Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, APJ, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... 2 days ago | 78 mins Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... 7 days ago | 61 mins The Power of Risk-Based Authentication: Placing Users in the Driver's Seat Wolfgang Goerlich, Advisory CISO, Duo Security, and Jennifer Golden, Duo Product Marketing Manager, Duo Security Duo’s new Risk-Based Authentication (now in public preview) dynamically detects potential threat signals and adjusts security requirements, in real ti... April 11, 2023 5:00pm Open House Session on UNEP FI's 2023 Climate Risk Programme David Carlin, Head of Climate Risk and TCFD, UNEP FI Join us for a discussion on the upcoming work of UNEP FI’s Climate Risk Programme including working groups, initial plans for in-person sessions, and ... 1 month ago | 58 mins Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... 4 weeks ago | 61 mins Training Deep Learning Models in the Cloud Milind Pandit, Habana, an Intel Company; Seetharami Seelam, IBM; Erin Farr, IBM Industry analysts predict Deep Learning will account for the majority of cloud workloads. Additionally, training of Deep Learning models will represen... 2 weeks ago | 56 mins Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... 1 month ago | 61 mins ISACA Virtual Summit Session: Managing Security in the Digital Age John Wheeler, Senior Advisor, Risk & Technology, AuditBoard Digital transformation — largely accelerated by the 2020’s shift to remote work models — altered business operations from a visible set of centrally m... May 31, 2023 4:00pm Effective Ways to Augment Your Microsoft 365 Defence Jennifer Cheng, Cybersecurity strategy, JAPAC, Proofpoint | Alex Sheppard, Sr Sales Engineer, Proofpoint Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud se... 1 month ago | 78 mins Introduction to Using PrecisionTree: Measuring the Value of Information Rafael Hartke Decision trees are structured decision models containing sequences of decisions and events. They allow us to graphically map the plan throughout the l... 4 weeks ago | 56 mins Load more