www.brighttalk.com
Open in
urlscan Pro
23.56.200.7
Public Scan
Submitted URL: http://links.brighttalk.com/ls/click?upn=F9a1AJELHycUugtazuN-2B5QbIPoHJK11l4HsukfvOw5NOzTJzFwtEvD6iM-2F90CJvZ23FFQk5PnQDjIkf...
Effective URL: https://www.brighttalk.com/webcast/18359/597854?player-preauth=w2rQ%2FKMNZNDO74D6HPOTIoB8xDgbntbFLhsdY8fenhE%3D&utm_source=...
Submission: On November 23 via api from US — Scanned from DE
Effective URL: https://www.brighttalk.com/webcast/18359/597854?player-preauth=w2rQ%2FKMNZNDO74D6HPOTIoB8xDgbntbFLhsdY8fenhE%3D&utm_source=...
Submission: On November 23 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form novalidate="" method="post" enctype="multipart/form-data"><label for="avatar-upload" data-bdd="attendees-add-button" class="AttendeesItem_AttendeesItem-Add__3ZrBH AttendeesItem_AttendeeItem-Add-Disabled__3ifVL"><svg aria-hidden="true"
focusable="false" data-prefix="fas" data-icon="camera" class="svg-inline--fa fa-camera getColorClass_text-white__2QP-B AttendeesItem_AttendeesItem-Big-Camera__3p5eY" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"
data-bdd="attendees-add-icon">
<path fill="currentColor"
d="M149.1 64.8L138.7 96H64C28.7 96 0 124.7 0 160V416c0 35.3 28.7 64 64 64H448c35.3 0 64-28.7 64-64V160c0-35.3-28.7-64-64-64H373.3L362.9 64.8C356.4 45.2 338.1 32 317.4 32H194.6c-20.7 0-39 13.2-45.5 32.8zM256 192a96 96 0 1 1 0 192 96 96 0 1 1 0-192z">
</path>
</svg><span class="globalStyle_hnb__1DGf2">Add photo</span></label><input type="file" class="AttendeesItem_AttendeesItem-Input__1Aktv" name="profile_photo_upload" data-ga-action="My BrightTALK photo uploaded"
ga-click-tracker-action="My BrightTALK upload photo" ga-click-tracker-category="Social" accept="image/*" id="avatar-upload" data-bdd="attendees-add-input" disabled=""></form>
Text Content
Watch laterViewing Certificate Related topics: Microsegmentation Identity Management Identity Security AWS Authorization Zero Trust IT Security Security Management Security Strategy Access Management NETWORK WITH LIKE-MINDED ATTENDEES More attendees Add photo Simon Mujica Manager - IT Systems management PACCAR Inc United States Bill Berry Architect - Network Systems Texas Department of Public Safety United States Ariane Evans Marketing Assistant Cogito Group Pty Ltd Australia Safae BERRAH EL KHEIR E&S Project Manager Bank of Africa Morocco Hide me from other attendees MORE FROM THIS CHANNEL AppViewX Upcoming talks (2) On-demand talks (183) Subscribers (5866) Certificate Lifecycle Management and Network Orchestration AppViewX is the low-code automation platform that assists global enterprises with PKI certificate management and network infrastructure automation. By focussing on maximizing network security while minimizing the manual effort expended by IT teams, AppViewX has helped over 100 orga…… How to Safeguard Your Software Supply Chain with Secure Code Signing… Dec 06 2023, 8:00am PST How to Overcome Common Kubernetes Security Challenges… Nov 22 2023, 9:30pm PST Zero-Trust, Not Zero People: Building a Human-Machine Identity Approach… 21 days ago13 mins Simplifying Certificate Lifecycle Management for Kubernetes Environments… 1 month ago24 mins Certificate Lifecycle Management Automation Benefits for Crypto-Agility… 1 month ago33 mins AppViewX Product Q&A with Ravi Chamarajnagar… 1 month ago25 mins 5 Ways PKI Prevents Burgeoning Medical Device Security Attacks… 1 month ago25 mins SSL/TLS Certificate Security