InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Brick House: The Evolution of Identity within Your Security Stack

Presented by

Joe Leonard, CTO & VP, Security Strategy | Kevin Converse, Identity and Access Management Practice Lead

About this talk

Watch our candid conversation on Evolution of Identity within Your Security Stack. With the risk landscape continuing to grow, do you ever wake up at night wondering if you have all the right defenses in place? While Identity has always played (or at least, always should have played) a vital role in cybersecurity, recent changes to the ways we structure our organizations, networks, and offices have amplified the importance of Identity across the board. This month, CISO & VP, GRC Services at GuidePoint Security, Gary Brickhouse, and his guests are discussing the changes that have already occurred, and how to prepare for the changes that are certainly coming in the future. The Brick House is a monthly panel discussion with GuidePoint Security’s CISO, Gary Brickhouse, and his expert guests examining the hottest topics in cybersecurity. There are no talking heads here, just honest conversations examining the problems we all face in cybersecurity. Gain insights from security practitioners who have current, real-world experience solving the most complex cybersecurity challenges.
GuidePoint Security Channel

GuidePoint Security Channel

6410 subscribers102 talks
Your Trusted Cybersecurity Advisor
The GuidePoint Security Channel features presentations by leading real-world certified practitioners in the fields of AppSec, Cloud Security, Digital Forensics, Government Risk & Compliance, Identity & Access Management, Incident Response, Penetration Testing, Security Operations, Vulnerability Management and more.
Related topics