www.brighttalk.com
Open in
urlscan Pro
23.36.238.122
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbvNTsytPcmE4nMKe-2BcP0i-2B0dyruwb...
Effective URL: https://www.brighttalk.com/webcast/13169/610525?player-preauth=2Z4WdyPT9n4FesE6%2BlIkUesYNlnULgaMw5o1IBkVQWY%3D&utm_source=...
Submission: On April 10 via api from DE — Scanned from DE
Effective URL: https://www.brighttalk.com/webcast/13169/610525?player-preauth=2Z4WdyPT9n4FesE6%2BlIkUesYNlnULgaMw5o1IBkVQWY%3D&utm_source=...
Submission: On April 10 via api from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
SIG DOWNLOAD: EPISODE SEVEN - SPRING INTO SECURITY Share Tweet Share Link Copied! PRESENTED BY Tricia Howard, Security Intelligence Group, Steve Winterfeld, Advisory CISO, Director of Security Technology Strategy, Akamai ABOUT THIS TALK Join Tricia Howard and Akamai’s Advisory CISO and Director of Security Technology and Strategy, Steve Winterfeld, as they discuss the latest threats observed in the past 30 days and offer defense strategies as we embrace the spring season. In this bite-sized episode, our experts will uncover: • Fresh strategies to fortify your digital defenses against cybersecurity • Blossoming techniques and cutting-edge tools designed to enhance your security posture • Spring cleaning tips to ensure your systems are tidy and secure Don’t let cyberthreats rain on your parade this spring. Sign up for Episode Seven. Related topics: Cyber Attacks Cyber Crime Cyber Defense Cyber Defence Cyber Incident Response SOC Ransomware Phishing credential abuse IT Security MORE FROM THIS CHANNEL Akamai EMEA Upcoming talks (2) On-demand talks (152) Subscribers (18083) Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, sec…… Fast and Secure Omnichannel Delivery of Media Assets with Scaleflex… Apr 23 2024, 3:00pm CEST Around the World with APIs: Understand API Attacks Anywhere… 13 days ago48 mins SIG Download: Episode Six - Bring on the Madness… 13 days ago15 mins State of the Internet: API Security… 21 days ago26 mins State of Cloud: 2024… 1 month ago1 hr 7 mins SIG Download: Episode Five - Valentine Vulnerabilities… 1 month ago17 mins How Observability Can Proactively Safeguard Your Customer Experience… 1 month ago15 mins State of the Internet: A Year in Review… 2 months ago34 mins Understanding Enterprise Security in 2024… 2 months ago1 hr SIG Download: Episode Four - New Year, New Threats… 2 months ago18 mins SIG Download: Episode Three - The Holiday Hacks… 3 months ago16 mins Secure Your Business in 2024: Top Trends, Tips and Tricks… 3 months ago1 hr 1 min Cloud Adoption Trends According to Media and Entertainment Leaders… 4 months ago42 mins SIG Download: Episode Two - The DDoS Deepdive… 4 months ago15 mins Achieving Complete Observability for SaaS Applications… 4 months ago1 hr 3 mins Guarding Against API Abuse… 4 months ago28 mins SIG Download: Episode One - Social Engineering & Obfuscation… 5 months ago15 mins You're registered! We look forward to seeing you online on: Apr 24 2024, 3:00pm CEST Add to calendar Outlook Google iCal Share with your team Click to copy event link Link copied to clipboard Open in your default mail app IN THIS SERIES 8 episodes Monthly Threat Brief: The SIG Download Sep 12, 2023 - Oct 27, 2024 Show episodes AVAILABLE ON-DEMAND SIG Download: Episode Six - Bring on the Madness… Tricia Howard, Security Intellige…… 13 days ago15 mins SIG Download: Episode Five - Valentine Vulnerabilities… Tricia Howard, Security Intellige…… 1 month ago17 mins SIG Download: Episode Four - New Year, New Threats… Tricia Howard, Security Intellige…… 2 months ago18 mins SIG Download: Episode Three - The Holiday Hacks… Tricia Howard, Security Intellige…… 3 months ago16 mins SIG Download: Episode Two - The DDoS Deepdive… Tricia Howard, Security Intellige…… 4 months ago15 mins SIG Download: Episode One - Social Engineering & Obfuscat…… Tricia Howard, Security Intellige…… 5 months ago15 mins Monthly Threat Brief: The SIG Download - Episode Zero… Tricia Howard, Security Intellige…… 6 months ago56 secs DISCOVER MORE ON BRIGHTTALK: The Human Equation in Cloud Migration: Balancing Risk and Sec…… Sandra Estok, Founder & CEO | Way…… 27 days ago55 mins AI and Sustainability: Technology's Role in Environmental Conservation… Ramesh Dontha, Digital Transformat…… May 28 20246:00pm Threat & Opportunity: Governing Data in the Age of Generative AI… Dan Lohrmann, Presidio; Earl Duby, …… 4 months ago58 mins The Blueprint to Secure API Design Through Effective Threat Modeling… Elango Balusamy, Co-founder & CTO…… May 16 20249:00am Predictive Shenanigans: The New Wave of Application Threats… Jordan Wiseman, Fellow | Online Bu…… May 16 202411:00pm Immersion Day: Public Cloud Network Security Hands-On-Lab… Goran Bogojevic, Prisma Cloud Solu…… May 16 202411:00am Cloud and AI Integration: Optimizing AI Strategy for Real Impact… Jo Peterson, Clarify360… May 15 20246:00pm The State of Cyber Resilience 2024 – Are You Secure?