Hi [[ session.user.profile.firstName ]]

Are Your Endpoints Secured and Ready for Work in a 5G World?

Today many businesses are connected! Yes, people are connected via laptops, tablets, and smart phones – but many businesses are also connected in other ways. For example, manufacturing lines for some businesses are automated and connected through a series of sensors and cameras. These new and unique connections are happening through endpoints of all types – endpoints with humans such as laptops and endpoints that are autonomous such as IoT endpoints that are continuously collecting data. And, we are seeing a surge in endpoints as more businesses adopt and implement 5G and edge networking. But more endpoints mean an expanded attack surface into your network that can take just a fraction of a second to compromise.

Are you prepared to protect your endpoints at the speed and pace of this 5G world? Do you have the right technical staff and solutions in place to automate security policies across a variety of endpoints? If even one of your endpoints is compromised, is your business resilient enough to overcome the breach?

Join us to gain insight into:
• Why speed is key to protecting your endpoints
• Why protection against ransomware and business continuity matters in today’s competitive world
• Why using a managed security service to protect your endpoints helps your business act faster and with greater confidence

Join Jared Phipps, SVP Solutions Engineering at SentinelOne and Theresa Lanowitz of AT&T Cybersecurity as they discuss how to protect and manage your endpoints to deliver strong business outcomes.
Recorded Sep 28 2021 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jared Phipps, SVP Solutions Engineering at SentinelOne and Theresa Lanowitz of AT&T Cybersecurity
Presentation preview: Are Your Endpoints Secured and Ready for Work in a 5G World?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust Fundamentals Nov 16 2021 8:00 pm UTC 28 mins
    Bindu Sundaresan, Director AT&T Cybersecurity and Derrick Johnson, Practice Director, Cybersecurity Consulting
    Organizations globally, are embracing Zero Trust (ZT) as a meaningful, strategic approach to security, whether deploying ZT as part of a digital transformation initiative or to better protect an increasingly distributed network and workforce. However, many security leaders continue to struggle with where to start on their ZT journey and how to provide for a successful roll out.

    Join AT&T Cybersecurity for an expert session on how to best prepare, smartly plan for achieving Zero Trust and learning:

    • Who to put on your Zero Trust team to help work toward success
    • What essential factors must be considered ahead of time
    • Where to start when assessing your organization's readiness for Zero Trust
    • Why Zero Trust strategy and planning must happen from the inside out
    • How to avoid common pitfalls when starting (or continuing) your progression to ZT targets
  • How to manage access control with Zero Trust Nov 9 2021 6:00 pm UTC 65 mins
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism
    A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO)

    Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Access control has always been a part of ZT, however in 2019 Forrester formalized the requirement to “limit and strictly enforce access control” into a core, critical pillar of the framework — of equal importance to network security. Controlling and maintaining access to the business without disrupting operations has reached a new level of importance. Especially now that businesses are dealing with the needs of a sudden, remote workforce and increasingly embrace mobile, cloud, and edge computing.

    Join us in a conversation with the AT&T Chief Security Office (CSO) as we discuss its current point of view on how to manage access control using ZT principals, including best practices. In this webinar, we’ll discuss:

    -What steps you can take to help improve access control and move closer to a ZT environment
    -Why network segmentation and virtualization are so important
    -How to use automation and orchestration for managing and dynamically enforcing access
    -Why you should define security policy by network components (versus IP addresses) and how to extend multi-factor authentication

