www.brighttalk.com
Open in
urlscan Pro
23.213.84.37
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbswE9gnVKMJmT8RPljQ-2F4JQBP1sGS-2...
Effective URL: https://www.brighttalk.com/webcast/17830/604962?player-preauth=IY30Kn2120kBnhXrdaNo22HJyb8mAEtWOu%2F%2FB3olsNY%3D&utm_sourc...
Submission: On August 07 via api from OM — Scanned from CA
Effective URL: https://www.brighttalk.com/webcast/17830/604962?player-preauth=IY30Kn2120kBnhXrdaNo22HJyb8mAEtWOu%2F%2FB3olsNY%3D&utm_sourc...
Submission: On August 07 via api from OM — Scanned from CA
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
2024 RECAP: IT SECURITY TRENDS AND INSIGHTS Share Post Share Link Copied! NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Ahmed Al Shehri Director - IT Systems management Bank Muscat Saudi Arabia Kenzo Ho Cybersecurity Professional Security Governance Hong Kong Zakhona Dubazane Security Analyst In2IT Technologies South Africa John Macasio Project Lead JMLOGIC Consultancy Malta Hide me from other attendees PRESENTED BY Diana Kelley, Protect AI and Guests ABOUT THIS TALK In the last episode of the year, Diana Kelley and guests will discuss the trends we've seen over the last 12 months, the news stories that dominated our screens - and security strategies - and what learnings we should take from 2024, to apply to the year ahead. Related topics: IT Security AI Generative AI Enterprise Applications IT Architecture Infrastructure Risk Management Secure Cloud Security Business Architecture MORE FROM THIS CHANNEL The (Security) Balancing Act Upcoming talks (5) On-demand talks (48) Subscribers (26167) As we realize the transformative power of the cloud, AI and machine learning, has our culture of responsibility and ethics kept pace? How do we harness our new technological capabilities to the understanding of how to use them well?… Infrastructure as Code (IaC): What it is and How it Impacts Risk… Nov 13 2024, 8:00pm Bug Bounty Programs: What Are They and Do You Need One?… Oct 23 2024, 7:00pm Risk Registers: The Most important Thing You're Not Doing… Sep 18 2024, 7:00pm Attack Containment: Limiting the Blast Radius in the Cloud… Aug 21 2024, 7:00pm Zero Trust Maturity or Bust: Update on ZTA Adoption Patterns… 1 month ago59 mins MLSecOps Explained: Building Security Into ML & AI… 2 months ago59 mins Green and Sustainable Considerations for IT in the age of AI… 3 months ago39 mins How To Create a Security Aware Culture… 4 months ago59 mins CISO-lution: The Role of the CISO in 2024… 5 months ago59 mins Understanding Enterprise Security in 2024… 6 months ago1 hr Secure Your Business in 2024: Top Trends, Tips and Tricks… 7 months ago1 hr 1 min Understanding Hacktivism in 2023… 8 months ago55 mins A Guide To Cross Cloud Risk Management… 9 months ago59 mins Security Considerations for Low Code/No Code… 10 months ago59 mins Grow Your Cyber Career: Where Do You Go if You Don't Want To Be a CISO?… 11 months ago59 mins Blasting Cyber Myths: Part Two… 1 year ago1 hr Cyber Myth Busting: Blasting Common Misconceptions… 1 year ago1 hr You're registered! We look forward to seeing you online on: Dec 11 2024, 8:00pm Add to calendar Outlook Google iCal Share with your team Click to copy event link Link copied to clipboard Open in your default mail app DISCOVER MORE ON BRIGHTTALK: Gen AI and Cloud: A Symbiotic Relationship?… David Terrar - Cloud Industry Forum,…… 5 months ago57 mins How to Use AI to Drive Value in Insurance: Lessons From Zurich In…… Jonathan Davis, Head of Data Scien…… Aug 20 20241:00pm The Global Impact of AI: Differences in Adoption & Application Across C…… Ramesh Dontha, Digital Transformat…… Sep 24 20247:00pm Achieve Unprecedented Trading Efficiency with FIX Connector… Enoch Chandayengerwa… 1 month ago8 mins Optimize Decision-Making Outcomes in Financial Services wit…… Youssouf Traore, Deep Tech Investo…… Aug 21 202411:00am Modernizing Your vSAN Infrastructure for Next-Gen Worklo…… David Iparraguirre (VMware), Simon …… 9 months ago32 mins Transforming Finance in the Cloud Era: What are the Stresses and Reli…… Steve Yates FBCI, CBCP, FICPEM, M…… Aug 20 20246:00pm Harnessing AI in the Cloud Era: Transforming Finance with Gen AI… Eugina Jordan, Chief Marketing Offic…… Aug 21 20248:00pm The Big Ruse… Renée Burton, Maël Le Touz, Jacque…… Aug 14 20248:00pm The Strategic 8: How to Navigate the Current State of Cloud Security… Jo Peterson, Clarify360… Sep 