Demos
Tech demo: Defending against network threats
May 05 by Olivia PowellDuo Security’s Jaki Hassan demonstrates how Duo Cisco and Duo Umbrella can increase cyber resilience
Demo: Mitigating authorization sprawl without changing APIs
November 15 by Seth AdlerPing Identity’s Steve Dillon and Tam Tran demonstrate how to implement effective user consent enforcement and policy-driven, fine-grained authorization
Attaining True Managed Risk Visibility From On-Prem To The Cloud
August 12 by Seth AdlerGain the ability to: Classify assets in an environment to measure and manage risk; Incorporate the risk associated with users that are a part of a third-party breach; Attain easy measurement to be able to benchmark against the industry; Track that single composite managed risk score over time
Reducing Vulnerabilities by Aligning Developers and Operations with Security
April 05 by Seth AdlerThis demo showcases: Engaging with in-depth lesson content while providing security teams and management visibility; Quickly providing evidence of completion of training to internal compliance teams and third-party auditors; Attributing reductions in vulnerabilities (25-30%) in developer’s code
How To Attain Cloud Visibility, Detection & Remediation
March 22 by Seth AdlerThe demo showcases one-click visibility over multiple cloud environments; a robust one-click compliance engine; permission hardening or account governance and a demo-within-a-demo of a robust detection and correlation engine which detects attacks and activity but also correlates individual events.
Stopping Data Exfiltration Prior to Export
February 08 by Seth AdlerIn order to meet the needs of specific applications and industry segments, an additional layer of trust is needed which provides comprehensive protection, monitoring, and long term retention of change history for your critical data.
Harnessing A Present & Future Fraught With Danger
November 12 by Seth AdlerThis demo showcases How to guard against the vast majority of threats entering the organization via Email; How Information Protection should be focused on people while ensuring that data doesn’t lose itself; The context necessary to distinguish between Compromised, Malicious and Negligent users
Cross-Industry Lessons Learned In IoT Industrial Network Cyber Security
November 04 by Seth AdlerIf everything from a human to a vending machine is technology that can be attacked, the posture of the enterprise has to adapt. Mohamad Mahjoub, CISO, Middle East, Veolia, joined us to discuss IoT & Industrial Network Cyber Security at the CSHub EMEA Summit. Watch the session now.
SASE: Meeting On-Prem Security Standards For A Distributed Workforce
September 16 by Seth AdlerThe mission of providing universal protection consistent with best-in-class on-prem security standards for users and data no matter where they are, is accomplished in this demo.
CISO Perspectives w/Dr. Tom Mustac: Zero Trust, Secure Access, and What’s Next
August 25 by Seth AdlerWorkloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organizations now have plans to continue at least some form of remote work longer term. Endpoint threat vector matrices are thus a key focus, no matter how much chatter has been dedicated to zero trust.
How To Secure The Distributed Digital Enterprise On Any Endpoint, Anywhere.
August 14 by Seth AdlerExamine a self-contained platform that continuously protects your organisation from evolving cyber threats. Realise secure access to any application, device and files from anywhere without the need for VPN.
Identify And Remediate The Highest Risk Vulnerabilities
July 21 by Seth AdlerThe primary challenge for all vulnerability management programs is remediating the large volumes of critical severity vulnerabilities. The goal is divining a metric which can significantly reduce the number of vulnerabilities that need to be treated as incidents.