
Sign up to save your podcasts
Or
Follow Fedinsider on LinkedIn
In the first of a two part special of Feds At the Edge, we took the conversation to Austin, Texas where we gathered top thought leaders to explore how their local organizations are combatting cyber threats in a post COVID world.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working.
We look at how Application Program Interfaces (APIs) can act as a gateway and attack point for outsiders, and how something as simple an Infosec Academy can give your staff the training it needs to protect personal data – no computer science degree necessary.
We will also address the double-edge sword of automation. While it speeds up processes and allows platforms to talk to each other, it’s vital that system administrators use Identity, Credential and Access Management, and know where the gaps are to provide endpoint protection.
Join us for the start of this amazing special on your favorite podcasting platform today.
5
55 ratings
Follow Fedinsider on LinkedIn
In the first of a two part special of Feds At the Edge, we took the conversation to Austin, Texas where we gathered top thought leaders to explore how their local organizations are combatting cyber threats in a post COVID world.
This week we’re diving right in with data, more specifically the expanded cyber landscape full of personal data malicious actors gained easier access to as the workforce transitioned into remote working.
We look at how Application Program Interfaces (APIs) can act as a gateway and attack point for outsiders, and how something as simple an Infosec Academy can give your staff the training it needs to protect personal data – no computer science degree necessary.
We will also address the double-edge sword of automation. While it speeds up processes and allows platforms to talk to each other, it’s vital that system administrators use Identity, Credential and Access Management, and know where the gaps are to provide endpoint protection.
Join us for the start of this amazing special on your favorite podcasting platform today.