Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date AI Strategy, Security, and Governance: The View from the Top Sayoko Blodgett-Ford, GTC Law Group and Jamie Boote, Synopsys The Board and C-Suite are starting to take notice of the opportunities and risks inherent with powerful new generative artificial intelligence (GAI) t... June 7, 2023 4:00pm 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... June 8, 2023 9:00am 5 Pitfalls and 5 Wins in Using Generative AI in Your Marketing Tactics Byrony Seifert, SVP, Audience Operations, TechTarget Content creation, SEO, brand profiling, tone and message structure, authenticity, and compromise - we'll connect on all these topics and more in this ... 4 days ago | 17 mins Building on ABM Success: Six Keys to Long-Term Success Adam Bennington, Head Of Consulting and Rob Leavitt, Senior Vice President, Advisory at Momentum ITSMA ABMers have made great strides in recent years. Business leaders no longer question whether to invest in ABM. Now, they debate account coverage, scale... June 21, 2023 1:00pm Coffee with a Slice of SBOM Mike McGuire, Senior Software Solutions Manager, Synopsys For a variety of reasons, everyone is talking about software Bills of Materials (SBOMs). Some organizations are being required to generate and provide... 3 weeks ago | 42 mins Ask the Experts: AI and Software Development DLA Piper, GTC Law Group, Hall Law, Osler, and Synopsys As you start down the path of using generative artificial intelligence (GAI) in software development to improve efficiency, reduce costs, and increase... June 28, 2023 4:00pm Everything You Need to Know About Structural Code Coverage for C & C++ Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance & Zak Maiga - Solution Architect Structural coverage is the identification of code that has been executed and logged. There are several reasons why it's important to perform this acti... 3 months ago | 58 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 2 months ago | 41 mins SD-WAN & SASE, a reliable and secure network for AI and Machine learning Alexander Polevoy, Avinash CN, Lisette Sens Aryaka Networks and Deutsche Telekom have an upcoming webinar on June 6th at 4pm Singapore/Kuala Lumpur time that we believe would greatly benefit you... June 6, 2023 8:00am Air-Gapped Kubernetes: Architecture and Considerations D2iQ D2iQ Kubernetes Expert Patrick Logan answers questions about air-gapped Kubernetes environments: What does the architecture look like for air-gapped ... 8 hours ago | 30 mins Load more