www.brighttalk.com
Open in
urlscan Pro
23.36.238.122
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=F9a1AJELHycUugtazuN-2B5QbIPoHJK11l4HsukfvOw5MnLp669F6MDZPkKYueUbAaPjRLrUBsXY5UGpvAD...
Effective URL: https://www.brighttalk.com/webcast/18884/590931?player-preauth=gSPMraanmRoyw8fFLazYwTMZbbsdMQflHG58PcTaFjQ%3D&utm_source=br...
Submission: On October 18 via api from GB — Scanned from GB
Effective URL: https://www.brighttalk.com/webcast/18884/590931?player-preauth=gSPMraanmRoyw8fFLazYwTMZbbsdMQflHG58PcTaFjQ%3D&utm_source=br...
Submission: On October 18 via api from GB — Scanned from GB
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__3ZrBH AttendeesItem_AttendeeItem-Add-Disabled__3ifVL"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__2QP-B AttendeesItem_AttendeesItem-Big-Camera__3p5eY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__1DGf2">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input__1Aktv" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
Watch laterViewing Certificate Related topics: Cisco Cyber Security Cloud Security Secure Cloud Secure Access Multi-Factor Authentication Phishing Threat Detection NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Sseruuma Asilam Senior Security Officer MTN Uganda Randolph Schmidt IT Security Consultant FM Global United States Clinton Devereaux Director Solutions Engineering Airespring United States Noel Simela Solutions Consultant Ambient (Pty) Limited Botswana Hide me from other attendees MORE FROM THIS CHANNEL Duo Security - Cisco Upcoming talks (0) On-demand talks (73) Subscribers (11818) Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives y…… How Zero Trust Accelerates Incident Response… 1 month ago29 mins Evaluating Threat Detection and Response Solutions… 1 month ago54 mins Top Security Trends for 2023… 1 month ago27 mins How Passwordless is the Next Essential Step in your Zero Trust Journey… 1 month ago31 mins The State of Passwordless in the Enterprise… 2 months ago53 mins Still Using Passwords to Access Apps from Your Devices? There's a Better Way… 2 months ago49 mins Still Using Passwords to Access Apps from Your Devices? There's a Better Way… 2 months ago49 mins Evaluating Threat Detection and Response Solutions… 2 months ago54 mins Hindsight is 2020: Here's Where Risk Management is Today… 2 months ago29 mins Hindsight is 2020: Here's Where Risk Management is Today… 2 months ago29 mins What’s New with Duo Single Sign-On (SSO)… 2 months ago46 mins Making A Business Case for Duo- Strong Access Security that Delivers Seamless UX… 2 months ago45 mins Making A Business Case for Duo- Strong Access Security that Delivers Seamless UX… 2 months ago45 mins Secure Workforce Access at Unmatched Value… 3 months ago48 mins Secure Workforce Access at Unmatched Value… 3 months ago48 mins How Passwordless is the Next Essential Step in your Zero Trust Journey… 3 months ago31 mins Still Using Passwords to Access Apps from Your Devices? There's a Better Way… 5 months ago49 mins RECOMMENDED FOR YOU VMware Platform Services deploying Tanzu with Intel Hardware… Alex Romanenko, VMware; John H…… 27 days ago21 mins Cyber Resilience: Align your lines of defence… Conor Champion & Blerta Likaj - Ser…… 7 days ago42 mins SkopeAI: Upgrading Security and Performance with the Power of AI… "Krishna Narayanaswamy - CTO Bo…… 4 days ago25 mins COP 15 — the 'Paris moment for nature': Is finance on board?… UNEP FI, Finance for Biodiversity Fo…… 11 months ago57 mins Understanding the most critical variable in today’s cyber threats – …… Carl Leonard I Cybersecurity Strateg…… Nov 01 20231:00nm Secure Cloudscape: Exploring Cloud Security Solutions… Pankul Chitrav, Application Release …… Okt 26 20238:00nm Why Should Cloud Security Posture Be Your #1 Priority?… Bojan Magusic, Progam Manager a…… Okt 26 20236:00nm AI and emerging tech: The growing impact, challenges and responsibil…… Diann Daniel/TechTarget, Irving Wla…… 5 months ago43 mins Securing multi-cloud architecture… Simon Ratcliffe, CIO/CTO Advisor… Okt 24 20233:00nm Elevate Digital Experiences with Cisco Full-Stack Observability… Ronak Desai SVP/GM Cisco AppDyn…… Okt 24 20236:00nm Transforming cyber incident recovery with Veeam and Kyndryl… Christophe Bertrand, Enterprise Str…… 26 days ago36 mins Join the Memory Tiering Revolution with VMware and Intel… Simon Todd, Arvind Jagannath & Su…… 9 months ago31 mins Securing Kubernetes: Exploring Access Management Techniques… Atulpriya Sharma, Senior Developer …… Okt 25 202310:00vm Workforce Identity: Securing the Digital Workforce Today and Tomo…… Jason Keenaghan, Director of Prod…… Nov 09 20237:00nm Critical apps on older vSphere? Now What?