www.brighttalk.com Open in urlscan Pro
23.212.205.46  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=F9a1AJELHycUugtazuN-2B5QbIPoHJK11l4HsukfvOw5MA9FpTVZ-2FcyLlTVXyBlgn8SCAIhGHCvHDbxgc...
Effective URL: https://www.brighttalk.com/webcast/20139/600559?player-preauth=w2rQ%2FKMNZNDO74D6HPOTIoB8xDgbntbFLhsdY8fenhE%3D&utm_source=...
Submission: On November 23 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__3ZrBH AttendeesItem_AttendeeItem-Add-Disabled__3ifVL"><svg aria-hidden="true"
      focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__2QP-B AttendeesItem_AttendeesItem-Big-Camera__3p5eY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
      data-bdd="attendees-add-icon">
      <path fill="currentColor"
        d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
      </path>
    </svg><span class="globalStyle_hnb__1DGf2">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input__1Aktv" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
    ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>

Text Content

Watch laterViewing Certificate

Related topics:
NIS2
CyberArk
Cyber Hygiene
Software Supply Chain
Cyber Attacks
Cyber Defence
Cyber Incident Response
IT Security


NETWORK WITH LIKE-MINDED ATTENDEES


More attendees
Add photo
Simon Mujica
Manager - IT Systems management
PACCAR Inc
United States
Andrew Portin
SDR
BrightTALK
United States
Kevin Villanueva
Partner
Moss Adams LLP
United States
Courtne Parker
Risk Analyst
KeyBank
United States
Hide me from other attendees


MORE FROM THIS CHANNEL


CyberArk - Partner Hub
Upcoming talks (1)
On-demand talks (12)
Subscribers (1432)
CyberArk is partnered with organizations around the globe to offer the most
complete and
extensible identity security solution, protecting identities and critical assets
by enabling
zero trust and enforcing least privilege. This channel is focused on addressing
today’s
most critical Identity Security challenges in conjunction with CyberArk's
Partner Network.…
Role-specific Least Privilege
Protection of Linux Machines…

Dec 12 2023, 8:00am PST
NIS2: Inside the War Room
Responding to 3 Attacks on Critical
Infrastructure…
15 days ago37 mins
Are You Essential or Important-
Making Sense of NIS2…
15 days ago13 mins
Why Now is The Time to Consider
Passwordless Authentication…
28 days ago36 mins
From Foundational to Exceptional:
Best Practices for Access
Management Programs…
1 month ago23 mins
Continuous Zero Trust Transformation…
1 month ago31 mins
Multi-Cloud Identity Security:
Combating a Wide Open Gate…
1 month ago51 mins
4 Key Steps to Eliminate Vault Sprawl
Across AWS Applications…
1 month ago31 mins
Workforce Password Management
(WPM): Government Use-Cases…
1 month ago10 mins
Secrets Management: Non-Person
Entities Have Privilege Too!…
2 months ago11 mins
Endpoint Privilege Manager:
Un-Privilege the Attacker…
3 months ago13 mins
Zero Trust and Identity Security - From
Privilege Policy to End User Security…
3 months ago28 mins



IN THIS SERIES

3 episodes
Get Ready for NIS 2 – An Identity Security Perspective
Oct 17, 2023 - Oct 01, 2024
Show episodes


AVAILABLE ON-DEMAND

NIS2: Inside the War Room
Responding to 3 Attacks on Cr……
David Higgins & Andy Thomps……
15 days ago37 mins
Are You Essential or Important-
Making Sense of NIS2…
Nicholas Hauberg Karlsen & D……
15 days ago13 mins


