Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Connection Is the New Currency: Meet Customers When It Matters Erin Fitzgerald, Director, Client Revenue Operations at CloudKettle In our always-on digital world, the refrain “serve up the right message at the right time to the right person,” is always at the forefront. The need t... 2 months ago | 33 mins Optimize your algo trading models: Tick data best practices Nick Laurence, Vice President, Marketing Communications, KX As the financial world seeks to optimize proprietary pricing and trading strategies, the huge volume of tick data demands models that can deal with mu... 2 months ago | 49 mins Leveraging the MITRE ATT&CK framework to operationalize threat intelligence Ben Cook, Solutions Architect & Ryan Roobian, Architect - Mandiant Threat Intelligence covers an incredibly broad scope when it comes to cyber operations. Too often this is reduced to threat data feeds aimed at enrich... 2 weeks ago | 53 mins Pragmatic Risk-Based Cyber Security Peter Wood, Partner, Naturally Cyber LLP Our cyber enemies are sophisticated and strategic with clear objectives and lots of resources. To counter their attacks, we need a pragmatic approach ... 2 weeks ago | 39 mins Reduce Noise From Intel Sources With TruSTAR + ES Elvis Hovor, Product Management, Splunk | Erick Ingleby, Director of Security Analytics, Product Management, Splunk Industry reports on security operations practices cite high false-positive rates and noise from threat intelligence feeds as a top issue affecting sec... August 3, 2022 5:00pm Reduce Noise From Intel Sources With TruSTAR + ES Elvis Hovor, Product Management, Splunk | Erick Ingleby, Director of Security Analytics, Product Management, Splunk Industry reports on security operations practices cite high false-positive rates and noise from threat intelligence feeds as a top issue affecting sec... 1 month ago | 23 mins Blueprint for Managing Regulatory Challenges in Highly Regulated Industries Tim Carbery, CastleHill Managed Risk Solutions, SK Karanam, Wolters Kluwer and Corey Carpenter, Archer Managing rapidly changing regulations is a problem that many companies face, especially in highly regulated industries. Failure to comply with changes... 1 month ago | 60 mins Why a Threat Intel Platform is the Pivotal Solution in Your Security Stack Gino Rombley, Senior Solutions Engineer, Anomali Threat data is everywhere, it comes from IT systems in our corporate networks, third-party threat intelligence feeds and is even reported in our local... 2 months ago | 26 mins Customer Spotlight: Cameron County, TX Embraces Zero Trust Approach with iboss Richard Quinones Join Juan Saldana, CTO of Cameron County, Texas, Richard Quinones, iboss Senior Vice President, Public Sector, and Mike Robbins, iboss Customer Succes... 1 month ago | 44 mins Cybersecurity Challenges Facing Remote Operators of OT & Critical Infrastructure Bill Moore, CEO & Founder, XONA Systems U.S. critical infrastructure must guard against malicious cyberattacks by implementing encryption and authentication at all access points for connecte... 2 months ago | 62 mins Load more