Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 3 weeks ago | 63 mins Tech in the classroom: The educator's guide to device lifecycle management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 9 months ago | 22 mins Is your data your weakest link? Is it time to get it under control? Julian Weinberger, Field CTO and Joe Sorial VP Product Management, ShardSecure In 2023, data will be king. It’s the most important and financially valuable element of IT infrastructure. It’s a key focus for security teams, who... 2 hours ago | 37 mins Cisco Talos Incident Response (CTIR)-on Air: Recapping 2022 (Part 1 of 3) Bruce Hennigar,Threat Researcher,Nate Pors,Incident Commander,Liz Waddel,Engineering Lead,Brett Ellis,Talos Incident Response Cisco Talos incident responders recap the top threats of Q2 2022, discussing the latest attacker trends and the most prevalent malware families they'v... 60 mins ago | 46 mins Illuminate the Blind Spots: Why your security investments are failing Dawid Kowalski - Senior Director Field Engineering, EMEA, FireMon We all know the story. The threat landscape is ever-evolving and security teams have to stay ahead of the curve and protect their networks. But what i... 5 hours ago | 48 mins If the Breach Comes: Defend & Recover Your Active Directory Dirk Schrader, Field CISO, Kent Tuominen, Solutions Engineer A single improper change to an AD object can seriously damage both performance and security — so you need a solution that empowers you to quickly pinp... March 22, 2023 10:00am EMEA Cyber Threat Intelligence Webinar – Season 2 – Episode 6 Thom Bailey, Andrew Williams, Johan Dreyer, Alex Peters In this episode of the EMEA Threat Intelligence Webinar, Thom Bailey, Sr. Director, Strategy & Evangelism, was joined by Andrew Williams, Sr. Prod Mar... 6 hours ago | 59 mins Public Key Infrastructure as a Service vs. Traditional PKI Alon Nachmany, Field CISO, AppViewX While Public Key Infrastructure (PKI) is fundamental to enterprise security, traditional PKI deployments are often complex, expensive and a burden to ... March 23, 2023 2:00pm Redefining the Modern Data Stack in 2023 Luke Stanke, Field Chief Analytics Officer @ phData & Matt Curtis, Senior Director of Field Enablement @ Sigma The “Modern Data Stack” is one of the hottest topics and buzzwords in the data analytics industry today. But what does it really mean? In today’s dyna... March 23, 2023 5:00pm Overcoming the Challenges of Deploying a Microservices Data Layer on Kubernetes Allen Terleto, Field CTO at Redis, and Lars Rosenquist, Manager Partner Solution Architects at Redis Microservices architectures can be a game-changer for business agility and incremental application modernization. Join the session to discover the f... March 23, 2023 7:00pm Load more