… Drew Schlussel, Sr. Director, Technic…… Apr 17 20247:00pm MLSecOps Explained: Building Security Into ML & AI… Diana Kelley, Protect AI and Guests… May 22 20246:00pm Protect the Nebula: Open Source, AI, and Innovations in Supply Chain Se…… Yesenia, Yser, Founder | Yes2Tech- S…… 26 days ago35 mins Don't Let Your Cloud Dreams Turn into Data Nightmares: Tips for Mig…… Chiletam Ogbu, Speaker | Innovation…… 27 days ago31 mins Data Protection and Privacy in a Multi-Cloud Setting… Elango Balusamy, Co-founder & CTO…… 27 days ago51 mins Why Should Cloud Security Posture Be Your #1 Priority?… Bojan Magusic, Program Manager a…… 27 days ago31 mins An Identity Security-first Approach to the Evolving Threat Landscape… Panel with Andrew Morrison (Deloitt…… 2 months ago28 mins Avoiding The Headlines: Data Breach Post-Mortem and Future-P…… Rob Callaghan - Wasabi; Michael Jo…… 1 day ago40 mins Unleashing the Potential: MSPs and the Cloud Storage Market Opportu…… Shannon Lynch, Wasabi; Andrew Sm…… 12 days ago48 mins Not If But When: How A Cyber Attack Could Impact Surveillance …… Danny Collins, Product Marketing M…… Apr 23 20247:00pm Beyond Backups: Building a Proactive Cyber Resilience Strateg…… Robert Callaghan, Wasabi; OG Hack…… 8 days ago40 mins Gen AI and Cloud: A Symbiotic Relationship?… David Terrar - Cloud Industry Forum,…… 1 month ago57 mins Defending Against Today's Threat Landscape with MDR… Kobi Luzner Senior Manager, Threat …… Apr 30 202410:00am Evaluating Economics of Elastic Licensing for Application Delivery… Prakash Sinha, Senior Director, Rad…… Jun 06 20242:00pm Mainframe Migration: The Risk and Cost of Doing Nothing… Pedro L. Bicudo Maschio, ISG | Nick …… Apr 25 20243:30pm Establishing Eye Comfort Standards in Monitors… John Bullough - Icahn School of Me…… 5 days ago23 mins Infoblox Threat Intel – Disrupting Cybercrime Where It Begins – DNS… Renée Burton and Krupa Srivatsan… May 08 20247:00pm Time to Go Serverless… Vasion… May 01 202412:00pm Divergent Paths, Converging Strategies: Opportunities with AB…… Callum Miskell & Julie Wisdom (MOI…… May 16 202412:00pm Adjusting GTM Strategies for the Future of ABM… Garrett Mann, VP of Corporate Com…… May 16 20247:00pm The Network Edge: Windows Devices & Their Data… Perry Correll, Principal Technical Co…… 6 days ago12 mins Navigating the Data Security Landscape: Understanding the Imp…… Jeff Warren, Chief Technology Office…… Apr 25 20243:00pm Driving GBS outcomes at scale… Tom Parisi, Nate Aschenbach, Kelly …… 7 days ago29 mins Formulating Content for Your Vertical Environment: How to Avoi…… Byrony Seifert (TechTarget), Kyle Mu…… May 16 20242:00pm Success Drivers: Two Essentials for ABM That Wins… John Steinert, CMO, TechTarget & Gr…… May 16 20248:00pm Fracking the Enterprise: Tapping into ABM Revenue Reservoirs… John Steinert, CMO, TechTarget & K…… May 16 20245:00pm ABM Engagement in the Age of AI… Rebecca Kitchens, President, TechT…… May 16 20244:00pm Nothing Works Anymore: Why B2B and ABM Need a New Playbook… John Steinert, CMO, TechTarget and…… May 16 20243:00pm Better Webinars. Better Engagement. Better ABM.… David Edwards, Sr Director, Product …… May 16 20249:00pm Unveiling Rolls Royce's SIEM Transformation with Microsoft Sen…… Cribl | Microsoft | Rolls-Royce… 12 days ago53 mins Fighting AI with AI: How to protect against new Disruptive bot attacks… Uri Dorot, Sr. Product Marketing Ma…… Apr 25 20245:00pm Hybrid, Multi-Cloud Management Is Key to Delivering Better Business …… Anthony James, John Grady and Ad…… Apr 24 20245:00pm Transform source-to-pay with GBS for lower costs, higher efficiency… Cara Herrick, Mark Labedz… 14 days ago46 mins Optimise applications and assets to reduce costs and technology risks …… James Ramsay, Sankhadeep Dhar, T…… 14 days ago57 mins Cybersecurity at the Edge for OT LAN and Edge Networks… Rod Locke, Director of Product Man…… May 30 202411:00am Practical Tips for Consolidation of your Application Protection Strategy… Ben Zilberman, Director of Product …… May 23 202411:00am Cloud Security 2024: Managing Complexity… Frank Dickson, Group Vice President…… May 14 202411:00am Quantum-Proofing Your Data: Are You Ready for the Future of Crypto…… Faisal Razzak, Group Manager, R&D… Apr 30 202411:00am The Future of Commercial Software is Low-Code… Hans de Visser, Chief Product Office…… 11 days ago99 mins Unified SASE for OT Asset Owners… Antoine d'Haussy, EMEA OT Head of…… Apr 23 202411:00am How to Protect Your Career and Your Company During a Cyber Incident… Nick Essner… Apr 24 20247:00pm Tales from the Trenches: Malware and attack trends from Managed D…… James Jones, Managed Defense Co…… Apr 30 20245:00pm 10 Tactics to Reduce Chaos During a Cyber Incident… Nick Essner… May 15 20247:00pm