Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date DevSecOps: Bridging Security with Development Michael Hanley, CSO, GitHub Pieter Ockers, Sr. Director, HackerOne In this session, GitHub CSO Michael Hanley and HackerOne will explore how leveraging data can help security teams accelerate delivery. August 10, 2022 4:00pm Thinking Beyond Ransomware – It’s Not All About the Bitcoin John Checco, Resident CISO, Proofpoint; Martin Raymond Okumu, CIO CCSF -SFSD-SO; Alex Holden, CISO; Brandon Dunlap, Moderator Ransomware attacks not only hit companies financially, but can impact their data, access and operations. And it has a ripple effect as we’ve seen disr... August 11, 2022 9:00am Supercharge Your Security with Automation John Dominguez | Product Marketing Director, Splunk Philip Royer | Research Engineer, Splunk Drowning in repetitive security tasks? Too many security alerts to triage each day? Can't respond to security incidents fast enough? Stop working hard... 2 weeks ago | 30 mins CISO Guide to Future-Proofing Your SOC [EMEA] Jeffrey Gardner, Practice Advisor Detection and Response, Rapid7 Given the current cyber threat landscape, your in-scope attack surface extends way beyond your organizational perimeter to cloud services, IoT devices... 5 days ago | 7 mins Modernizing your SOC for the Cloud: Onboarding Data From Any Cloud Service Joshua Cowling - Consulting Sales Engineer at Splunk & Matthias Maier - Product Marketing Director at Splunk SOC Analyst, Alice Bluebird, is overwhelmed by the sheer volume of different cloud services her new employer adopts and uses at rapid scale. She is ta... 2 weeks ago | 59 mins Cyber Threat Insights For The Financial Sector [EMEA] Derek Buchanan, Threat Advisor for EMEA (CrowdStrike) The financial sector – from banks to insurance – is a beloved victim for cyber criminals looking for a quick payday. The lack of security consistency ... 1 week ago | 47 mins Security with SURGe: Analysis of 10 Major Ransomware Strains Mick Baccio, Shannon Davis & Sydney Howard Splunk SURGe recently analyzed how quickly ten major ransomware strains, including Lockbit, REvil and Blackmatter, could encrypt 100,000 files. The en... 3 weeks ago | 43 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... August 24, 2022 12:00pm Continuously Verifying your Security Readiness Through Network Intent Automation Valerie DiMartino, Dir. Product Marketing; Raj Jain, Pre-Sales Engineer, NetBrain Investing in security products and services is just the beginning of any organization’s journey to secure their business. How do you know if everythin... August 9, 2022 3:00pm Dataminr Knowledge Academy – Ep 9: Managing Risk with Advanced Geovisualization Hugh Farquar Vice President of Product for Physical Security, Dataminr In this module we address how geospatial technology can help contextualize risks faster and simplify operations for small security teams as well as la... 2 hours ago | 9 mins Load more