Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1 Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a bes... February 14, 2023 4:00pm How Dow Chemical Leverages Onapsis for Proactive Security & Compliance Brian Tremblay Compliance Practice Leader - Onapsis, Jeff Miller CISA, CISSP Cybersecurity Manager - The Dow Chemical Company Traditionally, cybersecurity and compliance have been two very separate functions where oftentimes the misalignment has been emphasized more than alig... February 7, 2023 9:00am How to Modernize your SOC, Simplify Endpoint Security, and Reduce Risk Justin Flack and Laura Flores Security and infrastructure teams work diligently to harden, prevent, detect, and respond to threats, but it’s becoming an increasingly challenging ef... February 9, 2023 4:00pm Wiz & CIO: Container Security Strategies for Builders and Defenders Swaroop Shan, Product Marketing at Wiz and Anne Taylor, Strategist at CIO The speed of application development has accelerated, thanks to the use of container technology. However, organizations are encountering challenges – ... 4 weeks ago | 17 mins PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 2 weeks ago | 46 mins Unlocking Your E5 Investment with MDR for Microsoft Kurtis Armour, VP Product Management and Patrick Arnone, Product Manager at eSentire With Microsoft offering a cost-effective and highly integrated security stack that covers endpoint, email, cloud, identity and more, many organization... 2 months ago | 55 mins LockDown 2022: Windows Updates & Patches: What to know in 2022 to stay secure! Susan Bradley, Microsoft MVP Patching may not be enough, look to use attack surface reduction rules which assist in protection against zero-day attacks. Windows 11 will be a slow ... 4 weeks ago | 58 mins A Preview of Coming Attractions: The 2023 Threat Landscape Scott Small, Director of Cyber Threat Intelligence, Tidal Cyber As we kick off 2023, the volume of cyber threats remains exceptionally high. Adversaries are continuously evolving their techniques in an effort to st... 4 weeks ago | 56 mins It’s Great to Detect a Breach, but Better to Detect the Attacker Mark Alba, Chief Product Officer, Anomali Focusing on Threat-Based Detection is the Key to Your Ability to Detect Attacks The “cat-and-mouse” game between Attackers and Defenders is as old as... 1 month ago | 26 mins Microsoft Defender for Cloud Apps Katie Flinn, Senior Product Architect for Microsoft 365 See Microsoft 365 Defender policies in action. Learn how you can protect your organization from malicious breaches, detect anomalous user behavior and... 4 months ago | 58 mins Load more