Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 8 Common Insider Threat Indicators & How to Defend Against Bad Actors Shunta Sharod Sanders What do the latest credential-stealing phishing exploits, theft of trade secrets, and ransomware attacks from Hive, BlackByte, LAPSU$$, and Lockbit3.0... 1 month ago | 21 mins Software Due Diligence: Mitigating Multiple Dimensions of Risk Phil Odence, Synopsys Most software due diligence playbooks involve peer-to-peer discussions about products, processes, and people. That’s all extremely important as invest... 2 months ago | 64 mins Considerations for the Modern Data Security Lifecycle Nick Savvides, Field CTO & Sr Director of Strategic Business | Kevin Oliveira, Sr. Product Marketing Manager See what's new! Data Security Lifecycle enables you to effectively discover, classify, prioritize, protect, and monitor your data. We know data secu... 3 weeks ago | 29 mins Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 7 months ago | 39 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 9 months ago | 51 mins Get compliant with TPISR and TISAX through data encryption Udo Falkenrich, Systems Engineer, Conpal by Utimaco | Michael Höppner, Head of Marketing & Communication, Conpal by Utimaco How client-side, transparent encryption can help meet industry requirements and boost your data security at the same time, whether data is at rest or ... 3 months ago | 62 mins Considerations For The Modern Data Security Lifecycle Nick Savvides, Field CTO & Snr. Director of Strategic Business | Kevin Oliveira. Snr. Product Marketing Manager Don't let your organization become a data breach statistic. We know data security is one of the most complex areas of technology and that it requires... 5 months ago | 61 mins How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 7 months ago | 63 mins Threats From Within: A Programmatic Approach to Managing Insider Risk Sanjay Raja, VP Product Marketing and Solutions | Antony Farrow, Sr Director of Solution Architecture Insider Threats pose a significant threat to enterprises because they are authorized users that have no need to breach your perimeter. While identifyi... September 26, 2023 6:00pm The Cost of a Breach [NA] Jeffrey Gardner - Practice Advisor, Rapid7 We know the risks to attackers successfully deploying ransomware into a customers environment - offline time, loss of revenue, customer trust, actual ... September 28, 2023 5:00pm Load more