Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Can We Have it All? How To Prioritise Security Without Hindering Your Workforce Box and Guests Security is a global business priority. The ability to manage valuable and sensitive data while simultaneously reducing financial, legal and reputatio... 2 months ago | 36 mins Cyber Notes Cast - The Biggest Vectors of Cyberattacks in SMEs senhasegura Small and medium-sized enterprises usually do not make or have the capacity to make large investments in digital security, which makes them vulnerable... June 7, 2023 3:00pm The Daily Need For Threat Vector and Vulnerability Analysis Julia Grunewald, Sr. Director, Product Management, Tanium Lucas Lyon, Director, Technical Product Management, Tanium In today's distributed environment, new threat vectors and vulnerabilities emerge daily. For organizations, agility will be the most important attribu... June 6, 2023 3:00pm Tailor Your Cell Culture Platform to Achieve Objectives & Scale Requirements Ann Rossi Bilodeau, Senior Bioprocess Applications Scientist, Corning Life Sciences The cell and gene therapy field is rapidly advancing, placing a focus on manufacturing challenges to meet the growing demand. The efficient harvest of... 3 days ago | 24 mins Lab: Subdomain Takeover, Part 2 | Discover & remediate Carlos Vendramini, Security Research Engineer, Normalyze In the second part of this two-part webinar, Carlos will do a hands-on demonstration of a subdomain takeover attack using open-source tools. This demo... 2 days ago | 39 mins Analyzing the nature of 12-month cyber incidents Ayman Shaaban, Digital Forensic and Incident Response Manager at Kaspersky Everyday Kaspersky Global Emergency Response Team (GERT) helps organizations all over the world with full-blown responses and expert advice for intern... 4 days ago | 60 mins Unabashed. Unashamed. Unpredictable. The Changing Face of Ransomware. Sam Rubin, VP, Chris Scott, Managing Partner, David Faraone, Consulting Senior Director & LeeAnne Pelzer, Consulting Director How to Stay Ahead of the Latest Ransomware TTPs Multi-extortion tactics are on the rise. Threat actors are increasingly using data theft and harassme... 3 days ago | 26 mins Navigating The Paths of Risk: The State of Exposure Management in 2023 Wade Baker, PhD - Cyentia Institute * Zur Ulianitzky,VP Research-XM Cyber * Menehem Shafran,VP Product-XM Cyber Did you know that 71% of organizations have exposures that can allow attackers to pivot from on-prem to cloud? Or that once an attacker accesses a c... June 7, 2023 1:00pm Faster Payments, Faster Fraud: Solutions to Stop the Madness Julie Conroy, Head of Risk Insights & Advisory, Aite-Novarica and Scott Olson, CMO, Outseer Faster payments have emerged country-by-country over the past two decades in a patchwork manner. This piecemeal approach is by far the one that frauds... June 6, 2023 3:00pm Live Demo - Attack Based Vulnerability Prioritization - June 9th Ranjeet Mewada, Technical Director – India , Cymulate In this webinar, gain insight into how Attack Based Vulnerability Prioritization automatically assesses vulnerabilities' potential impact on your comp... June 9, 2023 10:30am Load more