Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reinventing MDR With Identity Threat Protection (EMEA) Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... 3 days ago | 36 mins How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 1 week ago | 36 mins Trends in Cloud Security: Key Findings from the 2022 Thales Cloud Security Study Eric Hanselman, Principal Research Analyst, 451 Research; John McNeice, Research Analyst, 451 Research Businesses across the globe are accelerating the shift to the cloud in a modern digital world where hybrid workforces are accessing data from anywhere... 3 days ago | 50 mins The Cyber Threat Landscape: Get Ready for 2023 Panelists To Be Confirmed The social, economic and technological shifts of the past two years prompted cyber attackers to refine their methods, becoming more sophisticated and ... July 21, 2022 3:00pm Secure your enterprise with multi-factor authentication for your Salesforce Sai Ranjan, Regional Manager, Thales & Nilesh Ghorpade, IAM Principal Consultant, Persistent Cyberattacks are on the rise and passwords no longer provide sufficient safeguard against unauthorised access to the Salesforce data. The cybersecurit... 3 months ago | 44 mins Secure Your Cloud Environment from Evolving Threats Stanislav Sivak, Associate Managing Consultant, Synopsys | Arvinder Saini, Associate Principal Consultant, Synopsys As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data... 2 months ago | 59 mins [Developer Workshop] A deep dive into IDQL & Hexa Strata Identity, with speakers from Initial Capacity and Versa/MEF >> A deep dive into IDQL & Hexa: Behind-the-scenes of the new identity standard and open source software used to unify policy IDQL is the new, declar... June 28, 2022 5:00pm From VPN to VPN-less: Modernizing Secure Remote Access Seema Kathuria In this webinar, you will learn: Why using a VPN-less approach enhances security while minimizing user friction How the Duo Network Gateway helps org... June 28, 2022 5:00pm Why Identity is Key to Zero Trust Moderator: Hamish Taylor, Advisor | ex-CEO Eurostar and Sainsbury’s Bank Everyone is talking about Zero Trust. It is one of the hottest topics in the cyber security world right now. Zero Trust is an evolved security strateg... 3 days ago | 63 mins Top Six Cybersecurity Trends in 2022 Gregory Webb, Chief Executive Officer, AppViewX Challenges give birth to innovations. Gartner’s Hype Cycle for identity and access management (IAM) 2021 emphasizes the maturation of innovations that... June 28, 2022 4:00pm Load more