Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Protect Your Digital Business Rafe Pilling, Senior Security Researcher, Counter Threat Unit; Emma Jones, Proactive Incident Response Consultant How to Protect Your Digital Business: 3 Top Success Factors to Securing Your Digital Workforce Watch our webinar to discover the impact digital trans... July 27, 2022 1:00pm Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... August 23, 2022 8:00am Be Confident In Your Web Application and API Security Fulya Sengil,Prisma Cloud Sol Architect, Palo Alto; Pasquale Russiello, Prisma Cloud Sol Architect; B.Dunlap, Moderator According to Verizon "2022 Data Breach Investigation Report," Web Application attacks are the number one vector in breaches. Moreover, Web Application... July 7, 2022 12:00pm Key Insights on the Future of Cybersecurity Profession in the UK Clar Rosso, CEO, Moderator, Jon France, CISO, Tara Wisniewski, EVP – Advocacy, Sanjana Mehta, Senior Director – Advocacy The UK has a dynamic cybersecurity policy landscape. With the formation of the UK Cyber Security Council, and government’s recent consultation on prop... 4 days ago | 59 mins Second Order Cyber Risk: Exposing Your Blind Spots Peter Hay, Lead Instructor, SimSpace; Brandon Dunlap, Moderator The very activities that cybersecurity teams do to make their organizations safe can create additional risk for the organization. Defenders can uninte... 3 days ago | 57 mins Planning for COMPLETE Recovery from a Ransomware Attack Josue Guzman, Sr. Technical Account Mngr, Synology; Brandon Dunlap, Moderator Accidents and attacks can happen – no matter how airtight your security practices are. As ransomware threats continue to surge, businesses struggle to... July 7, 2022 5:00pm Unconscious Bias Series (Part 1): Understanding Bias Suri Surinder, CEO & DEI Leader, CTR Factor, Inc.; Dwan Jones, Director DEI, (ISC)² Many professions value and leverage pattern recognition and informed judgment based on limited information. While this is a huge strength for our empl... 4 days ago | 63 mins Zero Trust: Real-World Tactics and Strategies Jennifer Minella, IANS Faculty; Brandon Dunlap, Moderator No doubt, you’ve heard the buzz about zero trust. Zero trust isn’t a product but rather a journey. While the end goal is worthwhile, like most thing... 5 days ago | 59 mins Open-Source Risk: The Ground Zero of Software Supply Chain Security Mike McGuire, Security Solutions Manager, Synopsys; Brandon Dunlap, Moderator When approaching software supply chain security, managing the risk related to open-source usage is often a top consideration for builders of applicati... 6 days ago | 58 mins How to Hire and Develop Entry- and Junior-Level Cybersecurity Practitioners Jon France, (ISC)2; Saju Thomas Paul, Atos; Becky Goza, Love's Travel Stops; Brandon Dunlap (Moderator) You know the workforce gap numbers. Your team feels the effects, often working long hours and picking up the slack from an understaffed organization. ... 2 weeks ago | 61 mins Load more