www.brighttalk.com Open in urlscan Pro
23.213.84.37  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbswE9gnVKMJmT8RPljQ-2F4JQBP1sGS-2...
Effective URL: https://www.brighttalk.com/webcast/17830/604962?player-preauth=IY30Kn2120kBnhXrdaNo22HJyb8mAEtWOu%2F%2FB3olsNY%3D&utm_sourc...
Submission: On August 07 via api from OM — Scanned from CA

Form analysis 1 forms found in the DOM

POST

<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
      focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
      data-bdd="attendees-add-icon">
      <path fill="currentColor"
        d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
      </path>
    </svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
    ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>

Text Content

2024 RECAP: IT SECURITY TRENDS AND INSIGHTS


Share

Post

Share

Link
Copied!





NETWORK WITH LIKE-MINDED ATTENDEES


More attendees
Add photo
Ahmed Al Shehri
Director - IT Systems management
Bank Muscat
Saudi Arabia
Kenzo Ho
Cybersecurity Professional
Security Governance
Hong Kong
Zakhona Dubazane
Security Analyst
In2IT Technologies
South Africa
John Macasio
Project Lead
JMLOGIC Consultancy
Malta
Hide me from other attendees

PRESENTED BY

Diana Kelley, Protect AI and Guests


ABOUT THIS TALK

In the last episode of the year, Diana Kelley and guests will discuss the trends
we've seen over the last 12 months, the news stories that dominated our screens
- and security strategies - and what learnings we should take from 2024, to
apply to the year ahead.

Related topics:
IT Security
AI
Generative AI
Enterprise Applications
IT Architecture
Infrastructure
Risk Management
Secure Cloud
Security
Business Architecture


MORE FROM THIS CHANNEL


The (Security) Balancing Act
Upcoming talks (5)
On-demand talks (48)
Subscribers (26167)
As we realize the transformative power of the cloud, AI and machine learning,
has our
culture of responsibility and ethics kept pace? How do we harness our new
technological
capabilities to the understanding of how to use them well?…
Infrastructure as Code (IaC): What it is
and How it Impacts Risk…

Nov 13 2024, 8:00pm

Bug Bounty Programs: What Are They
and Do You Need One?…

Oct 23 2024, 7:00pm

Risk Registers: The Most important
Thing You're Not Doing…

Sep 18 2024, 7:00pm

Attack Containment: Limiting the
Blast Radius in the Cloud…

Aug 21 2024, 7:00pm

Zero Trust Maturity or Bust: Update
on ZTA Adoption Patterns…
1 month ago59 mins
MLSecOps Explained: Building
Security Into ML & AI…
2 months ago59 mins
Green and Sustainable Considerations
for IT in the age of AI…
3 months ago39 mins
How To Create a Security Aware
Culture…
4 months ago59 mins
CISO-lution: The Role of the CISO in
2024…
5 months ago59 mins
Understanding Enterprise Security in
2024…
6 months ago1 hr
Secure Your Business in 2024: Top
Trends, Tips and Tricks…
7 months ago1 hr 1 min
Understanding Hacktivism in 2023…
8 months ago55 mins
A Guide To Cross Cloud Risk
Management…
9 months ago59 mins
Security Considerations for Low
Code/No Code…
10 months ago59 mins
Grow Your Cyber Career: Where Do
You Go if You Don't Want To Be a
CISO?…
11 months ago59 mins
Blasting Cyber Myths: Part Two…
1 year ago1 hr
Cyber Myth Busting: Blasting
Common Misconceptions…
1 year ago1 hr

You're registered!
We look forward to seeing you online on:

Dec 11 2024, 8:00pm


Add to calendar

Outlook

Google

iCal

Share with your team

Click to copy event link

Link copied to clipboard


Open in your default mail app


DISCOVER MORE ON BRIGHTTALK:

