Chapters
Introduction
Introduction
0:00
Introduction
0:00
Agenda
Agenda
1:10
Agenda
1:10
The world has changed
The world has changed
1:54
What does this mean
What does this mean
3:52
What does this mean
3:52
Trend in vulnerabilities
Trend in vulnerabilities
4:59
Recent examples
Recent examples
5:47
Recent examples
5:47
Threat landscape evolving
Threat landscape evolving
6:37
Hybrid cloud environment
Hybrid cloud environment
7:53
Attack service
Attack service
8:51
Attack service
8:51
Attack service intelligence
Attack service intelligence
10:33
Visibility
Visibility
12:12
Visibility
12:12
Vulnerability Management
Vulnerability Management
13:12
Vulnerability Management
13:12
Confluence Vulnerability
Confluence Vulnerability
14:43
Confluence Vulnerability
14:43
Cybersecurity Organizations
Cybersecurity Organizations
15:51
Active Exploitation
Active Exploitation
16:51
Active Exploitation
16:51
Intelligence
Intelligence
17:32
Intelligence
17:32
Microsoft Exchange
Microsoft Exchange
19:00
Microsoft Exchange
19:00
Summary
Summary
21:58
Summary
21:58
Key takeaways
Key takeaways
28:23
Key takeaways
28:23
Digital transformation
Digital transformation
28:36
Digital transformation
28:36
Threat landscape
Threat landscape
29:18
Threat landscape
29:18
Where to start
Where to start
29:38
Where to start
29:38
Let RiskIQ help
Let RiskIQ help
30:31
Let RiskIQ help
30:31
Wrapup
Wrapup
30:56
Wrapup
30:56
Sync to video time
Description
12Likes
736Views
2021Nov 4
Transcript
Follow along using the transcript.
Show transcript
Microsoft Events
135K subscribers
Transcript
NaN / NaN
Show more