Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... February 7, 2023 10:00am CISO Roundtable: State of Public Cloud Security Andy Ellis, Advisory CISO, Orca Security, Yoav Alon, CTO, Orca Security, and Jack Roehrig, vCISO, Investor & Advisor Join our expert CISOs as they discuss key findings from Orca Security's State of Public Cloud Security Report, a collection of findings and recommenda... February 21, 2023 4:00pm 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... February 21, 2023 10:00am How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 2 weeks ago | 63 mins Continuously Assess Your Multi-Cloud Environments for Policy Violations Alex Feigenson Senior Manager, Security Engineering, Tenable, John Tonello Cloud Security Advocate, Tenable No matter what technology you're working with, there are two things you can count on: compliance audits and resulting remediations. You may not be abl... 2 days ago | 59 mins The MITRE ATT&CK for ICS Framework... And What to do About it Dick Bussiere, Technical Head of Operational Technology, APJ, Tenable, Joone Nijjar, Principal PMM, Tenable For organizations reliant on operational technologies, one of the important threat detection frameworks is MITRE ATT&CK® for ICS. Based on real action... 1 day ago | 60 mins The DoControl SaaS Security Platform: Shadow Applications Governance Guy Rosenthal, VP of Product, DoControl; Corey O’Connor, Director of Product Marketing, DoControl DoControl’s Product team will highlight a new module within the DoControl Software as a Service (SaaS) Security Platform. This new module will extend ... 3 days ago | 47 mins PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... February 8, 2023 6:00pm Case Study: How TGen Secures their Data with Identity-First Security John Forrister, Vice President Information Security, Translational Genomics Research Institute (TGen) The Translational Genomics Research Institute (TGen) is a pioneer in the biotechnology industry conducting groundbreaking genomic research that has be... 4 days ago | 25 mins Load more