Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Secure Your Gaming Development Pipeline with Lacework and AWS Karthik Odapally, Sr. Solutions Architect for Games - AWS | Trevor Milestone - Lacework | Jeff Fry - Lacework The global gaming market is expected to reach $200 billion in revenue by 2024,* making it a high-value target of cyber criminals. Cyber attacks can de... 1 year ago | 54 mins Best Practices for Cloud Infrastructure Entitlement Management (CIEM) Lior Zatlavi, Senior Cloud Security Architect, Ermetic As organizations migrate to the cloud, securing human and machine identities in production environments is critical, but cloud complexity and necessar... 4 months ago | 54 mins 5 anomalies to watch out for in your network Siddharth, IT Security Expert Unusual events occur in a network that is under attack. These events, called anomalies, can be tracked by security teams to identify and investigate p... 9 months ago | 54 mins Technology as a Disrupter to Financial Crime TIBCO: Nelson Petracek, CTO, Jesus Centeno, CoS, and Eastnets: Saeed Patel, Grp PDM Director, Seun Sotuminu, Data Scientist Financial crime involving money laundering and fraud has caused irreputable damage to customers and to the integrity of financial institutions. Crimin... 1 year ago | 29 mins Technology as a Disrupter to Financial Crime TIBCO: Nelson Petracek, CTO, Jesus Centeno, CoS, and Eastnets: Saeed Patel, Grp PDM Director, Seun Sotuminu, Data Scientist Financial crime involving money laundering and fraud has caused irreputable damage to customers and to the integrity of financial institutions. Crimin... 1 year ago | 29 mins Detecting and Responding to Zero-Day Attacks Mark Sangster, Rob McLeod, Keegan Keplinger, Jared Myers Join eSentire and VMware Carbon Black’s leading threat researchers, who are on the front lines of hunting and discovering these vulnerabilities, for t... 2 years ago | 32 mins Technology as a Disrupter to Financial Crime TIBCO: Nelson Petracek, CTO, Jesus Centeno, CoS, and Eastnets: Saeed Patel, Grp PDM Director, Seun Sotuminu, Data Scientist Financial crime involving money laundering and fraud has caused irreputable damage to customers and to the integrity of financial institutions. Crimin... 1 year ago | 29 mins Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco Pawan Shankar, Director, Secure Product Marketing, Sysdig & Vicente Garcia, Technical Marketing Engineer, Sysdig Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. Examples include: - Exploits of unpatch... 3 years ago | 70 mins UEBA Explained: Using User & Entity Behavior Analytics to Stop Advanced Threats Mike Parkin, Technical Marketing Engineer, Gurucul UEBA is the scientific process of transforming user and entity behavior data into risk-prioritized intelligence, for the purpose of driving business a... 3 years ago | 32 mins Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Brenden Bishop, Data Scientist, the Columbus Collaboratory Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corpo... 4 years ago | 44 mins