Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Making cyber-threat intelligence programs effective and impactful Jon Oltsik- Distinguished Analyst & Fellow with Enterprise Strategy Group & TJ Alldridge- Product Marketing Manager, Mandiant Most organizations have cyber-threat intelligence programs in one form or another, but the tough-to-face fact is that many only achieve tactical succe... 2 days ago | 32 mins Preventing Phishing Attacks Emily Laufer, Threat Research Product Marketing Manager at Zscaler With so many teams working remotely, employees at home have become the new network perimeter. This flexible new definition of “workplace” and BYOD pol... 2 days ago | 28 mins Beyond the Endpoint – Tackling Your Biggest Cybersecurity Problems TJ Nelson, Director, Information Security Research, Secureworks; George Anderson, Sr. Product Marketing Manager, Secureworks An overreliance on endpoint detection and response (EDR) alone is bound to leave holes in your cyber defense. That’s because cybersecurity incidents n... April 4, 2023 1:00pm Building an Incident Response Plan (IRP) to address ransomware attacks David Muniz, cybersecurity expert at senhasegura | Gabriel Oba, Product Owner at senhasegura Building an Incident Response Plan (IRP) is a critical step for addressing any cyberattack, but it is especially important for ransomwares. An IRP out... 2 weeks ago | 37 mins Going Back to Basics: Solid Endpoint Security Practices for SMB Success Andrew Namisi, Senior Presales Engineer, Kaspersky and John Bruggeman, Chief Information Security Officer, Consulting - CBTS Mitigating the risks that attacks pose to an entity can be the difference between an SMB growing and succeeding - or it falling victim to a malicious ... April 4, 2023 8:00pm Mitigating Cyber Risk: Insights from the Front Lines of Cyber Insurance Brook Dutcher, Allied World Assurance Company | Nick Jajko, Freeman Mathis & Gary, LLP | Larry Slusser | Jennifer Mulvihill According to the Coalition’s 2022 Report on Cyber Claims, the average ransom demand made against its policyholders increased 20% in 2021 to $1.8m. Thi... April 12, 2023 4:00pm Endpoint Security and SOC Strategies to Enhance Effective Threat Response Justin Flack and Laura Flores Security and infrastructure teams work diligently to harden, prevent, detect, and respond to threats, but it’s becoming an increasingly challenging ef... 3 weeks ago | 35 mins Endpoint Security and SOC Strategies to Enhance Effective Threat Response Justin Flack and Laura Flores Security and infrastructure teams work diligently to harden, prevent, detect, and respond to threats, but it’s becoming an increasingly challenging ef... 3 weeks ago | 35 mins Value-Tiers, Clusters & Triggers: How To Put Your Customer Data To Work Andrew Locke, Director of Strategy & Data, Response Labs A presentation/workshop that walks through the steps email marketers can take to make their customer data work for them. Participants will learn how t... 2 weeks ago | 22 mins Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... 1 week ago | 61 mins Load more