The Security Strategist
Total duration:
14 h 58 min
Supporting Technology for Application Security with Rapid7
The Security Strategist
22:02
Finding Better Methods to Address Application Security with Rapid7
The Security Strategist
17:40
Part 1: How Endpoint Security Got To Now? with Endgame
The Security Strategist
14:52
Part 2: What’s Next for Endpoint Security? with Endgame
The Security Strategist
15:26
Part 3: How To Map Endpoint Security to a Contemporary Security Strategy? with Endgame
The Security Strategist
15:18
The role backup and recovery tools can play in enhancing IT security with Unitrends
The Security Strategist
20:58
New Risks Arising for Businesses Through Increased Digitisation with RSA
The Security Strategist
25:00
Cybersecurity Responding to Demand with SecureData
The Security Strategist
20:08
The Rapid Changes in Cybersecurity Due to Advanced AI with Darktrace
The Security Strategist
25:34
Securing the DevOps Process with Capsule8
The Security Strategist
23:24
Continuous Controls Monitoring for Cybersecurity with Panaseer
The Security Strategist
44:52
Social and Digital Endpoint with SafeGuard Cyber
The Security Strategist
13:26
Automated Protection Against Common Vulnerabilities and Exposures with Sixgill
The Security Strategist
19:36
Threat Detection, Prevention, and Response with Blackberry Cylance
The Security Strategist
25:43
Fullstack Vulnerability Management Implementation Benefits and Challenges with Edgescan
The Security Strategist
26:53
Secure Access in the Age of Zero Trust Networking with Pulse Secure
The Security Strategist
25:34
Balancing Privacy and IT Security with Zscaler
The Security Strategist
25:16
Preventing Credential Stuffing Attacks with Shape Security
The Security Strategist
20:31
Optimising Application Security with Contrast Security
The Security Strategist
27:48
Application Security in the age of DevSecOps with WhiteSource
The Security Strategist
23:22
IT Security Policy Management and Automation with FireMon
The Security Strategist
23:33
Understanding the current state of SOAR and its future with Swimlane
The Security Strategist
18:14
The use of external threat intelligence for proactive IT security with IntSights
The Security Strategist
25:00
The Business Balancing Act – User Experience and Security with Auth0
The Security Strategist
20:57
Navigating a crisis and the benefits of Zero Trust with Infoblox
The Security Strategist
24:59
How inbox defence protects against increasingly sophisticated attacks with Barracuda
The Security Strategist
26:27
Secure remote working practices with Menlo Security
The Security Strategist
21:12
Building resiliency through disruption with RSA Security
The Security Strategist
18:27
Social Engineering: Psychological Warfare in the Cyberspace
The Security Strategist
26:41
What Cybersecurity Experts Get Wrong
The Security Strategist
20:40
Analysing the Top Indicators of Behaviour
The Security Strategist
21:15
Top Enterprises are Normalising Data Leaks
The Security Strategist
19:51
Best Software Security Practices for 2021
The Security Strategist
20:23
Building Connections in Your Cybersecurity Job
The Security Strategist
18:22
Cybersecurity: The Orchestration and Automation of Processes
The Security Strategist
20:50
Intercepting Attackers with Deceptive Technology
The Security Strategist
27:09
Quality Automotive Products in an Age of Cyber Crime
The Security Strategist
17:16
Testing Application Security Challenges in 2022
The Security Strategist
22:59
GitGuardian: Secrets in the Source Code Need Protection
The Security Strategist
19:54
Technimove: The Science Behind Cyber Security & Cyber Resilience
The Security Strategist
30:49