Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Integrated Data and Risk Modelling Using a Cloud Native Solution Dan Wainwright, Amrit Khangura, Tom Peplow, Steve Mitchell, Milliman; Mark Kromer, Microsoft Insurance relies on data, but needs Actuaries to bring data fluency to unlock value from that data. Providing actuaries with the ability to easily man... 3 days ago | 45 mins This is How They Tell Me the World Ends Alex Rice (HackerOne), Nicole Perlroth (Author) & Sandra McLeod (Zoom) On February 9, The New York Times cybersecurity reporter Nicole Perlroth released the highly anticipated book, This is How They Tell Me The World Ends... June 28, 2022 4:00pm How to Tackle Software Regulatory Compliance for Medical Devices Arthur Hicken, Chief Evangelist & Ricardo Camaho, Sr. Technical Marketing Manager Developing safety-and security-critical software isn't easy, especially for life-saving medical devices. Not to mention the challenge of ensuring your... June 28, 2022 4:00pm Managed Penetration Testing - An Integral Part of Your Risk Management Approach Aravind Venkataraman, Senior Principal Consultant and David Johansson, Principal Consultant, Synopsys Managed penetration testing is an integral part of an organization’s risk management strategy. It serves as a complementary security testing approach ... 1 week ago | 47 mins Zero Trust Segmentation: The Key to Cyber Resilience Raghu Nandakumara, Head of Industry Solutions at Illumio | John Grady, Senior Analyst at ESG If cyber threats are keeping you up at night, you’re not alone. New research by analyst firm Enterprise Strategy Group found that 76% of surveyed orga... 3 days ago | 40 mins [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... June 30, 2022 11:00am How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 1 week ago | 36 mins How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... June 30, 2022 1:00pm Russia’s War on Ukraine and the Implications for Global Supply Chains Geraint John, Vice President, Resilience Lab, Interos Russia’s invasion of Ukraine has already taken an extraordinary toll on individuals, families and communities caught up in the war. Military conflict ... 1 day ago | 46 mins Enterprise Risk Management: Pragmatic risk quantification for the enterprise Steve Schlarman, Integrated Risk Management Strategist The objective of quantified risk is to make better business decisions for the enterprise. Join Steve Schlarman, Integrated Risk Management Strategist... 3 days ago | 33 mins Load more