Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Organizing the Chaos with a Workload Placement Policy John Burke + Johna Till Johnson | Nemertes A workload placement policy (WPP) is the policy for, and process of, deciding where to host a workload, application or service, based on factors such ... 2 weeks ago | 30 mins The 2023 State of Data Collection Jai Davda, CIO, FormAssembly | Tomer Madori, GM of IT & Digital Solutions, TechUnity How do security-conscious organizations handle the collecting and processing of their data? What are the challenges of data collection in today’s data... 3 weeks ago | 44 mins A Data-centric Approach to Sustainable Data Accessibility in Smart Cities François Thibodeau, ing (Technical Advisor - Systems Engineering / Montréal Urban Planning Service) Six years ago, the City of Montreal faced challenges when initiating a pilot program for live traffic data collection. These critical data are produce... 4 months ago | 41 mins Why Extending Zero Trust to Workloads Should Be on Every CISO’s Agenda John Grady, Analyst, ESG, Brian Lazear, VP Product Management & Sakthi Chandra, Sr. Director, Head of Marketing, Zscaler Too often are security strategies static, and perimeter-based tools such as firewall and VPN do not offer the scalability or policy granularity to sec... 1 month ago | 47 mins Influencing Strategy and Execution without having Authority or Responsibility Carlos Sanchez, Sr. Director, OT, Fortinet & Matt Bunch, Sr. Director of Information Security/Cyber (CISO), Tyson Foods, Inc. For many organizations, cybersecurity ranks in the top five business risks for an organization. This is no surprise given the cyber incidents reported... June 27, 2023 4:00pm Enable People-centric Access to Web and Cloud Apps Brian Gleeson, Sr. Product Marketing Manager & Ran Schwartz, Sr. Product Manager Policies used by organizations to control access to cloud and web applications are typically static and designed to serve large groups of users. To be... 9 months ago | 30 mins Cloud Load Balancers Step in When Hardware Falls Short Neptuno Moretto, Program Manager, Field Engineering at VMware, Lei Yang, Director of product Marketing at VMware Hardware-centric and virtual load balancers are, unfortunately, plagued by a trio of pitfalls: they can be expensive, inflexible, and restrictive in f... 5 months ago | 58 mins The Role of Authorization in Driving Zero Trust and Identity-First Security Mickey Martin, Director of Product Outreach, PlainID Static and inflexible policies through traditional access control methods have failed to address security risk in real-time. Enterprises are expanding... 5 months ago | 45 mins The Future is Identity-Centric Diana Kelley, SecurityCurve | Joseph Carson, Thycotic | Dave Farrow, Barracuda | Jeremy Snyder, Rapid7 Instead of the traditional "castle and moat" model of the past, today the security perimeter is being defined around the identity of the person or the... 2 years ago | 60 mins Digital Acceleration in Insurance Ben Matarese, Director of Insurance Practice, Precisely Insurers have been transitioning from a “policy centric” approach to a “customer centric” strategy and the foundation of this transition has been data... 2 years ago | 34 mins Load more