www.brighttalk.com Open in urlscan Pro
23.36.238.122  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbvNTsytPcmE4nMKe-2BcP0i-2B0dyruwb...
Effective URL: https://www.brighttalk.com/webcast/13169/610525?player-preauth=2Z4WdyPT9n4FesE6%2BlIkUesYNlnULgaMw5o1IBkVQWY%3D&utm_source=...
Submission: On April 10 via api from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

SIG DOWNLOAD: EPISODE SEVEN - SPRING INTO SECURITY


Share

Tweet

Share

Link
Copied!




PRESENTED BY

Tricia Howard, Security Intelligence Group, Steve Winterfeld, Advisory CISO,
Director of Security Technology Strategy, Akamai


ABOUT THIS TALK

Join Tricia Howard and Akamai’s Advisory CISO and Director of Security
Technology and Strategy, Steve Winterfeld, as they discuss the latest threats
observed in the past 30 days and offer defense strategies as we embrace the
spring season. In this bite-sized episode, our experts will uncover: • Fresh
strategies to fortify your digital defenses against cybersecurity • Blossoming
techniques and cutting-edge tools designed to enhance your security posture •
Spring cleaning tips to ensure your systems are tidy and secure Don’t let
cyberthreats rain on your parade this spring. Sign up for Episode Seven.

Related topics:
Cyber Attacks
Cyber Crime
Cyber Defense
Cyber Defence
Cyber Incident Response
SOC
Ransomware
Phishing
credential abuse
IT Security


MORE FROM THIS CHANNEL


Akamai EMEA
Upcoming talks (2)
On-demand talks (152)
Subscribers (18083)
Leading companies worldwide choose Akamai to build, deliver, and secure their
digital
experiences — helping billions of people live, work, and play every day. Akamai
Connected
Cloud, a massively distributed edge and cloud platform, puts apps and
experiences closer
to users and keeps threats farther away. Learn more about Akamai’s cloud
computing, sec……
Fast and Secure Omnichannel
Delivery of Media Assets with
Scaleflex…

Apr 23 2024, 3:00pm CEST
Around the World with APIs:
Understand API Attacks Anywhere…
13 days ago48 mins
SIG Download: Episode Six - Bring on
the Madness…
13 days ago15 mins
State of the Internet: API Security…
21 days ago26 mins
State of Cloud: 2024…
1 month ago1 hr 7 mins
SIG Download: Episode Five -
Valentine Vulnerabilities…
1 month ago17 mins
How Observability Can Proactively
Safeguard Your Customer Experience…
1 month ago15 mins
State of the Internet: A Year in Review…
2 months ago34 mins
Understanding Enterprise Security in
2024…
2 months ago1 hr
SIG Download: Episode Four - New
Year, New Threats…
2 months ago18 mins
SIG Download: Episode Three - The
Holiday Hacks…
3 months ago16 mins
Secure Your Business in 2024: Top
Trends, Tips and Tricks…
3 months ago1 hr 1 min
Cloud Adoption Trends According to
Media and Entertainment Leaders…
4 months ago42 mins
SIG Download: Episode Two - The
DDoS Deepdive…
4 months ago15 mins
Achieving Complete Observability for
SaaS Applications…
4 months ago1 hr 3 mins
Guarding Against API Abuse…
4 months ago28 mins
SIG Download: Episode One - Social
Engineering & Obfuscation…
5 months ago15 mins

You're registered!
We look forward to seeing you online on:

Apr 24 2024, 3:00pm CEST

Add to calendar

Outlook

Google

iCal

Share with your team

Click to copy event link

Link copied to clipboard


Open in your default mail app


IN THIS SERIES

8 episodes
Monthly Threat Brief: The SIG Download
Sep 12, 2023 - Oct 27, 2024
Show episodes


