Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe Paul Edon, International Services Director, Tripwire We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise s... 4 years ago | 45 mins Fireside chat: Data—the Biggest Constraint in DevOps and CI/CD Gene Kim, WSJ bestselling author of The Unicorn Project, Jed Yueh, CEO, Delphix Gene Kim is the WSJ bestselling author of The Unicorn Project. He’s also the founder and organizer of the DevOps Enterprise Summit. Gene shares his... 1 year ago | 12 mins The key EM debt return drivers to watch today Andrew Keirle, Chris Kushlis & Michael Ganske Much has changed since the Covid-19 shock hit emerging market bond prices this time last year. Today, we think EM assets have a lot going for them, bu... 1 year ago | 35 mins The Evolving Cyberthreat Landscape: Defending Against Complex Mixed-Mode Threats Diana Kelley - CTO & Founding Partner, SecurityCurve and Tom Hickman - Chief Product Officer, ThreatX Complex cyberthreats are one of the most rapidly evolving threat vectors that businesses face as we head into 2022. Attackers are constantly shapeshif... 6 months ago | 43 mins Panel: DevOps Adoption In The Enterprise Gene Kim, Damon Edwards, Gary Gruver and John Willis We know that DevOps principles and patterns have been pioneered by the “unicorns,” the likes of Google, Amazon, Facebook, Netflix, Twitter and so fort... 7 years ago | 46 mins [LIVE] The Twitter White House & The Trump Effect - Impact on Financial Markets Robert Mata, Director of Marketing, Finance, Dataminr & John Duncan, Principal, Meridian Research Group Join BrightTALK and Startup Bootcamp NYC for a live broadcast of two sessions: The Twitter White House: How Tweets are Changing the Political Informa... 5 years ago | 67 mins 2 Minutes on BrightTALK: Don't Just Harden Your Network Michael Thelander, Product Marketing Director, Tripwire "I can harden my systems one time. I can harden my servers when they come out of the box. The problem is that it's not continuous and it's not really ... 9 years ago | 2 mins 10 Steps to Risk-Based Security Management Cindy Valladares Despite the belief of many security professionals in the value of a risk-based approach to information security, many organizations still act in ways ... 10 years ago | 59 mins How to Restore Trust After a Breach - UK Joel Barnes In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, suc... 8 years ago | 57 mins Practicing the Basics of Security Rob Warmack, Marketing Director, EMEA The Law of the Vital Few…Pareto Got It Right! 11 years ago | 33 mins Load more