Upcoming Talks Workshop: fuzzing - automated discovery of memory corruption vulnerabilities Defeating Application Fraud in a Multi-Cloud World Demo of Cyber Attack Simulation Platform - March 2nd, 2021 Accelerating Cybersecurity Log Pipelines and Analytics for Rapid Correlation Las mejores prácticas de seguridad con los CISOs de Bankia y Naturgy How to Secure Sensitive Data in Database as a Service (DBaaS) Environments [APAC] The State of Cybersecurity Panel [APAC] Series: Doing More with Less: Detection and Response Planning for 2021 On Demand Talks Fortinet Secures the Intelligent Enterprise Running SAP Podcast: Egregor Arrests, SIM-Swapping, and Oldsmar Updates! Credential Stuffing and the Future of Account Takeovers Podcast: Egregor Arrests, SIM-Swapping, and Oldsmar Updates! Ransomware and The Cloud Magecart Mapping and Mitigation The Power of Company Personality in a Cyber Awareness Program Continuous Supply Chain Assurance: Always know your risk NHS: The 10-minute Splunk Overview Cisco Umbrella EMEA Live Demo [EMEA] Combatting ransomware and APT activity with process-level monitoring [EMEA] Supercharging LogRhythm: Using Jupyter Notebook to enhance threat hunting Explore all talks