Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Protect Your Applications in the Multi-Cloud Eyal Arazi Most organizations today deploy applications across three, four or five different cloud environments, meaning they frequently must use multiple applic... 6 hours ago | 31 mins The Future of MDR: Reimagining the ‘R’ with Unlimited DFIR [EMEA] Warwick Webb, Senior Director, Detection & Response Services; Robert Knapp, Manager of Incident Response Services at Rapid7 The term “Incident Response” can mean different things to different Managed Detection and Response (MDR) providers. The big question: who is ultimatel... 1 day ago | 59 mins Maximize your corporate value & differentiate your offerings by enabling AI Daniel Spahr, COO, Stream Analyze Our vision is that all devices, machines and assets in the world will be smart – powered by AI. However, the way AI is being built and deployed today ... 2 days ago | 32 mins Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... 3 days ago | 44 mins Quantitative Research Tooling for High Volume Financial Markets Speakers: Conan Hales, CFA, Solutions Engineer, KX, Harry Darell Brown, VP of Product Management, Financial Solutions, KX, Quants develop – and help implement - digital transformation within firms. These ideas can change, or even revolutionize, their organization across fu... 3 days ago | 45 mins Making 5G Ready to Live on The Edge Kaitki Agarwal, Founder, President and CTO, A5G Networks, Inc. Edge IT is diverse, distributed, and largely siloed. With OT in the network that involves sensors, IoT devices etc., we need coordination with mobile ... 3 days ago | 19 mins WebShell Intrusion Live Attack & Defend Demo [EMEA] Falcon Complete EMEA Analysts This webinar will be delivered by the CrowdStrike Falcon Complete team where they will respond live to an exploit leveraging a vulnerable public facin... 3 days ago | 55 mins Insider Threats Are On the Rise: Insights from The Ponemon Report 2022 Yvette Lejins, Resident CISO, Proofpoint APJ & Steve Moros, Snr Director Threat Detection & Advanced Threats, Proofpoint APJ Insider threats continue to be a significant — yet frequently overlooked — cybersecurity threat within organisations. In fact, in the past two years, ... August 16, 2022 9:00am How Internal Audit Can Partner with the CISO to Achieve Cyber Resilience Dan Clark, Principal, D. Clark Risk Advisory Services & Bryan Timmerman, Chief Information Security Officer, Galvanize When it comes to cyber risk, are you equipped to be proactive and maintain resilient security and response measures? One key to maximizing your organi... 4 hours ago | 49 mins Internal Audit’s Guide to Supporting Vendor Onboarding Dan Clark, Principal, D. Clark Risk Advisory Services & Christain Focacci, Managing Director, Steel Compliance Managing vendor onboarding is a top consideration for organizations, as you need to keep the process streamlined, organized and secure while accessing... 4 hours ago | 49 mins Load more