The following video is taken from our UK CISO Summit in London on 22nd October and features Matt Rider, VP Solutions Engineering EMEA at Exabeam. In the keynote titled ‘The […]
The following video is taken from our DACH Summit in Frankfurt on 9th September 2024 and features Felix Blanke, Senior Manager, Sales Engineering at Exabeam. In the keynote titled ‘The […]
The success of your security operations automation strategy depends on having all of the necessary data readily available so that threats can be prioritised and rapidly resolved but establishing a centralised source of enterprise visibility is no small order.
Ahead of their appearance at TLC Connect Global in Amsterdam, Exabeam have shared some materials to showcase their expertise and to demonstrate why our community should be excited to hear what they have to say…
Fundamental to meeting any data protection legislation is knowing your data: what you have, why you have it, how you got it, what you do with it, and where you keep it. Building data awareness is now an essential element for an effective data security strategy, but with new regulations being introduced and the rapid proliferation of data, can businesses keep up?
Detecting and responding to threats is the primary objective of your security operations program, but as our environments spill over into myriad SaaS tools and other cloud environments, are these detection and response programs able to keep up?
With software supply chain attacks on the rise, organisations are struggling to detect, let alone prevent, these attacks. No one is immune to these mounting threats – so how do we move from vulnerability to victory?
It’s critical that security teams are able to demonstrate the value of necessary projects and secure buy-in from the business, but with the C-suite guarding the company purse strings more closely than ever, identifying your projects and effectively communicating the need for them can be a tightrope walk.
Attackers are taking advantage of the open, connected nature of the cloud to carry out new cyber-attacks. As a result, while it is often overlooked, email is still one of the most important channels to protect. Understanding what types of attacks modern organisations face and how to defend against them is the first step.