Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to maintain security in a hybrid work environment Thomas Wingfield, Product Marketing Manager & Molita Sorisho, Product Marketing Mngr & Sanjay Khanna, Product Manager @ Webex Security is paramount today. With people now working from everywhere, your risk surface has expanded. Even if your databases and networks are protecte... 1 day ago | 30 mins Why You Need Next Generation SIEM for Advanced Threat Detection and Response Sanjay Raja, VP Product Marketing and Solutions, Gurucul | Guest Speaker Allie Mellen, Analyst, Forrester Security Information and Event Management (SIEM) tools have evolved as a core platform for enabling security teams to be more adept at detecting and r... 2 days ago | 62 mins Plugging the Holes in Your Remote Work Efforts Kevin Beaver, Author of Hacking for Dummies If a new normal does exist in today’s world, it’s the reality of how many people are working from home. Having a much larger remote workforce might pr... 2 weeks ago | 47 mins How to 10x Your Team’s Bandwidth Using Kintone’s Process Management Nim Grinvald, Kintone Technical Evangelist and Jessica Lee, UC Hastings Center for WorkLife Law “There aren’t enough hours in the day to get everything done.” Know the feeling? If you’ve got a small team with audacious goals, chances are you fee... July 7, 2022 5:00pm Ransomware for the Remote User Eric Howard, Cisco When your users no longer sit in your line of sight, and are using devices spread out across an entire WAN, detecting and responding to a ransomware o... 2 weeks ago | 54 mins Burnout In Leadership: What It Does and How To Avoid It Audrey Cavenecia Employers are fighting to keep their employees happy and healthy, but are they doing the same for themselves? Managing the day-to-day challenges of a... July 5, 2022 6:00pm Vulnerability Management in 2022: Reduce Your Attack Surface Diana Kelley, Cybrize | Edward Rowley, Proofpoint | Richard Meeus, Akamai | Erick Galinkin, Rapid7 In 2022, your attack surface will be larger than ever before. From the onset of the hybrid workforce to huge waves of data being produced, security te... 2 weeks ago | 62 mins Secure SD-WAN Summit | Session 1: Fortinet's Security-Driven Networking Approach John Maddison, CMO & Executive VP, Products, Fortinet With growing hybrid workforce and acceleration of digital innovations creating many network edges. At the same time, threats are becoming more sophist... 3 weeks ago | 24 mins Jumio + Okta: Keeping fraudsters out of the bank Sushan Shetty, - Sr Solutions Engineer, Jumio; Marcus Guan - Partner Solutions Engineer, Okta Join Jumio and Okta as they share Financial Services market trends and help onboard and digitally transform organizations with their secure identity a... July 14, 2022 6:00am How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... 2 months ago | 35 mins Load more