Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

The top challenges CISOs face in identity security

The top challenges CISOs face in identity security

Identity-based challenges are becoming increasingly complex. As organizations seek to mitigate identity-based risks, CISOs may confront notable obstacles.  Here, we talk to Alex Bovee, Co-Founder and CEO of ConductorOne, about the difficulties CISOs are facing with the modern identity security landscape.  Security magazine: Tell us about your title and background. Bovee: I’m the Co-Founder and CEO of ConductorOne, which provides a modern identity governance platform. My career has been largely focused on building products at the…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More

90% of organizations experienced an identity incident this past year

90% of organizations experienced an identity incident this past year

A report by the Identity Defined Security Alliance (IDSA) examined the identity security systems within large organizations. The study revealed trends in common identity incident vectors and direct organizational influence. It also analyzed the impact of trends such as cyber insurance, artificial intelligence (AI) and the shifting regulatory landscape. Among the studied organizations, 90% claimed to experience an identity-related event in the last year. This percentage remains consistent with the percentage from 2023.  More key…

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Network Detection & Response , Next-Generation Technologies & Secure Development , Security Operations Ashan Willy on Helping Clients Spot Hacker Techniques Insider Their Own 4 Walls Michael Novinson (MichaelNovinson) • February 3, 2023     Ashan Willy, CEO, Proofpoint (Image: Proofpoint) Proofpoint has long focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. See Also: Live Webinar | Navigating the…

Read More

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Active Defense & Deception , Next-Generation Technologies & Secure Development Ashan Willy’s First Deal as CEO Gets Proofpoint Into the Identity, Deception Spaces Michael Novinson (MichaelNovinson) • December 12, 2022     Ashan Willy has made his first acquisition as Proofpoint’s CEO, scooping up an identity startup established by Check Point’s former cloud and document security leader. See Also: Finding a Password Management Solution for Your Enterprise The Silicon Valley-based email security vendor says…

Read More

5 minutes with David Mahdi — Establishing digital trust with identity-first security

5 minutes with David Mahdi — Establishing digital trust with identity-first security

5 minutes with David Mahdi — Establishing digital trust with identity-first security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 2