Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frictionless Fraud Prevention: Stopping Fraud Without Adding Friction Daryl Huff, VP Advanced Development at Jumio Fraud attack sophistication is constantly evolving and increasing, putting businesses at risk. The Association of Certified Fraud Examiners and Grant ... 4 days ago | 22 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 2 weeks ago | 45 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 2 weeks ago | 45 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 4 weeks ago | 60 mins How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 1 month ago | 63 mins Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... May 4, 2023 2:00pm Implement best practice IAM and zero trust Vincent Amanyi, Founder | Boleaum Inc. Tune into this session, presented by Boleaum Inc.'s Vincent Amanyi, to learn how to implement a best practice identity access management (IAM) framewo... April 4, 2023 10:00pm Matter and Smart Home Cybersecurity Explained Mitch Mershon, Product Marketing Manager; Guillaume Crinon, Director of IoT Business Strategy, Keyfactor Matter is the converging standard for Smart Home automation and includes a built-in security layer which makes it easier for manufacturers to build st... 1 day ago | 30 mins The Pragmatic Approach to Zero Trust with Deep Observability Ian Farquhar Gigamon CISO and Matthew Plummer Gigamon Public Sector CTO Zero Trust not going as planned? Hear our CTOs explain why deep observability is foundational for a robust ZTA model. The science fiction writer, W... April 4, 2023 1:00am Centralize Data Security Governance with Dremio & Privacera Brett Roberts, Principal Solution Architect, Dremio, Lovelesh Chawla, Director of Sales Engineering, Privacera With the explosive growth in data volumes, data access requests, and interest in data democratization, data security and governance has become more im... April 4, 2023 3:00pm Load more