AVAILABLE ON-DEMAND

SIG Download: Episode Six -
Bring on the Madness…
Tricia Howard, Security Intellige……
13 days ago15 mins
SIG Download: Episode Five -
Valentine Vulnerabilities…
Tricia Howard, Security Intellige……
1 month ago17 mins
SIG Download: Episode Four -
New Year, New Threats…
Tricia Howard, Security Intellige……
2 months ago18 mins
SIG Download: Episode Three -
The Holiday Hacks…
Tricia Howard, Security Intellige……
3 months ago16 mins
SIG Download: Episode Two -
The DDoS Deepdive…
Tricia Howard, Security Intellige……
4 months ago15 mins
SIG Download: Episode One -
Social Engineering & Obfuscat……
Tricia Howard, Security Intellige……
5 months ago15 mins
Monthly Threat Brief: The SIG
Download - Episode Zero…
Tricia Howard, Security Intellige……
6 months ago56 secs


DISCOVER MORE ON BRIGHTTALK:

The Human Equation in Cloud
Migration: Balancing Risk and Sec……
Sandra Estok, Founder & CEO | Way……
27 days ago55 mins
AI and Sustainability: Technology's
Role in Environmental Conservation…
Ramesh Dontha, Digital Transformat……
May 28 20246:00pm
Threat & Opportunity: Governing
Data in the Age of Generative AI…
Dan Lohrmann, Presidio; Earl Duby, ……
4 months ago58 mins
The Blueprint to Secure API Design
Through Effective Threat Modeling…
Elango Balusamy, Co-founder & CTO……
May 16 20249:00am
Predictive Shenanigans: The New
Wave of Application Threats…
Jordan Wiseman, Fellow | Online Bu……
May 16 202411:00pm
Immersion Day: Public Cloud
Network Security Hands-On-Lab…
Goran Bogojevic, Prisma Cloud Solu……
May 16 202411:00am
Cloud and AI Integration: Optimizing
AI Strategy for Real Impact…
Jo Peterson, Clarify360…
May 15 20246:00pm
The State of Cyber Resilience 2024
– Are You Secure?…
Drew Schlussel, Sr. Director, Technic……
Apr 17 20247:00pm
MLSecOps Explained: Building
Security Into ML & AI…
Diana Kelley, Protect AI and Guests…
May 22 20246:00pm
Protect the Nebula: Open Source, AI,
and Innovations in Supply Chain Se……
Yesenia, Yser, Founder | Yes2Tech- S……
26 days ago35 mins
Don't Let Your Cloud Dreams Turn
into Data Nightmares: Tips for Mig……
Chiletam Ogbu, Speaker | Innovation……
27 days ago31 mins
Data Protection and Privacy in a
Multi-Cloud Setting…
Elango Balusamy, Co-founder & CTO……
27 days ago51 mins
Why Should Cloud Security Posture
Be Your #1 Priority?…
Bojan Magusic, Program Manager a……
27 days ago31 mins
An Identity Security-first Approach
to the Evolving Threat Landscape…
Panel with Andrew Morrison (Deloitt……
2 months ago28 mins
Avoiding The Headlines: Data
Breach Post-Mortem and Future-P……
Rob Callaghan - Wasabi; Michael Jo……
1 day ago40 mins
Unleashing the Potential: MSPs and
the Cloud Storage Market Opportu……
Shannon Lynch, Wasabi; Andrew Sm……
12 days ago48 mins
Not If But When: How A Cyber
Attack Could Impact Surveillance ……
Danny Collins, Product Marketing M……
Apr 23 20247:00pm
Beyond Backups: Building a
Proactive Cyber Resilience Strateg……
Robert Callaghan, Wasabi; OG Hack……
8 days ago40 mins
Gen AI and Cloud: A Symbiotic
Relationship?…
David Terrar - Cloud Industry Forum,……
1 month ago57 mins
Defending Against Today's Threat
Landscape with MDR…
Kobi Luzner Senior Manager, Threat ……
Apr 30 202410:00am
Evaluating Economics of Elastic
Licensing for Application Delivery…