18 20247:00pm Complete Cloud Sustainability: What You Need to Know… David Terrar - Cloud Industry Forum,…… 2 months ago62 mins Shifting Security Left with Prisma Cloud… Stephen Giguere, Palo Alto Network…… 1 year ago39 mins Elevate your AWS Threat Intelligence with Prisma Cloud and…… Kanthi Sarella, Palo Alto Networks | …… 1 year ago28 mins Extend Network Security with CN-Series Container Firewall on A…… John Grady, ESG | Chintan Udeshi, P…… 2 years ago42 mins Decentralising WAAPaaS with Customer Edge - Ep 6… Philippe Cloup, Senior Solutions Arc…… Sep 12 202412:00pm Blocking Automated Threats and Smart Bots - Ep 5… Patrick Zoller, Security Solutions Arc…… Sep 05 202412:00pm Getting to Know the F5 Distributed Cloud Platform - Ep 1… Raffaele D'Albenzio Manager Solutio…… Aug 08 202412:00pm Applying the Easy Button for API Security - Ep 3… Matthieu Dierick, Solutions Architect…… Aug 22 202412:00pm Creating the New WAF Boundary - Ep 2… Mohamed Shaath, Solutions Archite…… Aug 15 202412:00pm Protecting Applications against DDoS Attacks - Ep 4… Patrick Zoller, Security Solutions Arc…… Aug 29 202412:00pm Cyber Risk Series: To Be, or Not To Be? Patch is the Question… Qualys… 6 days ago202 mins Effectively Managing Security Posture in the Cloud… Jason Williams, Palo Alto Networks |…… 1 year ago41 mins Defending the Ballot Box: What It Takes to Digitally Protect an Election… Dan Lohrmann, Presidio; Earl Duby, …… Sep 10 20246:00pm Vulnerability Scoring 101… Lauren Fearon, Vulnerability Analyst,…… 1 month ago27 mins How to Prioritize the Software You Diligence in Software Due Diligence… Anthony Decicco, GTC Law Group & …… 6 days ago59 mins Best Practices for Using AI in Software Development… Anthony Decicco, GTC Law Group a…… 27 days ago65 mins Managing Software Risks in the Age of AI-Generated Code… John Lynn & Laila Paszti, Kirkland & …… Aug 14 20247:00pm Embracing the Future of Cybersecurity with NIST CSF 2.0… John Waller, Cybersecurity Practice …… 1 month ago18 mins Generative AI, Training Data, Open Source, and GitHub Copilot, Oh My!… Lena and Andrew Hall, Hall Law & M…… 1 month ago60 mins Keeping Pace: Managing the risks of AI-generated code… Patrick Carey, Executive Director - G…… 19 days ago33 mins It’s Time for AppSec to Evolve… Patrick Carey, Product Marketing | K…… 2 months ago32 mins How to Score an A+ on C++ in Open Source Security… John O'Zemko, Synopsys… 2 months ago28 mins The Evolution of Pen Testing… Thomas Richards, Principal Consult…… 26 days ago28 mins Deep Dive: Software Supply Chain Threats… Danil Panache, ReversingLabs AND …… 26 days ago59 mins AppSec Optimized! A Guide to AppSec Tool Consolidation… John Delmare Global AppSec Lead …… 2 months ago44 mins Black Duck: Unveiling the power of SCA scan and CI/CD pipeline… Steven Susanto, Applications Engine…… 2 months ago60 mins DevSecOps in the Wild: Examining Global Security Factors in 2023… Steven Zimmerman, Synopsys… 2 months ago59 mins Cloud-native and Generative AI Implications in DevSecOps… Kimm Yeo, Senior Manager, Platfor…… Aug 08 202412:00pm Shift Left to Shift Everywhere: Continuous Development's Impact …… Chris Edmundson, SANS Associate I…… Aug 29 202412:00pm PCI-DSS 4.0 Explained: Enhancements, Challenges, and A…… John Waller, Cybersecurity Practice …… 28 days ago20 mins Secure Your Frontline: Start Continuous DAST in Production… Vishrut Iyengar, Chris Burleson, Pete…… 1 month ago36 mins VMware Private AI with Intel: Unlocking AI Everywhere… Intel: Abhay Chitral; Broadcom: Shob…… 6 months ago50 mins Unleash AI Innovation Across the Enterprise with Teradata and AWS… Dr. Bogdan Vrusius, AWS / Dr. Chris …… 15 days ago44 mins What's on the Horizon for SASE in 2024… Nirav Shah, VP Products and Solutio…… 1 month ago53 mins Outsmart & Outpace Attackers: Strategies for Effective Security Op…… Max Zeumer, Director of Product, Se…… Sep 17 202412:00pm OT Security: It Takes A Platform… Richard Springer, Director Marketing,…… Sep 19 202412:00pm The Unseen Dangers of Evasive Malware and How to Prevent This …… Brook Chelmo, Director of Product …… Sep 24 202412:00pm Can You Secure OT Without SASE?… Daniele Mancini, EMEA Field CISO, F…… 1 month ago53 mins What the O-PAS Standard means for Oil & Gas… Aasef Iqbal, Sr. Director, Product Ma…… 7 days ago55 mins Back to the Future: The Next-Gen Firewall Re-visited… Patrick Grillo, Senior Director, Solutio…… 21 days ago46 mins