Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Webinar

The Howler - Episode 8: Andrew Burback, Chief Information Office & SVP of Operations

In this episode, our hosts sit down with Andrew Burback, Chief Information Office & SVP of Operations, as he shares about his journey from accounting to sales operations & IT, his leadership philosophy rooted in his trust of his team, as well as his love for Subway and his go-to sandwich order!

Keeper Webinar: Building a Robust Governance, Risk & Compliance Framework: Challenges & Solutions

IT Compliance doesn't have to be chaotic. Join Teresa Rothaar, Keeper Security's Governance Risk & Compliance Senior Analyst, in this webinar for ActualTech Media on the challenges and solutions to build a robust GRC framework. Keeper helps every organization get full visibility and control over employee password strength, credential sharing, permissions, zero-trust network access and dark web exposure, strengthening auditing and compliance for HIPAA, PCI DSS, SOX, GDPR, CCPA and more.

Marc Prioleau - The Complexity of Massively Distributed Mapping Technology

Marc Prioleau of the Overture Maps Foundation discussed the solution and the how and why of how it came to be. Mapping is critical in so many areas and we take for granted how dynamic we expect it to be. This cloud based, open source solution answers the question on how companies can share and contribute to mapping data.

Securing the Supply Chain - Automating our Way Out of Security Whack-a-Mole

Open-source components forever changed how we build software, but they are also a prominent security threat, nothing illustrated this better than the recent XZ library incident where the world narrowly avoided a massive supply chain attack. Join Gene Gotimer and Mackenzie Jackson to discuss how we can keep our open-source supply chains secure as we discuss: Security implications of vulnerable open-source components How using automation can help us move toward a secure supply chain How to discover and detect vulnerable components.

A C-Suite View of Cloud DevSecOps Today and Tomorrow

Hear about trends of innovative security leaders and how developers and security practitioners can best collaborate together through aligned incentives and strong communication. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open-source projects and more.

Webinar: Incorporating Digital Risk Exposure in Your Threat Detection Strategy

Watch as Kroll experts Wojcieszek and Scott Hanson outline the key benefits of incorporating surface, deep and dark web intelligence into your threat detection and response plans. During the session, they discuss the top use cases of digital risk protection and the best approaches to mapping out and reducing your digital risk across all areas of the internet. They also outline how security teams can use this external threat intelligence to improve their threat detection and response efforts and get wider visibility across the attack lifecycle.