Ranked #1
Global Security and Post Breach Management Best Practices
Global Security and Post Breach Management Best Practices
"If you can plan for the zombie apocalypse, you can probably face just about anything," said Tim Callahan, Senior Vice ... Read more
6 Jul 2022
•
40mins
Ranked #2
How to Tackle Burnout in Cybersecurity
How to Tackle Burnout in Cybersecurity
Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can ... Read more
22 Jun 2022
•
52mins
Ranked #3
Actionable Threat Intelligence and the Dark Web
Actionable Threat Intelligence and the Dark Web
In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti... Read more
8 Jun 2022
•
35mins
Ranked #4
Reducing the Disconnect Between Security and Development Teams
Reducing the Disconnect Between Security and Development Teams
How do you make security a first-class citizen of the software development process? According to an industry report, “ma... Read more
25 May 2022
•
31mins
Ranked #5
Perspectives of a Global Chief Information Security Officer
Perspectives of a Global Chief Information Security Officer
In a wide-ranging discussion, Vishal Salvi, CISO & Head of Cyber Practice at Infosys, sheds light on a range of topi... Read more
11 May 2022
•
45mins
Ranked #6
Thinking Like A Hacker
Thinking Like A Hacker
Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Ex... Read more
27 Apr 2022
•
50mins
Ranked #7
Is Cybersecurity Regulatory Compliance Good Enough?
Is Cybersecurity Regulatory Compliance Good Enough?
"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or secu... Read more
13 Apr 2022
•
41mins
Ranked #8
Is Cyber Insurance Necessary?
Is Cyber Insurance Necessary?
"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless... Read more
30 Mar 2022
•
38mins
Ranked #9
Dealing with Cyber Trauma
Dealing with Cyber Trauma
The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal ... Read more
16 Mar 2022
•
40mins
Ranked #10
A Deep Dive into Ransomware Attacks and Negotiations
A Deep Dive into Ransomware Attacks and Negotiations
Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent, discusses at length the unfortunate evoluti... Read more
2 Mar 2022
•
55mins