Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cyber Authors Ep.1: Inside the Cyberwar to Hijack Elections & Distort the Truth Theresa M Payton - CEO & Founder of Fortalice Solutions & Sushila Nair - VP, Security Services NTT DATA Theresa Payton, leading cybersecurity expert and first female Whitehouse CIO, discusses her book "Manipulated: Inside the Cyberwar to Hijack Elections... 2 years ago | 56 mins Cyber Authors Ep.3: How to Do Application Security Right Ted Harrington, Author of Hackable & Executive Partner at ISE | Sushila Nair VP Security Services at NTT DATA If you don’t fix your security vulnerabilities, attackers will exploit them. It’s simply a matter of who finds them first. If you fail to prove that y... 2 years ago | 58 mins Design a Mentoring Program That Delivers! Sushila Nair, Joy Harrison, Virginia "Ginger" Spitzer, and Kwasi Mitchell Mentoring programs can increase knowledge and build skills for future goals and milestones, allowing your workforce to grow their skills organically a... 2 years ago | 59 mins Finding Stolen Data Kirby Plessas Regardless of how the material is maliciously obtained, finding stolen data efficiently - before your customers know they have been compromised - is a... 6 years ago | 49 mins Cyber Authors Ep.4: Stopping Losses from Accidental and Malicious Actions Ira Winkler President at Secure Mentem | Sushila Nair VP Security Services at NTT DATA As users cost organizations billions of dollars due to simple errors or malicious actions, organizations believe that they have to improve their aware... 2 years ago | 52 mins Insider Cyber Theft and Sabotage: How Does It Work and How Can We Stop It? Dawn Cappelli, VP & CISO at Rockwell Automation In the current threat environment – with threat actors like North Korea targeting Sony Pictures and Russian hackers targeting the Ukraine power grid –... 6 years ago | 44 mins Protecting Your Revenue, Reputation and Meeting Regulatory Requirements Doug Howard, Steve Bergman, Marty Colburn, and Larry Whiteside Jr. Join this panel of seasoned cyber security executives as they discuss the trends shaping the fintech security landscape in 2017. From getting the mo... 6 years ago | 62 mins ISACA Certifications Information and Update Kim Cohen Becoming ISACA certified is one of the best ways to prove you have the knowledge and expertise to secure the modern enterprise against escalating IT-r... 6 years ago | 43 mins Cyber Authors Ep.2: A Practical Guide for CISOs Bill Bonney President CISO DRG,Gary Hayslip CISO SoftBank,Matt Stamper CISO EVOTEK,Sushila Nair VP Security Services NTT DATA Organizations are keenly aware of the existential threat that cyber risks now pose. The authors of the CISO Desk Reference Guide, Bill Bonney, Matt St... 2 years ago | 57 mins Climbing the Corporate Ladder… in (Tasteful) High Heels Jo Stewart-Rattray (BRM Holdich) & Theresa Grafenstine (US House of Representatives) For many years, women have represented roughly half of all university graduates. Yet, there is a lingering imbalance of women that progress to senior... 6 years ago | 62 mins