www.brighttalk.com
Open in
urlscan Pro
23.36.238.122
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=F9a1AJELHycUugtazuN-2B5QbIPoHJK11l4HsukfvOw5OrKspze7p6CCeL-2ByD1MtXT1cdZlZVUebPZx1Y...
Effective URL: https://www.brighttalk.com/webcast/17474/590701?player-preauth=gSPMraanmRoyw8fFLazYwTMZbbsdMQflHG58PcTaFjQ%3D&utm_source=br...
Submission: On October 18 via api from GB — Scanned from GB
Effective URL: https://www.brighttalk.com/webcast/17474/590701?player-preauth=gSPMraanmRoyw8fFLazYwTMZbbsdMQflHG58PcTaFjQ%3D&utm_source=br...
Submission: On October 18 via api from GB — Scanned from GB
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__3ZrBH AttendeesItem_AttendeeItem-Add-Disabled__3ifVL"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__2QP-B AttendeesItem_AttendeesItem-Big-Camera__3p5eY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__1DGf2">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input__1Aktv" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
Watch laterViewing Certificate Related topics: Application Security Hackers Financial Services Financial Security DevOps Security Threat Defence Mobile Security Mobile Security Risks NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Sseruuma Asilam Senior Security Officer MTN Uganda Nora Algmaei تنميه إقتصاد اليمن nora Yemen Iman Hussein Senior banker Sudanse french bsnk Sudan Jonathan Yim Customer Success Superhero Canada Hide me from other attendees MORE FROM THIS CHANNEL Digital.ai Upcoming talks (2) On-demand talks (142) Subscribers (17621) Finally, the intelligence, agility, and security you need to create innovative digital experiences customers trust.… Navigating Complexity and Change Fatigue: Strategies from the DevOps 2023 Report… Des 12 2023, 9:00nm EAT 2023 Application Threat Report… Okt 26 2023, 9:00nm EAT Overcoming Digital Disruption: Financial Services Success Stories… 6 days ago38 mins The 3 Pillars of AI – Practical Use Cases you can Leverage Today… 13 days ago54 mins What's Trending in Scaled Agile in 2023 - Value-based Delivery… 1 month ago19 mins AI-Powered DevSecOps for the Enterprise… 1 month ago21 mins Continuous Delivery on Multi-Cloud: Predicting the Unpredictable… 1 month ago41 mins Application Hardening as Part of a Holistic DevSecOps Strategy… 2 months ago56 mins Getting into the Flow: Finding Out if you Released the Right Things… 2 months ago32 mins Flow Metrics: What Metrics to Consider and Implementation Tips… 2 months ago48 mins The 16th State of Agile Report & the Rise of Business Metrics… 3 months ago55 mins How to Build a Blueprint for Secure Software… 3 months ago19 mins How to Implement Threat Monitoring for Application Security… 5 months ago58 mins Continuous Delivery Improves App Rollout for National Broadband Ireland… 5 months ago50 mins Build, Validate, Execute: Connect Agile requirements with Testing results… 6 months ago16 mins Use Code Obfuscation and App Monitoring to Protect your Apps… 6 months ago11 mins The DevOps Handbook: Creating, Implementing, and Analyzing Telemetry Synopsis… 7 months ago52 mins RECOMMENDED FOR YOU VMware Platform Services deploying Tanzu with Intel Hardware… Alex Romanenko, VMware; John H…… 27 days ago21 mins Cyber Resilience: Align your lines of defence… Conor Champion & Blerta Likaj - Ser…… 7 days ago42 mins SkopeAI: Upgrading Security and Performance with the Power of AI… "Krishna Narayanaswamy - CTO Bo…… 4 days ago25 mins COP 15 — the 'Paris moment for nature': Is finance on board?… UNEP FI, Finance for Biodiversity Fo…… 11 months ago57 mins Understanding the most critical variable in today’s cyber threats – …… Carl Leonard I Cybersecurity Strateg…… Nov 01 20231:00nm Secure Cloudscape: Exploring Cloud Security Solutions… Pankul Chitrav, Application Release …… Okt 26 20238:00nm Why Should Cloud Security Posture Be Your #1 Priority?… Bojan Magusic, Progam Manager a…… Okt 26 20236:00nm AI and emerging tech: The growing impact, challenges and responsibil…… Diann Daniel/TechTarget, Irving Wla…… 5 months ago43 mins Securing multi-cloud architecture… Simon Ratcliffe, CIO/CTO Advisor… Okt 24 20233:00nm Elevate Digital Experiences with Cisco Full-Stack Observability… Ronak Desai SVP/GM Cisco AppDyn…… Okt 24 20236:00nm Transforming cyber incident recovery with Veeam and Kyndryl… Christophe Bertrand, Enterprise Str…… 26 days ago36 mins Join the Memory Tiering Revolution with VMware and Intel… Simon Todd, Arvind Jagannath & Su…… 9 months ago31 mins Securing Kubernetes: Exploring Access Management Techniques… Atulpriya Sharma, Senior Developer …… Okt 25 202310:00vm Workforce Identity: Securing the Digital Workforce Today and Tomo…… Jason Keenaghan, Director of Prod…… Nov 09 20237:00nm Critical apps on older vSphere? Now What?