EXECUTIVE SERIES: TACKLING CYBER RISKS WITH IMPROVED CYBERSECURITY GOVERNANCE
BC Aware Video Content
EXECUTIVE SERIES: TACKLING CYBER RISKS WITH IMPROVED CYBERSECURITY GOVERNANCE
1:48:43
1+1=3. Leveraging Integration to Supercharge Your IAM Solutions
BC Aware Video Content
1+1=3. Leveraging Integration to Supercharge Your IAM Solutions
46:02
How I Learned to Stop Worrying and Love the Cloud
BC Aware Video Content
How I Learned to Stop Worrying and Love the Cloud
47:07
SheLeadsTech: Digital Defenders – A Fireside Chat
BC Aware Video Content
SheLeadsTech: Digital Defenders – A Fireside Chat
42:33
Best Practices: PAM Security and Data Privacy
BC Aware Video Content
Best Practices: PAM Security and Data Privacy
37:34
Post Secondary Track Career Panel
BC Aware Video Content
Post Secondary Track Career Panel
1:02:35
Protecting the Internet of Things: Proactively Addressing Cybersecurity Risks from Connected Devices
BC Aware Video Content
Protecting the Internet of Things: Proactively Addressing Cybersecurity Risks from Connected Devices
40:12
Prevention and Response Strategies for Credential Attacks
BC Aware Video Content
Prevention and Response Strategies for Credential Attacks
44:44
Navigating the Perfect Storm: Cloud Security Made Simple
BC Aware Video Content
Navigating the Perfect Storm: Cloud Security Made Simple
36:54
2019 Data Breach Landscape Overview
BC Aware Video Content
2019 Data Breach Landscape Overview
37:39
Evolution of risk - From Endpoint Ransomware to Supply Chain Compromise
BC Aware Video Content
Evolution of risk - From Endpoint Ransomware to Supply Chain Compromise
36:35
Developing Industrial Cyber Range
BC Aware Video Content
Developing Industrial Cyber Range
44:15
Scanning Isn't Enough: Measuring true risk and business impact with modern Vulnerability Management
BC Aware Video Content
Scanning Isn't Enough: Measuring true risk and business impact with modern Vulnerability Management
54:52
Post-Quantum Cryptography for Everyone
BC Aware Video Content
Post-Quantum Cryptography for Everyone
53:45
Automation vs. Automation - Evolve to Survive
BC Aware Video Content
Automation vs. Automation - Evolve to Survive
41:32
Best Practices for Privileged Access & Secrets Management in the Cloud
BC Aware Video Content
Best Practices for Privileged Access & Secrets Management in the Cloud
42:16
SheLeadsTech focusses on the Cyber Future
BC Aware Video Content
SheLeadsTech focusses on the Cyber Future
43:11
Dream Big and Believe
BC Aware Video Content
Dream Big and Believe
42:31
Pull Up Your SOCs!
BC Aware Video Content
Pull Up Your SOCs!
39:03
Protecting Customers in the Battle Against Account Fraud
BC Aware Video Content
Protecting Customers in the Battle Against Account Fraud
40:43
Security can do better: Think Security Architecture
BC Aware Video Content
Security can do better: Think Security Architecture
47:17
Cybersecurity; A Driving Force Behind Cloud Adoption
BC Aware Video Content
Cybersecurity; A Driving Force Behind Cloud Adoption
47:47
Artificial Intelligence and the Future of Privacy
BC Aware Video Content
Artificial Intelligence and the Future of Privacy
42:53
The Journey Without a Destination
BC Aware Video Content
The Journey Without a Destination
33:01
BC Aware 2020 (Track 1 Livestream)
BC Aware Video Content
BC Aware 2020 (Track 1 Livestream)
9:07:53
Technical Talk Track c/o MARS: Be a Champion! Reduce Compliance Costs by Adopting Cloud Services.
BC Aware Video Content
Technical Talk Track c/o MARS: Be a Champion! Reduce Compliance Costs by Adopting Cloud Services.
38:53
Post Secondary Networking 101
BC Aware Video Content
Post Secondary Networking 101
35:05
Global Threat Intelligence: Understanding the Challenges
BC Aware Video Content
Global Threat Intelligence: Understanding the Challenges
37:50
Outsmarting Email Hackers Using AI and Machine Learning
BC Aware Video Content
Outsmarting Email Hackers Using AI and Machine Learning
39:20
How to Build a Culture of Cybersecurity Awareness
BC Aware Video Content
How to Build a Culture of Cybersecurity Awareness
48:42
The Importance of Having Artificial Intelligence and Machine Learning to Protect Your Organization.