    Meet Your Hosts:
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Steve Sekiguchi
    Director, Cybersecurity for AT&T Chief Security Office (CSO)
    Rich Bowman
    Lead Member of Technical Staff for CSO
  • New (and free) analysis tools for the cyber threat hunter Nov 3 2021 4:00 pm UTC 60 mins
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • How to help protect your organization with Managed Threat Detection and Response Oct 26 2021 4:00 pm UTC 58 mins
    Haley Mathis: Senior PMM, AT&T Cybersecurity, Skylar Talley: Lead PMM - AT&T Cybersecurity
    With more access to resources than ever before, cybercriminals are rapidly scaling their operations and constantly shifting their tactics to exploit new vulnerabilities and slip past perimeter-based controls undetected. This makes every organization a potential target for a cyberattack, regardless of size, industry, or location. To help defend against modern cyberattacks, organizations need more than just advanced security protection and prevention controls like firewalls and antivirus solutions. Organizations need a way to continuously monitor what’s happening on their networks, cloud environments, and critical endpoints and to quickly identify and respond to potential threats

    That’s where managed detection and response (MDR) services come in. MDR services can help organizations improve their real-time threat monitoring and incident response capabilities while alleviating the need to deploy, staff, and maintain your own security technology stack.

    Join us for this special session to learn how AT&T Managed Threat Detection and Response can help you:

    Better protect your business from security events that could harm your brand and your bottom line.
    Accelerate your security and compliance goals and realize a rapid return on your cybersecurity investment.
    Grow your business with a cybersecurity solution that adapts and scales to continually meet your needs.
    We'll also provide a demo of our award-winning USM platform and AT&T Alien Labs threat intelligence so you can learn how to help protect your organization.

    Register today to save your seat.
  • Making it safer for your business to innovate Recorded: Oct 19 2021 13 mins
    Theresa Lanowitz - Director, AT&T Cybersecurity
    Making it safer for your business to innovate:

    Cybersecurity has matured from a technology problem to a business imperative. Organizations should lead with a security-first mindset and focus on what is important – delivering better business outcomes through innovation.

    Meet Your Host
    Theresa Lanowitz
    Director, AT&T Cybersecurity
  • Risk-Based Vulnerability Management: Protecting Your Business Outcomes Recorded: Oct 14 2021 51 mins
    Bindu Sundaresan, Clint Harris, John Stahmann
    New attack vectors are identified daily! Threat actors are actively seeking ways to breach your network; whether through an expanded attack surface of IoT devices, changing operational priorities, or adoption of emerging technologies. With every change comes the risk that a new flaw or configuration issue will provide a threat actor with the final link in their attack chain.

    To help mitigate the risk of attack via these new vectors, organizations should investigate a vulnerability management platform that is architected to have visibility, an improved prioritization of vulnerabilities, and automation of remediation. Changes in the way software is developed and released, specifically via containers and cloud, is precipitating the evolution in vulnerability management.

    Join Bindu Sundaresan and Clint Harris of AT&T Cybersecurity Consulting along with John Stahmann from Digital Defense, Inc. to discuss:
    Why vulnerability management is an important component in the modern application lifecycle
    How a vulnerability management platform can help to reduce risk and deliver positive business outcomes
    Why orchestration and automation are important part of vulnerability management
    How to drive operational efficiency into your cybersecurity budget

    Speakers:

    Bindu Sundaresan
    Director
    AT&T Cybersecurity

    Clint Harris
    Principle Architect
    Cyber as a Service

    John Stahmann
    Director of Sales Engineering
    Digital Defense, Inc.
  • Securing your mobile workforce with strong mobile defense Recorded: Oct 12 2021 53 mins
    Lisa Ashjian,PMM-AT&T Cybersecurity,Clint Harris,Principle Architect-AT&T Business Hank Schless, Director-AT&T Cybersecurity
    Mobile devices have dramatically enhanced an organization’s ability to perform, and in some cases, have enabled all new business models to emerge. This next generation mobile workforce also exposes business data to more risks making mobile devices one of today’s most significant security challenges. Hackers have evolved to bypass traditional security controls that don’t account for mobile operating systems and leave businesses vulnerable to attacks.

    Because of this changing mobile landscape, mobility must be treated as an inherent characteristic of the organization and integral to effective cybersecurity practices. Businesses must evaluate the unique needs of mobile devices to both operate as enablers of productivity while being properly secured from emerging threats when accessing sensitive data.

