<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Demos RSS Feed]]></title>
        <link>https://www.cshub.com/rss/demos</link>
        <description><![CDATA[ Cyber Security Hub ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:54:35 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/demos" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[Tech demo: Defending against network threats]]></title>
                <link>https://www.cshub.com/security-strategy/demos/defending-against-network-threats?utm_medium=RSS</link>
                <description><![CDATA[ Duo Security’s Jaki Hassan demonstrates how Duo Cisco and Duo Umbrella can increase cyber resilience ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/security-strategy/demos/defending-against-network-threats?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Demo: Mitigating authorization sprawl without changing APIs]]></title>
                <link>https://www.cshub.com/security-strategy/demos/pingauthorize-demo-centralizing-authorization?utm_medium=RSS</link>
                <description><![CDATA[ Ping Identity’s Steve Dillon and Tam Tran demonstrate how to implement effective user consent enforcement and policy-driven, fine-grained authorization ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/security-strategy/demos/pingauthorize-demo-centralizing-authorization?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Attaining True Managed Risk Visibility From On-Prem To The Cloud]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/attaining-true-managed-risk-visibility-from-on-prem-to-the-cloud?utm_medium=RSS</link>
                <description><![CDATA[ Gain the ability to: Classify assets in an environment to measure and manage risk; Incorporate the risk associated with users that are a part of a third-party breach; Attain easy measurement to be abl... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/attaining-true-managed-risk-visibility-from-on-prem-to-the-cloud?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Reducing Vulnerabilities by Aligning Developers and Operations with Security]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/reducing-vulnerabilities-by-aligning-developers-and-operations-with-security?utm_medium=RSS</link>
                <description><![CDATA[ This demo showcases: Engaging with in-depth lesson content while providing security teams and management visibility; Quickly providing evidence of completion of training to internal compliance teams a... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/reducing-vulnerabilities-by-aligning-developers-and-operations-with-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How To Attain Cloud Visibility, Detection &amp; Remediation]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/how-to-attain-cloud-visibility-detection-remediation?utm_medium=RSS</link>
                <description><![CDATA[ The demo showcases one-click visibility over multiple cloud environments; a robust one-click compliance engine; permission hardening or account governance and a demo-within-a-demo of a robust detectio... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/how-to-attain-cloud-visibility-detection-remediation?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Stopping Data Exfiltration Prior to Export]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/stopping-data-exfiltration-prior-to-export?utm_medium=RSS</link>
                <description><![CDATA[ In order to meet the needs of specific applications and industry segments, an additional layer of trust is needed which provides comprehensive protection, monitoring, and long term retention of change... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/stopping-data-exfiltration-prior-to-export?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Harnessing A Present &amp; Future Fraught With Danger]]></title>
                <link>https://www.cshub.com/attacks/demos/harnessing-a-present-future-fraught-with-danger?utm_medium=RSS</link>
                <description><![CDATA[ This demo showcases How to guard against the vast majority of threats entering the organization via Email; How Information Protection should be focused on people while ensuring that data doesn’t lose... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/attacks/demos/harnessing-a-present-future-fraught-with-danger?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Cross-Industry Lessons Learned In IoT Industrial Network Cyber Security]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/cross-industry-lessons-learned-in-iot-industrial-network-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ If everything from a human to a vending machine is technology that can be attacked, the posture of the enterprise has to adapt. Mohamad Mahjoub, CISO, Middle East, Veolia, joined us to discuss IoT & I... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/cross-industry-lessons-learned-in-iot-industrial-network-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[SASE: Meeting On-Prem Security Standards For A Distributed Workforce]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/how-to-protect-users-and-data-wherever-they-are?utm_medium=RSS</link>
                <description><![CDATA[ The mission of providing universal protection consistent with best-in-class on-prem security standards for users and data no matter where they are, is accomplished in this demo. ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/how-to-protect-users-and-data-wherever-they-are?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[CISO Perspectives w/Dr. Tom Mustac: Zero Trust, Secure Access, and What’s Next]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/ciso-perspectives-wtom-mustac-zero-trust-secure-access-and-whats-next?utm_medium=RSS</link>
                <description><![CDATA[ Workloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organizations now have plans to continue at least some form of remote work longer term. Endpoint threat v... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/ciso-perspectives-wtom-mustac-zero-trust-secure-access-and-whats-next?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How To Secure The Distributed Digital Enterprise On Any Endpoint, Anywhere.]]></title>
                <link>https://www.cshub.com/executive-decisions/demos/how-to-secure-the-distributed-digital-enterprise-on-any-endpoint-anywhere?utm_medium=RSS</link>
                <description><![CDATA[ Examine a self-contained platform that continuously protects your organisation from evolving cyber threats. Realise secure access to any application, device and files from anywhere without the need fo... ]]></description>
                <author><![CDATA[ seth@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/demos/how-to-secure-the-distributed-digital-enterprise-on-any-endpoint-anywhere?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Identify And Remediate The Highest Risk Vulnerabilities]]></title>
                <link>https://www.cshub.com/attacks/demos/identify-and-remediate-the-highest-risk-vulnerabilities?utm_medium=RSS</link>
                <description><![CDATA[ The primary challenge for all vulnerability management programs is remediating the large volumes of critical severity vulnerabilities. The goal is divining a metric which can significantly reduce the... ]]></description>
                <author><![CDATA[ setha@iqpc.com (Seth Adler) ]]></author>
                <guid>https://www.cshub.com/attacks/demos/identify-and-remediate-the-highest-risk-vulnerabilities?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:00 +0000</pubDate>
            </item>
            </channel>
</rss>