Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 1127
Filter

KI Park - AI can improve our lives. We are working on it | Rise of AI Summit 2020

11/18/2020
Views 85
0
competition, computing, data, data center, education, energy, engineering, entrepreneurship, feeling, infrastructure, intelligence, mindset, personal data, privacy, society, startup company, technology, computer network, hackerspace, self-service, telecommunication, telecommunications network, world wide web, nippon telegraph and telephone
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Florin Manaila | How AI and Deep Learning could effort the Climate Change

11/17/2020
Views 106
0
climate change, deep learning, emerging technologies, ibm, infrastructure, resource, scalability, binary file, byte, consumption (economics), data compression, floating-point arithmetic, gigabyte, kilowatt-hour, server (computing), supercomputer, high bandwidth memory, electric energy consumption
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Dr. Rasmus Rothe | AI Business Models & Trends

11/17/2020
Views 555
0
adoption, api, communication, computer, computing, email, expert, innovation, insurance, natural language processing, retail, sales, tax, computer network, literacy, long tail, remote sensing, spreadsheet, world wide web, gpt-3
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Adversary Simulation: Close the Gaps in Your Security Posture

05/20/2021
Views 47
0
api, application security, architect, automation, computer security, information security, outsourcing, red team, robotics, simulation, system, web service, active directory, antivirus software, audit, computer network, cron, cyberwarfare, proxy server, regulatory compliance, swot analysis, thought, understanding, vulnerability (computing), adversary simulation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

From Zero to Hero – How Cisco Deployed Zero Trust in Five Months

05/20/2021
Views 57
0
advertising, authentication, cisco systems, cloud computing, internet, onboarding, salesforce, active directory, android (operating system), application software, attention, certificate authority, computer network, dmz (computing), end user, laptop, microsoft windows, mobile device, multi-factor authentication, password, push technology, tablet computer, telecommuting, virtual private network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Serverless Architecture Security Patterns for Securing the Unseen

05/20/2021
Views 65
0
authentication, cloud computing, edge computing, facebook, identity management, internet, internet of things, justice, product lifecycle, robot, search engine, amazon dynamodb, authorization, command-line interface, computer network, data validation, end user, firewall (computing), function (mathematics), kernel (operating system), server (computing), serverless computing, single sign-on, social norm, transport layer security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Modern Identity Hacking: Have Hackers Really Adjusted to Constant Remote?

05/20/2021
Views 69
0
authentication, biometrics, cloud computing, data breach, data security, encryption, internet, powershell, authorization, computer file, computer network, dmz (computing), laptop, multi-factor authentication, outlook.com, password, physical security, server (computing), telecommuting, url redirection, web browser, world wide web, help desk, iris recognition, modern identity hacking
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hacker’s Paradise: Top 10 Biggest Threats When Working From Home

05/20/2021
Views 75
0
chromebook, dynamic-link library, microsoft sql server, windows task scheduler, biggest threats, hacker’s paradise
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

MITRE ATT&CK® as a Framework for Cloud Threat Investigation

05/20/2021
Views 78
0
best practice, cloud computing, community, computer security, computing, internet, interoperability, interview, operating system, outsourcing, research, retail, risk, spotify, system, virtualization, cloud computing security, computer network, penetration test, server (computing), system on a chip, thread (computing), threat model, storage area network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Operations Center Technology Taxonomy

05/20/2021
Views 70
0
archive, authentication, cloud computing, computer security, internet, malware, open-source software, simulation, stock, wi-fi, active directory, computer data storage, computer file, computer network, cyberwarfare, directory service, file system, information system, lightweight directory access protocol, safe, spreadsheet, tokenization (data security), voice over ip, vulnerability (computing), bank vault
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

