Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Optimizing cloud application security through relevant ISO standards Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations The concept of cloud applications have gone a long way from the days of peer to peer file sharing to modern enterprise solutions hosted in massive dat... June 8, 2023 9:00pm Navigating the Azure Cloud Waters for File Storage Tom Rose, Nasuni; Ray Lucchesi, Silverton Consulting New digital innovations have pushed companies to reconsider their technology infrastructure, with many making the decision to utilize the cloud. As a ... June 1, 2023 5:00pm Be aware of ransomware TTPs: applying MITRE to ransomware campaigns Marc Rivero, senior security researcher, GReAT, Kaspersky Due to some technical issues, we had to re-schedule the webcast that had been previously planned for April 26. Modern ransomware has transitioned to ... June 1, 2023 2:00pm Mental Health in Cybersecurity Amanda Berlin, CEO of Mental Health Hackers + Crystal Poenisch, Mark Bliss & Bronwen Hudson How do you manage your mental health as a cybersecurity professional? Cybersecurity can be high-stakes and high-stress. Avoiding burnout is an ongoi... 19 hours ago | 40 mins How semantics simplify data sharing at enterprise level! Minh Nguyen Semantics has been a topic often associated with academia with little impact in the analytics world. However, that tendency is starting to change, fue... 2 days ago | 47 mins The Power of Observability and AIOps: Busting Myths and Sharing Realities Bill Talbot, CMO, OpsRamp and Eveline Oehrlich, Industry Analyst, Research In Action Observability and AIOps are most likely something you have heard about. But would you know how to differentiate them, explain the pros and cons of eac... 2 days ago | 51 mins Understanding the media consumer with data: A single customer view of the world IBC In the worlds of connected tv and streaming there is more data available than ever before about what people are watching and how they are watching it.... 19 hours ago | 62 mins Multi-layer SSE Threat Defenses and Security Stack Integration "Tom Clare, Sr. Director Product Marketing, Netskope Udayan Palekar, Director Product Management Netskope" Learn threat protection for web & cloud access, sharing threat intelligence, exchanging risk scores, exporting logs into XDR and SIEMs, and automating... 2 days ago | 26 mins Collaborative Frameworks for Information Sharing Corey Lynch, Fouad Hassouneh The financial industry’s approach to combating financial crime is constantly evolving, but many challenges remain. Criminals continue to develop new i... 4 weeks ago | 56 mins School of Phish: Importance of Three Categories of Protections Part 1: People Ken Dang, Sr. PMM; John Phil, Sr. SA; JT Fanning, Sr. TAM ENHANCE THE HUMAN LAYER OF CYBERSECURITY The first of this six-part series focuses on People and their role in the Importance of Three Categories of ... 7 days ago | 65 mins Load more