Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Introduction to cybersecurity with Ubuntu Pro on Azure Government Chris Huffman - VP of Public Sector, James HiIliard - Chief Architect, David Anstine - Cloud Solution Architect US government agencies and organizations in government-regulated industries face a huge challenge in complying with regulations and standards in order... 6 days ago | 41 mins How Security Integrators Can Help Organizations Avoid Costly Oversights John Gallagher, Vice President, Viakoo Labs Physical security teams are being asked by their IT and Cybersecurity teams to perform (at significant time and effort) more comprehensive cyber hygie... July 20, 2022 5:00pm Introduction to confidential computing on public clouds with Ubuntu Chris Huffman - VP of Public Sector, Ijlal Loutfi - Security Product Manager Public clouds are great! Yet, many users are still reluctant towards moving their security-sensitive workloads away from their private data centers an... 1 month ago | 47 mins OT:ICEFALL – How to Tackle a Decade of Insecure-by-Design Practices in OT Daniel Dos Santos, Head of Security Research, Vedere Labs Forescout's Vedere Labs announced on June 21 the disclosure of "OT:ICEFALL": 56 vulnerabilities related to insecure-by-design functions affecting devi... July 14, 2022 3:00pm OT:ICEFALL – How to Tackle a Decade of Insecure-by-Design Practices in OT Daniel Dos Santos, Head of Security Research, Vedere Labs Forescout's Vedere Labs announced on June 21 the disclosure of "OT:ICEFALL": 56 vulnerabilities related to insecure-by-design functions affecting devi... 2 weeks ago | 26 mins Tackling Security Through the Supply Chain Tim Lewis, Insyde Software and Alex Matrosov, Binarly The process of addressing a firmware security issue can be long and complex. This webinar will provide recommendations for moving security updates int... 2 months ago | 40 mins IoT Governance: Applying Policies to Teams That Don't Report to You John Deskurakis, Carrier Corp; Maria Sumnicht, former Chief Architect New York City Cyber Command Many organizations with robust information security policies struggle to extend those policies to IoT devices. Whether it is because these devices ar... 1 month ago | 51 mins Assessing Enterprise Firmware Security Risk - 2021 Steve Mancini, Malcolm Harkins, Ed Amoroso 2020 saw a dramatic increase in firmware level threats, including widespread attacks against VPN devices, newly discovered UEFI implants, and a new Tr... 10 months ago | 62 mins Enterprise Best Practices for Firmware Updates John Loucaides, VP of Research and Development and Steve Mancini, CISO, Eclypsium Enterprises typically spend significant resources managing, patching and updating their software. The same processes and thoroughness are often not in... 9 months ago | 63 mins Making Software “Just Work” on IoT Devices! Dong Wei, Lead Standards Architect and Fellow, Arm Limited * This presentation focuses on the Arm SystemReady ES and IR program that makes software “just work” on IoT devices * It describes the hardware and fi... 6 months ago | 42 mins Load more