    Join AT&T and Lookout to learn how to assess the performance and risks of mobile devices and how to create ongoing benchmarks of success.

    In this webinar, we will explore:

    -The unique threats on mobile devices and mobile risk profiles
    -Ways to align mobile security to organizational performance outcomes including compliance requirements
    -Types of analysis needed to detect and manage risk on mobile devices
    -Ways to improve mobile security, limit risks, and improve productivity
  • Are Your Endpoints Secured and Ready for Work in a 5G World? Recorded: Sep 28 2021 33 mins
    Jared Phipps, SVP Solutions Engineering at SentinelOne and Theresa Lanowitz of AT&T Cybersecurity
    Today many businesses are connected! Yes, people are connected via laptops, tablets, and smart phones – but many businesses are also connected in other ways. For example, manufacturing lines for some businesses are automated and connected through a series of sensors and cameras. These new and unique connections are happening through endpoints of all types – endpoints with humans such as laptops and endpoints that are autonomous such as IoT endpoints that are continuously collecting data. And, we are seeing a surge in endpoints as more businesses adopt and implement 5G and edge networking. But more endpoints mean an expanded attack surface into your network that can take just a fraction of a second to compromise.

    Are you prepared to protect your endpoints at the speed and pace of this 5G world? Do you have the right technical staff and solutions in place to automate security policies across a variety of endpoints? If even one of your endpoints is compromised, is your business resilient enough to overcome the breach?

    Join us to gain insight into:
    • Why speed is key to protecting your endpoints
    • Why protection against ransomware and business continuity matters in today’s competitive world
    • Why using a managed security service to protect your endpoints helps your business act faster and with greater confidence

    Join Jared Phipps, SVP Solutions Engineering at SentinelOne and Theresa Lanowitz of AT&T Cybersecurity as they discuss how to protect and manage your endpoints to deliver strong business outcomes.
  • Fireside Chat: Diving into Software, SASE and Security Recorded: Sep 23 2021 31 mins
    Patrick Sullivan CTO of Security Strategy, Akamai and Theresa Lanowitz Director, AT&T Cybersecurity
    We are living in a software-defined world – our applications, infrastructure, network, and security controls are all built by software that is nimble and resilient. And, to add even more excitement to a software-defined world, we are embarking on a new era of compute being led by 5G and edge computing. To deliver the best possible user experience, data will live at the edge and the creation and consumption of that data will be faster than previously imagined.

    Today, with virtually a blank slate to create new software-driven business ideas, organizations are realizing the walls of the enterprise have been shattered, the traditional compute device has morphed to include a wide variety of IoT devices, and all of this must be highly secure. With the journey to the edge underway, organizations are moving to security frameworks such as Zero Trust and SASE (Secure Access Service Edge) to help protect the boundary-less enterprise. What do these frameworks mean to your enterprise as you adapt to new business models and new revenue streams?

    With businesses wanting to gain a competitive advantage using 5G and edge computing, it is important to include security in the process. How is your organization securing the edge? How are you thinking about delivering near real-time immersive experiences that are highly secure?

    Join us to gain insight into:

    Why Zero Trust matters moving forward
    Why SASE is a logical step in the next era of compute
    Why what you do today will impact the security of your data, applications, assets, and systems in the future
    Join Patrick Sullivan, CTO of Security Strategy at Akamai, and Theresa Lanowitz of AT&T Cybersecurity as they discuss what this new world of edge computing looks like and how to help make it highly secure.
  • Securing the new everywhere workplace in a 5G enabled world Recorded: Sep 21 2021 37 mins
    Jay Bhansali - Sr. Director Product Marketing, Ivanti and Theresa Lanowitz – Director, AT&T Cybersecurity
    In this new hyper connected world, businesses are using technology to access information faster, enable all new experiences, and build stronger collaboration across both humans and machines- no matter where they are located. But this hyper connected world has also led to an explosion of devices that need to be monitored, managed, and secured creating challenges for businesses to maximize the value of these 5G enabled world.

