Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... May 18, 2022 4:00pm 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disclosure, modification or destruction of data, pri... 11 hours ago | 11 mins Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs Chandu Ketkar, Director Security Architecture Practice at Synopsys and Himanshu Tiwari, Managing Consultant at Synopsys What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does t... May 19, 2022 9:00am TDM for the Win: How Test Data Management Enables Continuous Testing Wilhelm Haaker - Director, Solution Engineering & Jeff Peeples - Senior Product Manager Shifting integration testing left is often difficult due to shared backend services and resources. Teams that share testing data sources and environme... May 24, 2022 4:00pm Specialized ITSM for Hybrid Work & Global Teams II: Managing Cloud-Native Apps Francesco Altomare, Regional Sales Manager S. Europe at GlobalDots & Ovidio Maiuri, Chief Digital Officer at Challenger Stone ITSM solutions to manage the productivity, security and compliance of today's work, workforces and workplaces - PART 2 Join us to learn about the cha... May 18, 2022 9:00am Evaluating and Implementing Security in the Cloud Yaniv Bar-Dayan, Vulcan Cyber CEO / Melinda Marks, ESG / Mark Guntrip, Menlo Security / Dan Mellen, Accenture Watch this Dark Reading webinar and learn how to evaluate and implement cloud security technologies including the latest cyber risk management solutio... 3 weeks ago | 46 mins When UI Testing Hits the Wall, Break Through With API Testing Jeff Peeples, Senior Product Manager, Adam Attanasio, Product Manager The user experience for web applications is critical. If your application’s user interface isn't fully tested, it likely won't work as expected and yo... 6 days ago | 38 mins Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... May 18, 2022 5:00pm How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... May 17, 2022 4:30pm Avoid The Top Five Breach-Inducing Mistakes and Mitigate Log4Shell Risk Yaniv Bar-Dayan, Vulcan Cyber CEO; Ali Naqvi, Vulcan Cyber Sr. Director Solutions Architects We must learn from our mistakes. Exploits work, breach happens, and threat actors succeed because after decades of cyber security effort we are still ... May 17, 2022 6:00pm Load more