Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 2 weeks ago | 64 mins Why Identity Protection is essential for Zero Trust implementation David Muniz - Cybersecurity Specialist Zero Trust has been a hot cybersecurity topic for quite some time. Organizations have been implementing Zero Trust for some time, however, the movemen... 3 days ago | 48 mins PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... February 8, 2023 6:00pm Digital Signature Solutions: Streamline & Secure Document Signing Workflows Raj B., Field CISO at Oracle | Paul Loth, Product Manager at Evidos B.V. Organizations need to adapt to the requirements of today’s digital era, but many have neglected a key digital service: e-signing solutions. In order t... February 16, 2023 4:30pm Top Mistakes You Could be Making in Email Security Alyn Hockey Email threats are constant and remain a highly sought-after opportunity for data theft. Oftentimes organizations research email best practices and inc... 1 week ago | 31 mins 5 KEY CONSIDERATIONS BEFORE INVESTING IN AN EXTERNAL ATTACK SURFACE MANAGEMENT Tina Thorstenson, VP, Industry Business Unit & Executive Strategist and Kamil Imtiaz, Director, Product Marketing, IT SecOps It’s no secret: your external attack surface is expanding. Digital transformation, remote work, cloud migration and increased reliance on third party ... February 21, 2023 10:00am PKI Meets Red Team: Revealing Common Microsoft AD CS Misconfigurations Ted Shorter, CTO, Chris Hickman, CSO, Lee Christensen, Technical Architect, & Will Schroeder, Technical Architect Microsoft Active Directory (AD) PKI is widely used by enterprises today, yet it has largely flown under the radar of attackers and defenders – until n... 1 week ago | 46 mins 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... 2 weeks ago | 12 mins Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am Cybercrime, Identity Theft and Scams: Tips for Staying One Step Ahead in 2023 Frank Abagnale, Author of Scam Me If You Can Known as the subject of Steven Spielberg’s Catch Me If You Can, Frank Abagnale committed check forgery in his early years while pretending to be a Pan... 2 months ago | 57 mins Load more