Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Midday session panel discussion! Vytautas Butrimas, Chester Wisniewski,Lars Hilse Midday session panel discussion Ziedona hall 4 years ago | 34 mins Extending Zero Trust from network to endpoint Jani Haapio Channel Systems Engineer An integrated platform approach that combines endpoint and network security is the only way to achieve holistic protection and implement the Zero Trus... 4 years ago | 29 mins ForcePoint Per Jonsson ForcePoint 4 years ago | 26 mins How to make your remote control secure Luka Mulej Sales Manager How to make your remote control secure 4 years ago | 24 mins Deep dive into cybersecurity: Why we must respond to technological cybersecurity Philipp Kalweit CEO Why we must respond to technological cybersecurity challenges in an interdisciplinary way 4 years ago | 22 mins WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend Gabriel Mazarache Solutions Architect The evolution of vulnerabilities and the attacks that follows them, what you need to know to decrease the surface of an attack. 4 years ago | 37 mins The cybersecurity dimension of critical [energy] infrastructure Vytautas Butrimas The advances in information and communications technologies have provided possibilities for new functions, features and efficiencies in remotely manag... 4 years ago | 43 mins 360 degree Cyber – cyber security modelling beyond existing industry standards Lars Hilse Independant consultant cyber security modelling beyond existing industry standards 4 years ago | 29 mins Evolution of risk – From endpoint ransomware to supply chain compromise Chester Wisniewski Principal Research Scientist Managing risk well requires an understanding of the current threats you face while looking ahead to where threats may emerge tomorrow. This talk will ... 4 years ago | 34 mins