Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Devising the Right Data Loss Prevention Strategy: ML & The Human Factor Connie Stack - CEO, Next DLP and Dr Rebecca Wynn - CISO, Click Solutions Group In 2023, data is dynamic. In a world of hybrid working, people, users and the data they create, manipulate and share across seemingly endless channels... March 30, 2023 4:00pm 3 Steps To Protect Cloud Data in the Wake of the Pfizer Data Leak Hank Schless and Mahesh Rachakonda We often associate breaches with corporate espionage and advanced threat groups, but as the Pfizer IP leak incident showed, cloud connectivity has act... 6 months ago | 37 mins Open Doors and Lost Keys: Gaining visibility across your external attack surface Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—a... 1 month ago | 27 mins Prevent Insider-Led Data Leaks Without Compromising User Privacy Itir Clarke, Manager of Product Marketing and Nirav Shah, Staff Product Manager The powerful forces of the cloud and mobility have spurred greater collaboration and more distributed workforces. With this development, companies hav... 1 year ago | 31 mins Podcast: Defaced Subreddits, Intel Leak Drama on Twitter, and more Photon Research Team Alex, Kacey, and Charles host this week’s ShadowTalk, bringing you the latest in threat intelligence. In this episode they cover: - Defaced subreddits... 3 years ago | 22 mins Security Leaders' Panel: Has Phishing Reached a Crisis Level? Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who strugg... 2 years ago | 80 mins Data in the Cloud: Prevent Data Breaches from Misconfigured Buckets Julia Osseland, Product Specialist at CybelAngel Easy, scalable, and robust: cloud storage is a no-brainer for 83% of businesses worldwide who store sensitive information on the cloud (McAfee). Still... 2 years ago | 30 mins Podcast: Defaced Subreddits, Intel Leak Drama on Twitter, and more Photon Research Team Alex, Kacey, and Charles host this week’s ShadowTalk, bringing you the latest in threat intelligence. In this episode they cover: - Defaced subreddits... 3 years ago | 22 mins The Rise of DevSecOps Michelle McLean (StackRox), Alex Peay (SaltStack), Matthew Rose (Checkmarx) & Brian Soldato, ReversingLabs As CISOs are """"moving left"""" and integrating DevSecOps technologies into the daily routine of developers, testing and securing their own code is b... 3 years ago | 42 mins Cloud Security Threat - Cloud Monitoring and Breach Prevention James Johnson, Cloud Security Specialist, Proofpoint In this session we explore the threats associated with cloud security, breach monitoring and prevention. We also explore how organizations can protec... 2 years ago | 55 mins Load more