share.vidyard.com Open in urlscan Pro
23.21.203.87  Public Scan

Submitted URL: https://app.go.arrow.com/e/er?emID=16815&utm_source=eloqua&utm_medium=email&utm_campaign=na_arw_vation_28122021_pt_wb-ser...
Effective URL: https://share.vidyard.com/watch/L6KoTLNF3D8PZvRwyg6euZ?emID=16815&utm_source=eloqua&utm_medium=email&utm_campaign=na_arw_v...
Submission: On August 11 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

×
×
×
This is a preview of your video. Customize your viewer experience and add your
own logo and branding. Customize your theme
Upgrade to add your own logo


WHAT'S NEXT IN TECH: SECURITY OPERATIONS


As the attack surface continues to expand and threat actors become more
advanced, understand how security operations teams prevent, detect, monitor and
respond to modern incidents.

Skip to a specific section by using the chapters tool (next to the settings icon
in the lower right of the video).
- What is security operations?
- Investment trends
- Technology trends
- CXO priorities
- Channel impact
- Q&A
Vidyard uses cookies to better understand how videos are viewed, and to improve
your experience. Learn more
Got it