Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date MarTechFest Global Keynote: How to approach a cookieless future Tom Bianchi, VP Marketing, EMEA at Acquia Get access to Tom Bianchi's (VP Marketing EMEA @ Acquia) talk at the recent MarTechFest Global in London. Key areas covered: - What does the Cookie... 6 months ago | 26 mins Reducing Third-Party Identity Risk During the Great Resignation and Beyond Kyle Benson (Director of Product Marketing, Saviynt) , Bradley Barth (Director of Community Content, SC Media) The Great Resignation of 2021 and 2022 is having a tremendous impact on Identity Governance. Millions of people have left their jobs or moved to new p... 4 days ago | 58 mins How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... 5 days ago | 35 mins Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps Brandon Traffanstedt, Senior Director, Global Technology Office, CyberArk Who has access to what in your organizations? How do you consistently secure privileged access to critical systems and data? Join CyberArk’s Global Te... 1 week ago | 56 mins Secure Your Cloud Environment from Evolving Threats Stanislav Sivak, Associate Managing Consultant, Synopsys | Arvinder Saini, Associate Principal Consultant, Synopsys As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data... May 24, 2022 6:00pm How to De-Identify Apache Kafka Data Streams Ameesh Divatia, CEO, Baffle and Syl Yelle, VP, Baffle Apache Kafka is a powerful platform for streaming data in real time for multiple use cases, including data analysis downstream. However, putting sensi... May 24, 2022 5:00pm Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps Brandon Traffanstedt, Senior Director, Global Technology Office, CyberArk Who has access to what in your organizations? How do you consistently secure privileged access to critical systems and data? Join CyberArk’s Global Te... 1 month ago | 56 mins New Year, New You, New Identity Saviynt Security strength training for an unbreakable 2022. Whether personal or professional, your goals are easier to grasp with the right support. We’re re... 4 days ago | 10 mins Comprehensive PAM: Defending Endpoints, Third Parties, and DevSecOps Brandon Traffanstedt, Senior Director, Global Technology Office, CyberArk Who has access to what in your organizations? How do you consistently secure privileged access to critical systems and data? Join CyberArk’s Global Te... 2 months ago | 56 mins How To Proactively Protect Valuable Information SecureLink’s Product Marketing Managers Kylie Ruiz and Ashley Guerra No organization is an island unto itself. With valuable information (including credentials and PII) fetching for high prices on the dark web, an array... 1 month ago | 61 mins Load more