Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Détecter les incidents d’identités ne suffit pas à stopper une attaque zero day Anne-Sophie Goeldner, Regional Sales Manager Identity Protection Europe et Nicolas Koziel, Senior System Engineer Log4j, noPac: pourquoi auditer l’AD et détecter les incidents d’identités ne suffit pas à stopper une attaque zero day? - Vous découvrirez le rôle pr... June 28, 2022 9:00am Reinventing MDR With Identity Threat Protection (EMEA) Ryan Romagnolo (Senior Intrusion Researcher, Falcon OverWatch), Craig Sohn (Sr. Analyst, Falcon Complete) Identity is the front line in the battle against modern cyber threats. Nearly 80% of cyberattacks leverage compromised credentials to gain access and ... 3 days ago | 36 mins Keep Your Avid Environments Safe from Ransomware with Wasabi and Marquis Paul Glasgow, Managing Dir., Marquis; Simon Fearn, Product Mgr., Marquis; Ben Bonadies, Solutions Marketing Mgr., Wasabi Despite growing public awareness, ransomware has continued to wreak havoc on businesses around the world, and media and entertainment companies are no... June 28, 2022 3:00pm How The Right XDR Can Be a Game-Changer for Lean Security Teams George Tubin, Director of Product Strategy, Cynet And Jon Oltsik Senior Principal Analyst, ESG Extended Detection and Response (XDR) has the potential to dramatically improve efficiency for enterprises with unwieldy security stacks. But, can XDR... 2 weeks ago | 57 mins Securing a Productive Hybrid Workforce for the Long-Term Mark Bowker, ESG; Rose Cicala, Citrix; Akshay Kakar, Citrix “Been there, done that,” right? You’ve successfully enabled the majority of your employees to work remotely or in a hybrid capacity for almost two yea... 4 weeks ago | 18 mins 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... July 28, 2022 9:00am 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... 4 weeks ago | 12 mins Cutting through the Fog of More: Use MDR or XDR to Find Real Threats John Bruggeman, virtual CISO, CBTS Endpoint protection alone used to be good enough for companies. But now we have too many alerts, from too many systems along with “the Fog of More” ma... July 19, 2022 12:00pm Check Point Infinity - Defining the modern cyber security architecture EMEA/APAC Cindi Carter - Field CISO @ Check Point How to secure your organization’s infrastructure and data in the most efficient way and at the lowest cost? Recent global market conditions and tren... June 27, 2022 10:00am Laminar - What is Data-Centric Security, and Why Now? Jack Poller - Senior Analyst, ESG and Andy Smith - CMO, Laminar Security To facilitate remote and hybrid working models, public cloud adoption has surged in the last two years, and as a result, organizational assets and dat... June 28, 2022 3:00pm Load more