Management & Expiration Challenges… 1 month ago42 mins Welcome note from the CEO's desk… 1 month ago28 mins Accelerating DevOps with Secure Code Signing and Key Storage in the Cloud… 2 months ago41 mins Identity-First Security, the Foundation for Zero Trust… 2 months ago26 mins Crypto-Agility Automation: Prepare Now for Google’s 90-Day TLS Validity Proposal… 3 months ago31 mins Accelerating DevOps with Secure Code Signing and Key Storage in the Cloud… 3 months ago41 mins Hidden Cloud Security Challenges Are a Barrier to Zero Trust… 5 months ago22 mins Identity-First Security, the Foundation for Zero Trust… 5 months ago26 mins Crypto-Agility Automation: Prepare Now for Google’s 90-Day TLS Validity Proposal… 6 months ago31 mins SSL/TLS Certificate Management 102 - How to Manage?… 6 months ago55 mins RECOMMENDED FOR YOU Simplify your journey to the cloud with Red Hat and Google Cloud… Jim Chang (RH), Steven Richardson …… 15 days ago27 mins Optimize your IT environment with Red Hat and AWS… Mayur Shetty (RH), David Duncan (A…… 22 days ago27 mins Critical apps on older vSphere? Now What?… VMware & Intel… 6 months ago35 mins How enterprise Linux can support hybrid cloud environments feat. IDC… Penny Madsen (IDC), Chris Wells (RH)… 27 days ago50 mins Scale and standardize your infrastructure in Azure with Red Ha…… James Read (RH), Campbell Vertesi …… 8 days ago65 mins The Evolution of SOX: Building a Mature Program… Experts from The Trade Desk, CNM, …… 1 month ago60 mins Making Space for Data Center: Be ready for what is next… Lynn Comp, AMD VP of sever techn…… 2 months ago24 mins Hidden Costs of Public Cloud: In-Depth Analysis of Public vs. Priv…… Mirantis… 3 months ago52 mins You're Building a Cloud. Do You Need To Buy New Hardware?… Mirantis… 28 days ago50 mins Building Trust in an Untrusted World: The Zero Trust Paradigm… John Kindervag, Jason James, and …… 2 months ago40 mins What Private Content Delivery is and Why it Matters… Adrian Herrera, Chief Marketing Offi…… 9 hours ago40 mins Making Space for Data Center: Charting the course to power-effici…… Jason Collier, PMTS Systems Design…… 2 months ago29 mins How Classy Llama Slashed IT Support Tickets by 50% with AI-dri…… Rob Tull, CIO, Classy Llama and Mic…… 14 days ago49 mins How to achieve full situational awareness of multiple Kubernetes …… Edward Ionel… 3 months ago30 mins The Evolution of the Enterprise Data Catalog: O'Reilly Author in Convers…… Ole Olesen-Bagneux, Author of The …… Nov 30 20238:00am Navigating the AI Act: Preparing for the Challenges of the Latest EU Re…… Fátima Correia da Silva, Chief Comp…… Jan 10 202410:00am How Does Privacy Compliance = Innovation + Growth?… Rob Aragao, Greg Clark and Eric Po…… 10 months ago50 mins How to Secure Your Software Supply Chain on Windows Server… Kevin Ng, Senior Solution Architect… 1 month ago38 mins Siemens: The challenge of labeling & UDI for medical devices… Loftware and Siemens Healthineers… 30 days ago54 mins 4 Key Steps to Eliminate Vault Sprawl Across AWS Applications… Robert Sawyer, Sr. Director, DevSecO…… 1 month ago31 mins Zero Trust Series: 5 Customer Experiences with Data Access Gov…… David Condrey, Doug Ouzts, and Bu…… 9 months ago57 mins The Biggest Network Security Threats of 2023 & How to Combat …… Mary Shacklett at Transworld Data, …… 13 days ago61 mins OT Malware Showdown: Breaking Down the Kill Chain with OT Aware …… Rich Springer, Jonas Walker, Sigalit …… 13 days ago55 mins How Firewalls Fit with Modern Enterprise Security… Jonathan Care, Cybersecurity Exper…… 5 months ago59 mins Navigating the Evolving Landscape of ESG Reporting: Insights and Bes…… Michelle Dewarrat, Head of Risk, CS…… Jan 17 202410:00am Advanced Threat Protection for Operational Technology… Rod Locke, Director Product Manag…… 3 months ago17 mins Navigating Geopolitical Uncertainty… Liz Sandwith, Chief Professional Pra…… 14 days ago61 mins Internal Audit’s Role in Unlocking Culture as a Corporate Catalyst… Cynthia Cooper, CEO, CooperGroup …… Dec 27 202310:00am Elevating the Impact of Internal Audit: A Glimpse Into the Future… Anthony Pugliese President & CEO T…… 7 hours ago87 mins Preparing for the Next Wave of Privacy Regulations… Eric Popiel, Kirsten Fury, CyberRes a…… 1 year ago62 mins Deep Dive into SOC 2: Gaining a Competitive Edge with Advanced S…… Raymond Vankrimpen, Partner at Ri…… 22 days ago39 mins Data Security Platforms - Present and Future… Heidi Shey, Principal Analyst, Forres…… 20 days ago56 mins Why Privacy Compliance Delivers a Competitive Edge… Rob Aragao, CyberRes, Greg Anders…… 1 year ago43 mins Data Privacy Compliance: A Look at Current Progress and Future Road…… Michael Sampson, Senior Research …… 2 months ago57 mins Prevent Online Consumer Fraud Using Risk Signals and Biometrics… Maya Ogranovitch Scott, Solutions …… 9 months ago42 mins Unwrap Better Shopping Experiences… Jordan Griffith, Sr. Product Marketin…… 29 days ago32 mins Facing Your Fears: A Live Demo on How Attackers Can Use Generative…… Kevin Poulsen, Former Black Hat Ha…… Dec 05 20239:00am How can organizations address their privacy compliance obligations?… Michael Sampson, Senior Analyst at…… 1 year ago49 mins Harnessing The Power of AI: Pioneering The Future of SaaS Se…… Oz Wasserman, Head of Product at …… 6 months ago18 mins Join the Memory Tiering Revolution with VMware and Intel… Simon Todd, Arvind Jagannath & Su…… 11 months ago31 mins 4 big product risks you can mitigate with UX research… Arielle Coambes, FullStory… 1 month ago25 mins Fail like a scientist: Why failing is necessary to improving your CX… Jason Attard at Game Lounge Grou…… 21 days ago28 mins Navigating The Paths of Risk: The State of Exposure Management in …… Wade Baker, PhD - Cyentia Institute …… 8 days ago54 mins Top Attack Paths in AWS and How to Efficiently Remediate Exposure… Ashok Mahajan Senior Solutions Ar…… 14 days ago47 mins Ways to Address Insider and 3rd Party Data Risk Across Your SaaS …… Sam Curry, CISO at Zscaler: Gal Nak…… 2 months ago44 mins Identity Management Lays the Foundation for Zero Trust… Bryan Rosensteel, Ping Identity; Dr. …… 27 days ago64 mins Focus on User Experience to Grow Customer Loyalty and Transform Y…… Maya Ogranovitch Scott, Solutions …… Dec 12 20239:00am Journey to Zero Trust with Ping Identity… Max Fathauer, Product Marketing …… 3 months ago41 mins Voice of the SOC Report– Key findings… Eoin Hinchy, Co-Founder and CEO of…… 26 days ago37 mins Five Stages of Enterprise Labeling Success...How Do You Stack Up?… Loftware… 1 month ago43 mins Marketing solutions * Overview * Webinars * Lead generation * Virtual events * Request a demo Company * About * Blog * Careers * Contact Support * Channel owners * Developers * Presenters * Viewers © 2023 BrightTALK, a subsidiary of TechTarget, Inc. LegalPrivacy PolicyDo Not Sell or Share My Personal InformationCookie Preferences