Back to Search Begin New Search Save Search Auto-Notify
How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
May 15, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
May 15, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Predictive Shenanigans: The New Wave of...
In an age where artificial intelligence (AI) not only powers innovations but also underpins cybersecurity threats, this session aims to inform and help you prepare against the next wave of digital assaults. This talk will delve into the burgeoning domain where lax API security meets sophisticated AI-driven exploit bots, marking a paradigm shift in how cyber threats are generated and how they must be mitigated. As smaller entities become increa...
May 16, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Beyond the Horizon: Use AI to Expand Th...
In the rapidly evolving landscape of cybersecurity, the ability to effectively detect and respond to threats is paramount for organizations across the globe. Traditional threat intelligence mechanisms have often been reactive, focused on addressing vulnerabilities after they have been exploited. However, with the increasing sophistication of cyber threats and the expanding digital footprint of modern enterprises, there is a critical need to pi...
July 10, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search