    In order to best streamline this new environment, businesses need to take a Zero Trust approach with the endpoints accessing their network. Zero Trust strategies require visibility into what endpoints are on your network and limiting users’ access to only those applications and systems needed to perform their job. Finally, keeping up with the latest cyber threats and application updates before bad actors take advantage of security gaps can make staying ahead a never-ending challenge.

    During this webinar, join Jay Bhansali, Sr. Director Product Marketing, Ivanti and Theresa Lanowitz of AT&T Cybersecurity to learn how implementing a successful Zero Trust approach is possible in this 5G world and managing and securing endpoints can be streamlined so that you can stay focused on business outcomes.

    *Securing the everywhere workplace with a Zero Trust approach

    *Driving efficiency by eliminating passwords with Zero Sign-On

    *Reducing risk and remaining compliant by closing the applicationpatching gap

    * Protecting against the latest cyberthreats in this new 5G world
  • AT&T Cybersecurity Insights Report™: 5G and the Journey to the Edge Recorded: Sep 14 2021 57 mins
    Theresa Lanowitz Tawnya Lancaster
    The tenth edition of the AT&T Cybersecurity Insights™ Report: Transitioning to 5G is here – the data is in, the analysis is complete, and we can’t wait to share this new report with you!
    The use cases for 5G are unlimited and only constrained by imagination! But, with all these new ways to take advantage of low-latency, high-speed, and reliable computing, how are organizations preparing cybersecurity practices, policies, and procedures?

    The AT&T Cybersecurity Insights™ Report: Transitioning to 5G looks at how organizations are thinking about cybersecurity as we begin to transition to a world of Edge computing and IoT connectivity, led by a transition to 5G. This webcast examines global data on cybersecurity and the future of computing.

    Join us to gain insight into:
    •Organizational drivers for 5G business differentiation and competitiveness
    •Cybersecurity for 5G preparedness and what a shared responsibility model looks like
    •Zero Trust and the rationale behind the framework as organizations approach 5G implementation

    Join Theresa Lanowitz and Tawnya Lancaster of AT&T Cybersecurity as they reveal some of the most thought-provoking observations from our new industry-standard report.

    Hosts:
    Theresa Lanowitz
    Tawnya Lancaster
  • The Science of Cybersecurity: Best Practices in the New Normal Recorded: Sep 3 2021 59 mins
    Theresa Lanowitz, Director, AT&T Cybersecurity and Phil Quade CISO, Fortinet
    As organizations adapted quickly to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. As you navigate this new workforce dynamic, how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity” as we discuss best practices organizations can put in place quickly, efficiently, and effectively to protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
    -Why training your employees for cybersecurity resiliency is critical for your business
    -Best practices to allow for inoculating your network and remote workers against threats
    -How to be prepared and plan for what’s next
  • Why third-party risk assessments matter for compliance & risk management Recorded: Aug 24 2021 53 mins
    Bindu Sundaresan - Director, Carisa Brockman - Risk Advisory, Jake Johnson - VP Strategic Partnerships
    Creating and maintaining third-party relationships are associated with multiple risks. Risks include data compromise, illegal use of information by third parties, the detrimental and damaging effects of non-compliance, and irregularities in supply chain management.

    Exchanging operational data and confidential information with third parties can make that data and information vulnerable to misuse and exploitation, adding risk to the equation.

    In today's complex, outsourced environment, it's critical to step up Third-Party Risk Management (TPRM) initiatives to protect both reputation and revenue, gain a clear view of the third-party ecosystem, and adopt a proactive approach to manage associated risks.

