www.brighttalk.com Open in urlscan Pro
23.213.84.37  Public Scan

Submitted URL: http://links.brighttalk.com/ls/click?upn=u001.MfOm4j6cWZ-2FQp-2FeUn5XDz9Lcs2f7rN6LJtpU9rFdMbvKkhN14l5NFVFO3nS5H95O9UBaTCnxxC...
Effective URL: https://www.brighttalk.com/webcast/288/618058?utm_campaign=communication_reminder_starting_now_registrants&utm_medium=email...
Submission: On October 09 via manual from HK — Scanned from CA

Form analysis 1 forms found in the DOM

POST

<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__fngNj AttendeesItem_AttendeeItem-Add-Disabled__Rt_lf"><svg aria-hidden="true"
      focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__FAWAD AttendeesItem_AttendeesItem-Big-Camera__F7wIA" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
      data-bdd="attendees-add-icon">
      <path fill="currentColor"
        d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
      </path>
    </svg><span class="globalStyle_hnb__WOuPu">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input___pZLk" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
    ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>

Text Content

Watch later Viewing Certificate


Related topics:
DevOps
SecOps
DevSecOps
Cloud Security
Cyber Security
Cyber Threats
Containers


NETWORK WITH LIKE-MINDED ATTENDEES


More attendees
Add photo
Wing Chuang
Associate
HKEX
Hong Kong
Ganesh Pavale
Head IT
Mahindra First Choice Wheels Ltd
India
Qasim Saeed
Director Information Security
Arbisoft
Pakistan
James Townsend
Sr. director Technical Enablement
RegScale
United States
Hide me from other attendees


MORE FROM THIS CHANNEL


Information Security
Upcoming talks (9)
On-demand talks (597)
Subscribers (203145)
This channel features presentations by leading experts in the field of
information security.
From application, computer, network and Internet security to access control
management,
data privacy and other hot topics, you will walk away with practical advice for
your strategic
and tactical information security initiatives.…
Ransomware Negotiations: Everything
You Need to Know…

Jan 15 2025, 12:00am

Building a Security-First Culture:
Leadership Strategies for Holistic
Data Protection…

Oct 18 2024, 1:00am

To Automate or Not Automate: Guide
to Cybersecurity Best Defenses…

Oct 17 2024, 11:00pm

Integrating AI, Compliance and the
Human Factor in a Comprehensive
Data Security Strategy…

Oct 17 2024, 5:00am

Quantum Computing: The
Cybersecurity Apocalypse or the Next
Great Leap?…

Oct 17 2024, 1:00am

How Secure and Private is Your Data?…

Oct 16 2024, 11:00pm

AI-Enabled Cybersecurity is Overrated:
Why Low Tech IT Security Basics Still
Matter in 2025…

Oct 10 2024, 7:00am

Tackle 3 Common AI Challenges to
Build Effective Security Programs…

Oct 10 2024, 5:00am

The Promises and Perils of Using AI
for Cybersecurity…

Oct 10 2024, 1:00am

Victories, Challenges, and Unknowns:
Threat Landscape 2025…
1 hour ago59 mins
What Do You Need to Consider for
Your Cyber Incident Response
Framework?…
3 hours ago58 mins
Zero Downtime: Ensuring Reliable
Service Availability…
1 month ago36 mins
Improve Incident Detection and
Response Governance with NIST CSF
v2.0…
2 months ago41 mins
Identifying and Building the
Foundation of a Threat Program…
2 months ago41 mins
Ensuring Threat Intelligence Remains
Intelligent…
2 months ago39 mins
Elevating API Security…
2 months ago40 mins
Threat Intelligence: The Dark Side of
Threat Detection…
2 months ago58 mins



