InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CISO Security Tips to Manage the “End” of COVID-19

Presented by

Jo Peterson | Clarify360, Tyler Cohen Wood | Dark Cryptonite, Matthew Rosenquist | Elicpz.io, Robert Uno | Pricesmart

About this talk

With the post-pandemic work environment taking shape, CISOs must now come to terms with permanently remote and hybrid workforces, the decline of VPNs and perimeter-based security technologies and other inalterable changes. At this “point of no return,” security leaders require an updated roadmap to effectively manage new and improved cyber threats and a user base stretched out across locations doing work with third party and non-sanctioned applications. Attackers are growing sneakier and more sophisticated in penetrating the less defined barriers of the new workforce. CISOs should rethink old strategy and risk models in order to secure their companies in this destabilized post-pandemic world. Tune into this panel discussion including top experts in the cybersecurity sphere and discover how CISOs and other security leaders can guide their companies into a safer future. Some of the key discussion points will include: - Top threats predicted to strike in 2023 and how security leaders can prepare. - How to phase out legacy security technologies that may no longer be effective in this post-pandemic work world. - The biggest challenges brought forth by hybrid and remote workforces and how to address them. - Rethinking and re-organizing your organization’s risk model.
Information Security

Information Security

259719 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics