Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Coming Soon -- CISO Observability in the Boardroom Steve Levinson, VIce President, Risk, Privacy, and Security | Online Business Systems Cybersecurity has not only become a regular boardroom topic, but may soon be a requirement. If proposed SEC legislation takes hold, all publicly trade... September 7, 2022 8:00am Coming Soon -- CISO Observability in the Boardroom Steve Levinson, VIce President, Risk, Privacy, and Security | Online Business Systems Cybersecurity has not only become a regular boardroom topic, but may soon be a requirement. If proposed SEC legislation takes hold, all publicly trade... 1 month ago | 30 mins Is a False Sense of API Security Pervasive in the Enterprise? Christopher M. Steffen | Prakash Sinha Modern applications, composed of functions and services, require developers to rely on APIs to communicate between applications and their components t... 2 months ago | 60 mins How Blockchain is Driving Transparency Across the Supply Chain Jolanda Kooi - tex.tracer Bart Westerman - tex.tracer Gunjan Bassi - IDC Frederik De Breuck - Fujitsu According to an IDC survey, 61% of the European manufacturers increased their spending on technology associated with sustainability programs in 2021. ... August 26, 2022 2:00pm 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... September 28, 2022 9:00am How Blockchain is Driving Transparency Across the Supply Chain Jolanda Kooi - tex.tracer Bart Westerman - tex.tracer Gunjan Bassi - IDC Frederik De Breuck - Fujitsu According to an IDC survey, 61% of the European manufacturers increased their spending on technology associated with sustainability programs in 2021. ... 1 week ago | 45 mins Détecter les incidents d’identités ne suffit pas à stopper une attaque zero day Anne-Sophie Goeldner, Regional Sales Manager Identity Protection Europe et Nicolas Koziel, Senior System Engineer Log4j, noPac: pourquoi auditer l’AD et détecter les incidents d’identités ne suffit pas à stopper une attaque zero day? - Vous découvrirez le rôle pr... 2 months ago | 43 mins 2021 OWASP Top 10: Security Logging and Monitoring Failures - Ep9 John Wagnon, Solutions Architect, F5 Without properly logging and monitoring app activities, breaches cannot be detected. Not doing so directly impacts visibility, incident alerting, and ... November 9, 2022 10:00am 2022 CISO Survey of Small Security Teams George Tubin, Director of Product Marketing, Cynet We asked CISOs of small security teams to talk to us about their pain points and how they’re planning to address these challenges in the year ahead. T... 1 day ago | 34 mins Cloud Application Authentication and Access Control Vulnerabilities Fred Pinkett, Sr. Director Product Management | Brandon Cooper, Solutions Engineer, Security Innovation Join us as we dive deep into three common vulnerabilities found in the cloud: * Improper identify & access management - It's harder than you think! *... 1 day ago | 22 mins Load more