Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 3 weeks ago | 63 mins Managing data protection: If you can't measure it, you can't manage it Pragyansmita Nayak, Ph.D, Chief Data Officer | Hitachi Vantara Federal An unspoken requirement has emerged calling for IT staff to conduct data management in a non-intrusive manner. Skipping risk mitigation to avoid inter... 4 weeks ago | 57 mins The Value of Timely Data in Modern Manufacturing Vats Vana, VP, IoT Strategy, KX, and guest speaker Paul Miller, Vice President, and Principal Analyst at Forrester This discussion between Vats Vana, Vice President of IoT Strategy & Products at KX, and guest speaker Paul Miller, Vice President, and Principal Analy... 6 months ago | 56 mins A New Data Frontier: The Value of Streaming Analytics to a Data-first Business Mike Leone - Enterprise Strategy Group, Conor Twomey - KX & Kiran Singh - NextEra Energy When it comes to business initiatives driving technology spend, 1 in 3 organizations state that their top initiative over the next 12 months is to imp... 5 months ago | 35 mins Illuminate the Blind Spots: Why your security investments are failing Dawid Kowalski - Senior Director Field Engineering, EMEA, FireMon We all know the story. The threat landscape is ever-evolving and security teams have to stay ahead of the curve and protect their networks. But what i... March 21, 2023 1:00pm How Adobe Improved User Sign-up Experience While Enhancing Account Protections Sparky Toews - Adobe’s Principal Product Manager for Identity; Richard Dufty - Chief Revenue Officer, Arkose Labs As digital platforms set out to add new users and drive growth, stopping fake account fraud remains a top concern for fraud and identity teams. For Sp... March 21, 2023 5:00pm Shattering the Silicon Ceiling: Celebrating Women in Cyber Risk Maryam Hamidirad, FISPAN; Rebecca Scalchas, Hyatt; Praj Prayag, Horizon Media; Andrea Sherwood, NBC Universal Join us as we celebrate Women’s History Month as LogicGate’s VP of Customer Success and Services brings together three women working at the pinnacle o... March 23, 2023 6:00pm Bot Management Masterclass: 5 Key Principles to Win Against Bots David Senecal, VP of Architecture & Research at Arkose Labs Despite the myriad of bot prevention solutions and investments businesses are making to tackle this growing (and evolving) problem, we are far from wi... March 22, 2023 5:00pm Outsmarting RaaS: Strategies to Reduce the Risk of a Ransomware Attack Eric George (PhishLabs), Jon Hallberg (Digital Defense), and Paul Caiazzo (Avertium) As-a-Service models continue to change the ransomware landscape. Prominent threat groups operate as enterprises and blend outsourced cybercrime servic... 6 days ago | 61 mins Uncovering Hidden Risks in Your Cloud Environment Andy Ellis, Advisory CISO; Kathryn Kun, Dir. of Architecture & Assurance, Forter; George Werbacher, Director of IS, Blackbaud Whether you’re a first time CISO, or this is your tenth CISO gig, any cybersecurity pro can benefit from creating– or updating– an actionable plan to ... 7 days ago | 35 mins Load more