BrightTALK  
Ala , we handpicked these presentations for you based on your interests:

Joint Custody - The digital asset dialogues - Episode 6 - Zahid Mustafa from

Joint Custody - The digital asset dialogues - Episode 6 - Zahid Mustafa from
Benjamin Duve & Zahid Mustafa
In this episode of Joint Custody, host Benjamin Duve is joined by Zahid Mustafa,

GK8 by Galaxy : September 30, 2025 | 31 mins

Joint Custody - The digital asset dialogues - Episode 5 - Deborah Querub fro

Joint Custody - The digital asset dialogues - Episode 5 - Deborah Querub fro
Benjamin Duve & Deborah Querub
In this episode of Joint Custody, host Benjamin Duve is joined by Deborah Querub

GK8 by Galaxy : September 16, 2025 | 30 mins

Strengthening Your Security Perimeter to Shut Down Identity-Based Attacks

Strengthening Your Security Perimeter to Shut Down Identity-Based Attacks
Jared Brodsky & Seth Garlett
This is session one of the ""The Identity Security Model for Trust"" webinar ser

CyberArk : February 21, 2024 | 34 mins

Fake Careers, Fake Brands: Detecting Job Scam Campaigns Before They Go Viral

Fake Careers, Fake Brands: Detecting Job Scam Campaigns Before They Go Viral
Ali Uzun Solutions Engineering Team Lead
Job scams are becoming increasingly sophisticated, with cybercriminals creating

SOCRadar Extended Threat Intelligence : November 13, 2025 | 60 mins

How to Avoid PKI DIsruptions with Crypto-Agility

How to Avoid PKI DIsruptions with Crypto-Agility
Ganesh Gopalan, General Manager & Vice President, Identity Security for PKI
Major disruptions are reshaping the PKI landscape, and organizations without aut

AppViewX : November 5, 2025 | 24 mins

Empowering Digital Sovereignty: Google Workspace Client-Side Encryption and

Empowering Digital Sovereignty: Google Workspace Client-Side Encryption and
Johney Burke, Senior Product Manager, Google; David Ortega, Principal Soluti
Join us for an insightful webinar where we delve into the critical importance of

Thales - Cybersecurity Solutions : October 15, 2025 | 60 mins

Cybercrime-as-a-Service: Inside the Economy of Ransomware and Initial Access

Cybercrime-as-a-Service: Inside the Economy of Ransomware and Initial Access
Ali Uzun Solutions Engineering Team Lead
This session explores the growing underground economy of cybercrime-as-a-service

SOCRadar Extended Threat Intelligence : October 9, 2025 | 63 mins

Winning the B2B Attention Battle: AI-Enhanced Partner Demand Strategies

Winning the B2B Attention Battle: AI-Enhanced Partner Demand Strategies
Kristin Heisner (Commvault), Jerome Alexander (Cloudera), Rachael Fuller (In
In the relentless world of B2B marketing, buyers aren't just busy—they're under

Insights for Tech Sales and Marketing : September 24, 2025 | 47 mins

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense

From Shield to Spear: How AI is Reshaping Cyber Defense and Offense
Steve Piper, CISSP, Founder & CEO of CyberEdge Group and Editor-in-Chief of
The rise of artificial intelligence in cybersecurity is both a blessing and a cu

ISC2 Knowledge Vault : September 17, 2025 | 60 mins

You received this email because you are subscribed to one or more BrightTALK™ Channels. We hope you find this email useful and continue to browse BrightTALK to discover content that informs your decisions and advances your career.

For more information, please visit us at www.brighttalk.com
This email is published by BrightTALK. This site is owned and operated by TechTarget, Inc. and its subsidiaries, 275 Grove Street, Newton, Massachusetts, 02466 US.

© 2025 TechTarget, Inc. or its subsidiaries. All rights reserved.

Click here to unsubscribe from similar emails