IN THIS SUMMIT

The 2025 Threatscape
Oct 08, 20242 Tracks19 Talks
Hide agenda
-- All tracks --



UP NEXT

Unreliable AI: Addressing the
Cybersecurity Risks of LLM-B……
Vladislav Tushkanov - Researc……
Oct 09 2024 | 5:00pm
Fortifying Enterprise Defenses
Against AI-Powered Threats…
Prakash Sinha, Sr. Director & Te……
Oct 09 2024 | 9:00pm
A Step-by-Step Guide to
Securing Large Language Mo……
Ravi Ithal, Co-Founder and CTO……
Oct 09 2024 | 11:00pm
Purple AI GA: Detect Earlier,
Respond Faster, & Stay Ahead……
Ely Kahn…
Oct 10 2024 | 12:00am
The Promises and Perils of
Using AI for Cybersecurity…
John Bambenek, President | Ba……
Oct 10 2024 | 1:00am
Navigating AI in Cybersecurity:
The 2025 Threatscape…
Albert Caballero, Field CISO, Se……
Oct 10 2024 | 3:00am
2024 SonicWall Mid-Year Cyber
Threat Report…
Doug McKee, Executive Directo……
Oct 10 2024 | 4:00am
Tackle 3 Common AI
Challenges to Build Effective ……
Mayra Paredes, Enterprise Infor……
Oct 10 2024 | 5:00am
Unified Defense: The Power of
Cisco & Splunk in Data Securit……
Dave Gruber | ESG, Principal An……
Oct 10 2024 | 6:00am
AI-Enabled Cybersecurity is
Overrated: Why Low Tech IT S……
Ralph Villanueva, IT Security & ……
Oct 10 2024 | 7:00am



AVAILABLE ON-DEMAND

The Primacy of Resiliency: Why
(Most) Orgs Shouldn’t Focus o……
Rex Booth, Chief Information S……
2 hours ago30 mins
Ransomware Stopped:
Defending Against Fog and Ot……
Mark Sangster, DPO and Chief ……
44 minutes ago47 mins
The Evolution of Cyber Threats:
How Open Source Tools Are C……
Crystal Morin, Cybersecurity St……
15 minutes ago41 mins
Victories, Challenges, and
Unknowns: Threat Landscape ……
Alex Holden, CISSP, Chief Secur……
1 hour ago59 mins
What Do You Need to Consider
for Your Cyber Incident Respo……
Steve Yates FBCI, CBCP, FICPE……
3 hours ago58 mins
Fantastic Cyber Beasts and
Where to Find Them: From Cu……
Geri Révay, Principal Security R……
5 hours ago33 mins
Navigating API Security
Challenges…
Keiron Shepherd, Regional Solu……
6 hours ago37 mins
Cyber Security 2025: Emerging
Threats & Strategic Opportuni……
Katie Ralph, Director, Solutions ……
10 hours ago40 mins


