Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cybersecurity Strategy and Leadership for the SMB Diana Kelley | Susan Whittemore | Jay Ryerse | Courtney Radke Smaller businesses have a common problem when it comes to cybersecurity - limited expertise, resources and budget. The board is asking for, clients... 2 years ago | 56 mins Balancing the Security Workforce Diana Kelley | Chris Calvert | Larry Whiteside, Jr. | Gary Hayslip The world needs more people in infosec. There are currently about 2.8 million cybersecurity professionals, but roughly 4 million more are needed to cl... 2 years ago | 56 mins Deceiving the Attacker Diana Kelley | Chris Roberts | Christina Fowler When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach. Join t... 1 year ago | 56 mins Social Engineering Threats to Enterprise Security Diana Kelley | Tyler Cohen Wood | Stephanie Carruthers | Samantha Davison Join us as we review social engineering tactics and attack methods. Learn about the latest trends in social engineering, the risk to your organization... 2 years ago | 58 mins Balancing Security on Premise and In The Cloud Diana Kelley | Dominique West | Jon Garside | Dan Harding Digital transformation - we hear about it all the time, but what does it really mean for security? As organizations transition users, applications, wo... 2 years ago | 60 mins How To Prevent Bias in Machine Learning Diana Kelley, Microsoft I Deveeshree Nayak, University of Washington, Tacoma I Marcae Bryant-Omosor, USAA Machine Learning is not immune to bias. In fact, often times it can actually amplify bias. As organizations are increasingly turning to ML algorithm... 2 years ago | 58 mins When NOT To Release and Hold Out for Better Security Diana Kelley, Microsoft | Arun Kothanath, Clango | Ed Moyle, SecurityCurve New products or services can mean the difference between success and failure for a lot of companies. However, in the rush to release, security often t... 2 years ago | 51 mins Why Today’s Attacker is Focused on Identities Diana Kelley, Microsoft I Joseph Carson, Thycotic I Roshan Sherifudeen, EY According to Verizon’s 2019 Data Breach Investigation Report, 80% of hacking-related breaches exploited either stolen or weak user passwords - and 29%... 3 years ago | 59 mins Load more