Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Align Your ITSM and SecOps Strategy for Unstoppable IT Eric, Sr Director of Partnership at Freshworks | Chandrashekhar, CEO at SecPod To deal with the rising number of cyberattacks, ITSM strategy should align with SecOps (Security Operations). With SecOps functions merged within the ... 2 months ago | 42 mins Quantitative Research Tooling for High Volume Financial Markets (APAC) Speakers: Conan Hales, CFA, Solutions Engineer, KX, Harry Darell Brown, VP of Product Management, Financial Solutions, KX, Quants develop – and help implement - digital transformation within firms. These ideas can change, or even revolutionize, their organization across fu... 2 months ago | 45 mins Quantitative Research Tooling for High Volume Financial Markets Speakers: Conan Hales, CFA, Solutions Engineer, KX, Harry Darell Brown, VP of Product Management, Financial Solutions, KX, Quants develop – and help implement - digital transformation within firms. These ideas can change, or even revolutionize, their organization across fu... 7 months ago | 45 mins The 5 Real Pillars of Marketing and Sales Alignment Jodi Cerretani, VP Revenue Marketing and Danilo Nikolich, VP SDR, RollWorks Did you know ABM has helped 70% of B2B marketers align marketing and sales efforts to close business more efficiently? To learn how you can make the ... 3 months ago | 41 mins High Impact Sales and Marketing Collaboration Samantha Stone, Founder & CMO, The Marketing Advisory Network It’s common sense that organizations that rally together around shared goals will drive more efficiency than those where different functions are at od... 3 months ago | 45 mins Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1 Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a bes... March 23, 2023 3:00am Using Tealium Functions to automate Email Marketing workflows Tealium Enterprise Sales Director, Debbie Barnes and Vodafone Digital Experience Specialist, Rajneesh Gautam In part 3 of the 'Art of the Possible' Vodafone workshop series, Vodafone Digital Experience Specialist - Rajneesh Gautam, takes us through use cases... 2 weeks ago | 11 mins Ed TALKS: How to Train IT Teams for Security Ed Adams, Security Innovation | Satish Janardhanan, Accenture | Vandana Verma, OWASP, Snyk | Elena Scifleet, CyberCX The modern enterprise is highly dependent on the cloud and software-driven systems. To protect them, teams need relatable training that reflects the t... March 24, 2023 7:30am A Stakeholder-led Approach to Cyber Attribution Dr Jamie Collier, Senior Threat Intel Advisor, Mandiant, Google Cloud; Shanyn Ronis, Senior Manager, Mandiant, Google Cloud Attribution assessments are an essential component of intelligence analysis. With threat intelligence one of the critical functions in The Defender's ... 4 days ago | 60 mins Overcoming Kubernetes Container Access and Scalability Challenges Brian O'Sulivan, Cloud Director of Product Management - Gigamon + Naveed Cochinwala, Distinguished Engineer - Gigamon To eliminate East-West blind spots, you must be able to acquire and inspect Kubernetes container traffic. We’ll start by explaining the fundamentals o... 4 days ago | 32 mins Load more