What’s Old is New: Hybrid Security for Microsoft Azure and On-Premises Tech

05/20/2021
Views 182
0
email, icloud, identity management, ios, ransomware, security token, sharepoint, twitter, active directory, android (operating system), brute-force attack, computer file, computer network, firewall (computing), group policy, kerberos (protocol), mobile device management, multi-factor authentication, password, server message block, superuser, user (computing), web portal, domain controller (windows), federated identity, hybrid security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Top Active Directory Attacks: Understand, then Prevent and Detect

05/20/2021
Views 94
0
credential stuffing, dynamic host configuration protocol, kerberos (protocol), lightweight directory access protocol, password cracking, password policy, server message block, superuser, supply chain attack, user (computing), multi-function printer, top active directory attacks, desktop search, x window authorization
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Zero Trust, Zero Pain: A Practical Implementation with Intrinsic Security

05/20/2021
Views 113
0
analytics, authentication, cloud computing, data center, identity management, malware, microservices, operating system, web application, android (operating system), bring your own device, computer network, disk encryption, end user, end-to-end principle, endpoint security, intrusion detection system, multi-factor authentication, patch (computing), regulatory compliance, single sign-on, telecommuting, troubleshooting, virtual private network, vulnerability (computing), intrinsic security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Building Secure and Reliable Systems at Scale

05/20/2021
Views 113
0
database, linux, php, web application, active directory, apache http server, authenticator, bring your own device, gmail, google docs, hypertext transfer protocol, lamp (software bundle), public key certificate, software bug, transport layer security, virtual private network, zoombombing, reliable systems
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Attacking Kubernetes Clusters Through Your Network Plumbing

05/20/2021
Views 115
0
kubernetes , routing, amazon echo, border gateway protocol, communication protocol, computer network, dns spoofing, domain name system, file transfer protocol, handshaking, ip address, internet protocol, load balancing (computing), mac address, man-in-the-middle attack, name server, network packet, overlay network, ping (networking utility), routing table, spoofing attack, transmission control protocol, user datagram protocol, broadcast domain, network plumbing, virtual extensible lan
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Security-as-Code to Accelerate DevSecOps, a Practical Guide to Get Started

05/20/2021
Views 119
0
authentication, cloud computing, computer security, data center, devops, fuzzing, infrastructure as code, kubernetes , malware, microservices, product lifecycle, software development, version control, access control, backdoor (computing), computer network, digital signature, image scanner, intrusion detection system, library (computing), package manager, patch (computing), penetration test, traceability, vulnerability (computing), security-as-code
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Multi-Cloud Anomaly Detection: Finding Threats Among Us in the Big 3 Clouds

05/20/2021
Views 121
0
amazon s3, amazon web services, api, backup, cloud computing, encryption, infrastructure as code, internet, metadata, microsoft, microsoft azure, mobile app, node.js, web service, amazon dynamodb, amazon elastic compute cloud, command-line interface, computer network, file transfer protocol, npm (software), subnetwork, threats among, altmetrics
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Hunt and Gather: Developing Effective Threat Hunting Techniques

05/20/2021
Views 125
0
computer security, email, internet, malware, operating system, powershell, risk, risk management, splunk, surveillance, threat intelligence, command-line interface, computer file, computer network, cyberwarfare, hunting, incident management, parsing, path (computing), proxy server, remote desktop services, shared resource, use case, world wide web, 7-zip
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: Reshaping Security to Power Business Growth

05/19/2021
Views 147
0
asset, authentication, cloud computing, community, computer security, customer, data breach, email, ibm, information security, infrastructure, internet, organization, privacy, risk, supply chain, value chain, collaboration tool, computer network, general data protection regulation, information privacy, psychological resilience, regulatory compliance, software framework, telecommunication, reshaping security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: The Internet is Small: Own Your Attack Surface Before Somebody Else

05/17/2021
Views 1.05 K
0
cloud computing, computer security, digital transformation, internet, internet of things, internet security, palo alto networks, ransomware, amazon (company), computer network, cyberattack, cyberwarfare, exploit (computer security), ip address, ipv6, information sensitivity, laptop, patch (computing), remote desktop protocol, sas (software), virtual private network, world wide web, zero-day (computing), history of the internet
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

