know Marc Rivero, Senior Security Researcher, Global Research and Analysis Team, Kaspersky Cybercriminals tend to be secretive and act without disclosing their identity. However, when it comes to ransomware negotiations, the victim and the a... 1 week ago | 39 mins 2023 Email Security Trends & Cyber Risk Prevention Practices Garrett O’Hara and Daniel Mcdermott, Mimecast APAC Cybercrime is expected to cost the world $8 trillion; more than 70% in APAC have experienced an increase in email-based threats; and upwards of 72% of... 1 month ago | 55 mins 3 Steps To Protect Cloud Data in the Wake of the Pfizer Data Leak Hank Schless and Mahesh Rachakonda We often associate breaches with corporate espionage and advanced threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has act... 8 months ago | 37 mins Prevent Insider-Led Data Leaks Without Compromising User Privacy Itir Clarke, Manager of Product Marketing and Nirav Shah, Staff Product Manager The powerful forces of the cloud and mobility have spurred greater collaboration and more distributed workforces. With this development, companies hav... 2 years ago | 31 mins Stop Data Breaches in Your Third-Party Ecosystem Todd Carroll, CybelAngel CISO and David Sygula, Sr. Cybersecurity Analyst Today’s enterprise supply chains include hundreds of third and Nth parties extending across the globe. These complex, third-party ecosystems require d... 3 years ago | 31 mins Cloud Security Threat - Cloud Monitoring and Breach Prevention James Johnson, Cloud Security Specialist, Proofpoint In this session we explore the threats associated with cloud security, breach monitoring and prevention. We also explore how organizations can protect... 2 years ago | 55 mins Breaking the Chain: Hindering the Ransomware Killchain Todd Carroll, CISO & VP Operations at CybelAngel Ransomware is a clear and present danger to companies and global supply chains. With ransomware attacks crippling gasoline, food, and healthcare in th... 2 years ago | 15 mins Open Doors and Lost Keys: Gaining visibility across your external attack surface Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—a... 4 months ago | 27 mins Data leak prevention technologies – a critical piece of the GDPR compliance puzz Alexei Lesnykh As the countdown for the full enforcement of General Data Protection Regulation has begun, organizations of any size and industry across the European ... 7 years ago | 32 mins Load more