Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Evolution of risk – From endpoint ransomware to supply chain compromise Chester Wisniewski Principal Research Scientist Managing risk well requires an understanding of the current threats you face while looking ahead to where threats may emerge tomorrow. This talk will ... 3 years ago | 34 mins Building a Security culture Tarun Samtani - Why do you need a Security Culture - How to get the buy-in - Design the Security culture strategy 6 years ago | 30 mins Moving forwards with Mission Critical systems Michael Capindale Legacy analogue voice systems for the emergency services have been replaced by secure digital systems such as TETRA and P25 since the early 2000's. As... 6 years ago | 34 mins IoT Security 2016 - Market Analysis Perspective Wiktor Markiewicz The IDC provides an update to IoT security products market outlook. The presentation highlights key considerations for technology suppliers in this bu... 6 years ago | 30 mins Security risks and common mistakes in mobile application development. Kristaps Felzenbergs As mobile applications are becoming more popular many organizations are serving their business oriented services on mobile devices to ease daily opera... 6 years ago | 16 mins Intelligent Protection through Attack Surface Visibility Edvinas Pranculis Understanding and controlling your attack surface—the sum of all attack vectors against your organisation — is a fundamental, game-changing security c... 6 years ago | 29 mins Ransomware - The Rising Threat. How to protect against it? Giedrius Liutkevicius With cybercriminals making millions – if not billions – of dollars from ransom demands, ransomware is unanimously identified as one of the biggest thr... 6 years ago | 20 mins Applications are the new security perimeter Timo Lohenoja Application centric security solution with SSL visibility and identity federation are playing key role while building modern and future proof applicat... 6 years ago | 31 mins Privacy by design Adil Akkus GDPR and Data Security forum Digital Era 2018 5 years ago | 29 mins The impact of GDPR on the digital enterprise Hany Choueiri www.digitalaera.lv 5 years ago | 29 mins Load more