Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Take the Uncertainty Out of Ransomware Recovery | Rubrik Winter Release 2022

At Winter Release 2022, we announced a new part of Rubrik Security Cloud, Rubrik Cyber Recovery, which delivers two new capabilities to help organizations better prepare for attacks and minimize operational downtime. We also announced today that Ransomware Monitoring & Investigation and Sensitive Data Monitoring & Management will support Microsoft OneDrive, SharePoint, NAS Cloud Direct, and Azure Virtual Machines.

Customer Office Hours: CI/CD Best Practices

Learn tips and tricks on how to implement, troubleshoot and scale deployments. For example, should you scan in the CICD or in SCM? What implementation methods should you use - plugin, npm, binary…? We will cover this and more. Host: Sebastian Roth, Senior Solutions Engineer Seb brings his expertise as a Principal Software Engineer & Team Lead for over 17 years into the DevSecOps community, where he now focuses on process improvements and shares best-practices to improve security posture.

How Firstup extends security organizational wide with Datadog and AWS

n this video, learn how Datadog’s integrated solutions can increase visibility and improve collaboration between DevOps and security teams in real time. In this session, you will learn how Chad Upton, Vice President of Infrastructure at Firstup, uses Datadog Cloud Security Management to bring together cloud security and observability to enable their engineers to continuously maintain security and compliance best practices across their AWS assets. You’ll also get the chance to hear from Ray Zaman, Solutions Architect at AWS, on how to easily surface and remediate misconfigurations of your AWS environment with Cloud Security Management.

How to Prepare for Critical Infrastructure Security Threats

As part of our 2-Minute Security Talks series, Bob Thompson, Associate Managing Director in Kroll’s Security Risk Management practice for EMEA and APAC, addresses the threats to critical national infrastructure that are emerging from global geopolitical instability. Bob also discusses how Kroll can support organizations with threat monitoring, security reviews, risk assessments, cyber resilience assessments and crisis preparedness, and reviews the seven key points of Kroll’s risk assessment process that can help companies mitigate threats.

The Behavioral Science of Cybersecurity | Cybersecurity Sessions #14 with Si Pavitt & Steve Dewsnip

If a stranger walked into your workplace and asked you your name and email address, would you co-operate? What if they asked you to open a door for them, or to use your laptop or phone, all whilst wearing a shirt that said “CHALLENGE ME” on it?