Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Helping Big Enterprise Mitigate Cyber Risk at Scale [CyberRisk Summit May 2023] Yaniv Bar-Dayan, Vulcan Cyber CEO Watch this CyberRisk Summit keynote from Yaniv Bar-Dayan, Vulcan Cyber CEO, and learn how Vulcan Cyber is helping the world's largest retailers, finan... June 7, 2023 4:00pm CISO Perspectives on Cyber Security with Limited Resources - CyberRisk Summit Frank Kim, YL Ventures CISO in residence Now more than ever cyber security teams are being asked to do more with less and to get the most out of existing investments in people and tools. Atte... June 14, 2023 4:00pm Prioritizing Vulnerability Risk at Verana Health [CyberRisk Summit May 2023] Jayashree Jagannath, Verana Health director of security and compliance Hear Jayashree Jagannath, Verana Health director of security and compliance, describe how her cyber security and vulnerability management teams use Vu... June 21, 2023 4:00pm Getting the Most out of EPSS for Risk Prioritization [CyberRisk Summit May 2023] Octavian Suciu, postdoctoral cyber security research | Roy Horev, Vulcan Cyber CTO With many new developments to the EPSS and CVSS frameworks, cyber security teams are actively investigating how to make the most out of vulnerability ... June 28, 2023 4:00pm Putting Cyber Security Data to Work at Scale [CyberRisk Summit May 2023] Yitzy Tannenbaum, Vulcan Cyber director of product marketing, with experts from Wiz, Checkmarx, Cyberint, and CTCI Innovation from Vulcan Cyber helps put vulnerability and asset risk in context for more-effective cyber hygiene, risk visibility and security posture ... July 6, 2023 4:00pm Considerations in application tooling Vincent Amanyi, Founder | Boleaum Inc. Tune into this session from industry thought leader Vincent Amanyi for insight on how to simplify you application security tooling and enable agility ... June 7, 2023 9:00pm Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 2 months ago | 37 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... June 12, 2023 7:00am Cloud security: Does the endpoint still matter? Anton Ovrutsky, Senior Threat Researcher (Sumo Logic) & Megan Roddie, Senior Security Engineer (IBM) Today, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically? There ar... May 31, 2023 7:00pm ISACA Virtual Summit Session: Managing Security in the Digital Age John Wheeler, Senior Advisor, Risk & Technology, AuditBoard Digital transformation — largely accelerated by the 2020’s shift to remote work models — altered business operations from a visible set of centrally m... May 31, 2023 4:00pm Load more