Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 2 weeks ago | 49 mins Criteria for Selecting the Right Threat Detection & Incident Response Solution Nick Cavalancia - Techvangelism | George Anderson - Secureworks | Cat Coode - Binary Tattoo | Dom Glavach - CyberSN.com Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR... 3 weeks ago | 46 mins Time Series Analytics - Powering Trading Outcomes (APAC) Steve Wilcockson, KX, and financial solution experts Harry Darell-Brown, Conan Hales, and Alex Weinrich of KX With decades of combined experience at the sharp end of the Financial Services sector, the panelists discuss the various requirements that make up the... 2 months ago | 53 mins Is AI the Panacea to Doing Threat Detection Right? George Anderson - Secureworks, Nash Borges - Secureworks, Rebecca Wynn - Click Solutions Group and Simon Ratcliffe - Ensono The rise of AI has made its way to threat detection. With AI-enabled threat detection systems predicting new attacks and notifying admins of data brea... 2 months ago | 55 mins AI and Compliance: How to Prepare for Greater Regulations Ramesh Dontha Complex questions around the responsible use of artificial intelligence (AI) continue to arise as its adoption unfolds: explain-ability, responsibilit... February 2, 2023 4:00pm How to Make Better Buying Decisions in 2023 [EMEA] Jason Hart, Jeffrey Gardner, Devin Krugly, Meaghan Donlon New year, new bottomless security budgets? We wish. As the economy is slowing down, security budgets are tightening, forcing organizations to reevalua... 3 hours ago | 36 mins Getting a Step Ahead of the Attacker with Vulnerability Scanning & Pen Testing Dan Murphy, Distinguished Architect, Invicti Security A panel discussion that has aired initially as part of the Dark Reading Virtual Event, sponsored by Invicti: Today’s threat landscape calls for a mor... 4 hours ago | 49 mins PCI DSS v4.0—Time for Action Matt Arntsen, Ciske Van Oosten, Emma Sutcliffe, Lauren Holloway & Tony James Join us for the follow-up exploration of the latest update to the flagship Payment Card Industry Data Security Standard (PCI DSS). In our first webina... February 2, 2023 7:00pm Exploring the Future of Social Engineering: A Panel Discussion Joshua Crumbaugh, Greg Carpenter, Alex Heid, Damir Brescic Come join Joshua Crumbaugh, CEO of PhishFirewall and renowned 15+ year ethical hacker, as he leads a discussion on the future of social engineering in... 2 days ago | 62 mins Ep 9 - Biggest Cybersecurity Challenges of 2022: Are You Prepared? Lisa Forte - Cybersecurity, David Warburton - Threat Research Manager, F5 and Matthieu Dierick - Solutions Architect, F5 Join us for an exclusive myForum event where we explore and debate the most pressing cybersecurity concerns of 2022, and more importantly how organisa... February 3, 2023 10:00am Load more