… VMware & Intel… 5 months ago35 mins Ready for CSRD ?… Robert Garcia, Brittany Pettit - Servi…… 18 days ago46 mins Elevating and Securing Digital Experiences for Your Business… Brad Welsh, Indiana Office of Techn…… Okt 24 20237:00nm Turn risk into competitive edge with TPRM… Hasintha Gunawickrema, Industry …… 22 days ago59 mins Create a robust and effective third-party risk management progr…… Troy Dunham, Sr. Director of IT Appli…… 22 days ago53 mins B2B Interactions: A Blind Spot in Your Digital Transformation… Jason Keenaghan, Director Product…… Okt 25 20236:00nm Mastering Automated Cloud Security Incident Response: Strate…… Elango Balusamy, Co-founder & CT…… Okt 26 20231:00nm Will 2024 Bring Us a Year of AI and ML Threats?… John Bambenek, President | Bambe…… Nov 01 20236:00nm How to Use Threat Intelligence to Mitigate Third Party Risk… Christopher Crowley & Greg Kapour…… 26 days ago62 mins Take Control of Your Cyber Defense with The Defender’s Advantage Ser…… Kerry Matre, Sr. Director, Product, So…… 1 month ago52 mins Threat Forecast Vs. Operational Risk: What Keeps You Awake At Ni…… Steve Yates FBCI, CBCP, FICPEM, M…… Nov 02 20237:00nm The AI Elephant in Every Room… Steve Levinson, Vice President | OBS…… Nov 01 20238:00nm Building a Proactive Strategy to Exposure Management… Ryan Roobian, Principal Architect; A…… 14 days ago59 mins Data Center Solutions… M Scott Donovan, Enterprise Accou…… 22 days ago22 mins Debat - Préparer son SI à la menace d’une cyberattaque… Miguel De Oliveira (Président, AISI) V…… 21 days ago44 mins Gestion de crise cyber… Stéphanie Ledoux, PDG d'Alcyconie… 21 days ago31 mins Developing Strategy That Enables Zero-Day Exploitation… Vincent Amanyi, Founder | Boleaum …… Nov 03 202312:00vm Utilize Threat Intelligence, Establish Command & Control - Webinar Seri…… Danielle Restaino, Emily Cranston, P…… 1 month ago47 mins Security Automation: Getting Prepared and Calling for Help… Fortinet: Anthony Giandomenico, Sr.…… 7 months ago29 mins 2023 Cloud Security Report Insights and Recommendations… Vince Hwang. Sr. Director, Products …… Okt 24 202312:00nm SOC Operations Made Simple With AI, Automation & SaaS… Chris Borales, Product Marketing Di…… 1 month ago53 mins Zero-Trust Security for Identities and Privileged Accounts… Eric Schwake, Director of Product M…… 4 months ago40 mins AI: The Truth Behind the Hype and How SOC Teams Can Fight Back… From Fortinet: Chris Borales, David …… 7 days ago61 mins How to Easily Implement Defense-in-Depth for Cloud Storage… Drew Schlussel; Sr. Director, Technic…… Okt 24 20236:00nm Telco Market Trends and Key Cybersecurity Considerations… Fortinet's Jonathan Nguyen-Duy, Ro…… 4 months ago41 mins KEYNOTE SESSION Cybersécurité : Une menace qui ne faiblit pas...… Valery Marchive, Rédacteur en chef, …… 21 days ago31 mins KEYNOTE SESSION : Comprendre le parcours des attaquants… Valery Marchive, Rédacteur en chef, …… 20 days ago27 mins Maximizing Your Cyber Posture in the Hybrid Enterprise… Amit Shaked, CEO at Laminar Securi…… Okt 26 20234:00nm Beyond AI: Four Technologies That Will Disrupt Networking… Fortinet: Nirav Shah, VP of Products…… 20 hours ago38 mins Data Security and Governance in the Cloud Era… Joshua Stenhouse, Field CTO Cyber …… Okt 31 20235:00nm Journey to simplified SASE… Nirav Shah VP, Products & Solutions…… 5 months ago58 mins Defend Your Frontiers with Collaborative Cybersecurity Defen…… Jen Easterly, Director of the CISA; W…… Nov 02 20234:00nm Universal ZTNA: How to Use Zero Trust for All Locations… Peter Newton, Senior Director of Pro…… 4 months ago48 mins Cyber-crise : se préparer à l’inattendu, qui ne l’est plus tant qu…… Laurent Besset, Directeur Audit et F…… 20 days ago27 mins Network Firewall - Multiple Requirements, A Common Approach… Patrick Grillo Sr. Director, Solutions …… 5 months ago51 mins The Evolving Data Threat Landscape: A Fireside Chat w/ Mar…… Mark McLaughlin, Former Chairman…… Nov 02 20235:00nm Marketing solutions * Overview * Webinars * Lead generation * Virtual events * Request a demo Company * About * Blog * Careers * Contact Support * Channel owners * Developers * Presenters * Viewers © 2023 BrightTALK, a subsidiary of TechTarget, Inc. LegalPrivacy PolicyDo Not Sell or Share My Personal InformationCookie Preferences