Hi [[ session.user.profile.firstName ]]

SASE for the Hybrid Workforce

In the last year, the move to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models.

This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? According to many, it’s SASE. SASE provides a flexible, simplistic no-fuss, secure access model and Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE. But what is SASE and why is it being heralded as the future of network security?

Join us in this episode of The (Security) Balancing Act as security experts discuss:

- What exactly SASE offers that traditional network security controls don’t
- How SASE adoption has been in part fuelled by the pandemic, and what this means moving forward into the ’new normal’
- The future of secure access models, and what to expect over the next 12 months
- And more
Recorded Aug 18 2021 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley, Host | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security | Charles Kolodgy, Security Mindsets
Presentation preview: SASE for the Hybrid Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Keep Ahead of the Trends: Security in 2022 Jan 19 2022 5:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve and more
    Security is fast-changing, and keeping up to date with new trends and predictions is key to staying ahead of the race to secure your business. This is why we’re kicking off 2022 with an episode focused on the year ahead.

    How will the role of a CISO change in 2022? Do we need a BISO? How can I prepare for what’s to come? What tools and processes are available to me today? In this session we’ll be answering these questions and much more.

    Join Diana Kelley and expert thought leaders as they discuss:
    - The top 5 security trends and predictions for 2022
    - Why 2022 is the year for user awareness
    - AI and ML in IT Security
    - What the threatscape looks like in 2022
    - And much more!
  • A Guide To Global Regulations and Compliance Dec 8 2021 5:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve and more
    In the aftermath of the Covid-19 pandemic, organisations are seeing an increase in phishing and ransomware attacks, and the transformative impact of Covid-19 has demonstrated the need to implement new cybersecurity and privacy policies. There are new challenges in the cybersecurity and compliance space for both government and business leaders. The movement towards remote working has forced governments and business leaders alike to rethink privacy and security policies.

    But what do regulations and compliance look like globally in 2021? How have regulations changed in the security space, and what do we expect of the future?

    Join us in this session as we discuss:
    - How the pandemic has impacted security regulations and compliance globally
    - Why adopting new privacy policies strengthens trust in the digital economy
    - Industry-specific compliance regulations
    - The ways in which regulations have shifted
    - What regulatory experts expect to see in the future - and how you can prepare
  • Data Sovereignty in a Multi-Cloud World Nov 10 2021 5:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve and more
    Data sovereignty refers to the concept that data is subject to the laws of the country in which it is processed. Countries around the world have had these laws long before today, even before new privacy laws and legislation - like GDPR - came into force.

    By the end of 2021, 78% of enterprises will have a multi-cloud environment. With this in mind, if an organization utilises a multi-cloud infrastructure with data centers across the globe, they could be in violation of data sovereignty regulations. What does this mean given the increase in enterprises adopting multi-cloud, and how can we navigate these rules and regulations and keep our data safe and secure.

    Join experts in the field as they discuss:
    - Why data sovereignty matters when choosing your cloud solution
    - When it is and when it isn’t reasonable to expect full containment of your data
    - How to simplify data sovereignty with the cloud
    - Regulatory implications of Internationally distributed collaboration teams
    - How to make data sovereignty and SaaS get along
    - Cloud security compliance
  • BYOD in the Era of Remote Work Oct 13 2021 4:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve and more
    As we move towards a post-pandemic world of WFA (work from anywhere) supporting remote and hybrid working BYOD (bring your own device or devices) has become a standard operating practice. And while there are many financial upsides to BYOD there is also a loss of corporate control over that device.

    An efficient BYOD policy should address the amount of control and visibility the company has over the employee owned device, the tools employees are allowed to use on their personal devices, the rights of the employees when it comes to accessing and retaining data, the security of devices and much more.

    BYOD is more relevant now than ever before: what key considerations must be made when it comes to your BYOD policy, what mistakes must you avoid, and are there compelling reasons for companies to still supply devices rather than go all in on BYOD?

    Join us as we discuss:
    - Managing employee owned devices without sacrificing security and privacy
    - How to equip your employees with the knowledge needed to keep devices safe when working from home
    - What to prioritise when creating your BYOD policy
    - International privacy considerations for BYOD around the globe
    - The future of BYOD; where do we go from here?
  • Cybersecurity in the C-Suite Recorded: Sep 15 2021 56 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
    C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

    Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

    In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

    - To what extent cybersecurity should be a priority in the C-Suite
    - How C-Level execs should consider their role in relation to cybersecurity
    - How training and education can help CISOs navigate increased risk at all business levels
    - And more

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • SASE for the Hybrid Workforce Recorded: Aug 18 2021 62 mins
    Diana Kelley, Host | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security | Charles Kolodgy, Security Mindsets
    In the last year, the move to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models.

