Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... 2 weeks ago | 61 mins Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 2 weeks ago | 21 mins Managing data protection: If you can't measure it, you can't manage it Pragyansmita Nayak, Ph.D, Chief Data Officer | Hitachi Vantara Federal An unspoken requirement has emerged calling for IT staff to conduct data management in a non-intrusive manner. Skipping risk mitigation to avoid inter... 1 month ago | 57 mins Modernizing SAP by Harnessing the Power of Cloud with Dell & Infosys Scott Sinclair, Enterprise Strategy Group; Edwin Nadar, Dell Technologies; Abhijeet Vyas, Infosys Agility, the ability to quickly adapt to shifting demands, is essential for success in contemporary business. As a result, IT organizations are under ... April 13, 2023 3:00pm Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... May 4, 2023 2:00pm Making cyber-threat intelligence programs effective and impactful Jon Oltsik- Distinguished Analyst & Fellow with Enterprise Strategy Group & TJ Alldridge- Product Marketing Manager, Mandiant Most organizations have cyber-threat intelligence programs in one form or another, but the tough-to-face fact is that many only achieve tactical succe... 3 days ago | 32 mins The Current State of Critical Infrastructure Major General John Wharton (US Army ret) | Sam Curry, CISO, Zscaler | Oleg Strizhak, Digital Supply Chain Risk Manager, Shell The Current State of Critical Infrastructure: How to Prepare for Zero Day Threats in Your Supply Chain Cyberattacks on critical infrastructure have s... April 4, 2023 3:00pm The Current State of Critical Infrastructure [International] Major General John Wharton (US Army ret) | Sam Curry, CISO, Zscaler | Oleg Strizhak, Digital Supply Chain Risk Manager, Shell The Current State of Critical Infrastructure: How to Prepare for Zero Day Threats in Your Supply Chain Cyberattacks on critical infrastructure have s... April 5, 2023 9:00am A Demo of Vulnerability Risk Management Data Aggregation and De-duplication Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Sherlock Holmes said, "It is a capital mistake to theorize before one has data." Enterprise vulnerability management teams know exactly what Sherlock ... 3 days ago | 31 mins Shifts in the Threat Landscape Jon Clay; VP, Threat Intelligence, Trend Micro The events of the past few years have shifted the threat landscape. Understanding your attack surface starts with recognizing the motivations behind c... April 4, 2023 11:00am Load more