Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 13. Ransomwared. over nieuw boek van Hacker DigiD, EPD en Coronapas Erik Westhovens [Schrijver | Ransomware Expert | Security Evangelist], Mike Jansen [Security Consultant] Een live boekbespreking van het nieuwe boek van Erik Westhovens: 13. Ransomwared. Een uiteenzetting van de wondere wereld van ransomware. 12 hours ago | 38 mins Compliance for the Enterprise CIO – The art of being prepared Markus Strauss & Simon Ahmet We talk about compliance standards, tools and potential processes that, when implemented, can help any CISO, CIO or Security team be more prepared and... May 17, 2022 2:00pm Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... May 18, 2022 5:00pm Faster Breach Detection Ron Stein, CPacket Networks Breaches happen by clever and well-armed cybercriminals who use many tactics, techniques, and procedures to infiltrate IT infrastructure, implant malw... May 17, 2022 10:00pm 5 Critical Capabilities To Go From Legacy To Modern Endpoint Security [EMEA] Anne Aarness (Sr. Product Marketing Manager), Rachel Scobey (Technical Product Marketing Manager) According to one estimate, there will be 29.3 billion networked devices globally by 2023. Organizations and security teams are facing challenges like ... May 19, 2022 9:00am Understanding Your Attack Surface Through Vulnerability Disclosure Marten Mickos, HackerOne Melissa Vice, DoD Cyber Crime Center (DC3) Chip Wentz, Keurig Dr. Pepper Inc. Having a vulnerability disclosure policy (VDP) helps improve network defenses and enhance mission assurance, helping you launch faster with less risk... May 18, 2022 8:00pm A CISO Discussion: Don't "Default" on Email Security Ed Harris, CISO Mauser Packaging and Mike Bailey, Manager of Product Marketing Proofpoint With an increase in sophisticated phishing attacks like supplier fraud, ransomware threats, and account compromise attempts, default email security ca... May 19, 2022 8:15am Don't Become the Next Cautionary Tale: Top Breach Prevention Strategies Panel of experts Businesses are now spending $170.4 billion on information security annually, according to research from Gartner. Despite this huge investment, IBM's a... May 19, 2022 3:00pm The Application Attack Threat Landscape - After Log4J Sean Flynn - Director of Security Technology and Strategy, Akamai Modern web applications have become complex, heavily reliant on APIs for virtually every online interaction. This complexity brings with it the potent... May 17, 2022 5:00pm Fighting Cybercrime in 2022: All for one and one for all Mike Bailey Senior PMM, Security Awareness Proofpoint Cybercriminals have an arsenal of tactics at their disposal - phishing, malware, social engineering, email fraud, identity theft (EAC), and ransomware... May 17, 2022 2:00pm Load more