    This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? According to many, it’s SASE. SASE provides a flexible, simplistic no-fuss, secure access model and Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE. But what is SASE and why is it being heralded as the future of network security?

    Join us in this episode of The (Security) Balancing Act as security experts discuss:

    - What exactly SASE offers that traditional network security controls don’t
    - How SASE adoption has been in part fuelled by the pandemic, and what this means moving forward into the ’new normal’
    - The future of secure access models, and what to expect over the next 12 months
    - And more
  • Ethical Hackers: Redefining The Security Landscape Recorded: Jul 14 2021 61 mins
    Diana Kelley, SecurityCurve | Jim Richberg, Fortinet | Nuno Almeida, BitSight | Luke Tucker, HackerOne |
    As security breaches and attacks become more sophisticated and complex, managing your vulnerabilities and gaining a human perspective on your security gaps is an effective way to protect your attack surface.

    With 34% of ethical hackers and vulnerability researchers reporting that they have seen more bugs due to pandemic-driven Digital Transformation initiatives (HackerOne), now is the time to integrate a human element into your security controls.

    In this episode of The (Security) Balancing Act we’ll deep dive into the threat landscape, looking at why the insights of an outsider might be just what your organization needs.

    Join us as we discuss:

    - The value ethical hackers and vulnerability researchers can bring to your organization
    - Why ethical hackers and vulnerability researchers are more valuable now than ever before
    - Considerations for crowdsourcing ethical hacking and penetration testing
    - How bug bounty programs benefit companies and the research community
    - What to know if you are thinking of launching a bug bounty program
    - How ethical hackers and vulnerability researchers enhance vulnerability management
    - The 2021 threat landscape
  • Zero Trust for the New Normal Recorded: Jun 16 2021 61 mins
    Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Bob Rudis, Chief Data Scientist, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Ransomware in the Remote Work Era Recorded: May 12 2021 61 mins
    Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Nicole Hoffman, Intelligence Analyst, GroupSense
    - Courtney Radke, CISO for National Retail, Fortinet
    - Patrick Lee, Senior Incident Response Consultant, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Taking Down Nation State Botnets Recorded: Apr 14 2021 59 mins
    Diana Kelley, SecurityCurve | Johna Till Johnson, Nemertes Research | Craig Harber, Fidelis | Derek Manky, Fortinet
    This month's episode of The (Security) Balancing Act will focus on botnets as a growing threat to the enterprise, examples from the real world, and what enterprises can do to better protect against botnet-fueled state sponsored attacks.

    Join this interactive roundtable discussion with security experts and industry leaders to learn more about:
    - How botnets have become a tool for cyber criminals and nation state actors
    - Real-world examples & known botnet attacks
    - Nation state ransomware attacks
    - DDoS attacks
    - Cyber espionage
    - ATPs
    - The trouble with attribution
    - What enterprises and governments can do to address the threat

    Panelists:
    - Johna Till Johnson, CEO and Founder of Nemertes Research
    - Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
    - Craig Harber, Chief Customer Success Officer, Fidelis

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The Future is Identity-Centric Recorded: Mar 17 2021 60 mins
    Diana Kelley, SecurityCurve | Joseph Carson, Thycotic | Dave Farrow, Barracuda | Jeremy Snyder, Rapid7
    Instead of the traditional "castle and moat" model of the past, today the security perimeter is being defined around the identity of the person or the device requesting access. What are organizations doing to protect digital identities in the age of breaches? How are the current trends in identity and access management helping address this issue?

    Join this interactive roundtable discussion with notable security experts to learn more about:
    - The shift to identity-centric security
    - The zero trust mindset
    - What constitutes strong and effective authentication and authorization
    - The role of policy orchestration and enforcement
    - Best practices for protecting identities and managing access across the enterprise

    Panelists:
    - Joseph Carson, Chief Security Scientist and Advisory CISO at Thycotic
    - Dave Farrow, VP, Information Security at Barracuda
    - Jeremy Snyder, Sr. Director, Corporate Development, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Succeeding as a CISO in 2021 Recorded: Feb 17 2021 62 mins
    Diana Kelley, SecurityCurve | Patricia Titus, Markel Corp | Jonathan Nguyen-Duy, Fortinet | Gerald Mancini, Fidelis
    This month's episode of The (Security) Balancing Act will look at how the CISO role has evolved in the last few years, what today's expectations are and what it takes to succeed as a CISO.

