IT Management  >   Systems Operations  >   Security  >  

Public Safety

RSS Feed   
Public Safety Multimedia (View All Report Types)
 
An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

Understanding What's at Stake with Privileged Accounts
sponsored by One Identity
WEBCAST: In this webinar, listen to two security experts from One Identity talk about how Privileged Access Management is not just about securing passwords and how there's much more that needs to be done to keep your enterprise safe.
Posted: 14 Jun 2019 | Premiered: Jun 14, 2019

One Identity

Protecting the Unprotectable with Next Generation Authentication
sponsored by Silverfort
VIDEO: Not trusting anyone by default, even those already inside the network perimeter, has to be the new reality. The security model of zero trust. In this webinar, learn why traditional MFA won't cope with zero trust requirements, why passwords are no longer a reliable factor of authentication, and more.
Posted: 28 May 2019 | Premiered: 21 May 2019

Silverfort

Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO: In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019

Data Theorem

Advanced Breach Protection Demystified
sponsored by Cynet
VIDEO: Organizations are seeking protection against the threats that bypass AV and firewall. The common practice is to upgrade the endpoint protection with EPPEDR or a Network Analytic tool. However, what's common is not necessarily best. Tune into this webinar to learn about on the inherent security gaps in EDREPP and Network Analytics.
Posted: 30 May 2019 | Premiered: 30 May 2019


SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

Now on Now: How ServiceNow Runs IT Like a Business
sponsored by ServiceNow
VIDEO: Aligning IT projects with the goals of the business is a necessary start towards maximizing investment value. But one company took this strategy a few steps further – and started seeing impressive results. Click to learn how this company earned savings of $355,000, saved thousands of man hours, and more by revaluating their IT business strategy.
Posted: 11 May 2018 | Premiered: 07 May 2018

ServiceNow

Case Study: IT Director, Marek Laskowski, DZP
sponsored by Fidelis
VIDEO: In this video, learn about Fieldis Elevate from IT Director, Marek Laskowski and how it provided DZP with an ability to rapidly detect, investigate, and resolve advanced attacks, enabling the firm to identify both known and unknown threats.
Posted: 15 Aug 2018 | Premiered: 15 Aug 2018

Fidelis

Come Hack With Me: The Anatomy of a Data Breach
sponsored by Radware
WEBCAST: Migrating your computing workloads to the public cloud exposes them to a host of new vulnerabilities and attack vectors. In this webinar, Eyal Arazi will take an in-depth look at 2 cloud-native data breaches of organizations running in the public cloud and how they could have possibly been averted.
Posted: 13 Jun 2019 | Premiered: Jun 11, 2019

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement