News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
Be Less Man vs Machine, More Man and Machine
Be Less Man vs Machine, More Man and Machine
Webinar
14 Sep 2017
Speakers
Maxine Holt
Research Director, Ovum
Follow @maxineholt
Joe Lubelczyk
Data Security Specialist
,
Egress
Dan Raywood
Email Dan
Follow @DanRaywood
Connect on LinkedIn
Adrian Sanabria
Security Researcher
Follow @sawaba
Brought to you by
Egress
Why not watch?
Preventing and Detecting Malicious Insiders
22 Jan 2019
Insider Risk Maturity Models: Tales from the Insider Crypt
3 Dec 2020
Updating Your Security Strategy to the Evolving Insider Threat Risk
28 Apr 2022
Securing Cyber-Attack Vulnerabilities From Your Supply Chain
9 Jun 2022
You may also like
Outbound Email Errors Cause 93% Increase in Breaches
News
16 Sep 2020
Widespread Security Flaws Blamed for Northern Ireland Police Data Breach
News
12 Dec 2023
Desjardins Insider Accessed Data of 2.9m Members
News
21 Jun 2019
UK Healthcare Accounts for 43% of all Breaches
News
1 Jun 2017
FBI Analyst Gets Three Years For National Security Breach
News
23 Jun 2023
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Ransomware Attack Stops Nova Scotia Power Meter Readings
News
9 Jul 2025
1
ISACA Addresses Experience Gap with CISA Associate Designation
News
11 Jul 2025
2
M&S Chair Details Ransomware Attack, Declines to Confirm if Payment Was Made
News
9 Jul 2025
3
LLMs Fall Short in Vulnerability Discovery and Exploitation
News
10 Jul 2025
4
Over 500 Scattered Spider Phishing Domains Poised to Target Multiple Industries
News
8 Jul 2025
5
Nippon Steel IT Subsidiary Hit by "Zero-Day Attack," Causing Data Breach
News
10 Jul 2025
6
Taiwan Flags Chinese Apps Over Data Security Violations
News
4 Jul 2025
1
Qantas Contacted by Potential Cybercriminal Following Data Breach
News
7 Jul 2025
2
Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders
Opinion
23 Jun 2025
3
Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools
News
8 Jul 2025
4
Researchers Share CitrixBleed 2 Detection Analysis After Initial Hold
News
7 Jul 2025
5
Hackers Target Employee Credentials Amid Spike in ID Attacks
News
7 Jul 2025
6
Predicting and Prioritizing Cyber Attacks Using Threat Intelligence
Webinar
26 Jun 2025
1
Why Your Mainframe Security Strategy Could Be Your Biggest Business Risk
Webinar
18 Jun 2025
2
Reimagining the SOC: From Reactive to Resilient
Webinar
17 Jun 2025
3
Cybersecurity Employment: Making Sense of Conflicting Messaging
Webinar
19 May 2025
4
How to Tackle Rising Cloud Identity Attacks
Webinar
27 Mar 2025
5
The Threat Intelligence Imperative: Transforming Risk into Cyber Resilience
Webinar
13 Mar 2025
6
#Infosec2025: How CISOs Can Manage Budgets Effectively Amid Spending Restraints with Madelein van der Hout (video)
Interview
5 Jun 2025
1
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
News
6 Jun 2025
2
#Infosec2025: Understanding AI's Role in Exploiting Human Cyber Vulnerabilities (video)
Interview
5 Jun 2025
3
How to Incentivize Security by Design
News Feature
26 May 2025
4
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
27 Mar 2025
5
#Infosec2025: NCA Cyber Intel Head on Cybercrime's New Post-Trust Era (video)
Interview
3 Jun 2025
6