… VMware & Intel… 5 months ago35 mins Ready for CSRD ?… Robert Garcia, Brittany Pettit - Servi…… 18 days ago46 mins Elevating and Securing Digital Experiences for Your Business… Brad Welsh, Indiana Office of Techn…… Okt 24 20237:00nm Turn risk into competitive edge with TPRM… Hasintha Gunawickrema, Industry …… 22 days ago59 mins Create a robust and effective third-party risk management progr…… Troy Dunham, Sr. Director of IT Appli…… 22 days ago53 mins B2B Interactions: A Blind Spot in Your Digital Transformation… Jason Keenaghan, Director Product…… Okt 25 20236:00nm Mastering Automated Cloud Security Incident Response: Strate…… Elango Balusamy, Co-founder & CT…… Okt 26 20231:00nm Will 2024 Bring Us a Year of AI and ML Threats?… John Bambenek, President | Bambe…… Nov 01 20236:00nm How to Use Threat Intelligence to Mitigate Third Party Risk… Christopher Crowley & Greg Kapour…… 26 days ago62 mins Take Control of Your Cyber Defense with The Defender’s Advantage Ser…… Kerry Matre, Sr. Director, Product, So…… 1 month ago52 mins Threat Forecast Vs. Operational Risk: What Keeps You Awake At Ni…… Steve Yates FBCI, CBCP, FICPEM, M…… Nov 02 20237:00nm The AI Elephant in Every Room… Steve Levinson, Vice President | OBS…… Nov 01 20238:00nm Building a Proactive Strategy to Exposure Management… Ryan Roobian, Principal Architect; A…… 14 days ago59 mins Data Center Solutions… M Scott Donovan, Enterprise Accou…… 22 days ago22 mins Debat - Préparer son SI à la menace d’une cyberattaque… Miguel De Oliveira (Président, AISI) V…… 21 days ago44 mins Gestion de crise cyber… Stéphanie Ledoux, PDG d'Alcyconie… 21 days ago31 mins Developing Strategy That Enables Zero-Day Exploitation… Vincent Amanyi, Founder | Boleaum …… Nov 03 202312:00vm Utilize Threat Intelligence, Establish Command & Control - Webinar Seri…… Danielle Restaino, Emily Cranston, P…… 1 month ago47 mins Security Automation: Getting Prepared and Calling for Help… Fortinet: Anthony Giandomenico, Sr.…… 7 months ago29 mins 2023 Cloud Security Report Insights and Recommendations… Vince Hwang. Sr. Director, Products …… Okt 24 202312:00nm SOC Operations Made Simple With AI, Automation & SaaS… Chris Borales, Product Marketing Di…… 1 month ago53 mins Zero-Trust Security for Identities and Privileged Accounts… Eric Schwake, Director of Product M…… 4 months ago40 mins AI: The Truth Behind the Hype and How SOC Teams Can Fight Back… From Fortinet: Chris Borales, David …… 7 days ago61 mins How to Easily Implement Defense-in-Depth for Cloud Storage… Drew Schlussel; Sr. Director, Technic…… Okt 24 20236:00nm Telco Market Trends and Key Cybersecurity Considerations… Fortinet's Jonathan Nguyen-Duy, Ro…… 4 months ago41 mins KEYNOTE SESSION Cybersécurité : Une menace qui ne faiblit pas...… Valery Marchive, Rédacteur en chef, …… 21 days ago31 mins KEYNOTE SESSION : Comprendre le parcours des attaquants… Valery Marchive, Rédacteur en chef, …… 20 days ago27 mins Maximizing Your Cyber Posture in the Hybrid Enterprise… Amit Shaked, CEO at Laminar Securi…… Okt 26 20234:00nm Beyond AI: Four Technologies That Will Disrupt Networking… Fortinet: Nirav Shah, VP of Products…… 20 hours ago38 mins Data Security and Governance in the Cloud Era… Joshua Stenhouse, Field CTO Cyber …… Okt 31 20235:00nm Journey to simplified SASE… Nirav Shah VP, Products & Solutions…… 5 months ago58 mins Defend Your Frontiers with Collaborative Cybersecurity Defen…… Jen Easterly, Director of the CISA; W…… Nov 02 20234:00nm Universal ZTNA: How to Use Zero Trust for All Locations… Peter Newton, Senior Director of Pro…… 4 months ago48 mins Cyber-crise : se préparer à l’inattendu, qui ne l’est plus tant qu…… Laurent Besset, Directeur Audit et F…… 20 days ago27 mins Network Firewall - Multiple Requirements, A Common Approach… Patrick Grillo Sr. Director, Solutions …… 5 months ago51 mins The Evolving Data Threat Landscape: A Fireside Chat w/ Mar…… Mark McLaughlin, Former Chairman…… Nov 02 20235:00nm Marketing solutions * Overview * Webinars * Lead generation * Virtual events * Request a demo Company * About * Blog * Careers * Contact Support * Channel owners * Developers * Presenters * Viewers © 2023 BrightTALK, a subsidiary of TechTarget, Inc. LegalPrivacy PolicyDo Not Sell or Share My Personal InformationCookie Preferences