Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Revolutionize SOC Operations with Improved Efficiencies and Automation Sanjay Raja, VP Product Marketing, Gurucul | Guest Speaker: Joseph Blankenship, VP, Research Director, Forrester The evolving hybrid workforce, continued adoption of cloud-native applications and business at a global scale has introduced several security gaps wit... 9 hours ago | 62 mins Fighting against and adapting to the next generation of financial criminals Marc Anley, Deloitte | Hamida Khan, BNP Paribas | Ahmed Drissi, SAS | Manisha Khanna, SAS With the rise of digitalization, financial criminals have grown in complexity. This has caused a rise of AML cases, and with it are more false positiv... 24 hours ago | 61 mins Upgrade Your Identity Management: Minimize Risk and Leverage Cloud Opportunities John Morton - Britive, Dr. Chase Cunningham - Ericom Software and Sameer Patwardhan - Forbes We know identity is the new perimeter in the cloud. But what does that mean, and how does it affect business security? It means identities – human a... 1 week ago | 27 mins I was never here: Identity discussion with a KPMG Partner & former CSIS officer Marc Chaput (Partner Cyber Security and IAM, KPMG) , Andrew Kirsch (Former CSIS Officer) Former CSIS officer Andrew Kirsch and KPMG Identity Practitioner Marc Chaput discussed Identities, ways to exploit them, and solutions to reduce the t... 1 week ago | 42 mins Lessons Learned From Log4j: Mitigating Zero-Day Attacks Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai, Eran Haim, Senior Solutions Engineer, Guardicore The Log4j vulnerability caused widespread panic with organizations rushing to assess the impact caused and deploy mitigation strategies. These types o... May 31, 2022 1:00pm How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... 1 week ago | 35 mins Lessons Learned from Operational Insider Threat Programs Panel: Craig Cooper, Chief Operating Officer & Michael Williams, Director of Technology & Insider Risk, Edward Jones Join Gurucul’s customer for a discussion on lessons learned operationalizing Insider Threat Programs. With proven strategies and tactics, organization... 2 weeks ago | 36 mins Rise of the Machines: The New Identity Threat Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi The number of machines of all types – from Kubernetes, to cloud, to IoT – is on the rise. Every machine requires an identity – TLS, SSH, and code sign... 2 months ago | 59 mins Securing the Identity Perimeter with Defense in Depth Jack Poller, Senior Analyst, ESG The core tenet of a zero trust strategy is least-privilege access. Yet, organizations continue to rely on user and machine identities that are suscept... June 13, 2022 3:00pm Achieving Maximum Efficiencies and Outcomes Across Security Operations Bryan Littlefair, CEO Cambridge Cyber Advisers former Global CISO of Vodafone & Aviva | Sanjay Raja, VP, Gurucul Join Bryan Littlefair and Sanjay Raja for a fireside chat focusing on current challenges and gaps in today’s SOC operations. Subsequently, we will rev... May 31, 2022 5:00pm Load more