Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Evolution of Pen Testing Thomas Richards, Principal Consultant Network and Red Team Practice Director Innovate or perish is the only choice available to tech companies. Innovation ensures a constant state of change—new programming languages, systems, a... 1 month ago | 29 mins Cyber Recovery + Cyber Posture = Complete Cyber Resilience for Cloud Jerry Rijnbeek, AVP RubrikX; Amit Shaked, CEO of Laminar (owned by Rubrik) and Jack Poller, Senior Analyst, ESG Data is the most critical asset of every organisation and securing this data as it rapidly grows across private, public, and hybrid cloud environments... October 24, 2023 1:00pm Is Your IR Ready for Cloud? Lessons From the Front Lines of Nation-State Attacks Karl Ots, Head of Cloud Security | EPAM ; Aviv Srour, Head of Cyber Innovation | EPAM The need for structured IR readiness process that addresses both on-premises and cloud environments is clearer than ever before. In this session, an i... October 25, 2023 12:00pm Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... 4 months ago | 30 mins Radware Red Teaming Series EP 3 – ZeroBS, The DDoS Experts Pascal Geenens & Daniel Smith, Radware | Markus Manzke, CTO, zeroBS Abstract In this upcoming webinar, host Pascal and co-host Daniel will dive into several pressing topics in the world of cybersecurity with Markus, DD... 4 months ago | 35 mins Radware Red Teaming Series EP 3 – ZeroBS, The DDoS Experts Pascal Geenens & Daniel Smith, Radware | Markus Manzke, CTO, zeroBS Abstract In this upcoming webinar, host Pascal and co-host Daniel will dive into several pressing topics in the world of cybersecurity with Markus, DD... 4 months ago | 35 mins Assess Your Vulnerability to OWASP Top 21 Automated Threats using Radware's BVS Krishnakumar Satheesh We invite you to join our upcoming webinar, on how you can leverage the Bad Bot Vulnerability Scanner Assessment to identify your vulnerability to OWA... 4 months ago | 29 mins Optimizing Data Architecture with Samsung & VMware Greenplum: A Detailed Review Ivan Novick, Director, VMware & David McIntyre, Director, Samsung & Pramod Peethambaran, Director, Engineering, Samsung Join our informative webinar for a detailed review of a data architecture, crafted with Samsung's advanced storage solutions and VMware Greenplum's da... 4 hours ago | 48 mins EHDS Blows the Whistle: Cyber Resilience is Key to Trust in Health Data Nicolas Groh, EMEA Field CTO at Rubrik and Anna Delaney, Director of Productions at Information Security Media Group Constant technological developments, global pandemics, and natural disasters are forcing healthcare organisations worldwide to reshape their entire da... 5 days ago | 31 mins Automotive Software Testing for SDVs Ricardo Camacho - Dir. Regulatory Software Safety & Security Compliance & Charles Oxrieder, Sr Solution Engineer The automotive industry has been transforming from internal combustion engines (ICE) to autonomous driving assistance systems (ADAS) and electric vehi... October 5, 2023 4:00pm Load more