
Sign up to save your podcasts
Or
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
4.6
1111 ratings
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
Show Notes: https://securityweekly.com/csp37
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Visit https://securityweekly.com/csp for all the latest episodes!
Follow us on Twitter: https://www.twitter.com/cyberleaders
Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
181 Listeners
2,003 Listeners
370 Listeners
373 Listeners
638 Listeners
1,016 Listeners
322 Listeners
415 Listeners
932 Listeners
175 Listeners
313 Listeners
188 Listeners
73 Listeners
134 Listeners
44 Listeners