www.brighttalk.com
Open in
urlscan Pro
23.213.84.37
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbvKkhN14l5NFVFO3nS5H95O9UBaTCnxxC...
Effective URL: https://www.brighttalk.com/webcast/288/618058?utm_campaign=communication_reminder_starting_now_registrants&utm_medium=email...
Submission: On October 09 via manual from HK — Scanned from CA
Effective URL: https://www.brighttalk.com/webcast/288/618058?utm_campaign=communication_reminder_starting_now_registrants&utm_medium=email...
Submission: On October 09 via manual from HK — Scanned from CA
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
Watch later Viewing Certificate Related topics: DevOps SecOps DevSecOps Cloud Security Cyber Security Cyber Threats Containers NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Wing Chuang Associate HKEX Hong Kong Ganesh Pavale Head IT Mahindra First Choice Wheels Ltd India Qasim Saeed Director Information Security Arbisoft Pakistan James Townsend Sr. director Technical Enablement RegScale United States Hide me from other attendees MORE FROM THIS CHANNEL Information Security Upcoming talks (9) On-demand talks (597) Subscribers (203145) This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.… Ransomware Negotiations: Everything You Need to Know… Jan 15 2025, 12:00am Building a Security-First Culture: Leadership Strategies for Holistic Data Protection… Oct 18 2024, 1:00am To Automate or Not Automate: Guide to Cybersecurity Best Defenses… Oct 17 2024, 11:00pm Integrating AI, Compliance and the Human Factor in a Comprehensive Data Security Strategy… Oct 17 2024, 5:00am Quantum Computing: The Cybersecurity Apocalypse or the Next Great Leap?… Oct 17 2024, 1:00am How Secure and Private is Your Data?… Oct 16 2024, 11:00pm AI-Enabled Cybersecurity is Overrated: Why Low Tech IT Security Basics Still Matter in 2025… Oct 10 2024, 7:00am Tackle 3 Common AI Challenges to Build Effective Security Programs… Oct 10 2024, 5:00am The Promises and Perils of Using AI for Cybersecurity… Oct 10 2024, 1:00am Victories, Challenges, and Unknowns: Threat Landscape 2025… 1 hour ago59 mins What Do You Need to Consider for Your Cyber Incident Response Framework?… 3 hours ago58 mins Zero Downtime: Ensuring Reliable Service Availability… 1 month ago36 mins Improve Incident Detection and Response Governance with NIST CSF v2.0… 2 months ago41 mins Identifying and Building the Foundation of a Threat Program… 2 months ago41 mins Ensuring Threat Intelligence Remains Intelligent… 2 months ago39 mins Elevating API Security… 2 months ago40 mins Threat Intelligence: The Dark Side of Threat Detection… 2 months ago58 mins IN THIS SUMMIT The 2025 Threatscape Oct 08, 20242 Tracks19 Talks Hide agenda -- All tracks -- UP NEXT Unreliable AI: Addressing the Cybersecurity Risks of LLM-B…… Vladislav Tushkanov - Researc…… Oct 09 2024 | 5:00pm Fortifying Enterprise Defenses Against AI-Powered Threats… Prakash Sinha, Sr. Director & Te…… Oct 09 2024 | 9:00pm A Step-by-Step Guide to Securing Large Language Mo…… Ravi Ithal, Co-Founder and CTO…… Oct 09 2024 | 11:00pm Purple AI GA: Detect Earlier, Respond Faster, & Stay Ahead…… Ely Kahn… Oct 10 2024 | 12:00am The Promises and Perils of Using AI for Cybersecurity… John Bambenek, President | Ba…… Oct 10 2024 | 1:00am Navigating AI in Cybersecurity: The 2025 Threatscape… Albert Caballero, Field CISO, Se…… Oct 10 2024 | 3:00am 2024 SonicWall Mid-Year Cyber Threat Report… Doug McKee, Executive Directo…… Oct 10 2024 | 4:00am