Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protecting Against Endpoint To Cloud Attack Chains [EMEA] Doug Cahill (Vice President, Analyst Services & Senior Analyst), David Puzas (Sr. Product Marketing Manager, Cloud Security) Maintaining security consistency across our own data center and public cloud environments, along with the use of multiple cybersecurity controls are m... 20 hours ago | 63 mins Cutting through the Fog of More: Use MDR or XDR to Find Real Threats John Bruggeman, virtual CISO, CBTS Endpoint protection alone used to be good enough for companies. But now we have too many alerts, from too many systems along with “the Fog of More” ma... July 19, 2022 12:00pm WisdomTree - A New Asset Class: Investing in the Digital Asset Ecosystem Ben Dean, WisdomTree | Pierre Debru, WisdomTree A New Asset Class: Investing in the Digital Asset Ecosystem Blockchain technology supports many megatrends such as decentralised finance (DeFi), Web... July 12, 2022 8:00am Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... July 12, 2022 12:00pm Security & Compliance for SAP Data in Financial Services with Thales and SAP Dr. Wasif Gilani, Head of SAP Data Custodian, and Alex Hanway, Business Development Director at Thales Financial Services companies keep some of their most valuable data in SAP applications, triggering the need for both additional security and taking st... July 12, 2022 8:30pm Moving from Monoliths to Microservices: Design, Architecture & Deployment Stephane Estevez, EMEA Director of Product Marketing, IT Markets at Splunk We want to ditch the pitch and get straight to the point in this new webinar series dedicated to microservices. From design to troubleshooting, no mat... July 13, 2022 12:00pm 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... July 14, 2022 9:00am Unlock the Benefits of HPC Cloud for Compute- and Data-Intensive Workflows Wolfgang Gentzsch, President & Co-founder, UberCloud If you are in the middle of your corporate digital transformation journey, and you are aiming to also include your High-Performance Computing (HPC) en... 1 week ago | 47 mins API Security: Developing a Strategy That Keeps Pace With Your Business (APJ) Lebin Cheng, Head of API Security, Imperva and Amy DeMartine, VP, Research Director, Forrester APIs are increasing exponentially. Driven by digital transformation projects, they are creating a huge opportunity for attackers. To better understand... 2 hours ago | 49 mins Transforming Financial Services with London Stock Exchange Group Geoff Horrell & Oli Bage at LSEG, Richard Price & Heleen Snelting @ TIBCO Will you become another statistic in the ever-growing fintech disruption, or will you seize the opportunity to innovate through deeper data insights? ... July 6, 2022 8:00am Load more