Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... March 28, 2023 9:00am Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... March 30, 2023 6:00am Top 5 Insider Threat Profiles a Next-Gen SIEM Can Detect Findlay Whitelaw, Sr. Director, Insider Threat Program, Securonix; Tyler Williams, Principal Detection Engineer, Securonix With insider threats persisting, our webinar looks at how threat models bring real-life cases and incidents to life. Our experts offer an overview of ... 1 week ago | 50 mins Building an Incident Response Plan (IRP) to address ransomware attacks David Muniz, cybersecurity expert at senhasegura | Gabriel Oba, Product Owner at senhasegura Building an Incident Response Plan (IRP) is a critical step for addressing any cyberattack, but it is especially important for ransomwares. An IRP out... 1 week ago | 37 mins How AI is driving sustainability in information management Carlos Alberto Castaño Moraga, Fujitsu; Carlos Rodríguez Abellán, Fujitsu; Moderated by Simon Jones, Destrier Automation strategies are established as a key part of digital transformation. AI Document Processing is now presenting a new opportunity to get maxim... 2 weeks ago | 28 mins The Dutch Ministry of Justice and Security PKI Use Cases Cor de Jonge, PKI Business Owner ; Jeen de Swart, Senior Information & Security Architect The Dutch Ministry of Justice has an expertise center for chip technology and PKI for ePassports. In addition to testing border control readers, the c... 3 weeks ago | 26 mins Contamination Control Challenges Facing Cell Therapy Facilities Conor McMorrow at Takeda and Félix Montero-Julian at bioMérieux The presentation aims to provide an overview of challenges that can be faced with the knowledge that a one size fits all approach cannot be taken. Whi... April 17, 2023 2:00pm Controlling costs in a resource that has no limits... Brian Kirsch, Instructor and Architect | Milwaukee Area Technical College When given a resource that has unlimited scalability, software developers and other IT personnel can become like kids in a candy store. Nothing is off... 2 months ago | 28 mins Get Proactive for Ransomware: Learn Why Karin Shopen & Anthony Giandomenico As organizations, networks, and personnel change, ransomware readiness does too. Watch this webinar to get first-hand knowledge on preparing for ranso... 2 months ago | 18 mins Today’s Privacy Reality: AI, Assessments, Breach and DSARs Christopher Wall, Kamran Salour, Michael Sarlo, and David Wallack Today’s Privacy Reality: AI, Assessments, Breach and DSARs is a webcast that will bring together a panel of experts to discuss the impact of artificia... 1 month ago | 63 mins Load more