This video demonstrates how an administrator can filter activity logs to view activities in Slack. The video selects both a personal and enterprise slack account and applies filters.
This video illustrates how Lookout CASB can protect sensitive data, such as a social security number, in Slack by detecting the data in chat and masking that data so that it is not shared in plain text. This video also shows how Lookout applies a watermark to sensitive content allowing addition policy actions to be applied.
Alex Gladd, Principal Product Manager at Lookout discussed why it is important to have visibility into phishing threats and how Lookout Phishing and Content Protection can ensure your corporate data doesn't end up on the dark web.
Does your Zero Trust strategy include mobile devices? If not, it might have a zero chance of being successful. Hear how to deliver continuous authentication for mobile users connecting to corporate data. Speakers: Tomas Maldonado - CISO, NFL Ramy Houssaini - Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
Infrastructure as Code enables you to take ownership of your cloud environments and define what your application needs in a programmatic way. It's appealing because it’s code; you can version it, you can automate testing it using pipelines and you can deploy it frequently on your own. However there is a catch. With this level of autonomy comes increased responsibility and the implicit requirement to have the relevant knowledge needed in order to design and configure secure infrastructure.
Snyk allows customers to create custom rules, using advanced patterns, to define what to look for in infrastructure as code files. This session will be a deep dive into how to create your own rules for Snyk Infrastructure as Code (Snyk IaC)
Ahh, the web, an open platform where sites can communicate with each other, embed third-party content to unlock powerful features, make requests to arbitrary endpoints of other web applications... Well. Isolation was never a thing on the web, and this creates a number of security issues⏤but Spectre took this to the next level.
I will discuss digital transformation in the enterprise, how it impacts cloud native applications developed using agile methodologies and as a result, an oscillating application risk rating, which then triggers prioritized security-related activities by application security engineers.. Key topics will include: Creating a baseline application risk profile Dynamic characteristics of application risk factors Significant changes that trigger security reviews
Greatly reduce vulnerabilities using Snyk's advanced container analysis. This session focuses specifically on the Base Image Management capabilities. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.