Gen AI and Cloud: A Symbiotic
Relationship?…
David Terrar - Cloud Industry Forum,……
5 months ago57 mins
How to Use AI to Drive Value in
Insurance: Lessons From Zurich In……
Jonathan Davis, Head of Data Scien……
Aug 20 20241:00pm
The Global Impact of AI: Differences
in Adoption & Application Across C……
Ramesh Dontha, Digital Transformat……
Sep 24 20247:00pm
Achieve Unprecedented Trading
Efficiency with FIX Connector…
Enoch Chandayengerwa…
1 month ago8 mins
Optimize Decision-Making
Outcomes in Financial Services wit……
Youssouf Traore, Deep Tech Investo……
Aug 21 202411:00am
Modernizing Your vSAN
Infrastructure for Next-Gen Worklo……
David Iparraguirre (VMware), Simon ……
9 months ago32 mins
Transforming Finance in the Cloud
Era: What are the Stresses and Reli……
Steve Yates FBCI, CBCP, FICPEM, M……
Aug 20 20246:00pm
Harnessing AI in the Cloud Era:
Transforming Finance with Gen AI…
Eugina Jordan, Chief Marketing Offic……
Aug 21 20248:00pm
The Big Ruse…
Renée Burton, Maël Le Touz, Jacque……
Aug 14 20248:00pm
The Strategic 8: How to Navigate the
Current State of Cloud Security…
Jo Peterson, Clarify360…
Sep 18 20247:00pm
Complete Cloud Sustainability: What
You Need to Know…
David Terrar - Cloud Industry Forum,……
2 months ago62 mins
Shifting Security Left with Prisma
Cloud…
Stephen Giguere, Palo Alto Network……
1 year ago39 mins
Elevate your AWS Threat
Intelligence with Prisma Cloud and……
Kanthi Sarella, Palo Alto Networks | ……
1 year ago28 mins
Extend Network Security with
CN-Series Container Firewall on A……
John Grady, ESG | Chintan Udeshi, P……
2 years ago42 mins
Decentralising WAAPaaS with
Customer Edge - Ep 6…
Philippe Cloup, Senior Solutions Arc……
Sep 12 202412:00pm
Blocking Automated Threats and
Smart Bots - Ep 5…
Patrick Zoller, Security Solutions Arc……
Sep 05 202412:00pm
Getting to Know the F5 Distributed
Cloud Platform - Ep 1…
Raffaele D'Albenzio Manager Solutio……
Aug 08 202412:00pm
Applying the Easy Button for API
Security - Ep 3…
Matthieu Dierick, Solutions Architect……
Aug 22 202412:00pm
Creating the New WAF Boundary -
Ep 2…
Mohamed Shaath, Solutions Archite……
Aug 15 202412:00pm
Protecting Applications against
DDoS Attacks - Ep 4…
Patrick Zoller, Security Solutions Arc……
Aug 29 202412:00pm
Cyber Risk Series: To Be, or Not To
Be? Patch is the Question…
Qualys…
6 days ago202 mins
Effectively Managing Security
Posture in the Cloud…
Jason Williams, Palo Alto Networks |……
1 year ago41 mins
Defending the Ballot Box: What It
Takes to Digitally Protect an Election…
Dan Lohrmann, Presidio; Earl Duby, ……
Sep 10 20246:00pm
Vulnerability Scoring 101…
Lauren Fearon, Vulnerability Analyst,……
1 month ago27 mins
How to Prioritize the Software You
Diligence in Software Due Diligence…
Anthony Decicco, GTC Law Group & ……
6 days ago59 mins
Best Practices for Using AI in
Software Development…
Anthony Decicco, GTC Law Group a……
27 days ago65 mins
Managing Software Risks in the Age
of AI-Generated Code…
John Lynn & Laila Paszti, Kirkland & ……
Aug 14 20247:00pm
Embracing the Future of
Cybersecurity with NIST CSF 2.0…
John Waller, Cybersecurity Practice ……
1 month ago18 mins
Generative AI, Training Data, Open
Source, and GitHub Copilot, Oh My!…
Lena and Andrew Hall, Hall Law & M……
1 month ago60 mins
Keeping Pace: Managing the risks of
AI-generated code…
Patrick Carey, Executive Director - G……
19 days ago33 mins
It’s Time for AppSec to Evolve…
Patrick Carey, Product Marketing | K……
2 months ago32 mins
How to Score an A+ on C++ in Open
Source Security…
John O'Zemko, Synopsys…
2 months ago28 mins
The Evolution of Pen Testing…
Thomas Richards, Principal Consult……
26 days ago28 mins
Deep Dive: Software Supply Chain
Threats…
Danil Panache, ReversingLabs AND ……
26 days ago59 mins
AppSec Optimized! A Guide to
AppSec Tool Consolidation…
John Delmare Global AppSec Lead ……
2 months ago44 mins
Black Duck: Unveiling the power of
SCA scan and CI/CD pipeline…
Steven Susanto, Applications Engine……
2 months ago60 mins
DevSecOps in the Wild: Examining
Global Security Factors in 2023…
Steven Zimmerman, Synopsys…
2 months ago59 mins
Cloud-native and Generative AI
Implications in DevSecOps…
Kimm Yeo, Senior Manager, Platfor……
Aug 08 202412:00pm
Shift Left to Shift Everywhere:
Continuous Development's Impact ……
Chris Edmundson, SANS Associate I……
Aug 29 202412:00pm
PCI-DSS 4.0 Explained:
Enhancements, Challenges, and A……
John Waller, Cybersecurity Practice ……
28 days ago20 mins
Secure Your Frontline: Start
Continuous DAST in Production…
Vishrut Iyengar, Chris Burleson, Pete……
1 month ago36 mins
VMware Private AI with Intel:
Unlocking AI Everywhere…
Intel: Abhay Chitral; Broadcom: Shob……
6 months ago50 mins
Unleash AI Innovation Across the
Enterprise with Teradata and AWS…
Dr. Bogdan Vrusius, AWS / Dr. Chris ……
15 days ago44 mins
What's on the Horizon for SASE in
2024…
Nirav Shah, VP Products and Solutio……
1 month ago53 mins
Outsmart & Outpace Attackers:
Strategies for Effective Security Op……
Max Zeumer, Director of Product, Se……
Sep 17 202412:00pm
OT Security: It Takes A Platform…
Richard Springer, Director Marketing,……
Sep 19 202412:00pm
The Unseen Dangers of Evasive
Malware and How to Prevent This ……
Brook Chelmo, Director of Product ……
Sep 24 202412:00pm
Can You Secure OT Without SASE?…
Daniele Mancini, EMEA Field CISO, F……
1 month ago53 mins
What the O-PAS Standard means for
Oil & Gas…
Aasef Iqbal, Sr. Director, Product Ma……
7 days ago55 mins
Back to the Future: The Next-Gen
Firewall Re-visited…
Patrick Grillo, Senior Director, Solutio……
21 days ago46 mins