Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Software Supply Chain: More Than Just an SBOM? Guest: Sandy Carielli, Forrester Research | David London, Chertoff Group | Tim Mackey, Synopsys | Patrick Carey, Synopsys Gone are the days when you only had to worry about the code your developers are writing. Now you have to think about a complex supply chain, which inc... 4 months ago | 59 mins Disrupt the Ransomware Threat Actors: Focus on Attack Chains Mark Harris,Cybersecurity Advisor & Brette Peterson, Prod Mkt Mngr Proofpoint; Brandon Dunlap, Moderator Ransomware continues to dominate the headlines with a wide range of organizations impacted. Part of its staying power is that ransomware threat actors... 20 hours ago | 60 mins Crawl, Walk, Run – A Practical Approach to Preventing Certificate Outages Arman Abdulhayoglu, Senior Product Marketing Manager Marketing; Sami Van Vliet, Principal Product Manager U.S. Product In today's digital landscape, certificates play a crucial role in securing communication channels and ensuring data privacy. However, as the number of... March 30, 2023 4:00pm Myth vs. Reality: Is NDR a missing link in your security strategy? Girard Ordway,Sol Arch Lead ExtraHop; Francis Johnson CISSP/Sr Mngr Capgemini; Kris Rosson, CISSP; Brandon Dunlap, Moderator Cyberattackers can exploit vulnerabilities and evade controls, but they can't hide from the network. Network detection and response (NDR) solutions gi... 1 week ago | 60 mins Threat Hunting Fundamentals: Why Network Data Should Be At Core Of Your Process Ashley 'AJ' Nurcombe, Sr Cyber Security Engineer, Brandon Dunlap, Moderator Threat hunting is a challenge to get right, with many potential pitfalls. There are twenty different definitions for threat hunting and ten different ... April 6, 2023 12:00pm Open Industrial PKI OiPKI – Securing the connected Factory Florian Handke, Campus Schwarzwald | Andreas Philipp, Keyfactor Join our upcoming webinar, "Open Industrial PKI OiPKI - Securing the Connected Factory," to learn how to ensure secure data exchange in the digitaliza... 1 week ago | 28 mins Command and Control - a deeper look at DNS (ab)use Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai DNS traffic is a highway of information, which can include many aspects of a modern attack, including Command-and-Control (C2) traffic, multi-staged a... 1 day ago | 58 mins Entering the Cloud-Native Security Era LogRhythm Product Director, Matt Willems and Derek Watkins Security leaders need to routinely assess security risks and leverage best practices for mitigating risks. Software as a Service (SaaS) is a delivery ... 6 days ago | 66 mins The State of Cloud-Native Security 2023 Bob West, Chief Security Officer, Prisma Cloud/Palo Alto Networks; Brandon Dunlap, Moderator Global survey spotlights industry vitals and actionable insights. The State of Cloud-Native Security Report 2023 is the result of a months-long survey... 2 weeks ago | 59 mins Online Information Session 2023: グローバル情報セキュリティ資格「SSCP」紹介セミナー 小熊 慶一郎, CISSP, (ISC)² Director of Business Development, Japan; 福井 将樹, CISSP, CCSP, SSCP, (ISC)² 認定講師 SSCPは、国際的に認められた情報セキュリティ資格であり、サイバー攻撃から防御する能⼒があることを証明します。システムやネットワーク、ITインフラの開発、構築、運用に従事するエンジニアがSSCP資格を取得することによって、組織において重要な資産を保護し、組織のミッション達成をサポートするために必要と... 1 week ago | 83 mins Load more