Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Don’t put the Cart before the horse: What do I do to manage risk? [EMEA] Mike Kaplan Security vendors and industry analysts continuously come up with a dizzying array of product categories, acronyms, and buzzwords. Hear from Rapid7’s S... August 18, 2022 10:45am Build Resistance to Attacks by Unlocking the Value of Ethical Hackers Sean Ryan, Sr. Principal, Product Marketing Manager Attack surfaces are expanding, spurred on by the continuous release of new digital services and business transformation. In this session, you will lea... August 17, 2022 7:00pm A Demo of Vulcan Cyber Risk and Vulnerability Management Tony Taylor, Vulcan Cyber solutions architect Digital businesses are living in a constant state of uncomfortable vulnerability. It’s time for change. The Vulcan Cyber risk and vulnerability manage... August 25, 2022 4:30pm How to Achieve Complete Cyber Risk Management Yaniv Bar-Dayan, Vulcan Cyber CEO Register to watch this CyberRisk Summit keynote replay and learn how to achieve complete cyber risk management across all of your cyber risk surfaces.... August 23, 2022 4:30pm Reducing the Burden of Vulnerability Management at Scale Noy Sinai, Vulcan Cyber VP of operations / Tony Taylor, Vulcan Cyber solution architect Register to watch this CyberRisk Summit keynote replay and learn how to approach cyber risk management at enterprise scale. Vulnerability-generated cy... August 30, 2022 4:30pm Rethinking GRC for Modern Software Development Phillip Ivancic and Michael McGrath Many enterprises have split their security functions between first-line defences, where AppSec tooling and penetration testing traditionally fits, and... 6 days ago | 31 mins An Overview and Demo of Vulcan Cyber Risk and Vulnerability Management Tony Taylor, Vulcan Cyber solutions architect Digital businesses are living in a constant state of uncomfortable vulnerability. It’s time for change. The Vulcan Cyber risk and vulnerability manage... 4 weeks ago | 43 mins Securing Kubernetes at Scale: Deploying Uncrackable Clusters Keith Mokris, VP of Cloud Security Evangelism, Orca Security and Jacob Graves, Security Engineer, Orca Security Enterprises and cloud native organizations around the world have gravitated towards Kubernetes for powering their applications and tech stacks. Why? K... 1 day ago | 52 mins Log4j lessons learned: How to prepare your company for the next zero-day Sonali Shah, Chief Product Officer, Invicti Security and Tony Perez, Founder, NOC and CleanBrowsing Were you prepared for Log4Shell? Join Invicti Security Chief Product Officer, Sonali Shah, and Founder of NOC and CleanBrowsing, Tony Perez, for a dis... August 17, 2022 9:00am Active SAP Exploitation Activity Identified by the Onapsis Research Labs Richard Puckett:CISO SAP, Juan Pablo Perez-Etchegoyen:CTO Onapsis, Stephanie Kennelley Vulnerability Disclosure Analyst:CISA The Onapsis Research Labs continuously monitors the evolving SAP threat landscape to rapidly identify elevated risk, trending threat behavior and acti... 15 hours ago | 35 mins Load more