Search results


Securing Financial Institutions: Navigating the Next Wave of Cyber Threats

Securing Financial Institutions: Navigating the Next Wave of Cyber Threats

Channel Logo
Arik Atar, Dan Schnour

Join us for an engaging fireside chat as we explore the evolving cyber threat landscape targeting the financial sector. We'll discuss key insights into the rise in
DDoS attacks, AI-driven bot traffic, and sophisticated phishing campaigns. Learn how attackers are leveraging AI to bypass defenses and execute deepfake
phishing, and understand the impact of prolonged DDoS-as-a-Service and hacktivist campaigns. We'll also dive into the credential stuffing economy, reveali…

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale

OE for ICAM: Operational Efficiency that's FedRAMP Proven, & Ready to Scale

Channel Logo
Bassam Al-Khalidi, Chief Innovation Officer and Michael Thelander, Sr. Director Product Strategy

Federal agencies must modernize identity, credential and access management (ICAM) while ensuring compliance with evolving security mandates. Achieving
an Authority to Operate (ATO) is just the beginning—true operational efficiency requires scalable, centralized solutions that align with ICAM best practices. As
agencies look to modernize, they must ensure their IAM strategies are proven, adaptable, and ready to support thousands of users across multiple environ…

What is true Attack Surface Management (ASM)? Why it’s time to rethink how you manage your attack surface

What is true Attack Surface Management (ASM)? Why it’s time to rethink how you manage your attack
surface

Channel Logo
Michael Gianarakis, SVP ASM, and Shubham Shah, SVP Engineering & Research Australia - Searchlight Cyber

In this session, we're joined by Michael Gianarakis and Shubham Shah, the co-founders of Assetnote, where we'll break down the flaws in traditional ASM and
explore how teams can take a more proactive approach that actually helps security teams reduce risk. Topics we'll cover include: - The risks of 'shadow
exposure' (the hidden attack surface) where threats are introduced by third-party tools like ServiceNow, Citrix, and Slack - Why IP-based scanning is not en…

Why Dedicated Bot Management Has Become a Requirement

Why Dedicated Bot Management Has Become a Requirement

Channel Logo
Bryan Becker, Alex Gardner, and John Grady

A recent research study from Enterprise Strategy Group found that organizations continue to struggle with a variety of bot-related incidents spanning fraud,
content scraping and manipulation, and account attacks. This variation in sophisticated bot attacks requires advanced capabilities and detection mechanisms,
beyond what most web application firewalls (WAFs) are designed to offer. Join Enterprise Strategy Group Principal Analyst John Grady, Human Senior Direct…

How Snowflake Secures Workload Access — A Practitioner’s Deep Dive into Non-Human Identity Security

How Snowflake Secures Workload Access — A Practitioner’s Deep Dive into Non-Human Identity
Security

Channel Logo
Cameron Tekiyeh, Apurva Dave

Managing non-human identities at scale is a growing challenge for modern enterprises. In this exclusive webinar, Cameron Tekiyeh, head of global security
analytics at Snowflake, shares firsthand insights into the cloud-based data warehouse's journey to securing workload access, detailing real-world lessons
learned, challenges faced, and the strategies that made their approach successful. Cameron will share insights straight from the trenches. We’ll explore ho…

Secrets at Risk: Why Legacy Secrets Management Is Failing Your Security Strategy

Secrets at Risk: Why Legacy Secrets Management Is Failing Your Security Strategy

Channel Logo
Fahmy Kadiri, Customer Success Director, Akeyless

Legacy secrets management wasn’t built for today’s fast-paced, cloud-driven environments. Outdated tools create security gaps, secret sprawl, and
compliance risks while adding operational costs and friction. Join us to explore why legacy solutions fail—and how secretless authentication and modern best
practices can help secure secrets at scale. What You Will Learn: - How secrets management has evolved from on-prem to cloud-native - Security risks and …

Securing API Keys: The Hidden Threat Behind the U.S. Treasury Department Breach

Securing API Keys: The Hidden Threat Behind the U.S. Treasury Department Breach

Channel Logo
John Walsh Senior Product Marketing Manager, Secrets Shimran George Solutions Engineer, DevOps

In December 2024, a breach within the U.S. Treasury Department was traced back to a compromised API key. This attack underscores a growing security
vulnerability that many organizations overlook: unprotected API keys. API keys serve as digital passwords for applications, but when left unsecured, they
provide attackers with easy access to sensitive systems and data. In this informative webinar, we will dive into the critical role that API keys play in modern …

Identity Threats Decoded: Protecting the Core of Digital Security

Identity Threats Decoded: Protecting the Core of Digital Security

Channel Logo
Filipi Pires - Head of Identity Threat Labs & Global Product Advocate at senhasegura

Identity threats often serve as the keystone to many cyberattacks, where the compromise of digital identities can lead to unauthorized account access,
identity theft, and fraud. Cybercriminals employ various tactics such as social engineering, phishing, and malware to capture credentials and impersonate
legitimate users. Businesses must adopt a strategic approach to identity management, ensuring the robustness and security of identity verification process…

Hunting the Most Evasive Cyber Threats With Akamai HUNT

Hunting the Most Evasive Cyber Threats With Akamai HUNT

Channel Logo
Hagit Warshavsky - Customer Success Manager, Senior Lead | Shivangi Pandey - Senior Product Manager

Modern cyber threats are more sophisticated than ever, bypassing even the most advanced security defenses. Akamai HUNT takes security to the next level
by leveraging real-time segmentation data, third-party integrations, and cutting-edge telemetry to uncover and neutralize hidden threats before they cause
damage. With no additional agent rollout required, organizations can seamlessly enhance their security posture while avoiding alert fatigue and unnecessar…

Harmonize Access Control: What's New with Duo Single Sign-On (SSO)

Harmonize Access Control: What's New with Duo Single Sign-On (SSO)

Channel Logo
Colin Medfisch, Landon Greer, Mike Rotar

Whether you're an IT professional or a decision-maker, this webinar is designed to help you stay up to date with Duo Single Sign-On (Duo SSO). Join Colin
Medfisch, Landon Greer, and Mike Rotar as they delve into the exciting updates and enhancements that are enabled by Duo SSO, providing valuable insights
and practical guidance for the use cases your organization cares about most.