Tag: Presentations
-
Presentation: Busting AI Myths and Embracing Realities in Privacy & Security
Transcript Katharine Jarmul: We’re going to talk about realities and myths when we think about privacy and security in AI and machine …
-
Communicating Cyber Threats Effectively with Visual Presentations
In the field of cyber security, it’s very important to know about and deal with risks in order to keep private information safe and keep …
-
Presentation: Secure by Design: Building Security into Engineering Workflows and Teams
Stefania Chaplin explains how to integrate security into engineering workflows and teams using a “Secure by Design” …
-
What to expect during an Encore Presentation of the Data Protection & AI Summit: Join theCUBE Sept. 3-4
Organizations today face a perfect storm as data volumes surge and cyber threats intensify alongside the rise of AI. At the center of this …
-
Presentation: Designing for Defense: Architecting APIs with Zero Trust Principles
Renato Losio and a panel of security experts discuss designing for defense and architecting APIs with Zero Trust principles. They explain …
-
Presentation: Security or Convenience – Why Not Both?
Dorota Parad shares the BLISS framework (Bulkheads, Levels, Impact, Simplicity, Pit of Success), explaining how we can eliminate …
-
Presentation: Comprehensive Approaches to Software Supply Chain Security
Mykhailo Brodskyi discusses critical software supply chain security risk categories relevant to FinTech and explains effective mitigation …
-
Presentation: Flawed ML Security: Mitigating Security Vulnerabilities in Data & Machine Learning Infrastructure with MLSecOps
Transcript Gonzalez-Martin: Why do I want to talk about security in a machine learning …
-
A Guide on Creating Engaging Presentations for Trade Show Visitors
Making an interesting presentation is critical in the busy setting of a trade fair, where every booth fights for attention. Displays that …
-
Presentation: Trends in InfoSec: Data Minimization, Autoclassification, and Ethical AI
Transcript Greaves: I’m …
-
Presentation: Beyond the Breach: Proactive Defense in the Age of Advanced Threats
Transcript Brunton-Spall: I’m Michael …
-
Presentation: Best Practices to Secure Web Applications
Transcript Groner: We’re going to talk a little bit about API …
●●●
