Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Endpoint Security Alphabet Stew Must Include VM and PM Charles Kolodgy, Adjunct Professor, Rivier University | Principal, Security Mindsets Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of s... 3 weeks ago | 37 mins Live Attack & Defend Demo [EMEA] Tom Brown (EMEA Lead Falcon Complete, CrowdStrike), Alex Sayavedra (Director - Falcon Complete) Join the Falcon Complete Team for a live Attack & Defend Demo. In this scenario we will showcase ITP managed by Falcon Complete. The scenario entails ... August 16, 2022 9:00am Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA] Jason Rivera, Senior Director - Strategic Threat Advisory Group As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cybera... August 25, 2022 9:00am Remote Support Tools: Then vs Now Chris Handley, Senior Product Manager at GoTo, and Marie Ruzzo, Product Marketing Director (Remote Support Group) at GoTo Remote support tools have long been a staple of support operations and an indispensable tool to diagnose, troubleshoot, and fix a customer’s technical... August 30, 2022 4:00am A Partnership Initiative of Industry and Academia Deveeshree Nayak, Assistant Teaching Professor, University of Washington At present, Cyberattacks are not limited to any particular industry. Academia and industries must work together to determine solutions to protect the... 3 weeks ago | 29 mins Enhance Your Users’ Experience, Security, and Productivity from Day 1 Lisa Matragrano, Adarsh Kesari, Taylor Boring Want to know how you can achieve seamless, secure onboarding that balances employee experience, management, and security? Join our expert panel as the... 1 month ago | 44 mins Vulnerability Management in 2022: Reduce Your Attack Surface Diana Kelley, Cybrize | Edward Rowley, Proofpoint | Richard Meeus, Akamai | Erick Galinkin, Rapid7 In 2022, your attack surface will be larger than ever before. From the onset of the hybrid workforce to huge waves of data being produced, security te... 2 months ago | 62 mins SANS protects: The Endpoint Matt Bromiley, Nirav Shah (Cisco), Zach Wasserman (FleetDM) This SANS Protects webcast will examine threats to one of the most sizable assets of any organization: the endpoint. Endpoints are necessary for emplo... August 10, 2022 5:00pm Optimize the Digital Frontline Worker Experience to Build Long-Term Resilience Jessie Stoks, Product Marketing Manager, Mitch Berk, Sr. Director, Product Management & Dave Dwyer, Staff Solution Engineer Across industries, frontline workers require instant access to mission-critical devices and information to complete their tasks, serve customers and p... 11 hours ago | 26 mins Cybersecurity for Edge AI & Edge AI for Cybersecurity: Synergies and Challenges Jérémie Farret, VP, Advanced Analytics & Artificial Intelligence, Inmind Technologies A deep transformation has been happening these past three years in every aspect of the modern workplace, with the widespread introduction of remote wo... August 10, 2022 5:00pm Load more