    Some of the topics to be covered during this roundtable discussion with security and tech leaders include:
    - How has the CISO role evolved over the last few years and what is expected of CISOs in 2021?
    - CISO vs BISO
    - How to see ROI on your cybersecurity investment?
    - How to get the business to understand risk and care about security?
    - How to keep cyber employees happy. The churn is exhausting and costly for companies, and it’s exacerbated by employee burnout and a “grass is greener” approach.

    Panelists
    - Patricia Titus, Chief Privacy and Information Security Officer, Markel Corporation
    - Jonathan Nguyen-Duy, Vice President, Global Field CISO Team at Fortinet
    - Gerald Mancini, Chief Operating Officer of Fidelis Security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Election Takeaways for Cybersecurity Leaders Recorded: Jan 20 2021 61 mins
    Diana Kelley | Jim Richberg | W. Curtis Preston
    The 2020 US presidential election is behind us, but the key cybersecurity issues surrounding election integrity could linger for years to come. From ransomware attacks on local governments, to the untamed spread of disinformation, to experimenting with online voting apps and the myriad of vulnerabilities uncovered across election infrastructures, cybersecurity had never before taken such a central place in the national conversation as it did in 2020.

    So, what have we learned in the aftermath? And how can we apply it to better protect upcoming elections as well as enterprises, customers and employees?

    Join this interactive panel with security experts and tech leaders to learn the biggest lessons from the election from a cybersecurity and privacy standpoint. Discover what went down, what could have gone better and how to prepare for the midterm elections in 2022.

    - Can we build a hack-free election
    - Does misinformation on social sites impact how people vote and what can be done to stop the spread
    - What was new this time and what should security leaders keep in mind for their organizations
    - Would it be safer if we brought the voting process online or in app
    - Can nation state actors change voter rolls or polling data
    - What the biggest election threats mean for industry
    - Key takeaways for cybersecurity leaders

    Panelists:
    - Jim Richberg, Public Sector Field CISO at Fortinet
    - W. Curtis Preston, Chief Technical Evangelist, Druva

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • 2021 Readiness: Balancing Security in a Post-COVID World Recorded: Dec 9 2020 60 mins
    Diana Kelley | Mark Weatherford | Ted Harrington | Amir Shaked
    Earlier this year many companies experienced an incredible shift to fully remote work almost overnight, in response to the COVID-19 pandemic. This accelerated the “digital transformation” journey for many companies compressing what was a multi-year timeline into a few months and making 2020 different than any other previous year. In this episode we’ll explore how the balance between security, privacy and productivity was tipped this year, and what can we expect to see in 2021 as some, but not all, organizations head back to office work with a post-pandemic mindset.

    The audience will hear from CISOs and Security Directors about how this year was different, what they're going to do differently going forward, and what they expect (or have already seen) as organizations get back to pre-COVID levels.

    Topics covered:
    - 2020 in review
    - The hard lesson that a mobile workforce is not the same as a remote workforce
    - How the attack surface expanded and what CISOs are doing to ensure risk doesn’t expand too
    - How digital transformation sped up and what they meant for security, privacy and productivity
    - During the speedy journey to the cloud - what mistakes were made?
    - Lessons learned that will be carried forward for security teams
    - What CISOs are doing to prepare for whatever 2021 may bring

    Panelists:
    - Mark Weatherford, Chief Strategy Officer and Board Member, National Cybersecurity Center
    - Amir Shaked - VP, R&D, PerimeterX
    - Ted Harrington, Executive Partner, Independent Security Evaluators [ISE]

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Deceiving the Attacker Recorded: Nov 17 2020 56 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    Panelists:
    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing Identity - 1 Year Check-In Recorded: Oct 14 2020 59 mins
    Diana Kelley | Aidan Walden | Shareth Ben | Doug Simmons
    According to Verizon’s 2020 Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involved the use of lost or stolen credentials - and approximately 35% of all breaches were initiated due to weak or compromised credentials.

    Last year, we kicked off The (Security) Balancing Act series with a panel of identity experts to help us understand the landscape. Join us for this 1 year check-in to learn what has changed for organizations in the last 12 months and the security implications of shifting to a more remote workforce.

    - 2020 vs 2019: Key changes & challenges for cybersecurity
    - How work from home has opened the door to attackers
    - Regulatory updates that may impact identity management programs
    - Why attackers are focused on credentials and authentication systems
    - What businesses can do to keep track of all endpoints, manage identities and privileged access, protect their data and maintain compliance

    Panelists:
    - Aidan Walden, Director, Public Cloud Architecture & Engineering at Fortinet
    - Shareth Ben, Executive Director, Insider Threat & Cyber Threat Analytics at Securonix
    - Doug Simmons, Principal Consulting Analyst, Managing Director, Consulting at TechVision Research

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Life on the Front Lines - Staying Sane in the SOC Recorded: Sep 16 2020 57 mins
    Diana Kelley, SecurityCurve | Vinay Pidathala, Menlo Security | Delyan Nestorov, Rapid7 | Charity Wright, Recorded Future
    Join this episode of The (Security) Balancing Act for an insider's view of life on the front lines of cybersecurity.

