Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking a Zero Trust Approach to Malware James Coker, Infosecurity Magazine | Alex Tasker, Forcepoint | Paul Holland, ISF | Phil Robinson, Prism Infosec Malware-based attacks are growing in prevalence and sophistication and are increasingly difficult for organizations to tackle. Anti-malware and sandbo... 2 months ago | 61 mins Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 2 months ago | 61 mins Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 3 months ago | 16 mins Threats From Within: A Programmatic Approach to Managing Insider Risk Sanjay Raja, VP Product Marketing and Solutions | Antony Farrow, Sr Director of Solution Architecture Insider Threats pose a significant threat to enterprises because they are authorized users that have no need to breach your perimeter. While identifyi... 19 hours ago | 54 mins Avoid raised eyebrows: Dr. Oetker Improves Data Consistency with Automation Moritz Kelm, Lead Architect for Enterprise Architecture Management | Dr. Oetker; Thomas Schreiner, CEO of Aronis GmbH The information maintained in a LeanIX Repository is of high volume and complexity, with crowd-sourced knowledge. Being able to trust the data is esse... September 27, 2023 2:00pm Cyber Risk Roundtable Ep. 3: Email Security. Defend Your Top Cyber Vulnerability Michael Hansen (Check Point), Kory Jessen (Verizon) According to Verizon’s 2023 Data Breach Investigations Report (DBIR), Email security compromises have doubled since Verizon started publishing the rep... September 28, 2023 4:00pm Know Your People, Know Your Risk: The Rise of Account Compromise Ryan Schwartz, Sr. Product Marketing Manager & Maritza Perez, Group Product Manager, Abnormal Security It takes 328 days to identify and contain a breach due to credential compromise. Couple this with the fact that instances of credential compromise hav... September 28, 2023 4:00pm Manage Risk the ISF Way Benoit Heynderickx, Principal Analyst and Hui Shan, Senior Analyst, ISF Information risk assessments enable organisations to select controls or other treatment options that are commensurate with risk in order to reduce the... October 6, 2023 10:00am Understanding flood risk - the different modelling approaches Ali Smedley, Senior Research Analyst and Cory Isaacson, CEO and Co-founder at reThought Insurance Flooding is the most pervasive and damaging natural hazard throughout the world. Insurers want to understand the risk to accurately price policies, de... 6 days ago | 28 mins Biodiversity and TNFD development: building corporate engagement on biodiversity Responsible Investor in partnership with Reckitt The introduction of the TNFD’s new framework to improve standards in nature-based disclosure presents a pivotal moment in the journey towards halting ... 23 hours ago | 61 mins Load more