share.vidyard.com
Open in
urlscan Pro
23.21.203.87
Public Scan
Submitted URL: https://app.go.arrow.com/e/er?emID=16815&utm_source=eloqua&utm_medium=email&utm_campaign=na_arw_vation_28122021_pt_wb-ser...
Effective URL: https://share.vidyard.com/watch/L6KoTLNF3D8PZvRwyg6euZ?emID=16815&utm_source=eloqua&utm_medium=email&utm_campaign=na_arw_v...
Submission: On August 11 via api from US — Scanned from DE
Effective URL: https://share.vidyard.com/watch/L6KoTLNF3D8PZvRwyg6euZ?emID=16815&utm_source=eloqua&utm_medium=email&utm_campaign=na_arw_v...
Submission: On August 11 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
× × × This is a preview of your video. Customize your viewer experience and add your own logo and branding. Customize your theme Upgrade to add your own logo WHAT'S NEXT IN TECH: SECURITY OPERATIONS As the attack surface continues to expand and threat actors become more advanced, understand how security operations teams prevent, detect, monitor and respond to modern incidents. Skip to a specific section by using the chapters tool (next to the settings icon in the lower right of the video). - What is security operations? - Investment trends - Technology trends - CXO priorities - Channel impact - Q&A Vidyard uses cookies to better understand how videos are viewed, and to improve your experience. Learn more Got it