    This panel will look into what it's like to work in and manage a Security Operations Center (SOC), as well as share best practices for keeping your team of front-line defenders sane, empowered and happy, and your organization secure.

    The topics up for discussion during this episode include:
    - What kind of people are best suited for work in a SOC?
    - What kind of training / certifications / skills are needed to be successful?
    - How to handle alert fatigue and analyst overload?
    - Is automation (ML & AI) the answer?
    - What do you do when IOCs aren't enough?
    - Hunters vs. responders, what's the difference?
    - How the pandemic is impacting security operations?
    - Building a healthy team culture and managing self-care in the age of breaches
    - What's needed to make life easier for these front-line cyber defenders

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Supply Chain Security Recorded: Aug 18 2020 56 mins
    Diana Kelley | Kiersten Todt | Nick Charpentier
    According to new research from Risk Ledger, 60% of security breaches originate in the organization's supply chain; including third party vendors and applications. No matter what business an organization is in, supply chain security and resilience must be factored into business planning to ensure secure, ongoing operations even during times of crisis and disruption.

    Join this panel to learn more about:
    - Types of supply chains (hardware, software, services)
    - Common vulnerabilities in the supply chain
    - Assessing where your security gaps lie and addressing the risk
    - Impact of the COVID-19 pandemic on supply chain security
    - Recommendations for improving security in your supply chain and your risk management program
    - Benefits of Supply Chain Risk Management (SCRM)
    - What is the Cybersecurity Maturity Model (CMM), and how it can improve supply chain security
    - Solutions and approaches that can improve supply chain security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Protecting Your Business from Nation State Attacks Recorded: Jul 21 2020 59 mins
    Diana Kelley | Matt Rider | Etay Maor
    Cyberattacks attributed to foreign governments have been on the rise for years, many against organizations all over the world. These attacks try to steal online account information, infect computers, and compromise the safety of networks. Targets of these attacks include think tanks, university staff, government employees, and even members of organizations focused on human rights issues.

    As these attacks increase in prevalence and sophistication, organizations are taking notice of the threats posed by hostile state actors and state-sponsored cybercriminal groups.

    So, how can businesses protect against them?

    Join today's episode of The (Security) Balancing Act with Diana Kelley to learn whether your business should be concerned about nation state attacks and what to do about it.

    The topics up for discussion will include:
    - State actors & rise in cyber crime
    - How the attackers get in
    - A review of recent nation-state campaigns
    - How does this impact organizations across different verticals (Financial vs Healthcare vs Government)
    - How industry and law enforcement are responding to these attacks
    - How AI and ML may change cybercriminal tactics
    - How to deal with threats from criminals and hostile states

    Panelists:
    - Etay Maor, Chief Security Officer, IntSights
    - Matt Rider, International Engineering Director, Rapid7

    We welcome viewer participation and questions during this interactive panel session.
  • Securing the Remote Workforce Recorded: Jun 30 2020 59 mins
    Diana Kelley | David Sherry | Lee Imrey | Nathan Howe
    Remote working has been a growing trend for the last few years, especially in the tech sector. However, the COVID19 outbreak has really pushed businesses to adopt or accelerate their remote integration plans. How has this affected security? What are the steps companies need to take to better protect their remote workforce?

    Join this episode as we explore the security challenges in the time of COVID, why a strong security culture is important, and what steps to take today.
    - What are the security challenges associated with remote working
    - Examples of changes in cyber-attacks during COVID
    - Managing patching, VPNs, and backups for large and small remote workforces
    - How to maintain auditability and visibility
    - How to enable and keep your remote team secure
    - ​Tips for training end users to help themselves
    - Why a strong security culture matters now more than ever

    Panelists:
    - David Sherry, CISO, Princeton University
    - Lee Imrey, Cybersecurity Advisor, Splunk
    - Nathan Howe, Head of Transformation Strategy, EMEA, Zscaler

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
The (Security) Balancing Act
As we realize the transformative power of the cloud, AI and machine learning, has our culture of responsibility and ethics kept pace? How do we harness our new technological capabilities to the understanding of how to use them well?

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: SASE for the Hybrid Workforce
  • Live at: Aug 18 2021 4:00 pm
  • Presented by: Diana Kelley, Host | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security | Charles Kolodgy, Security Mindsets
  • From:
Your email has been sent.
or close