Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Live Panel Discussion: Is AI the Future of Cybersecurity? Johan Dreyer - Field CTO Mimecast, Seán Doyle - World Economic Forum, Magnus Carling - CISO at Stena, Elaine Lee - Mimecast Addressing innovation shortfalls - Mimecast State of Email Security Report 2022 Our sixth annual State of Email Security Report found that the use of... June 1, 2022 9:00am Live Panel Discussion: Is AI the Future of Cybersecurity? Johan Dreyer, Seán Doyle, Magnus Carling, Elaine Lee Addressing innovation shortfalls - Mimecast State of Email Security Report 2022 Our sixth annual State of Email Security Report found that the use of... 1 week ago | 56 mins Microservices Security Pattern in Kubernetes (East-West Traffic) Chris Nesbitt-Smith, Instructor at Learnk8s Join the experts from Learnk8s and NGINX to learn “How do I secure my APIs and apps to be production-ready?” In this session, you’ll learn about the s... June 22, 2022 9:00am Zero Trust for the New Normal Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7 Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to sta... 4 weeks ago | 61 mins Modernizing Supply Chain Cybersecurity Via Multi-Signal Threat Investigation Ryan Westman, Mgr,Threat Intell,eSentire;Paul Tobia, Sr. Security Product Mgr, Sumo Logic; Brandon Dunlap, Moderator In the last year alone, the number of supply chain attacks has grown exponentially as they offer threat actors stealthy, scalable, and privileged acce... 2 weeks ago | 59 mins Ransomware in the Remote Work Era Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7 Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk,... 2 months ago | 61 mins 7 Habits Of Highly Effective Data Center Networkers Drew Conry-Murray from the Packet Pushers, and Scott Sneddon, Sr. Architect Juniper Networks Data center network engineers play a big part in an organization’s success. From making precise changes, bringing up new services to the market, and s... 2 months ago | 53 mins Arm Virtual Hardware Lab Series: New Release Including More Hardware & Project Stefano Cadario, Director Product Management for IoT, Arm This session is part of the Arm Virtual Hardware Lab Series, introducing Arm Virtual Hardware, a new cloud-based offering which enables software devel... 2 weeks ago | 33 mins Avoiding Common Decision Traps Deb Calvert, founder of People First Leadership Academy & People First Productivity Solutions Hasty decisions can backfire. Popular-vote decisions can take everyone down the wrong path. Unilateral decisions invite resistance. Decisions that add... July 11, 2022 5:00pm Why Weak Passwords Pose a Serious Threat — and How to Reduce Your Risk Martin Cannard, VP of Product Strategy at Netwrix and Brian Johnson, Security Consultant & Podcaster at 7 Minute Security The latest industry data shows that nearly every cyberattack today involves misuse of credentials. So it’s worth asking, exactly how do threat actors... 3 months ago | 61 mins Load more