Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How Data Management is Creating a New Revenue Stream for Service Providers Drew Schlussel, Wasabi; Isabel Freedman, Wasabi; Ryan Goff, Aparavi; Shawn Lieu, Aparavi Join us live for a chance to win a $300 Amazon Gift Card! Managing growing data volumes effectively is becoming more of a challenge for your customer... August 16, 2022 5:00pm DevSecOps: Bridging Security with Development Michael Hanley, CSO, GitHub Pieter Ockers, Sr. Director, HackerOne In this session, GitHub CSO Michael Hanley and HackerOne will explore how leveraging data can help security teams accelerate delivery. 5 days ago | 28 mins Rethinking GRC for Modern Software Development Phillip Ivancic and Michael McGrath Many enterprises have split their security functions between first-line defences, where AppSec tooling and penetration testing traditionally fits, and... 4 days ago | 31 mins How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA] Jason Rivera, Senior Director - Strategic Threat Advisory Group As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cybera... August 25, 2022 9:00am Cybersecurity Series: Hackers 're Gonna Hack - Pt 3/3 [EMEA] Jason Hart, Chief Technology Officer - EMEA at Rapid7 Cybersecurity KPIs for Business Leaders & Stakeholders With board directors looking to their leaders to help understand risk and exposure - part thre... 3 weeks ago | 41 mins All compliance risks begin with people Michael McGrath, Yulia Luciano, Simon Fulton, Ben Chapman. Do you know who in your organisation has the most significant exposure to compliance risk? Are they at risk because of their actions, or are they tar... August 23, 2022 9:00am CISO Guide to Future-Proofing Your SOC [EMEA] Jeffrey Gardner, Practice Advisor Detection and Response, Rapid7 Given the current cyber threat landscape, your in-scope attack surface extends way beyond your organizational perimeter to cloud services, IoT devices... 2 weeks ago | 7 mins Outwit Attackers with a Proactive Cybersecurity Plan Jon Oltsik, Senior Principal Analyst and Fellow, ESG Organizations face a constant barrage of cyber threats that could lead to business disruption, intellectual property theft, and reputation damage. But... August 15, 2022 3:00pm Xm Cyber Presents: A Cloud Security Masterclass Part 3 Paul Giorgi, Director Of Sales Engineering Part 3 - Best Practices to Improve Your Cloud Security Posture Chances are, you are using the cloud or right on your way. It is critical to have a co... 2 hours ago | 57 mins Load more