Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Insecure Design - Ep 4 John Wagnon, Solutions Architect, F5 Security needs to be inherent to applications. A secure design can still have implementation defects leading to vulnerabilities. An insecure design ca... 3 weeks ago | 8 mins Better vendor risk management. Less effort. Panorays’ all-in-one TPRM platform. Demi Ben-Ari, Co-Founder & CTO, Panorays An average organization has 182 vendors that connect to its systems each week. And each vendor with whom you do business provides threat actors with ... 2 weeks ago | 47 mins Extend your Boomi deployment to integrate/modernize legacy mainframes Bo Luongo, SVP Alliances, OpenLegacy Discuss how Boomi and OpenLegacy can extend your Boomi deployment to integrate and modernize legacy mainframes, mid-range, and core systems. Integra... June 28, 2022 4:00pm Prevent Digital Healthcare Fraud with Cybersecurity Solutions Lane Williams Director, Solutions Engineering, F5 Join F5 as we unpack the complex issues of today’s threat landscape for healthcare payers and providers. We will cover how security executives can nav... 4 days ago | 45 mins Managing Risk Across the Enterprise with Appian Laura and Herbert Risk management has always been a focus for financial institutions, given the inherent risk and highly regulated nature of the finance industry. Howev... 1 month ago | 24 mins Confronting Cyber Risk: Why the Orange Bank & Trust Company Adopted Biometrics Kathy Pinto (VP of Information Technology, Orange Bank & Trust), Joshua Crespo (BIO-key), Kimberly Biddings (BIO-key) As cyber threats continue to present a significant risk to commercial banks, many are rethinking and improving their authentication strategy. Even the... 1 month ago | 48 mins Not All PAM is Equal: A Guide To Securing Privileged Activity in Finance Martin Cannard, VP of Product Strategy at Netwrix Did you know that 74% of data breaches start with privileged credential abuse? In a world where cyber security is a major concern no matter which indu... 2 weeks ago | 58 mins Integrate and modernize legacy mainframes, mid-range, and core systems Bo Luongo, OpenLegacy; Fran Parras, Boomi; Ori Bar, OpenLegacy; Gemma Coupland, Boomi Join us for a virtual lunch & learn, July 6th, 12pm BST, to discuss how Boomi and OpenLegacy can extend your Boomi deployment to integrate and moderni... July 6, 2022 11:00am Dealing with the “New Normal” of Supply Chain Security Risk Barak Schoster, Sr Director, Chief Architect at Bridgecrew, Palo Alto Networks | Demi Ben-Ari, Co-Founder and CTO at Panorays The “new normal” elicits many different thoughts and emotions about the world that was and the world that is. Along with other upheavals that we’ve ex... 3 months ago | 49 mins Active Directory Masterclass: AD Configuration Strategies for Stronger Security Sander Berkouwer (Microsoft MVP and MCT), Alex McCoy (PreSales Engineer at Netwrix) Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure— but it... July 6, 2022 5:00pm Load more