Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Security Misconfiguration - Ep 5 John Wagnon, Solutions Architect, F5 Security Misconfiguration is a major source of cloud breaches. Learn what to do and avoid—as modern app development, software re-use, and architectura... 1 day ago | 10 mins Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1 Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a bes... February 14, 2023 4:00pm Crypto Clarified: Investing in the Truth Benjamin Dean, WisdomTree | Pierre Debru, WisdomTree | Blake Heimann, WisdomTree WisdomTree is proud to present the podcast series, Crypto Clarified: Investing in the truth, your expert led discussion uncovering the truth behind th... February 10, 2023 3:00pm X13 Products + Intel® Xeon® CPU Max Series–An Applications & Performance View Andree Jacobson, Dir. Technology Enablement, Supermicro; Mark Kachmarek, Dir. of Product Management, Xeon Product Line Intel With Intel’s Jan 10th launch of the Intel® Xeon® Max CPU series – the industry’s first with high bandwidth memory (HBM) enabled CPU – Supermicro is pr... 2 weeks ago | 55 mins Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... February 21, 2023 4:00pm Detect Risks & Validate Security Controls - Webinar Series Part 3 Jason Brown, Principal Consultant, Mandiant, Kyle Baird, Principal Consultant, Mandiant This session is the third in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... February 28, 2023 4:00pm 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... February 14, 2023 10:00am Respond to Resume Operations & Hunt to Prevent Compromise- Webinar Series Part 4 Omar Toor, Principal Consultant, Mandiant, Dan Nutting, Manager, Consulting, Mandiant This session is the fourth in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... March 7, 2023 4:00pm Ventajas de Series de Tiempo como Herramienta de Proyección y Análisis en @RISK Enrique Navarrete En este Webinar mostraremos cómo utilizar series de tiempo para realizar proyecciones tanto de variables macroeconómicas como de variables internas de... February 8, 2023 3:00pm IE Series | Faculty Activity Reporting Buy-In and Sustainability Robert Bucciere, Systems Training & Reporting Specialist, University of North Carolina Wilmington Watermark Institutional Effectiveness Series Faculty Activity Reporting Buy-In and Sustainability | A College's Implementation Story One of the bigge... February 8, 2023 7:00pm Load more