All Videos Tagged webinar (CISO Platform) - CISO Platform 2021-01-25T06:36:04Z https://www.cisoplatform.com/video/video/listTagged?tag=webinar&rss=yes&xn_auth=no (Best Of The World) The Dark Future of Privacy By Menny Barzilay (Ex CISO, Israeli Defense) tag:www.cisoplatform.com,2019-07-25:6514552:Video:158370 2019-07-25T07:35:32.430Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/best-of-the-world-the-dark-future-of-privacy-by-menny-barzilay"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/3382298810?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can ... <a href="https://www.cisoplatform.com/video/best-of-the-world-the-dark-future-of-privacy-by-menny-barzilay"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/3382298810?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can ... (Webinar) 5 Shocking Results From The Hidden Internet 12 Months Of Monitoring tag:www.cisoplatform.com,2019-06-21:6514552:Video:158118 2019-06-21T11:48:44.877Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-o-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn ?<br /> -Major causes of recent breaches<br /> -Results from indexing the deep, dark &amp; surface web (Exposed databa... <a href="https://www.cisoplatform.com/video/webinar-5-shocking-results-from-the-hidden-internet-12-months-o-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2922613719?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn ?<br /> -Major causes of recent breaches<br /> -Results from indexing the deep, dark &amp; surface web (Exposed databa... Hacking Exposed: LIVE-Why Current Security Solutions Fail tag:www.cisoplatform.com,2019-06-12:6514552:Video:157699 2019-06-12T07:33:14.230Z CISO Platform https://www.cisoplatform.com/profile/06chlks3jaa2a <a href="https://www.cisoplatform.com/video/hacking-exposed-live-why-current-security-solutions-fail-1"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/2863222450?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>Stuart McClure, Ex McAfee CTO &amp; lead author of HACKING EXPOSED, along with Bikash Barai, CEO of iVIZ, and Gary Golumb, Sr. Researcher at Cylance. This episode is a joint effort between Hacking Exposed and CISO Platform.<br></br> <br></br> What you will Learn:<br></br> <br></br> How security products can be exploited<br></br> Vulnerability trends in security… <a href="https://www.cisoplatform.com/video/hacking-exposed-live-why-current-security-solutions-fail-1"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/2863222450?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Stuart McClure, Ex McAfee CTO &amp; lead author of HACKING EXPOSED, along with Bikash Barai, CEO of iVIZ, and Gary Golumb, Sr. Researcher at Cylance. This episode is a joint effort between Hacking Exposed and CISO Platform.<br /> <br /> What you will Learn:<br /> <br /> How security products can be exploited<br /> Vulnerability trends in security products over last decade<br /> Vulnerability statistics of Major Security Vendors /Products<br /> Classes of Vulnerabilities in Security Products and comparative analysis Webinar Building an App centric security program tag:www.cisoplatform.com,2018-02-06:6514552:Video:58638 2018-02-06T09:09:20.427Z pritha https://www.cisoplatform.com/profile/pritha <a href="https://www.cisoplatform.com/video/webinar-building-an-app-centric-security-program"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397065?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Key Learnings<br /> -API Programming Interface<br /> -Four Pillars of API Security<br /> -F5 API Protection <a href="https://www.cisoplatform.com/video/webinar-building-an-app-centric-security-program"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397065?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />Key Learnings<br /> -API Programming Interface<br /> -Four Pillars of API Security<br /> -F5 API Protection Using 8020 rule in Application Security Management tag:www.cisoplatform.com,2017-02-28:6514552:Video:51587 2017-02-28T07:23:54.651Z Gireesh Kumar https://www.cisoplatform.com/profile/GireeshKumar <a href="https://www.cisoplatform.com/video/using-8020-rule-in-application-security-management"><br /> <img alt="Thumbnail" height="180" src="https://storage.ning.com/topology/rest/1.0/file/get/840397069?profile=original&amp;width=240&amp;height=180" width="240"></img><br /> </a> <br></br>What will you learn?<br></br> -How to create a prioritization plan for your application security strategy?<br></br> -Which are the top 20% actions that will result in 80% of the results?<br></br> -How to minimize your effort and budget?<br></br> -What are the top mistakes one make in building an App Sec program?<br></br> -How to build your Application Security Program for… <a href="https://www.cisoplatform.com/video/using-8020-rule-in-application-security-management"><br /> <img src="https://storage.ning.com/topology/rest/1.0/file/get/840397069?profile=original&amp;width=240&amp;height=180" width="240" height="180" alt="Thumbnail" /><br /> </a><br />What will you learn?<br /> -How to create a prioritization plan for your application security strategy?<br /> -Which are the top 20% actions that will result in 80% of the results?<br /> -How to minimize your effort and budget?<br /> -What are the top mistakes one make in building an App Sec program?<br /> -How to build your Application Security Program for 2013.