    Join this webinar with AT&T Cybersecurity Consulting and FortifyData to learn:

    -Some insights and best practices around managing supply chain cyber risk given the supply chain transformation that has taken place.
    -How next-generation third-party cyber risk management is a powerful strategy that every business should have in their arsenal.
  • Tenets of an Effective SASE Solution Recorded: Aug 17 2021 48 mins
    Kumar Ramachandran, Senior Vice President of Products, Theresa Lanowitz, Director & Mary Blackowiak, Lead Product Manager
    The year 2020 accelerated our business lives at an unprecedented rate. Challenges that would have been addressed over years became top-of-mind drivers in what is now our new normal environments. The rapid business transformation meant that technology needed to keep pace. Legacy technologies quickly gave way to the need for more centralized visibility and the convergence of SD-WAN networking controls with cybersecurity to provide a secure access service edge (SASE).

    SASE helps organizations modernize their networks, provide unified security, and create digital trust. This approach helps to connect and protect your users and your edge to support innovation and improve user experiences.

    The new normal marches on with a hybrid workforce, growing cloud adoption, and digital transformation initiatives front and center. SASE solutions offer a holistic view of the entire network platform and provide protection and access without compromising performance from a single and unified cloud-delivered platform.

    Join AT&T Cybersecurity and Palo Alto Networks to learn:

    -How SASE solutions can help your organization prepare for the new normal.
    -Why organizations are considering a SASE solution
    -How to best plan your SASE journey

    Meet Your Hosts:
    Kumar Ramachandran, Senior Vice President of Products – Palo Alto Networks
    Theresa Lanowitz, Director – AT&T Cybersecurity
    Mary Blackowiak, Lead Product Marketing Manager – AT&T Cybersecurity
  • The Science of Cybersecurity: Best Practices for Business in Asia Pacific Recorded: Dec 18 2020 57 mins
    Theresa Lanowitz Director, AT&T Cybersecurity Phil Quade CISO, Fortinet
    As organizations across Asia Pacific continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity.” We will discuss best practices organizations can put in place to quickly, efficiently, and effectively help protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
    -Why training your employees for cybersecurity resiliency is critical for your business
    -Best practices to help protect your network and remote workers against threats
    -How to be prepared and plan for what’s next
  • The Science of Cybersecurity: A new way of thinking for European Organizations Recorded: Dec 17 2020 60 mins
    Director, AT&T Cybersecurity Phil Quade CISO, Fortinet
    As organizations across Europe continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity.” We will discuss best practices organizations can put in place to quickly, efficiently, and effectively help protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    -What we’ve learned about enhancing cyber defenses for the “new normal” business expectations

    -Why training your employees for cybersecurity resiliency is critical for your business

    -Best practices to help protect your network and remote workers against threats

    -How to be prepared and plan for what’s next
  • Building Blocks for a Cyber Resilient 2021 and beyond Recorded: Dec 10 2020 57 mins
    Bindu Sundaresan, Director, AT&T Cybersecurity Derrick Johnson, Principle Architect, Cyber Operations, AT&T Cybersecurity
    There is no more business as usual. Rapid and dramatic changes concerning how and where personnel perform their daily responsibilities require companies to provide that their security infrastructure, controls, processes, and plans are updated and operational. 2020 has been a year full of change, and we've gone through digital transformation initiatives in the span of a single year that probably would have taken us many years.

    Join us for a 1-hour webcast as our AT&T Cybersecurity Consulting team discusses steps you can take to help build resilience now, especially when the future feels less than certain. Designed for CIOs, CISOs, and security experts facing new challenges on the front line, topics will cover:

    • Cyber Transformation & Risk Management
    • Cloud Security Architecture and Path to Zero Trust
    • Managing Compliance with a remote workforce
    • Threat and Vulnerability Management and Rapid Response

    The pressure is on to maximize - possibly reduce - your IT/security spend, but you know that cybersecurity is critical. In this webcast, we will cover priorities for 2021 Cybersecurity as you work towards Cyber Resilience.

