Upcoming Talks Cyber Notes Cast - The Biggest Vectors of Cyberattacks in SMEs First Line of Defense: The State of the Security Team Top 10 Azure security tips from 10 years of securing Azure applications Cyber Notes Cast - The Main Types of Cyberattacks in Cloud Environments Cyber Notes Cast - Concepts of Federated Identity Management Cyber Notes Cast - SysAdmin What Do They Do for Your Company’s Website Securing Collaboration in the Wake of the Cloud Defending the Triple Threat On Demand Talks Cyber Notes Cast - Security Training Best Practices for Privileged Users Defending the Triple Threat What is so Pro in Ubuntu Pro? Forrester TEI Study Reveals Impactful Business Outcome of Fortinet Secure SD-WAN Cyber Notes Cast - Lessons learned from the Uber data breach The SOC Analyst Experience: Tools and Techniques to Enhance Performance People, Process & Partners: Building a Future-Ready Security Monitoring Strategy Cyber Notes Cast - How to Protect Cloud Environments Against Cyberattacks? Get digitally trusted products into your supply chain – IEEE 802.1AR in practice Cyber Notes Cast - Password Reuse Understand the Risks of this Practice Explore all talks