Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Battling Endpoint Cybercrime: Protecting Modern Businesses Nick Cavalancia, Conversational Geek | Kent Feid, Quest Software | Dan Garcia, EDB | Markus Abraham, Independent Consultant The workforce is changing at a rate few can keep up with. The impact of hybrid working, BYOD and IoT can take its toll on your security, open you up t... February 16, 2023 10:00am How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 3 weeks ago | 63 mins So Long, SOC Provider Johna Till Johnson, Nemertes CEO and Founder + Jerald Murphy, Nemertes SVP of Research & Consulting Best Practices for Security Operations Center Migration • A look at who to consider for SOC-as-a-service or MDR services • What some selection criter... February 8, 2023 4:00pm Pilot and Trial: the 2nd Stage of Implementing Quantum Networks Matthew Skrzypczyk There are 3 key stages to launching a Quantum Network: Design and Emulation, Pilot and Trial, and Full Scale Deployment. In this session Matthew Skrzy... February 9, 2023 6:00pm Design and Emulation: the 1st Stage of Implementing Quantum Networks Eric Brown There are 3 key stages to launching a Quantum Network: Design and Emulation, Pilot and Trial, and Full Scale Deployment. In this session, Eric Brown, ... 2 weeks ago | 59 mins January 2023 TRU Intelligence Briefing Paul Aitken, Keegan Keplinger, Spence Hutchinson, Derek Thomas In this month’s TRU Intelligence Briefing, the Threat Response Unit reviewed: - Threat Landscape: A review of recently observed malware by the SOC suc... 2 weeks ago | 60 mins Ransomware Attacks: Strategies for Prevention and Recovery Immanuel Chavoya, SonicWall and Michael Sampson, Osterman Research Join the SonicWall Threat and Detection Strategist as we uncover the findings in the latest Osterman Research paper, Ransomware Attacks: Strategies fo... 3 weeks ago | 67 mins Defeat inaccessible analytics: Best practices for sharing data insights Sam Priddy, Data Visualization Guide, Tableau Your data insights won’t do your organization any good if they’re locked up in local files and email attachments, or otherwise inaccessible. At the sa... 1 week ago | 61 mins Why Quantum Networks, Why Now? Daniel Winton Experts estimate that quantum technology capable of breaking current encryption algorithms and intercepting communications will be possible no later t... 4 weeks ago | 61 mins Building a Stronger Security Partner Team Astrid Bailey, Security Operations Manager - Security Engagement, Adobe Security Partners at Adobe provide product teams with guidance needed to help improve overall security posture. They partner with risk management, ope... 4 months ago | 25 mins Load more