Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 2 weeks ago | 34 mins The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 2 weeks ago | 34 mins The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 2 weeks ago | 34 mins Protect Against Data Loss from Departing Employees on Unmanaged Devices Stephanie Torto, Sr Product Marketing Manager, Proofpoint & Michael Gordover, Principal Security Architect, Proofpoint Employees have been leaving their jobs, whether voluntarily or involuntarily, at an unprecedented rate during the past several years. As a result, 50%... 3 months ago | 31 mins BlackBerry Security Summit 2022 | Unpacking Of Zero Trust Network Shishir Singh, Executive Vice President & Chief Technology Officer, Cybersecurity Business Unit, BlackBerry The security perimeter is everywhere, yet invisible. And it’s under siege. Learn how our Zero Trust Security Model secures your business assets and ou... 4 weeks ago | 23 mins The Critical Infrastructure Threat Landscape and How to Prepare for 2023 Daniel dos Santos, Head of Security Research, Vedere Labs Several events in 2022 shaped the current threat landscape for critical infrastructure, such as the OT:ICEFALL vulnerabilities highlighting how insecu... 4 weeks ago | 34 mins Expose Unmanaged Devices Across Your Digital Terrain Daniel Trivellato, Forescout VP, OT Product & Engineering; Christina Hoefer, Forescout VP, Global Industrial Enterprise The growth and exposure of IoT devices and their connectivity with Building Automation Systems (BAS) devices offer attackers alternative ways to compr... 5 months ago | 47 mins How Contact Centers Save Costs with the VDI Alternative to Secure Remote Work Dvir Shapira, Chief Product Officer, Justin Kapahi - VP, Sales Engineering, Perry Hiltz, Senior Sales Engineer, Venn Customer Contact Centers need to transform their IT Model in a post-pandemic world where remote work is becoming permanent and we have blurred the lin... 4 months ago | 44 mins BlackBerry Security Summit 2022 | Unpacking Of Zero Trust Network Shishir Singh, Executive Vice President & Chief Technology Officer, Cybersecurity Business Unit, BlackBerry The security perimeter is everywhere, yet invisible. And it’s under siege. Learn how our Zero Trust Security Model secures your business assets and ou... 2 months ago | 23 mins Securing Data in Cloud Apps with Agentless DLP Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint | Justin Crowley, Principal Sales Enablement Manager, Forcepoint We have seen the impact that the rise of cloud-first organizations and the increased adoption of hybrid and remote work has on data security. The work... 3 months ago | 42 mins Load more