Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow Nick Sorensen-CEO, Whistic & Azure Shen-Compliance Analyst, OneLogin & Samantha Cowan-Security Compliance Manager, HackerOne Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their wo... 3 years ago | 56 mins Death of the Traditional Security Review John Finizio, Director of Partner Success, Whistic Recent crises have not just exposed the many inefficiencies inherent in traditional security reviews, it has exacerbated them. Enterprises and Vendors... 3 years ago | 27 mins Understanding the Third Party Risk Ecosystem John Finizio & John Burton of Whistic Many stakeholders make up the third party Risk ecosystem: multiple organizations within the enterprise, software and service solution providers, indus... 2 years ago | 45 mins Solving the 5 Key Challenges of Vendor Security Reviews Duane Newman, VP of Product, Whistic & Alec Fullmer, Product Manager, Whistic Join Duane Newman, Whistic’s VP of Product, for a discussion about how to approach the five key challenges when conducting vendor security reviews. ... 3 years ago | 39 mins Reducing Security Review Friction Duane Newman, VP of Product & Tom Rhoton, VP of Marketing at Whistic Security reviews are a part of nearly every sales cycle, and a frequent cause of business friction. In this webinar we’ll discuss common causes of thi... 2 years ago | 29 mins Maturing Your Cloud Security Mike Rothman, President, Securosis In this session, Mike will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective o... 3 years ago | 43 mins Building a World-Class Security Program James Christiansen, Vice President of Cloud Security Transformation, Netskope There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of ... 3 years ago | 50 mins Securing the Work-From-Cloud Lifecycle Jerry Archer, CISO, Sallie Mae In recent months, the COVID pandemic has forced employers to move to a work-from-home model much faster than expected. Many critical business employee... 3 years ago | 43 mins STAR 1000 - The reason behind the STAR Program success story Daniele Catteddu, CSA and John DiMaria, CSA The cloud has come to dominate the technology landscape and revolutionize the market, creating a tectonic shift in accepted practice contributing to a... 2 years ago | 53 mins Vendor Risk Assessment: Secrets for Procuring Secure Cloud Services Jerry Cochran, Nick Sorenson, Gary Gooden, Walton Stephens, Steve Quane In this panel, our experts will share lessons learned and best practices for securing cloud services. From proactive risk assessments within the procu... 3 years ago | 61 mins