
Sign up to save your podcasts
Or
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
4.6
1111 ratings
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
1,983 Listeners
365 Listeners
636 Listeners
366 Listeners
183 Listeners
1,009 Listeners
312 Listeners
415 Listeners
925 Listeners
166 Listeners
189 Listeners
314 Listeners
74 Listeners
127 Listeners
43 Listeners