Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Easily Implement Defense-in-Depth for Cloud Storage Drew Schlussel; Sr. Director, Technical Product Marketing; Wasabi Technologies “Defense-in-Depth" defined by NIST as “An information security strategy that integrates people, technology, and operations capabilities to establish v... October 24, 2023 3:00pm Mastering Automated Cloud Security Incident Response: Strategies and Tools Elango Balusamy, Co-founder & CTO | SquareShift Technologies In the rapidly evolving landscape of cloud computing, security incidents are a constant threat. To effectively protect your cloud infrastructure and d... October 26, 2023 10:00am Data Security and Governance in the Cloud Era Joshua Stenhouse, Field CTO Cyber Resilience at Rubrik, Stephen Faig, Research Director Unisphere Research and DBTA, and more Managing and protecting information is one of the toughest challenges facing data-driven organizations today. Security threats continue to evolve alon... October 31, 2023 2:00pm OWASP Top 10 Nivedita Murthy, Associate Principal Consultant Learn about OWASP as an organization and its key projects, and dive into the evolution and process of building the OWASP Top 10 list. Learn whether th... October 31, 2023 10:00am Is Your Customer’s Business Ready for the Next Web DDoS Tsunami? Ron Meyran The recent surge of new disruptive web DDoS attacks overwhelms companies around the world; Pro-Russian threat actors, along with Islamic threat actors... 3 months ago | 34 mins Is Your Customer’s Business Ready for the Next Web DDoS Tsunami? Ron Meyran The recent surge of new disruptive web DDoS attacks overwhelms companies around the world; Pro-Russian threat actors, along with Islamic threat actors... 3 months ago | 27 mins Achieving Safe and Compliant Generative AI: Lessons from Model Risk Management Ramesh Dontha | Dr. Jon Hill, NYU Tandon School of Engineering | David Van Bruwaene, Fairly AI | Hassan Patel, Fairly AI Generative AI has sparked widespread discussions regarding its safety and ethical implications, and it is crucial to navigate this rapidly evolving la... 3 months ago | 59 mins Banking Security: Safeguarding your Data from external and internal threats Udo Falkenrich, Systems Engineer | Michael Höppner, Head of Marketing & Communication | Ingo Ludemann PreSales Engineer Financial records and other business data are crucial to success. They are also a prime target for attackers, both from without and within the organiz... 3 months ago | 62 mins Fiber Optic Connector Inspection: Navigating the Latest IEC 61300-3-35 Standard Jean-Simon Gagné, Product Line Manager at EXFO & Yasin Alekhorshid Ensuring optimal network performance begins with understanding the fundamental aspects of fiber inspection and maintenance. Join our upcoming webinar,... 2 days ago | 54 mins Secure Access Service Edge (SASE) roundtable: user insights and learnings Mark Ehr (S&P Global), Ali Neil - (Verizon Business) and Ashish Khanna Verizon Business) Join Mark Ehr from Standard & Poor's Global Market Intelligence, along with Verizon EMEA Executives Ali Neil and Ashish Khanna, for an insightful disc... 1 day ago | 61 mins Load more