Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date See An ASOC Tool In Action Adrian Acuna, Senior Sales Engineer The right application security orchestration and correlation (ASOC) tool automates time-consuming application security workflows and makes software se... 6 months ago | 59 mins 6 Ways to Improve AppSec Accountability Adrian Acuna, Senior Sales Engineer AppSec teams often struggle to keep up with the rapid code releases produced by DevOps teams. Testing falls behind as development speeds up. Since slo... 7 months ago | 41 mins The 5 Executive Blind Spots Around Observability Brandon Shopp, Group VP of Products, SolarWinds; Peggy Bresnick-Kendler, Moderator, Information Week Only 1 in 10 enterprises adopted an observability strategy in 2020. By 2024, Gartner predicts that number will triple among companies progressing clou... 3 days ago | 53 mins Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 2 months ago | 45 mins How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 3 weeks ago | 48 mins How To Enable the Hybrid Workforce and Reduce Cyber Threat Bruce Dodworth, Sea Glass and Guests Staying connected, and enabling first-class collaboration and communication for your employees isn’t always easy. As we continue to evolve the way we ... June 29, 2023 9:00am Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 5 months ago | 45 mins How to Achieve Complete Cyber Risk Management Yaniv Bar-Dayan, Vulcan Cyber CEO Register to watch this CyberRisk Summit keynote replay and learn how to achieve complete cyber risk management across all of your cyber risk surfaces.... 10 months ago | 12 mins How to Achieve Complete Cyber Risk Management Yaniv Bar-Dayan, Vulcan Cyber CEO Register to watch this CyberRisk Summit keynote replay and learn how to achieve complete cyber risk management across all of your cyber risk surfaces.... 10 months ago | 12 mins Oil & Gas Webinar Series 5: Project Portfolio Analysis and Optimization Rafael Hartke On this last webinar of the O&G series we will wrap up everything we presented so far: based on the risk analysis of each project, we will group them ... 5 months ago | 72 mins Load more