Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... August 9, 2022 3:00pm Alert Management 2.0 with easy onboarding, integrations, and intelligence Naganandhini Ramasubramaniyan, Senior Product Manager, Freshworks | Karthik Elangovan, Product Manager, Freshworks Struggling to manage your digital infrastructure? You need a solution that takes care of the noise while letting you focus on what you do best – sol... 6 days ago | 27 mins Setting Up Self-Serve Support Antoinette Taaffe, Senior Field Marketing Manager, Intercom | Justin Nuzum, Vice President of Support & Services, Pendo Over the course of three webinars, we’re bringing together customer support leaders to find out how they’ve implemented each stage of the conversation... 4 days ago | 46 mins AI-powered Classification and Protection for Efficient Enterprise DLP Alin Mutu, Director of Product Management and Chris Muffat, VP of Data Classification The growth and dispersion of data in the cloud makes protecting sensitive information more challenging than ever. Legacy Data Loss Prevention (DLP) so... August 18, 2022 9:00am Deep dive into Freshservice On-Call Management Naganandhini, Senior Product Manager, Freshworks | Anusha Jha, Lead- Product Marketing, Freshworks Struggling to provide 24*7 agent coverage? You need a system that eliminates chaos in incident escalation while eliminating agent burnout. Explore... 2 weeks ago | 37 mins The value of impact analysis for accelerating SAP updates Features Forrester Consulting In this webinar, distinguished guest speakers from Forrester will share how incorporating AI and analytics into your test strategy can help you delive... 1 week ago | 39 mins Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... August 24, 2022 3:00pm Unlock new value from your end-of-life technology Ian Hutchinson – SoftwareONE Alliance Leader for AWS and others With Microsoft’s fast approaching end-of-life (EOL) deadlines for SQL Server 2012 and Windows Server 2012, many organizations find themselves in need ... 3 weeks ago | 43 mins How Developers Influence Application Security Strategies Nick Barham, DevSecOps Transformation Consultant, Veracode We’re not pointing any fingers here, but 46% of organizations knowingly push vulnerable code to meet a deadline. This isn’t only Security’s problem or... August 9, 2022 2:00pm Get the most out of Identity Governance Sean Ryan, Senior Analyst of Security & Risk at Forrester, and Rod Simmons, VP of Product Strategy at Omada View this webinar with guest speaker, Sean Ryan, Senior Analyst of Security & Risk at Forrester, and Rod Simmons, VP of Product Strategy at Omada, whe... August 9, 2022 1:00pm Load more