Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 3 weeks ago | 49 mins Delivering Advanced Threat Protection for OT Environments Vik Iyer, CIO Marketing Services, Foundry; Fortinet: Joe Robertson, Antoine d’Haussy, Aasef Iqbal Industry and infrastructure are becoming an increasingly attractive target for hackers, who may be motivated by money or under the control of a nation... 3 hours ago | 25 mins STRONGER 2022: Enterprise IoT Security Sucks - A Story of 2 Million Devices Brian Contos, Chief Security Officer at Phosphorus Cybersecurity Working globally with Fortune 500 enterprises and government agencies, we’ve interrogated over two million production IoT devices. Across these two mi... February 9, 2023 6:30pm Get Proactive for Ransomware: Learn Why Karin Shopen & Anthony Giandomenico As organizations, networks, and personnel change, ransomware readiness does too. Watch this webinar to get first-hand knowledge on preparing for ranso... February 9, 2023 6:00pm Moving Target Defense for Space Systems Chris Jenkins ( Sandia National Laboratories) Space systems provide many critical functions to the military, federal agencies, and infrastructure networks. Space Policy Directive-5 Cybersecurity P... February 9, 2023 7:00pm Navigating Cybersecurity Threats, Challenges and Innovation in 2023 Augusto Barros, Cyber Security Evangelist; Findlay Whitelaw, Insider Threat; Kayzad Vanskuiwalla, Customer Success The threat landscape will continue to change creating new challenges for organizations. How will threats that are relevant today evolve in 2023? Will... 1 week ago | 46 mins Back to the Future: What Will Endpoint IR Really Look Like? Greg Scheidel, SANS | Robert Fink, BlackBerry Let’s go back, way back to 2013 when AV was AV, whitelisting was whitelisting, and EDR ads were taking over airport terminals. Ah, the good old days. ... 2 days ago | 63 mins Be Prepared, Not Scared of Ransomware Attacks Nicholas Hughes - Strategic Account Executive, Hitachi Vantara, and Graeme Down - Solutions Consultant, Hitachi Vantara With the rising threat of ransomware attacks, businesses need to have a fast, predictable, and reliable plan in place for when their systems are infec... February 10, 2023 10:00am Live Talk: Building a safer future in Manufacturing Didi Ismawan The manufacturing industry is undergoing huge transformation. At the same, it faces unprecedented challenges from accelerated adoption of Industry 5.0... February 14, 2023 5:00am Navigating Cybersecurity Threats, Challenges and Innovation in 2023 Augusto Barros, Cyber Security Evangelist; Findlay Whitelaw, Insider Threat; Kayzad Vanskuiwalla, Customer Success The threat landscape will continue to change creating new challenges for organizations. How will threats that are relevant today evolve in 2023? Will... 2 weeks ago | 46 mins Load more