
Sign up to save your podcasts
Or


Deep dive video episode: A Japanese Tech giant, Fujitsu’s transition toward an "attack-resilient" security posture by integrating global IT asset management with a specialized dual-loop governance model. The primary structure of the text details how the company shifts from traditional perimeter defenses to a "Zero Trust" framework, where every user and device must be authenticated and all vulnerabilities are proactively identified via centralized visualization and autonomous scanning. Key themes include the Inner Loop, which empowers local departments to manage their own technical risks, and the Outer Loop, which provides high-level CISO oversight and management accountability through real-time data dashboards. Ultimately, the source serves to define a cohesive corporate strategy that harmonizes international regulatory standards, such as GDPR and NIST, with a human-centric culture of continuous training and incident drills to protect the company's global digital infrastructure.
By Dead Inside by 9:05Deep dive video episode: A Japanese Tech giant, Fujitsu’s transition toward an "attack-resilient" security posture by integrating global IT asset management with a specialized dual-loop governance model. The primary structure of the text details how the company shifts from traditional perimeter defenses to a "Zero Trust" framework, where every user and device must be authenticated and all vulnerabilities are proactively identified via centralized visualization and autonomous scanning. Key themes include the Inner Loop, which empowers local departments to manage their own technical risks, and the Outer Loop, which provides high-level CISO oversight and management accountability through real-time data dashboards. Ultimately, the source serves to define a cohesive corporate strategy that harmonizes international regulatory standards, such as GDPR and NIST, with a human-centric culture of continuous training and incident drills to protect the company's global digital infrastructure.