Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... 24 hours ago | 44 mins Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 2 days ago | 23 mins This is How They Tell Me the World Ends Alex Rice (HackerOne), Nicole Perlroth (Author) & Sandra McLeod (Zoom) On February 9, The New York Times cybersecurity reporter Nicole Perlroth released the highly anticipated book, This is How They Tell Me The World Ends... 3 days ago | 61 mins MITRE ATT&CK Framework: Seeing Through the Eyes of Your Attacker Davide Veneziano Senior SE, Antonio Forzieri Cybersecurity Specialist & Matthias Maier EMEA Director of Product Marketing Start thinking like an attacker and learn how to make more effective decisions to prevent costly attacks – before your business is interrupted. It’s ... July 7, 2022 12:00pm Building Boundaries: How to Rein in Cloud Sprawl Alex Hilton - CEO, CIF | Shaun Ward - Claranet | Dan Ortman - SoftwareONE | Adrian Lovell - HPE Cloud infrastructures offer seemingly endless opportunities, but this lack of physical boundaries can create problems if organizations aren’t careful.... 3 days ago | 63 mins How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... 2 weeks ago | 36 mins One Step Further: How to Prioritise Security with SecDevOps Helen Beal - DevOps Institute | Ricardo Ferreira - Fortinet | Ryan Sheldrake - Lacework | Cheryl Razzell - IFS Security has historically had to be an after-thought for developers. The need for speed and delivery means that misconfigurations and vulnerabilities ... July 18, 2022 3:00pm TechChannel: How to Incorporate Continuous Testing Into Your IBM i Dev Cycles Andrew Finley Solutions Engineer, Rocket Software Continuous integration and continuous delivery sounds interesting, but it’s not possible without agile, automated testing of your IBM i code. This is ... July 1, 2022 12:00pm Voice of the CISO 2022 : la médiatisation des attaques cybercriminelles Loic Guezo, Proofpoint FRANCE & Benoit Fuzeau, RSSI Casden Banque Populaire L'année 2021 a sans doute été moins mouvementée que l'année précédente, mais pour les professionnels de la cybersécurité, elle fut tout aussi éprouvan... 3 hours ago | 53 mins TechChannel: How to Incorporate Continuous Testing Into Your IBM i Dev Cycles Andrew Finley Solutions Engineer, Rocket Software Continuous integration and continuous delivery sounds interesting, but it’s not possible without agile, automated testing of your IBM i code. This is ... July 1, 2022 5:00pm Load more