Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing Apps Starts with Securing Kubernetes Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicat... 13 hours ago | 63 mins Détecter les incidents d’identités ne suffit pas à stopper une attaque zero day Anne-Sophie Goeldner, Regional Sales Manager Identity Protection Europe et Nicolas Koziel, Senior System Engineer Log4j, noPac: pourquoi auditer l’AD et détecter les incidents d’identités ne suffit pas à stopper une attaque zero day? - Vous découvrirez le rôle pr... 13 hours ago | 43 mins Voice of the CISO 2022 : la médiatisation des attaques cybercriminelles Loic Guezo, Proofpoint FRANCE & Benoit Fuzeau, RSSI Casden Banque Populaire L'année 2021 a sans doute été moins mouvementée que l'année précédente, mais pour les professionnels de la cybersécurité, elle fut tout aussi éprouvan... July 1, 2022 7:15am Voice of the CISO Report 2022: The year cybercrime went primetime Andy Rose, Resident CISO, Proofpoint It may have been less eventful than the year it followed, but 2021 was another testing time for cybersecurity professionals. To find out how CISOs cop... 3 weeks ago | 59 mins Engaging With Increasingly Larger and Fragmented Buying Centers Winfried Schultz, EMEA VP Marketing at Teradata Why the real challenge is not the selling, but the buying. And what marketing can do. -Traditional B2B technology marketing makes it harder to sell a... 2 months ago | 30 mins Securing Communications at the Tactical Edge using Hardware Security Modules Alex Antrim, Senior Solutions Engineer, Yubico Today’s warfighters and the network architects that design the communications networks that they rely on, are faced with adversaries that are increasi... 50 mins ago | 61 mins Why You Need Next Generation SIEM for Advanced Threat Detection and Response Sanjay Raja, VP Product Marketing and Solutions, Gurucul | Guest Speaker Allie Mellen, Analyst, Forrester Security Information and Event Management (SIEM) tools have evolved as a core platform for enabling security teams to be more adept at detecting and r... June 29, 2022 5:00pm Tech Talk (and Demo): Warehouse Management System - Automation & Innovation Kapil Bhamburkar Director of Application Delivery, Dan Ljungberg Director of Solution Engineering From receipt to goods movement within the warehouse to picking, packing and shipment, your team can work more productively, efficiently, and cost-effe... June 29, 2022 6:00pm Future-proofing your finance systems; the role of technology Innovate Finance and Evelyn Partners A panel event hosted by Evelyn Partners. Join us for a discussion and live Q&A session on automating finance and business processes. Demand to allow ... 6 days ago | 46 mins Creating Unity in Diversity: The Role of Leadership, Culture, and Appreciation SARA JONES, CEO OF INCLUSIONPRO AND MINDI COX OF O.C. TANNER INSTITUTE Diversity, equity, and inclusion continue to be top of mind for senior leaders and HR practitioners. We know that integrated DE&I programs and inclusi... 1 week ago | 62 mins Load more