Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Don't Get Stung by the OWASP API Top 10 James Lee, Solutions Architect, F5 and Shahnawaz Backer, Senior Solutions Architect, F5 Recent data breaches have shown the major impact of attacks on APIs. With the steadfast adoption and growth in number of APIs, the attacks targeting t... February 2, 2023 3:00am PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 7 days ago | 46 mins Cyber Threat Profiling: Where to Start and How to Take Action Scott Small, Director of CTI, Tidal Cyber Which threats matter most to my organization? A common question from security leadership, but usually not an easy (or quick) one to answer. This sessi... February 15, 2023 6:00pm ChatGPT - good or evil? AI impact on cybersecurity Vladislav Tushkanov, Maher Yamout, Victor Sergeev, Kaspersky As the world discusses ChatGPT-3 and its impressive capabilities, the business community is concerned about the AI’s potential to change the game for ... February 15, 2023 2:00pm Dynamic Defensive Equity in a Multi-Asset Portfolio Dimitris Korovilas, PhD, Investment Product Specialist, Scientific Beta | Brendan Maton Traditional multi-asset portfolios resort to cap-weighted benchmarks to gain exposure to the equity asset class. However, this exposes the portfolio t... 3 months ago | 58 mins Cyber Resiliency - The Many Layers of Preparedness Christophe Bertrand - Practice Director, Sr. Analyst – ESG Global and Ros Schulman – Global Solution Lead - Hitachi Vantara Ransomware is a top-of-mind issue for businesses around the world. However, few organizations feel prepared to combat ransomware attacks. Join the web... February 21, 2023 5:00pm Foundational Safeguards: Building Your Cybersecurity Foundation Aaron McIntosh, ActZero |Davis Hake, Resilience |Ken Jenkins, Security Scorecard |Phyllis Lee, Center for Internet Security ‘Hosted by’ statement: This webinar series is graciously hosted by ActZero, who is a contributing member of the Blueprint for Ransomware Defense work... February 23, 2023 4:00pm Don't Get Stung by the OWASP API Top 10 James Lee, Solutions Architect, F5 and Shahnawaz Backer, Senior Solutions Architect, F5 Recent data breaches have shown the major impact of attacks on APIs. With the steadfast adoption and growth in number of APIs, the attacks targeting t... 4 weeks ago | 63 mins Defending Against Live MITRE ATT&CKs Kevin Poniatowski, Principal Security Instructor at Security Innovation Leveraging a real-world Banking Web site to demonstrate MITRE Attacks, see firsthand how hackers exploit the OWASP Top Ten and other vulnerabilities t... 1 month ago | 36 mins The Blue Team Wins | Practical Measures To Improve Defensive Operations Tim Wade Operating a Blue Team isn’t an easy task. It is often mired in too many false positives, too few conclusive investigations, and too little gratitude w... 4 months ago | 36 mins Load more