Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Helping Big Enterprise Mitigate Cyber Risk at Scale [CyberRisk Summit May 2023] Yaniv Bar-Dayan, Vulcan Cyber CEO Watch this CyberRisk Summit keynote from Yaniv Bar-Dayan, Vulcan Cyber CEO, and learn how Vulcan Cyber is helping the world's largest retailers, finan... June 7, 2023 4:00pm Considerations For The Modern Data Security Lifecycle Nick Savvides, Field CTO & Snr. Director of Strategic Business | Kevin Oliveira. Snr. Product Marketing Manager Don't let your organization become a data breach statistic. We know data security is one of the most complex areas of technology and that it requires... 3 weeks ago | 61 mins Big Data and Privacy Risk Dr Rebecca Wynn, Click Solutions Group and Guests In the digital age, big data is here to stay, and the sooner we learn to embrace it, while also prioritising data protection, the better. Though big d... June 29, 2023 3:00pm By the Numbers: 2023 Open Source Risk in M&A Phil Odence, Synopsys Open source is widely used in software development because it allows you to create high-quality software quickly. But if left unmanaged, open source c... 1 week ago | 60 mins Top Recommendations For Your Security Program, 2023 Guest speaker, Heidi Shey, Principal Analyst, Forrester * Chris Peel, VP Customer Engineering, Echoworx The tech landscape security leaders protect - and use - is set for major changes as critical elements of security, including encryption, experience ma... 2 weeks ago | 37 mins Putting Cyber Security Data to Work at Scale [CyberRisk Summit May 2023] Yitzy Tannenbaum, Vulcan Cyber director of product marketing, with experts from Wiz, Checkmarx, Cyberint, and CTCI Innovation from Vulcan Cyber helps put vulnerability and asset risk in context for more-effective cyber hygiene, risk visibility and security posture ... July 6, 2023 4:00pm Managing data protection: If you can't measure it, you can't manage it Pragyansmita Nayak, Ph.D, Chief Data Officer | Hitachi Vantara Federal An unspoken requirement has emerged calling for IT staff to conduct data management in a non-intrusive manner. Skipping risk mitigation to avoid inter... 3 months ago | 57 mins Generative AI, Training Data, Open Source, and GitHub Copilot, Oh My! Lena and Andrew Hall, Hall Law & Mark Lehberg and Chris Stevenson, DLA Piper Generative artificial intelligence (GAI) will fundamentally change the way that software is built. Whether they are developing or using AI tools, orga... June 21, 2023 4:00pm The Invisible Transformation: Retire Legacy LDAP Directories Without Disruption Doug Simmons, Principal Consulting Analyst for TechVision Research; Wade Ellery, Field CTO at Radiant Logic The legacy LDAP directory infrastructure is a major pain point today for organizations looking to cut costs, boost agility, and secure their environme... 1 hour ago | 53 mins A CISO Perspective: From Threat Landscape Insights to Transformation Programs Chip Stewart, former CISO at the State of Maryland | Rajiv Raghunarayan, SVP Product Marketing, Anomali An Informative Fireside Chat Chip Stewart, former Chief Information Security Officer at the State of Maryland, discusses with Anomali’s Rajiv Raghuna... 1 hour ago | 41 mins Load more