Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Retail Identity Lab - Part 1: Becoming – and remaining – compliant with GDPR Willem Tibosch - CISO and Henk Willems - Sales Accelleration Manager Data privacy regulations, such as GDPR and other legislations are tightening. They are becoming more complex and trickier to keep up with. Customers a... 17 hours ago | 45 mins Master the Core PCI DSS 4.0 Requirements with QSA Advice Chan Pak Ho, Regional Head, Cyber Defence Solutions, APAC, Thales | Ray Law, Security Consultant, CPL, Thales PCI DSS 4.0 was introduced in 2022 to address emerging threats and technologies and enable innovative methods to combat new threats. The transition ti... 2 hours ago | 61 mins How to Optimize On-Demand Food Delivery in a Digital World Elon Weiss, Senior Product Manager at Favor Delivery The world is more digital than ever before, and with the influx and prevalence of on-demand food and delivery platforms, total revenue for the industr... June 7, 2023 5:00pm School of Phish: Importance of Three Categories of Protections Part 1: People Ken Dang, Sr. PMM; John Phil, Sr. SA; JT Fanning, Sr. TAM ENHANCE THE HUMAN LAYER OF CYBERSECURITY The first of this six-part series focuses on People and their role in the Importance of Three Categories of ... 2 weeks ago | 65 mins Microsoft OneDrive and Teams: Harden Your M365 Applications Mike Rothman, IANS Faculty; Brandon Dunlap, Moderator Without the proper security settings, attackers have found ways to exploit Microsoft OneDrive and Teams as primary distribution mechanisms for ransomw... June 8, 2023 5:00pm Beers with Engineers: Developing a Resilient Security Strategy (Part 2) US Signal, Veeam Developing a Resilient Security Strategy (Part 2 of 2) Join US Signal and partners in the second half of a two-part series as we discuss the steps th... June 15, 2023 6:00pm Lab: Subdomain Takeover, Part 1 | Identify attack paths Carlos Vendramini, Security Research Engineer, Normalyze In the first part of this two-part series, Carlos will go over the current landscape for subdomain takeover by analyzing some bug bounty report statis... 3 weeks ago | 19 mins Enterprise Grade IoT–Data Management | Software AG Webinar Jane Porter, Senior Director of Product Management, IoT & Analytics; Rahul Talreja, Product Manager, IoT & Analytics When IoT plays a critical role in your business processes, and the products your customers use, you need to ensure that your IoT solution is up to the... 6 days ago | 32 mins Akamai SOTI - Healthcare App & API Attacks Rising - Part 1 Patrick Sullivan VP, Eliad Kimhy Head of Akamai Security Research Core Team, Anthony Lauro Security Technology & Strategy Dir With nearly 50% of organizations regularly releasing vulnerable apps into production because of time restraints from the growing demand of faster turn... 3 weeks ago | 29 mins Akamai SOTI - The Rise of Application and API Attacks - Part 1 Patrick Sullivan VP, Eliad Kimhy Head of Akamai Security Research Core Team, Anthony Lauro Security Technology & Strategy Dir With nearly 50% of organizations regularly releasing vulnerable apps into production because of time restraints from the growing demand of faster turn... 3 weeks ago | 29 mins Load more