3 events found
+ 6 past events found
Back to Search Begin New Search Save Search Auto-Notify
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
May 15, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Predictive Shenanigans: The New Wave of...
In an age where artificial intelligence (AI) not only powers innovations but also underpins cybersecurity threats, this session aims to inform and help you prepare against the next wave of digital assaults. This talk will delve into the burgeoning domain where lax API security meets sophisticated AI-driven exploit bots, marking a paradigm shift in how cyber threats are generated and how they must be mitigated. As smaller entities become increa...
May 16, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Beyond the Horizon: Use AI to Expand Th...
In the rapidly evolving landscape of cybersecurity, the ability to effectively detect and respond to threats is paramount for organizations across the globe. Traditional threat intelligence mechanisms have often been reactive, focused on addressing vulnerabilities after they have been exploited. However, with the increasing sophistication of cyber threats and the expanding digital footprint of modern enterprises, there is a critical need to pi...
July 10, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search