ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Verodin

  • Securing the Future Through Education

    Tune into the Cybersecurity Effectiveness podcast to listen to Helen Patton, CISO for Ohio State University, talk about her thoughts on undergraduate university programs and the importance of providing guidance for students who are passionate about cybersecurity.

  • The Cybersecurity Effectiveness Podcast: Nick Andersen

    As CISO of the State of Vermont, Nick Andersen is involved in everything from healthcare to emergency management to academia. In this podcast, listen as he and Brian dive into the crucial priorities for the state, differences between protecting state and business data, and establishing third-party relationships to neutralize risk.

  • The Cybersecurity Effectiveness Podcast: Mike Fabrico

    Download this podcast to listen as Mike Fabrico, former specialist at NASDAQ and Senior Director at TrapX Security, breaks down deception as a strategy—not just a tool—to provide organizations with the ability to turn the tables on their opponents.

  • The Cybersecurity Effectiveness Podcast: MacKenzie Brown

    In this podcast, listen as Microsoft Detection and Response Team (DART) consultant MacKenzie Brown describes how her love of theatre led her to her current work with incident response (IR) and becoming co-founder of the Ms. Greyhat Organization.

  • Cybersecurity Effectiveness Podcast: Ed Amoroso

    Tune into this episode of the Cybersecurity Effectiveness Podcast to hear Brian Contos chat with Ed Amoroso, former SVP and CSO of AT&T and current CEO of TAG Cyber LLC, about priorities and advice for building a top-notch security team.

  • The Cybersecurity Effectiveness Podcast: Richard Seiersen

    Seasoned cybersecurity veteran Richard Seiersen, current SVP & CISO at LendingClub and former VP of Trust and CISCO for Twillio, attributes success in any career to two things: metrics and measurement. In this podcast, he shares his contagious passion for security, the qualities of top engineers, his latest book, and more.

  • How to Test Your Security Effectiveness

    Download this white paper to learn about the Verodin Security Instrumentation Platform (SIP)—which uses a signal to continuously validate the layered defenses in your infrastructure to ensure they're optimally configured and working as expected.

  • Cybersecurity Effectiveness Podcast: Featuring Greg Martin

    The Cybersecurity Effectiveness Podcast: The Age of the Intelligent SOC features JASK CEO and Co-Founder, Greg Martin. In this episode, hear his predictions about the key cybersecurity challenges that organizations will be facing in the near future as well as the ground-breaking developments in AI and SOC automation.

  • Remove Assumptions, Prove Security

    With no visibility into their cybersecurity effectiveness beyond a point in time, organizations have grown accustomed to holding a reactionary stance when managing their cybersecurity risks. Learn about Verodin SIP, an evidence based approach to managing your cybersecurity lifecycle.

  • The Cybersecurity Effectiveness Podcast: Richard Stiennon

    In this podcast, listen to Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, discuss how security is maturing at the executive leadership level.

  • Ulf Lindq Podcast

    In this podcast episode, host Brian Contos and Dr. Ulf Lindqvist, the Senior Technical Director of SRI International's Computer Science Laboratory discuss the future of IoT devices, how the security industry has changed, and more. Tune in to learn more

  • Security Instrumentation for Incident Response Teams

    Effective incident response conditioning requires an ongoing feedback loop between offense and defense. In this brief, learn about the key security benefits of The Verodin Security Instrumentation Platform (SIP) including bridging the gap between offense and defense and improving incident prevention and detection configurations.

  • Cybersecurity Effectiveness Podcast: Raj Samani

    In a security professional's career, a nearly perfect success rate can be quickly and detrimentally tarnished by one mistake that puts the company at risk. In this podcast, Raj Samani, Fellow and Chief Scientist at McAfee, shares his professional journey in security.

  • Cybersecurity Effectiveness Podcast: Malcolm Harkins

    In this podcast, Cylance Chief Security and Trust Officer Malcolm Harkins reflects on his core leadership philosophies and the processes he implements to cultivate a professional culture of excellence. Listen as he discusses his transition from working at Intel, to joining the cybersecurity start-up, Cylance.

  • The Cybersecurity Effectiveness Podcast: Bill Crowell

    This podcast concentrates on the massive changes in cyberthreats over the last 15 years and how well the security industry has coped with those changes. Listen to Bill Crowell, who has a 57-year history in the Security and Intelligence world, and Brian Contos, CISO of Verodin, ransomware, DDoS attacks, APTs, and more.

  • Cybersecurity Effectiveness Podcast: Terry Ray

    According to Terry Ray, SVP, Fellow, and former CTO of Imperva, Inc., practices and safety around data privacy and the cloud, though slowly improving, still leave much to be desired. In this podcast, he and Brian Contos discuss the concept of absolute security.

  • Cybersecurity Effectiveness Podcast: IJay Palansky

    While appealing new gadgets and innovative products continue to hit the market, legal firms caution organizations about the risks of IoT devices. In this podcast, technology-focused trial litigator IJay Palansky forecasts the impending boom of cyber litigation in the coming years and provides recommendations for avoiding an attack.

  • Cybersecurity Effectiveness Podcast: Mark Bagley

    Cyber threat research is not all created equal – especially in the realm of security instrumentation. In this podcast, Mark Bagley, VP of Product at Verodin, highlights the core objectives of the Behavioral Research Team (BRT) and provides direction for scaling your organization's defenses with improved durability and efficiency in mind.

  • The Urgent Need for Security Instrumentation

    In this IT Harvest report, cybersecurity research analyst and bestselling author Richard Stiennon tackles the fundamental flaws in traditional cybersecurity assessments, compliance and policies. Read on to explore a new, evidence-based approach to validating cybersecurity effectiveness and aligning it to the business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.