Tackle 3 Common AI Challenges to Build Effective …… Mayra Paredes, Enterprise Infor…… Oct 10 2024 | 5:00am Unified Defense: The Power of Cisco & Splunk in Data Securit…… Dave Gruber | ESG, Principal An…… Oct 10 2024 | 6:00am AI-Enabled Cybersecurity is Overrated: Why Low Tech IT S…… Ralph Villanueva, IT Security & …… Oct 10 2024 | 7:00am AVAILABLE ON-DEMAND The Primacy of Resiliency: Why (Most) Orgs Shouldn’t Focus o…… Rex Booth, Chief Information S…… 2 hours ago30 mins Ransomware Stopped: Defending Against Fog and Ot…… Mark Sangster, DPO and Chief …… 44 minutes ago47 mins The Evolution of Cyber Threats: How Open Source Tools Are C…… Crystal Morin, Cybersecurity St…… 15 minutes ago41 mins Victories, Challenges, and Unknowns: Threat Landscape …… Alex Holden, CISSP, Chief Secur…… 1 hour ago59 mins What Do You Need to Consider for Your Cyber Incident Respo…… Steve Yates FBCI, CBCP, FICPE…… 3 hours ago58 mins Fantastic Cyber Beasts and Where to Find Them: From Cu…… Geri Révay, Principal Security R…… 5 hours ago33 mins Navigating API Security Challenges… Keiron Shepherd, Regional Solu…… 6 hours ago37 mins Cyber Security 2025: Emerging Threats & Strategic Opportuni…… Katie Ralph, Director, Solutions …… 10 hours ago40 mins RECOMMENDED FOR YOU Effectively Managing Security Posture in the Cloud… Jason Williams, Palo Alto Networks |…… 1 year ago41 mins Infrastructure as Code (IaC): What it is and How it Impacts Risk… Diana Kelley, Protect AI and Guests… Nov 14 20241:00am A Deep Dive into the APAC Tech Purchasing Team… Robert Lopez, Norths Collective, Ch…… Oct 24 202411:00am Mapping B2B Content to Each Stage of the New Sales Funnel… Kate Jacobsen, Sr. Manager, Marketi…… Oct 25 202412:00am Challenges in AI Implementation: Overcoming Obstacles and Resista…… Ramesh Dontha, Digital Transformat…… Nov 13 20241:00am Build a Better Webinar: Recruiting Speakers… Emily Falconer, Marketing Program …… 20 days ago35 mins Bringing Together an Integrated MarTech Stack for APAC… Kezia Chia, Senior Customer Succes…… Oct 25 202411:00am Carbon Intelligent Cloud: The Benefits of Making the Green Choice… Jo Peterson, Clarify360… Nov 14 20241:00am How Rubrik Finds Success in Leveraging BrightTALK’s Active Au…… Louise Radoor Larsen, International …… 3 months ago10 mins Cyber Warfare: What We’ve Learned From Past Conflict… Dan Lohrmann, Presidio; Earl Duby, …… Nov 13 202412:00am Go Fast and be More Secure: Lessons Learned from the Biggest …… Sandy Carielli, Forrester | Chris Crop…… Oct 18 20242:30am Extend Network Security with CN-Series Container Firewall on A…… John Grady, ESG | Chintan Udeshi, P…… 2 years ago42 mins Shifting Security Left with Prisma Cloud… Stephen Giguere, Palo Alto Network…… 1 year ago39 mins Elevate your AWS Threat Intelligence with Prisma Cloud and…… Kanthi Sarella, Palo Alto Networks | …… 1 year ago28 mins Radware Exclusive Executive Briefing: Inside the H1 2024 Global…… Pascal Geenens, Head of Threat Res…… Oct 10 20241:00pm Navigating the Path to Net Zero: Expert Insights for Investors with N…… Nigel Topping (Policy advisor and fo…… Oct 15 20249:00pm Securing APIs Against Modern Threats with AI… Christopher Rodriguez, Research Dir…… 6 days ago44 mins From Chaos to Consistency: Mastering the Art of Process Stand…… Ishan Sellahewa Digital Transformat…… 22 days ago66 mins Acheiving Process Maturity: Your Path to Operational Excellence… Trudi Masalski Senior Product Mark…… 22 days ago41 mins Are you fully protected from cyber threats today?