Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Multi-Signal Defense Kill Chain: Strengthening Combat Capabilities in Intrusions Keegan Keplinger, Research and Reporting Lead, eSentire; Brandon Dunlap, Moderator Cybersecurity teams are fighting a losing battle trying to keep up with complex business requirements and the expanding attack surface. Although tradi... May 19, 2022 5:00pm Container and Kubernetes Security Best Practices: Forensics & Incident Response Jake Williams, SANS Analyst and Daniella Pontes, Security Product Marketing Manager, Sysdig Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements a... May 26, 2022 5:00pm Data Forensic Investigations Exploitation by Concept Searching Warren Kruse, Bobby Malhotra, and Robert Kruse As data volumes are exploding, so too are the potential data sources that require analysis for investigations. Wading through such volumes can take ti... 3 months ago | 59 mins Workshop: Troubleshooting Tips & Techniques for Cloud Monitoring and Security Andy Idsinga: Sr. Cloud Architect & Ron Stein: Dir Product Marketing at cPacket Service assurance, application monitoring and cloud security rely on network visibility across the board in a hybrid cloud and multicloud environment ... 1 month ago | 63 mins Remote Mobile Collection for Corporate Investigations Ashley Hernandez 95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile ph... 9 months ago | 29 mins The Hierarchy of TAR: From Active Learning to Optimal Results Jonathan Flood, Stephanie Urbano, Andrew Retizos, and Robert Lin As leading legal departments and law firms move from asking about Technology-Assisted Review (TAR) to asking for it, it is increasingly essential for ... 2 months ago | 62 mins How to resolve phishing incidents faster through automation Akhila Managoli, staff information security engineer, ServiceNow & Matt Seller, senior digital forensics engineer, ServiceNow Make sure you don’t get caught this Phishing Season. Join Akhila Managoli, staff information security engineer, and Matt Seller, senior digital forens... 12 months ago | 35 mins In-House Digital Forensics Team: Modern Information Security Program 'Must Have" Gregory Braunton National Director, Threat Management, Incident Response & Forensics Catholic Health Intiatives Litigation happens. Is your preservation, collection, presentation and reporting function legally defensible? Likewise, do you have events within your... 3 years ago | 55 mins Charting the chemical reaction space for DNA-encoded library design Dr Andreas Brunschweiger, Professor at Chemistry and Chemical Biology of TU Dortmund DNA-encoded libraries (DELs) are a powerful technology for target-based small molecule screening. DEL design raises the question of chemical reaction ... 7 months ago | 49 mins Reaction condition prediction using Reaxys: from raw data to best-in-class model Timur Madzhidov , Assistant Professor, Department of Organic and Medicinal Chemistry, Kazan Federal University Do you find it a challenge selecting optimal reaction conditions in the development of a synthesis strategy, or are you developing different approache... 7 months ago | 45 mins Load more