Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Reducing Security Review Friction Duane Newman, VP of Product & Tom Rhoton, VP of Marketing at Whistic Security reviews are a part of nearly every sales cycle, and a frequent cause of business friction. In this webinar we’ll discuss common causes of thi... 3 years ago | 29 mins Death of the Traditional Security Review John Finizio, Director of Partner Success, Whistic Recent crises have not just exposed the many inefficiencies inherent in traditional security reviews, it has exacerbated them. Enterprises and Vendors... 3 years ago | 27 mins Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow Nick Sorensen-CEO, Whistic & Azure Shen-Compliance Analyst, OneLogin & Samantha Cowan-Security Compliance Manager, HackerOne Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their wo... 4 years ago | 56 mins Understanding the Third Party Risk Ecosystem John Finizio & John Burton of Whistic Many stakeholders make up the third party Risk ecosystem: multiple organizations within the enterprise, software and service solution providers, indus... 3 years ago | 45 mins Solving the 5 Key Challenges of Vendor Security Reviews Duane Newman, VP of Product, Whistic & Alec Fullmer, Product Manager, Whistic Join Duane Newman, Whistic’s VP of Product, for a discussion about how to approach the five key challenges when conducting vendor security reviews. ... 3 years ago | 39 mins Building a World-Class Security Program James Christiansen, Vice President of Cloud Security Transformation, Netskope There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of ... 3 years ago | 50 mins Software Defined Perimeter, Microsegmentation & Zero Trust Juanita Koilpillai, Founder and CEO, Waverly Labs Security has become of paramount importance in recent times, especially due to the advent of cloud computing and virtualization. With so many devices ... 3 years ago | 34 mins Maturing Your Cloud Security Mike Rothman, President, Securosis In this session, Mike will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective o... 3 years ago | 43 mins The Blind Spot in Object Storage Ed Casmer,CTO, Cloud Storage Security Amazon S3 is one of the most successful services provided by AWS. AWS has unlimited emphasis, ensuring your data is safe. Customers and AWS leverage m... 3 years ago | 43 mins Securing the Work-From-Cloud Lifecycle Jerry Archer, CISO, Sallie Mae In recent months, the COVID pandemic has forced employers to move to a work-from-home model much faster than expected. Many critical business employee... 3 years ago | 43 mins