
Sign up to save your podcasts
Or
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
4.6
1111 ratings
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
1,966 Listeners
360 Listeners
628 Listeners
367 Listeners
179 Listeners
1,015 Listeners
314 Listeners
392 Listeners
929 Listeners
167 Listeners
187 Listeners
314 Listeners
78 Listeners
117 Listeners
33 Listeners