This week, we welcome Kevin O'Brien, Co-founder and CEO at GreatHorn, to discuss email security.
Merlin Namuth is a former CISO. Namuth has over 24 years of IT experience with the last 21 years focused in security. His experience includes building and running numerous security programs, program management, managing incident response teams, computer forensics, compliance, architecture, and engineering complex security solutions.
In the leadership and communications section, Two Big Reasons that Digital Transformations Fail, DevSecOps model requires security get out of its comfort zone, 3 things CIOs should discuss with the CEO to optimize cybersecurity, and more!
In this segment, we'll share the results of our Security Weekly 25 Index Survey, which we completed earlier this year.
It's our quarterly security money segment and we'll review the Security Weekly 25 index.
In the leadership and communications section, The 5 Enemies of Trustworthy Leadership, 5 Things Leaders Do That Stifle Innovation, 'What's Your Purpose'? Big Tech's 7 Favorite Interview Questions, and more!
Ty Sbano is the Cloud Chief Information Security Officer of Sisense. Ty graduated from Penn State University with a B.S. in Information Science & Technology and from Norwich University with a M.S. in Information Assurance. He currently holds a CISSP, CEH, CCSK and CPT. To learn more, please visit – tysbano.com.
In the articles, they cover Why New Leaders Should Make Decisions Slowly, The Missing Ingredient in Kraft Heinz’s Restructuring, Shift to digital business is booming, but are CEOs ignoring associated risk?, and much more!
In the leadership and communications section, Of the 4 manager types, only 1 boosts employee performance 26%, How to Look and Sound Confident During a Presentation, 2020 IT spending priorities — and the traps a cloud shift creates, and more!
Jeff Costlow is the Head of Security at ExtraHop. Organizations looking to embrace the speed and flexibility of the cloud need to shift gears in security as well, moving towards a cloud-first approach that combines complete visibility with behavioral- and- rule-based threat detection. Learn how the SOC Visibility Triad pairs network detection and response with endpoint detection and response and SIEM tools in order to help you strengthen your cloud security posture.
To learn more about ExtraHop, visit: https://securityweekly.com/extrahop