Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A Proactive Plan for Addressing Cyber Risk Jon Oltsik, Senior Principal Analyst and Fellow, ESG Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But... September 7, 2022 1:00am Keeping Data Safe In The Cloud Dr. Michael McGrath, Sr. Director and Brian Reed, Sr. Director, Cyber Security Strategy, Proofpoint As seen in The Sunday Times centre-fold ‘Future of Data’ report in collaboration with Raconteur, Proofpoint’s Sr. Director Dr. Michael McGrath and Bri... 2 months ago | 33 mins Ensure Business Continuity with Managed DNS solutions Francesco Altomare, senior solution architect at GlobalDots How managed / dedicated DNS solutions enable business resilience by: Increasing availability, reliability, and uptime for your internal and external a... 5 months ago | 48 mins Modernization: Getting your data ready for Cloud Analytics Brian Platt * Geoff Speare Designing and architecting a cloud and data analytics solution can be challenging. Leverage our AscentData offering and a Modern Analytics Framework t... August 18, 2022 3:00pm Essential tips for automating everyday tasks in Slack Stephanie Hooppell - Senior Success Manager, Slack Nitin Kapila - Customer Success Manager, Slack For millions of knowledge workers, students and frontline workers around the world, Slack is their digital workplace and hub to communicate, collabora... August 18, 2022 6:00pm Outwit Attackers with a Proactive Cybersecurity Plan Jon Oltsik, Senior Principal Analyst and Fellow, ESG Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But... 3 days ago | 32 mins Optimize the Digital Frontline Worker Experience to Build Long-Term Resilience Jessie Stoks, Product Marketing Manager, Mitch Berk, Sr. Director, Product Management & Dave Dwyer, Staff Solution Engineer Across industries, frontline workers require instant access to mission-critical devices and information to complete their tasks, serve customers and p... 1 week ago | 26 mins Shaping the Future of Work for Frontline Workers Frank Weigel, Google Cloud & Stijn Stabel, Carrefour Belgium Frontline workers are the backbone of many organizations. But they have unmet technology needs, including legacy tools and processes that prevent them... September 8, 2022 5:00am Anatomy of an Attack: Ransomware Theory and Practice Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical ski... 1 week ago | 54 mins Zero Trust for the New Normal Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7 Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to sta... August 23, 2022 4:00pm Load more