RECOMMENDED FOR YOU

Effectively Managing Security
Posture in the Cloud…
Jason Williams, Palo Alto Networks |……
1 year ago41 mins
Infrastructure as Code (IaC): What it
is and How it Impacts Risk…
Diana Kelley, Protect AI and Guests…
Nov 14 20241:00am
A Deep Dive into the APAC Tech
Purchasing Team…
Robert Lopez, Norths Collective, Ch……
Oct 24 202411:00am
Mapping B2B Content to Each Stage
of the New Sales Funnel…
Kate Jacobsen, Sr. Manager, Marketi……
Oct 25 202412:00am
Challenges in AI Implementation:
Overcoming Obstacles and Resista……
Ramesh Dontha, Digital Transformat……
Nov 13 20241:00am
Build a Better Webinar: Recruiting
Speakers…
Emily Falconer, Marketing Program ……
20 days ago35 mins
Bringing Together an Integrated
MarTech Stack for APAC…
Kezia Chia, Senior Customer Succes……
Oct 25 202411:00am
Carbon Intelligent Cloud: The
Benefits of Making the Green Choice…
Jo Peterson, Clarify360…
Nov 14 20241:00am
How Rubrik Finds Success in
Leveraging BrightTALK’s Active Au……
Louise Radoor Larsen, International ……
3 months ago10 mins
Cyber Warfare: What We’ve Learned
From Past Conflict…
Dan Lohrmann, Presidio; Earl Duby, ……
Nov 13 202412:00am
Go Fast and be More Secure:
Lessons Learned from the Biggest ……
Sandy Carielli, Forrester | Chris Crop……
Oct 18 20242:30am
Extend Network Security with
CN-Series Container Firewall on A……
John Grady, ESG | Chintan Udeshi, P……
2 years ago42 mins
Shifting Security Left with Prisma
Cloud…
Stephen Giguere, Palo Alto Network……
1 year ago39 mins
Elevate your AWS Threat
Intelligence with Prisma Cloud and……
Kanthi Sarella, Palo Alto Networks | ……
1 year ago28 mins
Radware Exclusive Executive
Briefing: Inside the H1 2024 Global……
Pascal Geenens, Head of Threat Res……
Oct 10 20241:00pm
Navigating the Path to Net Zero:
Expert Insights for Investors with N……
Nigel Topping (Policy advisor and fo……
Oct 15 20249:00pm
Securing APIs Against Modern
Threats with AI…
Christopher Rodriguez, Research Dir……
6 days ago44 mins
From Chaos to Consistency:
Mastering the Art of Process Stand……
Ishan Sellahewa Digital Transformat……
22 days ago66 mins
Acheiving Process Maturity: Your
Path to Operational Excellence…
Trudi Masalski Senior Product Mark……
22 days ago41 mins
Are you fully protected from cyber
threats today?…
Rajat Gambhir, Govindu Kakinada & ……
21 days ago55 mins
Towards Zero Government
Bureaucracy: Digitizing Process Im……
Amr Fouad - Presales Manager at Ni……
22 days ago51 mins
Workflow Automation with Nintex:
K2 5.8 Release & Roadmap…
Cody Kaji - K2 Product Manager at ……
22 days ago44 mins
Why US high yield may continue to
be leaders of the pack…
Michael Graham, James Wallace…
Oct 24 202410:00pm
Connecting risk across the
enterprise- Asia…
Vasant Balasubramanian, VP & GM,……
28 days ago30 mins
The Foundation for Sustainable and
Responsible AI Innovation- Asia…
Elisha Harrington, Senior Director, E……
28 days ago19 mins
IDC Analyst: Future of trust
framework- Asia…
Christian Fam, Senior Research Ma……
28 days ago22 mins
Now on Now: Our Enterprise IRM
Journey- Asia…
Valerie Spillman, Senior Director, Int……
28 days ago28 mins
Streamlined Certificate
Management and Automation: Deli……
David Croston, Strategic Account Dir……
1 month ago62 mins
Fortifying Enterprise Defenses
Against AI-Powered Threats…
Prakash Sinha, Sr. Director & Techno……
Oct 09 20249:00pm
Episode 2 | Fireside chat with
automation industry experts…
Holly Anderson VP, Product Marketin……
12 days ago42 mins
Episode 1 | How success begets
success, the top AI technologies, a……
Maureen Fleming Program VP, IDC | ……
19 days ago30 mins
Automating Documents: Stories
from the Trenches…
Ryan Bazler, Sr. Director Product Ma……
1 month ago60 mins
Scaling marketing operations with
process orchestration…
Holly Anderson, VP Product Marketi……
1 month ago31 mins
Transforming Revenue Operations
with Automated Document Generat……
Ryan Bazler, Sr Dir Product Marketin……
1 month ago41 mins
Better automation through process
mapping…
Matt Spears, Solution Engineers @ ……
1 month ago22 mins
Stop Wasting Time and Money:
Transform Your HR Processes with……
Ryan Bazler, Sr. Product Marketing D……
1 month ago34 mins
Discover how Akamai and Ateme
lower the barrier to entry to cloud c……
Matthew Lynn, Senior Director, Clou……
1 month ago31 mins
From Good to Great: Upgrading Your
Automation Capabilities with Proce……
Mark du Toit, Solution Engineer. Luk……
1 month ago37 mins
Reducing risk with Process
Management and Automation…
Paul Blackwell, Nintex Account Exec……
1 month ago41 mins
How Customer Benefits from
TeamViewer Integration…
Maximilian Paetsch…
1 month ago37 mins
Why EDRs still can’t stop
ransomware or breaches…
Gaurav Joshi, Enterprise Security So……
2 months ago23 mins
The disruption of Cloud Computing
in the era of AI…
Jay Jenkins, CTO | Akamai…
1 month ago48 mins
Protecting APAC Commerce: A
Strategic Approach to API Security…
Reuben Koh - Director, Security Tech……
1 month ago59 mins
Why zero trust matters in cyber
security and remote access…
Robert Haist, Chief Information Sec……
1 month ago26 mins
Accelerating Zero Trust with AI,
simplicity and speed…
Dean Houari, Director, Security Tech……
1 month ago58 mins
How Did Gamers Become
Cybercriminals: Unmasking DDOS ……
Eva Abergel, DDoS Senior Solution E……
2 months ago39 mins
Ep. 5 - Rise of AI Assisted API
Attacks…
Menachem Perlman, Director-Soluti……
2 months ago25 mins
Ep. 4 - A Year in the Life of an API:
Chronicles of Security Evolution…
Eli Arkush, Solutions Engineering, AP……
2 months ago25 mins
Ep. 3 - The Importance of Data
Tokenization Over Traditional Encr……
Sean Boulter, Senior Solutions Engin……
2 months ago24 mins
Ep. 2 -What Drives API Security
Compliance…
Sean Boutler, Senior Solutions Engin……
2 months ago20 mins