Channel Avatar

Cyber Tech & Risk @UCdVM3PhMub5K43gPG2j_G4A@youtube.com

2.8K subscribers - no pronouns :c

Cyber Tech & Risk (cybertechrisk.com) is the hub for people


33:27
State of Cloud Security in Canada - David Senf (Bell) and Allan Mac Donald (Palo Alto Networks)
31:12
SSH Security - A Scalable Approach - Kieran Miller, Garantir
39:07
Panel: The Transformation of IAM
36:00
Microsoft Entra – Identity Governance with Lifecycle Workflows - Robin Wenstrom, Microsoft
34:15
Want Security? Think Identity! - Dorin Gherghelegiu, Accenture
30:08
Combatting Risky Behavior in the Cloud - Neil Walker, Microsoft
34:22
Approach to a Safe Architecture - Nicolas Buache, Microsoft
59:19
Panel: Effective Cybersecurity Architecture
40:37
Panel Discussion: Securing IoT
33:52
Securing IoT - Uniting OT & IT for Smarter, more Secure Future
29:40
Efficient Compliance Enablement for DevOps Operating Model - Somasundaram Subbu, CSTREAM.IO
49:58
Panel Discussion: Data Security
22:09
Security Automation: The future of digital economy - Poonam Mishra, Microsoft
27:56
Data Protection & Privacy: protecting a human right - Radu Vaduva, Microsoft
34:55
Panel - Automation for Security Operations
29:47
Continuously Improving the Capability of Human Defenders with AI - Tahseen Shabab, Penfield.AI
31:02
Panel - Automation for Identity and Access Management
01:00:10
Unleashing the Power of ChatGPT in Security Operations - Chris Stelzer, Microsoft
22:09
How over reliance on DLP is hurting your data protection efforts - Daniel Cybulskie, Zscaler
31:59
Cloud Detection and Response, Closing the Visibility Gap - Christopher Fielder, Artic Wolf
13:57
Securing Cloud Workloads and Resources - Jumoke Ajidahun, Microsoft
54:07
Panel Discussion: Cloud Detection and Response
55:47
Panel Discussion: Data Governance and Privacy
33:14
Recognize sensitive and personal data and protect privacy - Raushan Dilruba, Microsoft
19:36
You’re going to need a bigger boat – the reality of phishing, Oren J. Falkowitz, Cloudflare
51:57
Panel Discussion: Phishing Protection
30:34
Cloud Security Posture Ninja: Assessing cloud security posture like a pro - Vishal Patel, KPMG
50:31
Protecting Your Resources in the Cloud - Nehal Shah, Microsoft
36:21
Panel Discussion: Multi Cloud Management
28:20
Trust but Verify - Verifying Security Controls in the Public Cloud - Ihor Kravchuk, RBC
31:45
Panel Discussion: Cloud Identity and Access Management
26:43
Practical Cloud Security - Increasing Attacker Cost and Adopting the Shared Responsibility
27:56
Security Controls in the Public Cloud - Maxime Coquerel, RBC
44:05
Panel Discussion - Security Orchestration, Automation, and Response (SOAR)
25:10
Modernize Security Operations Triage Efforts with Microsoft - Chris Stelzer
26:01
Protecting your Organization: Email Security Best Practices - Eric Ivankovich, Microsoft
25:09
Threat Detection & Hunting Through Email - Shashi Gautam, Trend Micro
28:08
Enabling the Next Frontier of Automation in Cybersecurity - Tahseen Shabab, Penfield.AI
29:22
Securing the Future: AI and Machine Learning at Microsoft
33:52
What’s trust got to do with it - Stephen Perciballi, Cloudflare
30:18
Why Zero Trust, Why Now? - Christopher Hills, BeyondTrust
32:05
Panel - Automation for GRC
29:38
Panel - Automation for DevSecOps
30:25
Panel - Automation for Identity and Access Management
30:13
A Novel Approach to Automating Security Credentials - Kieran Miller, Garantir
29:39
Automation Success Stories – Reducing Burden and Increasing Quality in the SOC
32:09
Fireside Chat - Automation Best Practices
46:46
Panel Discussion: Zero Trust Architecture
27:16
Zero Trust: Just Take the First Step - Michael Kaunitz, Cloudflare
33:53
Zero Trust Demystified - Brian Baldock, Eric DeLorme, Microsoft
43:30
Panel Discussion: Privileged Identity Management
27:15
Privileged Access Management: Beyond Vaulting - Brett Jones, Delinea
15:58
Privileged Identity Management 101 - Brian Baldock, Microsoft
54:14
Panel Discussion: Cloud Migration
24:13
Lessons Learned: Supporting Cloud Migration
27:54
Cloud Migration: Simplified and Secured
55:20
Panel Discussion - Network Security in a Hybrid Work World
22:20
The Death of Network Hardware Appliances, and the Evolution of Cloud-native Security
19:19
Identity is the New Blue - Mike Kiser, SailPoint
52:23
Panel Discussion - The Future of Identity Security