Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 3 weeks ago | 63 mins DEMO - See Workload Protection, WAF and API Security in Action Ivan Melia, Senior Manager Product Marketing, Prisma Cloud by Palo Alto Networks Join us for a 30-minute demo session to see how to get complete security across your application lifecycle with Cloud Workload Protection by Prisma Cl... March 22, 2023 9:00am Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... March 22, 2023 2:00pm Prius vs. Ferrari: Who's helping threat actors outpace security controls? Neko Papez, Sr. Cybersecurity Strategist & Tim Hendrix, Sr. Cybersecurity Engineer When entire workforces went remote back in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps... 8 hours ago | 38 mins Verizon Threat Research Advisory Center MIB Steven Swanson, Abdul Abufilat, David Kennedy Join us—the Verizon Threat Research Advisory Center – for an insightful and technical deep dive into the world of cybersecurity, with our experts from... March 22, 2023 4:00pm Ransomware: Attackers vs Defenders Alex Hinchliffe, Unit 42 and Maurits Lucas, Intel 471 Ransomware is the most common type of malware attack and often the most costly to organizations around the world. The need for organizations to protec... March 22, 2023 7:00pm Cisco Talos Incident Response (CTIR)-on Air: Recapping 2022 (Part 1 of 3) Bruce Hennigar,Threat Researcher,Nate Pors,Incident Commander,Liz Waddel,Engineering Lead,Brett Ellis,Talos Incident Response Cisco Talos incident responders recap the top threats of Q2 2022, discussing the latest attacker trends and the most prevalent malware families they'v... 8 hours ago | 46 mins How Hackers Bypass MFA… And How to Stop Them Cybersecurity Experts from Zimperium & RSA Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to netw... March 23, 2023 3:00pm PAM: We’ve Been Doing It All Wrong Martin Cannard, Vice President of Product Strategy at Netwrix. The last two decades have seen massive change in the IT landscape: We’ve seen workloads shift from the datacenter to the cloud, applications move from... March 22, 2023 5:00pm March 2023 TRU Intelligence Briefing Edward Crowder, Matt Tilley, Spence Hutchinson In this month’s TRU Intelligence Briefing, the Threat Response Unit reviewed: - Rise of OneNote Abuse: How OneNote is being leveraged for malware deli... 5 days ago | 47 mins Load more