Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Levers of Human Deception: The Science and Methodology Behind Social Engineering Erich Kron (KnowBe4) No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different leve... 5 days ago | 56 mins Levers of Human Deception: The Science & Methodology Behind Social Engineering Erich Kron, Security Awareness Advocate for KnowBe4; Brandon Dunlap, Moderator No matter how much security technology we purchase, we still face a fundamental security problem: people. This (ISC)² and KnowBe4 webinar will explore... 2 weeks ago | 59 mins Zero Trust: Past, Present, Future Bob Flores, OODA, Jason Garbis, Appgate, Junaid Islam, OODA, and Shamun Mahmud, CSA Learn what Zero Trust is, what it isn’t, and some approaches to zero trust (present and future). This session will also discuss the importance of SDP ... 2 months ago | 31 mins Becoming Ransomware Resilient Guillaume Ross (CIO @Finaptic); Megan Stifel (Global Policy Officer @Global Cyber Alliance); Bob Gourley (Co-Founder @OODA) Industry experts weigh in on why ransomware-related cyberattacks are increasing, who is responsible, what is being done to help organizations better u... 8 months ago | 64 mins Elastic Security: Your one-stop OODA loop shop Mike Nichols, Product Lead Elastic Security, Elastic Elastic Security, leveraging the expertise of the makers of Elasticsearch coupled with the subject matter experts of the security domain, brings enter... 10 months ago | 30 mins Deception for Speeding Up Your OODA Loop Matt Devost, CEO & Co-Founder of OODA LLC and Tony Cole, CTO of Attivo Networks Join Matt Devost, CEO & Co-Founder of OODA LLC. and Tony Cole, CTO of Attivo Networks for an in-depth discussion on cyber deception and how it plays i... 2 years ago | 61 mins Open at the infrastructure edge: Transforming raw data into warfare dominance Rich Lucente Principal Solutions Architect, Red Hat Anne Dalton Edge and Data Science Specialist, Red Hat In military operations, having all the data in the world doesn’t matter if you can’t use it to maximize use of your resources and firepower where and ... 4 months ago | 36 mins Why Bother With 3rd Party Cyber Risk Management? Bob Maley, CSO NormShield Supply chain risks multiply with every new third party. Does adding processes and control actually help? Here, Bob Maley explores cardinal methodology... 2 years ago | 23 mins Can We Rein in the Global Cybersecurity Crisis? Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum; Usama Fayyad, CIO OODA Health The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of techn... 4 years ago | 54 mins CSA's Executive Series: When AI Goes Wrong Bob Gourley, CTO and Co-Founder of OODA Join Bob Gourley, CTO and Co-Founder of OODA, to learn about when AI goes wrong including... - 6 categories of real-world AI failures - notable failur... 2 years ago | 36 mins Load more