Cyber Tech & Risk
2.75K subscribers
33:27
State of Cloud Security in Canada - David Senf (Bell) and Allan Mac Donald (Palo Alto Networks)
Cyber Tech & Risk
101 views • 9 months ago
31:12
SSH Security - A Scalable Approach - Kieran Miller, Garantir
Cyber Tech & Risk
56 views • 11 months ago
39:07
Panel: The Transformation of IAM
Cyber Tech & Risk
79 views • 11 months ago
36:00
Microsoft Entra – Identity Governance with Lifecycle Workflows - Robin Wenstrom, Microsoft
Cyber Tech & Risk
653 views • 11 months ago
34:15
Want Security? Think Identity! - Dorin Gherghelegiu, Accenture
Cyber Tech & Risk
89 views • 11 months ago
30:08
Combatting Risky Behavior in the Cloud - Neil Walker, Microsoft
Cyber Tech & Risk
40 views • 11 months ago
34:22
Approach to a Safe Architecture - Nicolas Buache, Microsoft
Cyber Tech & Risk
69 views • 11 months ago
59:19
Panel: Effective Cybersecurity Architecture
Cyber Tech & Risk
153 views • 11 months ago
40:37
Panel Discussion: Securing IoT
Cyber Tech & Risk
88 views • 1 year ago
33:52
Securing IoT - Uniting OT & IT for Smarter, more Secure Future
Cyber Tech & Risk
73 views • 1 year ago
29:40
Efficient Compliance Enablement for DevOps Operating Model - Somasundaram Subbu, CSTREAM.IO
Cyber Tech & Risk
57 views • 1 year ago
49:58
Panel Discussion: Data Security
Cyber Tech & Risk
86 views • 1 year ago
22:09
Security Automation: The future of digital economy - Poonam Mishra, Microsoft
Cyber Tech & Risk
89 views • 1 year ago
27:56
Data Protection & Privacy: protecting a human right - Radu Vaduva, Microsoft
Cyber Tech & Risk
25 views • 1 year ago
34:55
Panel - Automation for Security Operations
Cyber Tech & Risk
66 views • 1 year ago
29:47
Continuously Improving the Capability of Human Defenders with AI - Tahseen Shabab, Penfield.AI
Cyber Tech & Risk
131 views • 1 year ago
31:02
Panel - Automation for Identity and Access Management
Cyber Tech & Risk
142 views • 1 year ago
1:00:10
Unleashing the Power of ChatGPT in Security Operations - Chris Stelzer, Microsoft
Cyber Tech & Risk
1.9K views • 1 year ago
22:09
How over reliance on DLP is hurting your data protection efforts - Daniel Cybulskie, Zscaler
Cyber Tech & Risk
35 views • 1 year ago
31:59
Cloud Detection and Response, Closing the Visibility Gap - Christopher Fielder, Artic Wolf
Cyber Tech & Risk
121 views • 1 year ago
13:57
Securing Cloud Workloads and Resources - Jumoke Ajidahun, Microsoft
Cyber Tech & Risk
35 views • 1 year ago
54:07
Panel Discussion: Cloud Detection and Response
Cyber Tech & Risk
114 views • 1 year ago
55:47
Panel Discussion: Data Governance and Privacy
Cyber Tech & Risk
204 views • 1 year ago
33:14
Recognize sensitive and personal data and protect privacy - Raushan Dilruba, Microsoft
Cyber Tech & Risk
51 views • 1 year ago
19:36
You’re going to need a bigger boat – the reality of phishing, Oren J. Falkowitz, Cloudflare
Cyber Tech & Risk
98 views • 1 year ago
51:57
Panel Discussion: Phishing Protection
Cyber Tech & Risk
37 views • 1 year ago
30:34
Cloud Security Posture Ninja: Assessing cloud security posture like a pro - Vishal Patel, KPMG
Cyber Tech & Risk
221 views • 1 year ago
50:31
Protecting Your Resources in the Cloud - Nehal Shah, Microsoft
Cyber Tech & Risk
61 views • 1 year ago
36:21
Panel Discussion: Multi Cloud Management
Cyber Tech & Risk
93 views • 1 year ago
28:20
Trust but Verify - Verifying Security Controls in the Public Cloud - Ihor Kravchuk, RBC
Cyber Tech & Risk
121 views • 1 year ago
Load More