Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date [EMEA] Cybersecurity Series: Hackers 're Gonna Hack - Pt 2/3 Jason Hart Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the ‘Cybersecurity Series’, Jason Hart, Chief Technology Of... June 30, 2022 11:00am This is How They Tell Me the World Ends Alex Rice (HackerOne), Nicole Perlroth (Author) & Sandra McLeod (Zoom) On February 9, The New York Times cybersecurity reporter Nicole Perlroth released the highly anticipated book, This is How They Tell Me The World Ends... 2 days ago | 61 mins DevOps Teams: Why the Cloud Risk Encyclopedia Should Be Your New Best Friend Bar Kaduri, Cloud Threat Researcher; Liran Lavi, Dir. of DevOps; Jason Silberman, Dir. of Product Marketing The Cloud Risk Encyclopedia (CRE), a free and open resource, includes a collection of common cloud security risks pulled directly from the Orca Cloud ... July 13, 2022 5:00pm Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... 1 month ago | 33 mins 2021 OWASP Top 10: Vulnerable and Outdated Components - Ep 6 John Wagnon, Solutions Architect, F5 Open Source software exploits are behind many of the biggest security incidents. The recent Log4j2 vulnerability is perhaps the most serious risk in t... July 7, 2022 9:00am Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... July 12, 2022 12:00pm Lessons from the Trenches: What We Learned This Year to Get Cloud Security Right Avi Shua, CEO & Co-Founder, Orca Security Today’s risks in the cloud continue to rapidly evolve, including vulnerabilities that impact applications, misconfigurations that expose sensitive dat... July 28, 2022 3:00pm 3 Actions for Hybrid Cloud Success – For CIOs in 2022 Markus Strauss & Simon Ahmet A shift from monolith to distributed architecture is an inevitable trend that enables enterprises benefit from positives of various technologies at th... 3 weeks ago | 45 mins An Overview and Demo of Vulcan Cyber Risk and Vulnerability Management Tony Taylor, Vulcan Cyber solutions architect Digital businesses are living in a constant state of uncomfortable vulnerability. It’s time for change. The Vulcan Cyber risk and vulnerability manage... June 30, 2022 4:00pm Second Order Cyber Risk: Exposing Your Blind Spots Peter Hay, Lead Instructor, SimSpace; Brandon Dunlap, Moderator The very activities that cybersecurity teams do to make their organizations safe can create additional risk for the organization. Defenders can uninte... June 30, 2022 5:00pm Load more