Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date SOC 2 Bootcamp: Part 3 - Evidence Collection Monica McMahen, Director of Demand Generation and Jitendra Juthani, Director of InfoSec Risk and Compliance SOC 2 is a well-defined process, but every company has to customize it to their unique business. To help you understand what this entails, we are brea... July 6, 2022 6:00pm Windows Incident Response webinar. Live analysis with PowerShell Ayman Shaaban and Kai Schuricht, Kaspersky Global Emergency Response Team (GERT) According to Kaspersky Incident Response Analyst report, an incident can exist undetected in the system for hours and days to months and even years - ... 5 days ago | 103 mins Security is Important - Said No Developer, Ever Garry Owen - Senior Solutions Marketing Manager, VMware EMEA Do you know anyone on the development team who'd say, "security should be everyone's responsibility"? Probably not. Yet, evidence shows that when it i... 1 week ago | 24 mins Standardization of quality care Hashem Kanafani, Mohammad Al-Qazaq The standardization of quality care can be achieved through a consistent source of evidence-based information. This consistency can also create operat... 2 weeks ago | 32 mins Are you prepared for the next attack? (Can you prove it?) Babu Kandula, Architect, Systems Solutions, APAC Today’s risk-aware business environment is putting unprecedented pressure on CISOs and their teams to secure corporate assets and protect their organi... 1 week ago | 55 mins Watermark Solution Tour: Applying Indirect Measures to Outcomes Assessment Hunter Simmons, Watermark Solution Engineer Direct and indirect measures work together to create a complete picture of student learning, but it can be challenging to capture and connect indirect... 1 week ago | 28 mins Live Demo: CyberStrong Continuous Control Automation Padraic O'Reilly, Chief Product Officer & Co-Founder | Michael Blumreich, Sales Engineer Until now, the process of assessing an organization’s cybersecurity risk posture against a framework or standard has been manual. CyberStrong’s contin... July 12, 2022 7:00pm The Rush to MDR Services - Osterman Research Report 2022 Michael Sampson, Senior Analyst, Osterman Research & Willy Leichter, CMO, LogicHub The managed cybersecurity services market is undergoing a significant shift. Organizations are upgrading from alert-oriented Managed Security Service ... 1 week ago | 52 mins New Advances in Information Security Assurance and Compliance for IT Departments Max Pruger, GM Compliance IT professionals who work in small to medium sized organizations are under increasing pressure – and scrutiny – to comply with IT requirements coming ... 2 weeks ago | 41 mins Mobile Elite: Powerful and Accessible Mobile Extractions at Your Fingertips Ashley Hernandez- VP of Product Management with Cellebrite Enterprise Solutions Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages a... July 20, 2022 5:00pm Load more