… Rajat Gambhir, Govindu Kakinada & …… 21 days ago55 mins Towards Zero Government Bureaucracy: Digitizing Process Im…… Amr Fouad - Presales Manager at Ni…… 22 days ago51 mins Workflow Automation with Nintex: K2 5.8 Release & Roadmap… Cody Kaji - K2 Product Manager at …… 22 days ago44 mins Why US high yield may continue to be leaders of the pack… Michael Graham, James Wallace… Oct 24 202410:00pm Connecting risk across the enterprise- Asia… Vasant Balasubramanian, VP & GM,…… 28 days ago30 mins The Foundation for Sustainable and Responsible AI Innovation- Asia… Elisha Harrington, Senior Director, E…… 28 days ago19 mins IDC Analyst: Future of trust framework- Asia… Christian Fam, Senior Research Ma…… 28 days ago22 mins Now on Now: Our Enterprise IRM Journey- Asia… Valerie Spillman, Senior Director, Int…… 28 days ago28 mins Streamlined Certificate Management and Automation: Deli…… David Croston, Strategic Account Dir…… 1 month ago62 mins Fortifying Enterprise Defenses Against AI-Powered Threats… Prakash Sinha, Sr. Director & Techno…… Oct 09 20249:00pm Episode 2 | Fireside chat with automation industry experts… Holly Anderson VP, Product Marketin…… 12 days ago42 mins Episode 1 | How success begets success, the top AI technologies, a…… Maureen Fleming Program VP, IDC | …… 19 days ago30 mins Automating Documents: Stories from the Trenches… Ryan Bazler, Sr. Director Product Ma…… 1 month ago60 mins Scaling marketing operations with process orchestration… Holly Anderson, VP Product Marketi…… 1 month ago31 mins Transforming Revenue Operations with Automated Document Generat…… Ryan Bazler, Sr Dir Product Marketin…… 1 month ago41 mins Better automation through process mapping… Matt Spears, Solution Engineers @ …… 1 month ago22 mins Stop Wasting Time and Money: Transform Your HR Processes with…… Ryan Bazler, Sr. Product Marketing D…… 1 month ago34 mins Discover how Akamai and Ateme lower the barrier to entry to cloud c…… Matthew Lynn, Senior Director, Clou…… 1 month ago31 mins From Good to Great: Upgrading Your Automation Capabilities with Proce…… Mark du Toit, Solution Engineer. Luk…… 1 month ago37 mins Reducing risk with Process Management and Automation… Paul Blackwell, Nintex Account Exec…… 1 month ago41 mins How Customer Benefits from TeamViewer Integration… Maximilian Paetsch… 1 month ago37 mins Why EDRs still can’t stop ransomware or breaches… Gaurav Joshi, Enterprise Security So…… 2 months ago23 mins The disruption of Cloud Computing in the era of AI… Jay Jenkins, CTO | Akamai… 1 month ago48 mins Protecting APAC Commerce: A Strategic Approach to API Security… Reuben Koh - Director, Security Tech…… 1 month ago59 mins Why zero trust matters in cyber security and remote access… Robert Haist, Chief Information Sec…… 1 month ago26 mins Accelerating Zero Trust with AI, simplicity and speed… Dean Houari, Director, Security Tech…… 1 month ago58 mins How Did Gamers Become Cybercriminals: Unmasking DDOS …… Eva Abergel, DDoS Senior Solution E…… 2 months ago39 mins Ep. 5 - Rise of AI Assisted API Attacks… Menachem Perlman, Director-Soluti…… 2 months ago25 mins Ep. 4 - A Year in the Life of an API: Chronicles of Security Evolution… Eli Arkush, Solutions Engineering, AP…… 2 months ago25 mins Ep. 3 - The Importance of Data Tokenization Over Traditional Encr…… Sean Boulter, Senior Solutions Engin…… 2 months ago24 mins Ep. 2 -What Drives API Security Compliance… Sean Boutler, Senior Solutions Engin…… 2 months ago20 mins