Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open Doors and Lost Keys: Gaining visibility across your external attack surface Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—a... 2 months ago | 27 mins Deep Fakes, Disinformation and Social Engineering Etay Maor, Chief Security Officer, IntSights In information security, we always talk about PPT – People, Processes, and Technology. We tend to focus mostly on the tech: new sophisticated malware,... 3 years ago | 61 mins Navigating the Storms of Geopolitically Charged Cyberattacks Chad Skipper, Karen Worstell, and Rick McElroy Successfully navigating the never-ending wave of cyberattacks presents many challenges for incident responders. In this webcast, we will examine the g... 5 months ago | 56 mins Navigating the Storms of Geopolitically Charged Cyberattacks Chad Skipper, Karen Worstell, and Rick McElroy Successfully navigating the never-ending wave of cyberattacks presents many challenges for incident responders. In this webcast, we will examine the g... 5 months ago | 56 mins Fake News and Deepfakes: Harmless Fun or the Future of Fraud? Erich Kron, Javvad Malik We have all seen them. Fake news articles that get passed off as legit sources. Misleading memes. Entertaining videos that swap people’s faces. But wh... 3 years ago | 62 mins Is there a coming 'Phishpocalypse'? Phil Syme, Distinguished Engineer, Cloudflare Deep language-based neural networks are surprisingly good at generating and detecting text of all forms. Some AI labs have been hesitant to release t... 7 months ago | 48 mins Solving Problems with ML: ID Fake News Through Natural Language Processing Mike Tamir - Chief Scientist and Head of Machine Learning, SIG Recorded at Rev 2 | May 23-24, 2019 | New York Day 1 - Practitioner - SIG In this talk, we explore real-world use case applications for automated “F... 4 years ago | 31 mins How to Combat Fake News & Disinformation being used to Attack Your Organisation Jacqueline Jayne A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you e... 2 years ago | 21 mins Combat the Fake News and Disinformation Being Used to Attack Your Organization Stu Sjouwerman (KnowBe4’s Founder and CEO), Perry Carpenter (KnowBe4’s Chief Evangelist and Strategy Officer) A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you e... 3 years ago | 61 mins Who’s In Control: Human or Machine? Lei Chen, Marcus by Goldman Sachs, Gagan Sekhon, MoneyLion, Neha Wattas, JPMorgan Chase, Ashish Jain, Arkose Labs As finance becomes more digital and real-time, protecting their digital platforms is becoming increasingly challenging as attackers adapt their approa... 4 months ago | 56 mins Load more