BC Aware Video Content
The Importance of Having Artificial Intelligence and Machine Learning to Protect Your Organization.
40:20
Ransomware: Prevent, Detect, and Mitigate or Pay Up!
BC Aware Video Content
Ransomware: Prevent, Detect, and Mitigate or Pay Up!
32:17
Cloud Security - Where to start and why
BC Aware Video Content
Cloud Security - Where to start and why
27:26
Building a Secure Foundation for Converged IT/OT Systems
BC Aware Video Content
Building a Secure Foundation for Converged IT/OT Systems
41:02
Privacy in the Time of Digital Disruption [BC Aware Day 2019]
BC Aware Video Content
Privacy in the Time of Digital Disruption [BC Aware Day 2019]
58:12
A BC AWARE Executive Symposium:  How to Achieve Tangible & Measurable Cyber-Risk Reduction Part 2
BC Aware Video Content
A BC AWARE Executive Symposium: How to Achieve Tangible & Measurable Cyber-Risk Reduction Part 2
1:03:34
A BC AWARE Executive Symposium:  How to Achieve Tangible & Measurable Cyber-Risk Reduction
BC Aware Video Content
A BC AWARE Executive Symposium: How to Achieve Tangible & Measurable Cyber-Risk Reduction
28:48
Rob Clyde - Current Cyber Threats and Digital Transformation
BC Aware Video Content
Rob Clyde - Current Cyber Threats and Digital Transformation
45:47
Ron Dodge  Data Analytics and Automation
BC Aware Video Content
Ron Dodge Data Analytics and Automation
32:33
Privacy in the Time of Digital Disruption
BC Aware Video Content
Privacy in the Time of Digital Disruption
57:36
SheLeadsTech Panel Discussion
BC Aware Video Content
SheLeadsTech Panel Discussion
55:46
Grant Asplund   My CEO Told me we have to move our Datacenter to the Public Cloud.
BC Aware Video Content
Grant Asplund My CEO Told me we have to move our Datacenter to the Public Cloud.
40:44
Ale Espinosa - Small Team Big Results: Scaling Security Operations with SIEM and SOAR
BC Aware Video Content
Ale Espinosa - Small Team Big Results: Scaling Security Operations with SIEM and SOAR
35:52
Leita Ouellette   A View from the Inside
BC Aware Video Content
Leita Ouellette A View from the Inside
34:44
Jason Maynard   Passive and Active Defense
BC Aware Video Content
Jason Maynard Passive and Active Defense
50:34
BC Aware Day 2019 (LIVE raw footage)
BC Aware Video Content
BC Aware Day 2019 (LIVE raw footage)
8:03:15
BC Aware Video Content Live Stream
BC Aware Video Content
BC Aware Video Content Live Stream
Cybersecurity Skills Gap in Today's IT Community
BC Aware Video Content
Cybersecurity Skills Gap in Today's IT Community
30:19
Legal Concerns: Preparing for and Facing your “Oh Shit!” Cybersecurity Breach Moment
BC Aware Video Content
Legal Concerns: Preparing for and Facing your “Oh Shit!” Cybersecurity Breach Moment
44:10
Physical Access Control Systems: A Double-Edged Sword
BC Aware Video Content
Physical Access Control Systems: A Double-Edged Sword
43:24
Self Evolving Detection System
BC Aware Video Content
Self Evolving Detection System
37:51
Designing Secure Cloud-based Web and Mobile Applications
BC Aware Video Content
Designing Secure Cloud-based Web and Mobile Applications
45:53
DevSecOps - One Man Changes the World
BC Aware Video Content
DevSecOps - One Man Changes the World
36:38
Lessons Learned from 2017
BC Aware Video Content
Lessons Learned from 2017
38:40
Layered Defense in a World Without Layers
BC Aware Video Content
Layered Defense in a World Without Layers
33:11
The Forces Shaping Today's Cyber Threat Landscape
BC Aware Video Content
The Forces Shaping Today's Cyber Threat Landscape
43:09
Holistic Cyber Security
BC Aware Video Content
Holistic Cyber Security
45:16
Networking 101: Build and Leverage the Power of Your Network
BC Aware Video Content
Networking 101: Build and Leverage the Power of Your Network
32:17
Is Cryptocurrency Really Secure?
BC Aware Video Content
Is Cryptocurrency Really Secure?
56:47
The Security Effectiveness Challenge
BC Aware Video Content
The Security Effectiveness Challenge
49:00
Building a Cybersecurity Awareness Program from the Ground Up
BC Aware Video Content
Building a Cybersecurity Awareness Program from the Ground Up
40:06