RECOMMENDED FOR YOU

Scale and standardize your
infrastructure in Azure with Red Ha……
James Read (RH), Campbell Vertesi ……
8 days ago65 mins
Simplify your journey to the cloud
with Red Hat and Google Cloud…
Jim Chang (RH), Steven Richardson ……
15 days ago27 mins
Optimize your IT environment with
Red Hat and AWS…
Mayur Shetty (RH), David Duncan (A……
22 days ago27 mins
Critical apps on older vSphere? Now
What?…
VMware & Intel…
6 months ago35 mins
How enterprise Linux can support
hybrid cloud environments feat. IDC…
Penny Madsen (IDC), Chris Wells (RH)…
27 days ago50 mins
What Private Content Delivery is and
Why it Matters…
Adrian Herrera, Chief Marketing Offi……
10 hours ago40 mins
Making Space for Data Center:
Charting the course to power-effici……
Jason Collier, PMTS Systems Design……
2 months ago29 mins
Hidden Costs of Public Cloud:
In-Depth Analysis of Public vs. Priv……
Mirantis…
3 months ago52 mins
You're Building a Cloud. Do You
Need To Buy New Hardware?…
Mirantis…
28 days ago50 mins
Building Trust in an Untrusted
World: The Zero Trust Paradigm…
John Kindervag, Jason James, and ……
2 months ago40 mins
The Evolution of SOX: Building a
Mature Program…
Experts from The Trade Desk, CNM, ……
1 month ago60 mins
Making Space for Data Center: Be
ready for what is next…
Lynn Comp, AMD VP of sever techn……
2 months ago24 mins
How Classy Llama Slashed IT
Support Tickets by 50% with AI-dri……
Rob Tull, CIO, Classy Llama and Mic……
14 days ago49 mins
The Evolution of the Enterprise Data
Catalog: O'Reilly Author in Convers……
Ole Olesen-Bagneux, Author of The ……
Nov 30 20238:00am
How to achieve full situational
awareness of multiple Kubernetes ……
Edward Ionel…
3 months ago30 mins
Navigating the AI Act: Preparing for
the Challenges of the Latest EU Re……
Fátima Correia da Silva, Chief Comp……
Jan 10 202410:00am
How to Secure Your Software
Supply Chain on Windows Server…
Kevin Ng, Senior Solution Architect…
1 month ago38 mins
How Does Privacy Compliance =
Innovation + Growth?…
Rob Aragao, Greg Clark and Eric Po……
10 months ago50 mins
Siemens: The challenge of labeling
& UDI for medical devices…
Loftware and Siemens Healthineers…
30 days ago54 mins
OT Malware Showdown: Breaking
Down the Kill Chain with OT Aware ……
Rich Springer, Jonas Walker, Sigalit ……
13 days ago55 mins
How Firewalls Fit with Modern
Enterprise Security…
Jonathan Care, Cybersecurity Exper……
5 months ago59 mins
Navigating the Evolving Landscape
of ESG Reporting: Insights and Bes……
Michelle Dewarrat, Head of Risk, CS……
Jan 17 202410:00am
Zero Trust Series: 5 Customer
Experiences with Data Access Gov……
David Condrey, Doug Ouzts, and Bu……
9 months ago57 mins
The Biggest Network Security
Threats of 2023 & How to Combat ……
Mary Shacklett at Transworld Data, ……
13 days ago61 mins
Advanced Threat Protection for
Operational Technology…
Rod Locke, Director Product Manag……
3 months ago17 mins
Navigating Geopolitical Uncertainty…
Liz Sandwith, Chief Professional Pra……
14 days ago61 mins
Internal Audit’s Role in Unlocking
Culture as a Corporate Catalyst…
Cynthia Cooper, CEO, CooperGroup ……
Dec 27 202310:00am
Elevating the Impact of Internal
Audit: A Glimpse Into the Future…
Anthony Pugliese President & CEO T……
8 hours ago87 mins
Unwrap Better Shopping
Experiences…
Jordan Griffith, Sr. Product Marketin……
29 days ago32 mins
How can organizations address their
privacy compliance obligations?…
Michael Sampson, Senior Analyst at……
1 year ago49 mins
Facing Your Fears: A Live Demo on
How Attackers Can Use Generative……
Kevin Poulsen, Former Black Hat Ha……
Dec 05 20239:00am
Data Security Platforms - Present
and Future…
Heidi Shey, Principal Analyst, Forres……
20 days ago56 mins
Preparing for the Next Wave of
Privacy Regulations…
Eric Popiel, Kirsten Fury, CyberRes a……
1 year ago62 mins
Deep Dive into SOC 2: Gaining a
Competitive Edge with Advanced S……
Raymond Vankrimpen, Partner at Ri……
22 days ago39 mins
Why Privacy Compliance Delivers a
Competitive Edge…
Rob Aragao, CyberRes, Greg Anders……
1 year ago43 mins
Prevent Online Consumer Fraud
Using Risk Signals and Biometrics…
Maya Ogranovitch Scott, Solutions ……
9 months ago42 mins
Data Privacy Compliance: A Look at
Current Progress and Future Road……
Michael Sampson, Senior Research ……
2 months ago57 mins
Navigating The Paths of Risk: The
State of Exposure Management in ……
Wade Baker, PhD - Cyentia Institute ……
8 days ago54 mins
Top Attack Paths in AWS and How to
Efficiently Remediate Exposure…
Ashok Mahajan Senior Solutions Ar……
14 days ago47 mins
Journey to Zero Trust with Ping
Identity…
Max Fathauer, Product Marketing ……
3 months ago41 mins
Harnessing The Power of AI:
Pioneering The Future of SaaS Se……
Oz Wasserman, Head of Product at ……
6 months ago18 mins
Ways to Address Insider and 3rd
Party Data Risk Across Your SaaS ……
Sam Curry, CISO at Zscaler: Gal Nak……
2 months ago44 mins
Zero-Trust, Not Zero People:
Building a Human-Machine Identit……
Geoff Cairns, Principal Analyst at Fo……
21 days ago13 mins
Identity Management Lays the
Foundation for Zero Trust…
Bryan Rosensteel, Ping Identity; Dr. ……
27 days ago64 mins
Focus on User Experience to Grow
Customer Loyalty and Transform Y……
Maya Ogranovitch Scott, Solutions ……
Dec 12 20239:00am
Voice of the SOC Report–
Key findings…
Eoin Hinchy, Co-Founder and CEO of……
26 days ago37 mins
Hidden Cloud Security Challenges
Are a Barrier to Zero Trust…
Muralidharan Palanisamy, Chief Sol……
5 months ago22 mins
Join the Memory Tiering Revolution
with VMware and Intel…
Simon Todd, Arvind Jagannath & Su……
11 months ago31 mins
4 big product risks you can mitigate
with UX research…
Arielle Coambes, FullStory…
1 month ago25 mins
Fail like a scientist: Why failing is
necessary to improving your CX…
Jason Attard at Game Lounge Grou……
21 days ago28 mins
Marketing solutions
 * Overview
 * Webinars
 * Lead generation
 * Virtual events
 * Request a demo

Company
 * About
 * Blog
 * Careers
 * Contact

Support
 * Channel owners
 * Developers
 * Presenters
 * Viewers

© 2023 BrightTALK, a subsidiary of TechTarget, Inc.

LegalPrivacy PolicyDo Not Sell or Share My Personal InformationCookie
Preferences