Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Tackle Software Regulatory Compliance for Medical Devices Arthur Hicken, Chief Evangelist & Ricardo Camaho, Sr. Technical Marketing Manager Developing safety-and security-critical software isn't easy, especially for life-saving medical devices. Not to mention the challenge of ensuring your... June 28, 2022 4:00pm MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano Senior SE, Antonio Forzieri Cybersecurity Specialist & Matthias Maier EMEA Director of Product Marketing Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... July 7, 2022 12:00pm Unpacking Endpoint Detection and Response John Bruggeman, virtual CISO at CBTS ; Steve Cobb, CISO at One Source Communications As the methods and practices used to attack digital assets become more refined, the security tools to combat the threats must evolve, shifting from re... July 19, 2022 3:00pm The Cyber Threat Landscape: Get Ready for 2023 Panelists To Be Confirmed The social, economic and technological shifts of the past two years prompted cyber attackers to refine their methods, becoming more sophisticated and ... July 21, 2022 3:00pm How to Validate DO-326A Airworthiness Security Requirements Arthur Hicken, Chief Evangelist & Ricardo Camaho, Sr. Technical Marketing Manager RTCA DO-326A, Airworthiness Security Process Specification, is the industry standard for cybersecurity in aircrafts. The standard gives guidance for a... 4 months ago | 45 mins Beyond Compliance: How Can Your ESG Strategy Supercharge Your Business? Simon Jones, Destrier | Frederik De Breuck, Fujitsu | Terry Paule and Adam Priester, Botanical Water Technologies An increasing number of companies find that sustainability investments can open new possibilities in creating new products and services or rapidly rel... 3 months ago | 40 mins ISO 26262 Compliance in Testing Automotive Software Arthur Hicken, Chief Evangelist & Ricardo Camaho, Sr. Technical Marketing Manager Specific testing methods depend on the Automotive Safety Integrity Level (ASIL) classification of the system. To address safety and security from the ... 4 months ago | 42 mins Secure your enterprise with multi-factor authentication for your Salesforce Sai Ranjan, Regional Manager, Thales & Nilesh Ghorpade, IAM Principal Consultant, Persistent Cyberattacks are on the rise and passwords no longer provide sufficient safeguard against unauthorised access to the Salesforce data. The cybersecurit... 3 months ago | 44 mins Progressive methods for reducing cloud compute costs Corey Quinn - The Duckbill Group, Bailey Caldwell - ex-Flexera, Asaf Ezra - Granulate After understanding that moving to the cloud will not necessarily save companies money, especially if they've just used a lift and shift approach, clo... June 28, 2022 4:00pm 2022 Cymulate Data Breaches Study - Methods, Implications, and Prevention Dave Klein, Cybersecurity Evangelist Director In this annual report, Cymulate surveyed over 800 enterprises looking at root causes, impacts, outcomes of cyber breaches as well as assessing key mit... June 29, 2022 2:30pm Load more