Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frictionless Fraud Prevention: Stopping Fraud Without Adding Friction Daryl Huff, VP Advanced Development at Jumio Fraud attack sophistication is constantly evolving and increasing, putting businesses at risk. The Association of Certified Fraud Examiners and Grant ... March 28, 2023 6:00pm Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 2 months ago | 64 mins Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 6 months ago | 24 mins The Art of Zero Touch Deployments Jim Grandbois, Partner Marketing, Jamf The bygone days of imaging have made way for zero-touch deployments, empowering IT to successfully deploy Mac, iPad and iPhone to users directly witho... 9 months ago | 27 mins Innovation Showcase Ep.4:Mobile Device Management and Security Verizon When devising a security policy, IT managers will need to examine multiple components. Some of these components are hardware, Operating Systems (OS),... 2 days ago | 30 mins How Government Organizations Can Quickly Enforce Mobile App Bans Kern Smith, VP of Sales Engineering for the Americas at Zimperium; Miguel Sian, SVP of Technology at Merlin The White House has given Federal agencies 30 days to remove a popular social media app from all government-issued devices and to prohibit future traf... 5 days ago | 23 mins How Hackers Bypass MFA… And How to Stop Them Cybersecurity Experts from Zimperium & RSA Multi-factor authentication (MFA) is a key component to achieving Zero Trust, as it adds a secondary line of protection before allowing access to netw... 3 days ago | 29 mins Improving SOC Efficiency by 450x with Forescout XDR Justin Foster, Chief Technology Officer; Virendra Bisht, Director of Data Science; George McTaggart, Chief Marketing Officer Threat detection and response has become increasingly important, and increasingly difficult, even for seasoned and large SOC teams. Current approaches... March 29, 2023 10:00am Creating a Culture of Connection: The Top 4 Moments that Matter Most! Lauren Bell, Jenny Jirsa, HR Programs Manager, T-Mobile and Iwo Szapar, Co-founder, Remote-How From the stress of a pandemic, a recession, disconnected teams, the “Great Resignation” and hybrid and remote work, human connection is harder than ev... March 31, 2023 10:00am End-to-end orchestrated patching for CISA compliance Will Tome, Automation Strategist, Red Hat "As long as there is software, there will be patching. Now more than ever, security vulnerabilities left unpatched put agencies at significant risk. T... 1 day ago | 32 mins Load more