Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Prevention is Key: Defining a Proactive Security Strategy Dave Gruber - Principal Analyst at ESG and Arun Krishnamoorthy, Senior Director of Product Management at Dell Technologies A successful security strategy requires vigilance, but organizations may be spreading their IT teams too thin. Enterprise Strategy Group has recently ... 4 days ago | 46 mins A Review: '22 Annual GuidePoint Research & Intelligence Team Ransomware Report Drew Schmitt, GRIT Lead Analyst + Nic Finn, Threat Intelligence Consultant - GuidePoint Security Attend our upcoming live talk presented by the GuidePoint Research and Intelligence Team (GRIT) on their just released 2022 Annual Ransomware Report, ... February 9, 2023 6:00pm How to implement continuous proactive security to safeguard Kubernetes Daniel Virassamy One of the major challenges of scaling Kubernetes is securing clusters. But this isn’t an area you want to ignore: Lackluster security practices can l... February 23, 2023 8:00pm Prevention is Key: Defining a Proactive Security Strategy Dave Gruber - Principal Analyst at ESG and Arun Krishnamoorthy, Senior Director of Product Management at Dell Technologies A successful security strategy requires vigilance, but organizations may be spreading their IT teams too thin. Enterprise Strategy Group has recently ... 2 months ago | 39 mins From Reactive to Proactive: Building a Synthetic Monitoring Practice Billy Hoffman - Sr. Principal Engineer, Splunk Many organizations already use synthetic performance monitoring to measure service uptime and alert on availability issues. However Synthetic monitori... 2 months ago | 59 mins How Princeton U Addresses Risk and Compliance Through Proactive Measures David Sherry, Chief Security Information Officer, Princeton University Addressing security, risk and compliance in higher education is like securing a small city. How can the security office stay on top of both emerging t... 8 months ago | 32 mins Threat Responder: A Day in the Life Using Contextual Threat Intelligence Jonathan Jackson – Director, Sales Engineering APJ, BlackBerry & Eoin Healy - Senior Threat Researcher, BlackBerry Recent cyberattacks serve as stark reminders that no one is safe. There is zero immunity from dedicated threat actors, and anyone operating in the dig... 2 months ago | 38 mins How Internal Audit Can Partner with the CISO to Achieve Cyber Resilience Dan Clark, Principal, D. Clark Risk Advisory Services & Bryan Timmerman, Chief Information Security Officer, Galvanize When it comes to cyber risk, are you equipped to be proactive and maintain resilient security and response measures? One key to maximizing your organi... 2 months ago | 49 mins Retaining Talent: Investments law firms need to consider Adrian Pylypec, Jim Cochran, Ray Oldfield and Erin Douglass As the battle for talent continues in 2022, law firms should be asking themselves what they can do to retain lawyers and the investments they should m... 2 months ago | 60 mins Proactive Tips for Improving Your Hybrid Cloud Security Strategy Melinda Marks, ESG | Terry McGraw, Secureworks | Dudi Matot, AWS ESG’s Maturation of Cloud-native Security report found that 88% of respondents believed that their cloud-native application security measures could be... 5 months ago | 52 mins Load more