Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Anatomy of an Attack: Ransomware Theory and Practice Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical ski... August 10, 2022 5:00pm Enboarder EDGE Episode 2: Designing For Action Dr BJ Fogg. Logan Ury. Adam Smiley Poswolsky. Dan Monheit. Alana Bennett Imagine a workplace where everyone did what you wanted! What a world that would be! Seriously though, there is a field of academic research called Be... August 10, 2022 10:00am Webcast: Economic theory is losing its battle with reality The Merlin Portfolios Team Economic theory does not describe immutable laws, but simply the sum of all human activities expressed in pounds/dollars/etc. Yet fickle human actions... 2 weeks ago | 61 mins Theory vs Practice: Aligning AI Governance to the EU Artificial Intelligence Act Patricia Shaw (CEO and Founder Beyond Reach), Robert Price (Director of Alchemmy) in discussion with Dataiku. The European Commission is the first institution worldwide to propose a new legal framework to harmonize rules regarding the use of AI. The “Artificia... August 22, 2022 9:00am Theory vs Practice: Aligning AI Governance to the EU Artificial Intelligence Act Patricia Shaw (CEO and Founder Beyond Reach), Robert Price (Director of Alchemmy) in discussion with Dataiku. The European Commission is the first institution worldwide to propose a new legal framework to harmonize rules regarding the use of AI. The “Artificia... 1 month ago | 59 mins CPD: Retirement Investing Henry Cobbe The objective of this CPD module is to understand the principles of Retirement Investing. Learning Outcomes By completing, this CPD module, you should... September 7, 2022 9:30am How much testing does my microservice really need? Steve Tran, Principal Consultant, Red Hat Almost all companies developing microservices struggle with how and what to test. Having developed hundreds of microservices across multiple projects ... 1 month ago | 47 mins Anatomy of an Attack: Ransomware Theory and Practice (NAM) Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical ski... 3 months ago | 54 mins Addressing the Challenges & Capitalizing on Opportunities Provided by ESG 2.0 Paul Wendee, Managing Director of Paul M. Wendee & Associates, LLC The global trend toward ESG creates both challenges and opportunities for enterprises. It is no longer a matter of “should an enterprise embrace ESG?”... 2 months ago | 60 mins Anatomy of an Attack: Ransomware Theory and Practice (NEMEA) Dirk Schrader, CISSP, CISM, ISO27001 Practitioner at NNT, Now part of Netwrix Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical ski... 3 months ago | 54 mins Load more