Prakash Sinha, Senior Director, Rad……
Jun 06 20242:00pm
Mainframe Migration: The Risk and
Cost of Doing Nothing…
Pedro L. Bicudo Maschio, ISG | Nick ……
Apr 25 20243:30pm
Establishing Eye Comfort Standards
in Monitors…
John Bullough - Icahn School of Me……
5 days ago23 mins
Infoblox Threat Intel – Disrupting
Cybercrime Where It Begins – DNS…
Renée Burton and Krupa Srivatsan…
May 08 20247:00pm
Time to Go Serverless…
Vasion…
May 01 202412:00pm
Divergent Paths, Converging
Strategies: Opportunities with AB……
Callum Miskell & Julie Wisdom (MOI……
May 16 202412:00pm
Adjusting GTM Strategies for the
Future of ABM…
Garrett Mann, VP of Corporate Com……
May 16 20247:00pm
The Network Edge: Windows
Devices & Their Data…
Perry Correll, Principal Technical Co……
6 days ago12 mins
Navigating the Data Security
Landscape: Understanding the Imp……
Jeff Warren, Chief Technology Office……
Apr 25 20243:00pm
Driving GBS outcomes at scale…
Tom Parisi, Nate Aschenbach, Kelly ……
7 days ago29 mins
Formulating Content for Your
Vertical Environment: How to Avoi……
Byrony Seifert (TechTarget), Kyle Mu……
May 16 20242:00pm
Success Drivers: Two Essentials for
ABM That Wins…
John Steinert, CMO, TechTarget & Gr……
May 16 20248:00pm
Fracking the Enterprise: Tapping into
ABM Revenue Reservoirs…
John Steinert, CMO, TechTarget & K……
May 16 20245:00pm
ABM Engagement in the Age of AI…
Rebecca Kitchens, President, TechT……
May 16 20244:00pm
Nothing Works Anymore: Why B2B
and ABM Need a New Playbook…
John Steinert, CMO, TechTarget and……
May 16 20243:00pm
Better Webinars. Better
Engagement. Better ABM.…
David Edwards, Sr Director, Product ……
May 16 20249:00pm
Unveiling Rolls Royce's SIEM
Transformation with Microsoft Sen……
Cribl | Microsoft | Rolls-Royce…
12 days ago53 mins
Fighting AI with AI: How to protect
against new Disruptive bot attacks…
Uri Dorot, Sr. Product Marketing Ma……
Apr 25 20245:00pm
Hybrid, Multi-Cloud Management Is
Key to Delivering Better Business ……
Anthony James, John Grady and Ad……
Apr 24 20245:00pm
Transform source-to-pay with GBS
for lower costs, higher efficiency…
Cara Herrick, Mark Labedz…
14 days ago46 mins
Optimise applications and assets to
reduce costs and technology risks ……
James Ramsay, Sankhadeep Dhar, T……
14 days ago57 mins
Cybersecurity at the Edge for OT
LAN and Edge Networks…
Rod Locke, Director of Product Man……
May 30 202411:00am
Practical Tips for Consolidation of
your Application Protection Strategy…
Ben Zilberman, Director of Product ……
May 23 202411:00am
Cloud Security 2024: Managing
Complexity…
Frank Dickson, Group Vice President……
May 14 202411:00am
Quantum-Proofing Your Data: Are
You Ready for the Future of Crypto……
Faisal Razzak, Group Manager, R&D…
Apr 30 202411:00am
The Future of Commercial Software
is Low-Code…
Hans de Visser, Chief Product Office……
11 days ago99 mins
Unified SASE for OT Asset Owners…
Antoine d'Haussy, EMEA OT Head of……
Apr 23 202411:00am
How to Protect Your Career and Your
Company During a Cyber Incident…
Nick Essner…
Apr 24 20247:00pm
Tales from the Trenches: Malware
and attack trends from Managed D……
James Jones, Managed Defense Co……
Apr 30 20245:00pm
10 Tactics to Reduce Chaos During a
Cyber Incident…
Nick Essner…
May 15 20247:00pm