Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... 2 months ago | 35 mins Cloud Transformation is Increasing Ransomware Risk - Cybersecurity Research Steve Piper - Founder CEO, CyberEdge & Tony Goulding - Cybersecurity Evangelist, Delinea, Join Steve Piper, Founder and CEO of CyberEdge, and Tony Goulding, Cybersecurity Evangelist at Delinea, for an in-depth discussion about the ongoing c... 5 days ago | 58 mins 'Hackers Gonna Hack' Series: Part 2 [APAC] Ken Mizota, Chief Technology Officer - APAC at Rapid7 Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cyber Security Series’, Ken Mizota, Chief Technology O... 2 weeks ago | 34 mins Insights From CyberEdge’s 2022 Cyberthreat Defense Report (APJ) Peter Klimek Director of Technology OCTO, Steve Piper CEO CyberEdge Group CyberEdge’s 2022 Cyberthreat Defense Report (CDR) has become the standard for assessing organizations’ security posture, for gauging perceptions of IT... 2 weeks ago | 61 mins Windows Server Security Masterclass: Harden Your Servers Efficiently Dirk Schrader, VP of Security Research, at Netwrix Whether you have an on-prem or hybrid IT environment, your Windows servers play a vital role in essential business operations. As a result, they are a... August 31, 2022 5:00pm 2022 Verizon Mobile Security Index Report Key Findings Verizon, Netskope, Proofpoint, and Ivanti As the dependency on mobile devices grows, the challenge of balancing productivity with proper security remains a top concern for security professiona... 2 weeks ago | 49 mins Frameworks & Best Practices for Securing Complex Multi-Cloud Environments Andres Torrado (Sr. Security Architect, OneNeck) and Antonio Sanchez (Product Marketing Manager, Alert Logic) The adoption of multi-cloud in your environment often means more complexity and potentially greater risk. As threats become more sophisticated and the... 4 weeks ago | 61 mins How to Benchmark Your Cloud Security Maturity – and Act on What You Discover Lior Zatlavi, Sr. Cloud Security Architect, Ermetic With the rise in cyber threats, your cloud infrastructure growing and devops demanding privileged access, you can no longer approach cloud security on... September 14, 2022 5:00pm New 2022 Phishing By Industry Benchmarking Report Perry Carpenter (KnowBe4), Joanna Huisman (KnowBe4) As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime ... 4 weeks ago | 60 mins The ‘Hottest’ IT Security Technologies in 2022 Steve Piper, CISSP, Founder & CEO, CyberEdge Group Want to know which IT security technologies are hot and which ones are not? Join Steve Piper, Founder & CEO of CyberEdge (and a proud CISSP), as he re... 2 months ago | 60 mins Load more