Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reducing the Burden of Vulnerability Management at Scale Noy Sinai, Vulcan Cyber VP of operations / Tony Taylor, Vulcan Cyber solution architect Register to watch this CyberRisk Summit keynote replay and learn how to approach cyber risk management at enterprise scale. Vulnerability-generated cy... August 30, 2022 4:30pm This is How They Tell Me the World Ends Alex Rice (HackerOne), Nicole Perlroth (Author) & Sandra McLeod (Zoom) On February 9, The New York Times cybersecurity reporter Nicole Perlroth released the highly anticipated book, This is How They Tell Me The World Ends... 1 month ago | 61 mins The value of impact analysis for accelerating SAP updates Features Forrester Consulting In this webinar, distinguished guest speakers from Forrester will share how incorporating AI and analytics into your test strategy can help you delive... 2 weeks ago | 39 mins Vulnerability Management in 2022: Reduce Your Attack Surface Diana Kelley, Cybrize | Edward Rowley, Proofpoint | Richard Meeus, Akamai | Erick Galinkin, Rapid7 In 2022, your attack surface will be larger than ever before. From the onset of the hybrid workforce to huge waves of data being produced, security te... 2 months ago | 62 mins Ensure Business Continuity with Managed DNS solutions Francesco Altomare, senior solution architect at GlobalDots How managed / dedicated DNS solutions enable business resilience by: Increasing availability, reliability, and uptime for your internal and external a... 5 months ago | 48 mins Specialized ITSM for Hybrid Work & Global Teams II: Managing Cloud-Native Apps Francesco Altomare, Regional Sales Manager S. Europe at GlobalDots & Ovidio Maiuri, Chief Digital Officer at Challenger Stone ITSM solutions to manage the productivity, security and compliance of today's work, workforces and workplaces - PART 2 Join us to learn about the cha... 3 months ago | 77 mins Privacy by Design: Why Data Privacy & Security Officers Must Collaborate Dr. Eduardo Rocha, GlobalDots | Dr. Anna Schmits, Akamai Technologies When falling into the wrong hands, abuse of user PII can have a devastating effect on the user’s lives and your business reputation. Facing today’s s... 4 months ago | 59 mins Specialized ITSM for Hybrid Work & Global Teams I: Managing Connectivity Francesco Altomare, Regional Sales Manager S. Europe at GlobalDots & Ovidio Maiuri, Chief Digital Officer at Challenger Stone ITSM solutions to manage the productivity, security and compliance of today's work, workforces and workplaces - PART 1 Join us to learn about the cha... 3 months ago | 63 mins Work smarter: using automation to harden your expanding attack surface Antonio Challita, Ravi Kanukollu, and Janene Casella of ServiceNow As business infrastructure continues its migration to the cloud, your attack surface continues to grow and change, making it harder to keep your organ... 15 hours ago | 48 mins [Full] The challenges and hidden risks of supply chain security Claire Pales -Director at The Security Collective Alla Valente, Senior Analyst at Forrester, Vijay Krishnan, CISO at Unisuper Australian research published in PwC’s 2022 Global Digital Trust Insights Survey indicates only one-third of Australian organisations “have assessed e... 3 weeks ago | 54 mins Load more