Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Steps to Integrate SAST into the DevSecOps Pipeline Meera Rao, Senior Principal Consultant Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t ... June 8, 2023 9:00am Better Webinars. Better Engagement. Better ABM. David Edwards, Sr Director, Product Mgmt & Marketing, BrightTALK & Olivia Dassler, Sr Director Marketing Programs, BrightTALK Successful ABM programs require thoughtful planning every step of the way. From collaborating with Sales on account selection to establishing the righ... June 21, 2023 3:00pm Outsmart The Likability Penalty: 10 Steps To Be Both Outspoken & Likable Ivna Curi Women often face the "competent but disliked" double-bind dilemma due to gender bias, as reported by Catalyst. The likability penalty dilemma can limi... June 7, 2023 5:00pm Vulnerability and the Consumer Duty Martin Lines If ever there was a time to focus on how we improve the experience and outcomes for the most vulnerable, surely now is that time. The FCA have said th... June 13, 2023 9:00am Cloud Security Assessment: Steps to Successful Implementation Carlos Vendramini, Security Research Engineer, Normalyze In today's fast-changing cloud environment, moving beyond traditional closed-box penetration testing methods is essential. Join us for an engaging web... June 29, 2023 5:00pm NIS2 Directive: Understanding and Complying with Supply Chain Security Guidance Nesh - Senior Solutions Engineer at GlobalDots The NIS2 Directive is a new, wide-ranging EU cybersecurity law that includes regulations on incident response, software supply chain security, multi-f... 1 month ago | 47 mins Unlocking Autonomic Security Operations David Grout, CTO EMEA, Mandiant, Iman Ghanizada, Global Head of Autonomic Security, Google, Amit Verma, Google Cloud Unlocking Autonomic Security Operations: Building an Adaptive, Agile, and Highly-Automated Approach to Threat Management Are you overwhelmed by the s... June 21, 2023 3:00pm How To Overcome Active Directory Exploits And Prevent Attacks Shira Bendkowski - Director of Product Management at XM Cyber According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threat... June 21, 2023 1:00pm Achieving your Cybersecurity Goals Within the Manufacturing Industry Melissa Gilbert, Samuel Junkin, Rafeeq Rehman Cybersecurity is a leading concern for business in the manufacturing business today. Organizations face many challenges with the protection of data an... 3 weeks ago | 51 mins Cybersecurity Disclosures: What’s Coming in 2023 John Wheeler, Senior Advisor, Risk & Technology, AuditBoard Cyber breaches and resulting costs reached all-time highs in 2022, with an over 42% global increase in attacks. Organizations want to better prepare f... 2 weeks ago | 59 mins Load more