Cyber-targeted attacks such as APTs are the primary cause of concern for any organization that holds data which can be of interest to attackers. The motivations are diverse and the attackers are highly sophisticated and relentless in their approach.
zero (4)
As I am digging deeper into the exciting world of “zero trust” (ZT), I’ve come across this fun blog series that my colleagues wrote about Google’s own journey to ZT.
Now, given that we experience BeyondCorp zero trust-style access every day at work, i
Zero trust model presentation
- 1. #RSAC SESSION ID: Zero Trust Security Gowdhaman Jothilingam
- Topics Covered Understand what Zero Trust is and why it is important. What comprises a Zero Trust network and how to create architectu
The Playbook Round Table on Topic " Zeroing-in on Zero Trust Architecture " happened on 21st February 2020 during the 12th CISO Platform Annual Summit 2020. Security Professionals came forward to have a discussion on zero trust, frameworks and how to
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best of the World Talks on The CISO's Journey: From Expert to Leader
- Description:
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…
- Created by: Biswajit Banerjee
- Tags: ciso