    Hosts:

    Bindu Sundaresan, Director, AT&T Cybersecurity
    Derrick Johnson, Principle Architect, Cyber Operations, AT&T Cybersecurity
    Carisa Brockman, Principal Architect, Risk Advisory, AT&T Cybersecurity
    Clint Harris, Principle Architect, Cyber as a Service
  • The Science of Cybersecurity: Digital Transformation in Retail Recorded: Dec 3 2020 43 mins
    Courtney Radke Fortinet National Retail CISO Theresa Lanowitz Director, AT&T Cybersecurity
    Retail as an industry has been in a transformational mode for the past several years – add a pandemic and consumers wanting to do everything from the safety of their computer screens and the pace of change increases at an unprecedented rate.

    Retail organizations are working closely with cybersecurity professionals to lead with a security-first mindset to help provide that personally identifiable information (PII) is protected, the expanded attack surface with an increase in connected devices is highly secure, and the IT systems supporting the retail business are up to date and managed.

    Join Courtney Radke, Fortinet National Retail CISO and Theresa Lanowitz, AT&T Cybersecurity for an informative 30-minute conversation about the changing face of retail and how to proactively lead digital transformation activities with a security-first mindset to help drive desired business outcomes.

    Courtney and Theresa will discuss:

    How retail is adapting to new demands through use of innovative technologies
    Why IoT is a key enabler for digital transformation and why the expanded attack surface should be proactively managed
    How to lead with a security-first mindset to help deliver desired business outcomes
  • Building Blocks for your 2020 Security Program Recorded: Nov 18 2020 55 mins
    Danielle Russell, Lead Product Marketing Manager, AT&T Cybersecurity Bindu Sundaresan, CISSP, CEH, CISM - Directo
    Is one of your New Year's resolutions to reduce your cyber risk in 2020? If so, do you know where to start? Join us for this special session webcast, in which we'll discuss the building blocks that make for an effective security and compliance program for organizations of any size.

    Join this webcast to learn how solutions from AT&T Cybersecurity, can help you to:

    Determine your current security posture and make a prioritized plan for improvement
    Centralize security monitoring across multi-cloud and on-premises environments
    Automate threat detection and incident response activities for improved efficiency
    Consolidate your regulatory compliance requirements to help accelerate audit readiness
    Maintain continuous security monitoring all year long
    Register today to reserve your seat. Here's to a secure 2020!
  • A conversation about leading with a security-first mindset Recorded: Nov 16 2020 34 mins
    Donnie O'Sullivan, CNN and Alicia Dietsch, CMO, AT&T Cybersecurity
    In honor of National Cybersecurity Awareness month, we’re talking about leading with a security-first mindset. Our current global landscape is testing network resiliency. As organizations continue to shift to a remote work business model, the rush to deploy digital and cloud solutions has created new and heightened cyber risk concerns. Protecting these digital connections needs to stay top of mind for leaders looking to help their organizations adapt to these changes while continuing to innovate.

    Join CNN’s Donie O’Sullivan for a conversation with Alicia Dietsch, CMO, AT&T Cybersecurity, as she shares the biggest risks facing organizations today, and considerations for CISOs in adapting to the ever-changing landscape.
Edge-to-Edge cybersecurity solutions.
AT&T Cybersecurity’s edge-to-edge technologies provide phenomenal threat intelligence, collaborative defense, security without the seams, and solutions that fit your business. Our unique, collaborative approach integrates best-of-breed technologies with unrivaled network visibility and actionable threat intelligence from Alien Labs researchers, Security Operations Center analysts, and machine learning – helping to enable our customers around the globe to anticipate and act on threats to protect their business.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Are Your Endpoints Secured and Ready for Work in a 5G World?
  • Live at: Sep 28 2021 5:00 pm
  • Presented by: Jared Phipps, SVP Solutions Engineering at SentinelOne and Theresa Lanowitz of AT&T Cybersecurity
  • From:
Your email has been sent.
or close