Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ransomware Protection: Across the Attack Surface and Along the Kill Chain David Finger, VP Product Marketing, Fortinet; Aamir Lakhani, FortiGuard Labs, Fortinet For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rel... 1 week ago | 34 mins How to Enhance your Security Posture by Consolidating Vendors David Finger VP of Product & Solutions, Fortinet; Jon Speer Director of Product & Solutions, Fortinet More than half of organizations (52%) believe security operations are more difficult today than in years past. And with good reason: The evolving thre... 2 weeks ago | 51 mins A Deep Dive Into The Global Threat Landscape FortiGuard Labs experts: Douglas Jose Pereira dos Santos, Tony Giandomencio, Monika Piekarus If you’re concerned about the ever-changing threat landscape, you’re not alone. We’re seeing attackers rely on many familiar techniques, but the frequ... 2 months ago | 55 mins CISO Fireside Chat with .italo: SOC, Amore Mio! Enrico Maresca - CISO at .italo, Matthias Maier - Product Marketing Director at Splunk Ciao Rome, Florence, Venice, Milan, Naples and more! .italo operates an Essential Service by connecting more than 100 million people annually across ... 6 months ago | 54 mins How to Build a Flexible, Extensible, and Automated Security Analytics Platform Fortinet: Abhiskek Narula, CTO; Jon Speer, Dir. Product Mktg, Automated SOC; Max Zeumer, Dir. Product Mktg, Automated SOC Join our speakers to learn about Fortinet's integrated SOC Automation model across every size and stage of maturity an organization is at and the best... 3 months ago | 27 mins 24 hours of Log4J within Barracuda's Security Operation Centre (SOC) Merium Khalid (Sr. SOC Manager, Offensive Security, Barracuda) Get an in-depth look at the Log4J Zero-Day Vulnerability and the strategies and solutions to protect your business from exploitation, including ransom... 4 months ago | 30 mins The Journey to the Autonomous SOC with SANS Chris Crowley, SANS Expert and Michael McGinnis, Devo Senior Solutions Engineer Are you straining to scale your security analysts and defenses to stop attackers? If so, you’re not alone. Combating today’s threats requires new app... 6 months ago | 62 mins Delivering the Zero Trust Enterprise Gary Spiteri, Senior Systems Engineering Specialist, Cortex At many companies, Zero Trust initiatives are in progress or in planning stages. While the focus tends to be on the products and policies controlling ... 3 months ago | 58 mins Getting Started with Low-Code Security Automation Mike Lyborg, Swimlane SVP of InfoSec and IT & Jay Spann, Security Automation Evangelist If virtually everyone knows they should be harnessing automation to simplify and improve their work, why aren’t they already doing it? Because starti... 1 month ago | 54 mins Where XDR Fits in Your SOC Modernization Strategy [APJ] Dave Gruber (Principal Analyst, ESG Research), Scott Simkin (Vice President, Portfolio and Product Marketing) Based on a recent study from ESG, more than half of security teams think SecOps has become more challenging over the past two years. Why? A growing at... 6 months ago | 44 mins Load more