Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Hackers Hack: Episode 1 - The Profile Tyler Moffitt, Snr Security Analyst, Opentext Security Solutions Hacking has become a common term in today's digital world, but not all hackers are the same. In this webinar, we will explore the different types of h... 7 days ago | 55 mins How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 2 weeks ago | 63 mins CISO Roundtable: State of Public Cloud Security Andy Ellis, Advisory CISO, Orca Security, Yoav Alon, CTO, Orca Security, and Jack Roehrig, vCISO, Investor & Advisor Join our expert CISOs as they discuss key findings from Orca Security's State of Public Cloud Security Report, a collection of findings and recommenda... February 21, 2023 4:00pm Tools and Tactics to solve the top 3 Open-Source Intelligence (OSINT) Challenges Kevin Libby - Threat Intelligence Advisor Open-Source Intelligence (OSINT) has become increasingly important to organisations looking to identify potential risks and vulnerabilities early, whe... February 2, 2023 4:00pm ReversingGlass | Typsosquatting Matt Rose, Field CISO, ReversingLabs In this episode, Matt dives into typosquatting, an attack in which malicious actors will copy and slightly misspell the names of legitimate software p... 7 hours ago | 5 mins Key Findings from 2022 Data Threat Report – Financial Services Edition Eric Hanselman, Chief Analyst, 451 Research; Marcelo Delima, Global Solutions Marketing Manager, Thales Financial services firms are typically ahead of other industries in cyber defense maturity due to their highly regulated nature. However, advanced sec... February 2, 2023 4:00pm Evolving Risks: Combating Ransomware’s Latest Threats Michael Kennedy, FedInsider | Mike Rider, Menlo Security Ransomware continues to be one of the single biggest threats to government networks, and IT professionals are increasingly worried about employees who... 2 days ago | 60 mins How to effectively detect, prevent & respond to threats with threat intelligence Artem Karasev, Product Marketing Lead; Nikita Nazarov, Malware Analyst Team Lead; Vladimir Kuskov, Head of Threat Exploration The threat landscape is changing rapidly. It’s becoming incredibly challenging to effectively respond to emerging complex and advanced cyberthreats wi... 2 days ago | 50 mins SANS Anatomy of a Ransomware Operation Jake Williams, SANS | Ryan Chapman, BlackBerry Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption ... 2 days ago | 62 mins Integrating Secure Code Signing in the CI/CD Pipeline Ryan Sanders, Sr. Dir Product & Customer Mktg & Eric Mizell, VP of Field Engineering Keyfactor; Brandon Dunlap, Moderator Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the continuous integration and continuous dep... 2 days ago | 60 mins Load more