Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date AppSec Trends for 2022 and Beyond Eli Erlikhman, Director of Management Consulting In the world of application security (AppSec), it’s helpful to know what your peers are doing—what’s worked, what’s failed—and perhaps most importantl... 5 months ago | 39 mins Making Security Skills Stick – Findings from Ponemon Research Amy Severson, Security Innovation | Dr. Larry Ponemon, The Ponemon Institute As the notorious cybersecurity skills gap widens, organizations look for effective ways to up-level competency across diverse roles and abilities. How... May 30, 2023 5:00pm CISA's Zero Trust Maturity Model V2: Expert Analysis and Implications Sean Connelly, CISA; John Simms, CISA; Jason Garbis, Numberline Security; and Alex Sharpe, Sharpe42 CISA recently released version 2 of their Zero Trust Maturity Model. There is a lot of interest across the public and private sectors to understand th... May 31, 2023 5:00pm Making Security Skills Stick – Findings from Ponemon Research Amy Severson, Security Innovation | Dr. Larry Ponemon, The Ponemon Institute As the notorious cybersecurity skills gap widens, organizations look for effective ways to up-level competency across diverse roles and abilities. How... 5 days ago | 27 mins Achieving Zero Trust Maturity with Cato SSE 360 Demetris Booth While organizations realize they must deploy zero trust, knowing where to begin and how to deploy has become an impediment for many. The CISA (Cyberse... June 1, 2023 9:00am Workplace Investigations: Introducing the Investigations Maturity Model Meric Bloch, Organizational Investigations Expert Fireside Chat - Episode #1 | Workplace Investigations: Introducing the Investigations Maturity Model A workplace investigation should do more than de... May 31, 2023 6:00pm Making Security Skills Stick – Findings from Ponemon Research Amy Severson, Security Innovation | Dr. Larry Ponemon, The Ponemon Institute As the notorious cybersecurity skills gap widens, organizations look for effective ways to up-level competency across diverse roles and abilities. How... June 6, 2023 5:00pm Optimizing IAM Infrastructure Through Program Maturity Asif Savvas, CPO, Simeio | Aubrey Turner, Executive Advisor, Ping Identity Optimizing IAM infrastructure through program maturity involves continuously improving IAM program to better align with your organization's security g... June 8, 2023 4:00pm How Strong Is Your Last Line of Defense? Thomas Reichardt, Sales Backup & Recovery Solutions and Ulrich Wallscheid, Data Protector Product Manager, OpenText There’s no shortage of risks to your organization’s data integrity. That’s why you need to sort the backup and recovery approaches that help from thos... 5 days ago | 45 mins Strengthen Your Cyber Defense With a Data Security Maturity Model Ann Johnson, Corporate Vice President - Security, Compliance, & Identity at Microsoft, and Anneka Gupta, CPO at Rubrik Organizations are losing confidence in their ability to withstand cyber attacks, in part, because they lack visibility into the security of their data... 1 month ago | 13 mins Load more