A Conversation with CFTC Chairman and Chief Executive Heath Tarbert

10/13/2020
Views 7
0
5g, biotechnology, bitcoin, blockchain, commodity futures trading commission, cryptocurrency, economy, financial technology, institute, interest, milken, mobile app, telehealth, crispr gene editing, computational biology, computer network, derivative (finance), digital currency, financial market, futures contract, hedge (finance), hedge fund, jpmorgan chase, moneyness, option (finance), u.s. securities and exchange commission, volatility (finance)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Building Mental Health Resilience Amidst Uncertainty

10/12/2020
Views 10
0
disability, health, institute, internet, mental health, milken, telehealth, ageing, caregiver, child care, chronic condition, computer network, depression (mood), loneliness, major depressive disorder, mental disorder, opioid epidemic, presenteeism, psychological resilience, social isolation, social stigma, substance abuse, substance use disorder, suicide, teladoc health, workplace wellness
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

A Case Study of the Capital One Data Breach

05/17/2021
Views 201
0
capital one, case study, computer security, data breach, internet, leadership, personal data, research, risk, computer network, emergence, general data protection regulation, information privacy, internet protocol, office of the comptroller of the currency, payment card industry data security standard, regulatory compliance, replication (computing), tor (anonymity network), turnover (employment), virtual private network, vulnerability (computing), web application firewall, world wide web, cyber-security regulation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The Attacker’s Guide to SSO and Passwordless Technologies

05/17/2021
Views 294
0
biometrics, phishing, web application, authorization, exploit (computer security), http cookie, kerberos (protocol), personal identification number, single sign-on, trusted platform module, virtual private network, windows 7, passwordless technologies
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

NetWitness - How to Use XDR to Combat Today's Modern Threats

05/20/2021
Views 228
0
behavioral analytics, black hat briefings, expert, microsoft, home network, internet access, login, rsa (cryptosystem), real-time computing, user (computing), xtr, zero-day (computing), xdr technology
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Adversary Simulation: Close the Gaps in Your Security Posture

05/18/2021
Views 47
0
api, application security, architect, automation, computer security, information security, outsourcing, red team, robotics, simulation, system, web service, active directory, antivirus software, audit, computer network, cron, cyberwarfare, proxy server, regulatory compliance, swot analysis, thought, understanding, vulnerability (computing), adversary simulation, gaps , security posture
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How to Ruin your SOC in 5 Easy Steps

05/17/2021
Views 57
0
automation, big data, data center, encryption, intelligence, memory, mentorship, news, risk, software as a service, threat intelligence, computer network, data model, glasses, rsa conference, server (computing), working memory, threat intelligence platform, on-premises software, security information and event management
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How Protocol Gateways May Introduce More Problems than They Solve

09/17/2020
Views 77
0
open-source software, video, academic publishing, computer data storage, ethernet, firewall (computing), internet protocol, login, modbus, telephone, translation, transmission control protocol, secure shell protocol, rs-485
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

DevSecOps with IoT - Is it a myth?

09/17/2020
Views 82
0
amazon web services, analytics, central processing unit, cloud computing, computer, cybersecurity, data center, encryption, information, infosec, internet of things, machine learning, microcontroller, operating system, rsa, rsac, rsaconference, security, sql, amazon (company), amazon alexa, computer network, embedded system, file system, home network, interface (computing), patch (computing), sensor, transport layer security, world wide web, x86
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

20/20 Security Vision: Managing Digital Risk in the Era of IoT

09/17/2020
Views 100
0
analytics, authentication, cloud computing, computer security, computing, cybersecurity, database, edge computing, information, information security, infosec, internet of things, interoperability, linux foundation, microservices, mqtt, privacy, product lifecycle, rsa, rsac, rsaconference, security, access control, communication protocol, computer network, denial-of-service attack, gateway (telecommunications), machine to machine, reliability engineering, open platform communications, data distribution service
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 38