Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Emerging Threats: The Apps, Activities and Attacks Leading to the Most Data Loss Zoltan Deak, Director of Product Marketing, Rubrik; Salah Nassar, Sr. Director Product Marketing, Zscaler Join this webinar to learn about new strategies attackers are using to steal your most valuable asset - your data. We’ll examine the challenges of mod... October 4, 2023 9:00am Strategies for Combatting Compromised Credentials Rachel Wilson, Alex Cox and Amy Appleyard IT professionals play a vital role in protecting an organization’s data and systems from cyberattacks. They work hard to stay ahead of risks, remediat... October 4, 2023 4:00pm Why Asset Management in Healthcare is Essential for Your Audits Rui Fernandes, GRC - IT Security Director GRC - IT Security Director, Milford Hospital Medical professionals in hospitals rely on networked medical devices to help them access and share patient information. Knowing which devices are runn... 1 week ago | 6 mins Better Password Hygiene in Active Directory Sascha Martens (Chief Technology Officer at Mateso, now part of Netwrix) Every password is a corporate asset (or risk center) that needs to be managed as such. Between accounts on non-integrated internal systems, cloud acco... 1 month ago | 60 mins Cyber Hygiene and You Brute Force Attacks Arctic Wolf Networks They’re one of the filthiest weapons in a cyber criminal’s arsenal, and they rely on your poor cyber hygiene for success. Learn how brute force attack... 2 months ago | 3 mins Putting Cyber Security Data to Work at Scale [CyberRisk Summit May 2023] Yitzy Tannenbaum, Vulcan Cyber director of product marketing, with experts from Wiz, Checkmarx, Cyberint, and CTCI Innovation from Vulcan Cyber helps put vulnerability and asset risk in context for more-effective cyber hygiene, risk visibility and security posture ... 3 months ago | 27 mins Aligning Priorities: Cyber Risk & Service Delivery for Security & IT Teams Lokesh Aggarwal, CEO of Apexa iQ; Jamie Perry SVP/CSO of COCC, Steven Reis SVP/CTO of COCC Join Apexa iQ’s webinar on July 10th at 2:00 pm ET with Apexa iQ’s CEO leading the discussion with Steven Reis and Jamie Perry of COCC. You’ll learn:... 2 months ago | 60 mins The 3 Unavoidable Risks of Unmanaged Physical Security IOT devices Eric Adams (VP Physical Security, Presidio), John Gallagher (VP Viakoo Labs, Viakoo) Managing physical security environments is a challenge regardless of the size. Ensuring critical systems are working, mitigating cyber risks and meet... 5 months ago | 42 mins Preparing Your Board for Cybersecurity Risk Maggie Wilderotter, CEO, Grand Reserve Inn * Timothy Morris, Chief Security Advisor, Tanium "In cybersecurity, the more you know the better you can manage and defend. With emerging legal and regulatory requirements, cybersecurity has become a... 3 months ago | 46 mins Attack Surface Management and Security Hygiene and Posture Management Jon Oltsik, Senior Principal Analyst & ESG Fellow INSIDE SECURITY HYGIENE AND POSTURE MANAGEMENT Managing a healthy security posture and hygiene in an ever-growing attack surface is challenging. Ever... 6 months ago | 60 mins Load more