Cybersecurity Leadership: Identity, Access, Complexity – Digitalmunition




Featured cybersecurity-leadership-identity-access-complexity-showcase_image-1-a-16099.jpg

Published on March 3rd, 2021 📆 | 5510 Views ⚑

0

Cybersecurity Leadership: Identity, Access, Complexity

Governance & Risk Management
,
Identity & Access Management
,
Remote Workforce

CEOs and CISOs on Dealing With the ‘Work From Anywhere’ Challenge

Tom Field (SecurityEditor) •
March 3, 2021    

In this sudden era of “work from anywhere,” identity and access management solutions are challenged more than ever. What are the strategies and solutions recommended by top CEOs and CISOs in the cybersecurity sector? An expert panel weighs in.See Also: Webinar | SolarWinds Breach: If Cyber Companies Can Get Hit, Do You Stand A Chance?
Participating in this latest forum are:
Robert Hill, CEO, Cyturus; Arun Singh CEO, Ilantus; Kim Green, CISO, Rodan + Fields; and Kathy Wang, CISO, VeryGoodSecurity.

In this panel discussion hosted by Information Security Media Group and CyberTheory, these executives discuss:

Visibility into the endpoint;
How to stop network snooping;
Plugging the holes in application security.

Hill has spent over 30 years in IT working to reduce business risk through applied cybersecurity practices, programs and technologies. Prior to founding Cyturus, he worked as a cybersecurity consultant, serving as a frequent speaker on cybersecurity risk.
Singh joined Ilantus in October 2020 after serving as principal and Americas advisory risk leader for cybersecurity at Ernst & Young LLP. He has more than 25 years of experience in running global cybersecurity businesses.
Green, CISO at the manufacturing company Rodan + Fields, has served in several executive and senior-level IT and infosec roles and as an adviser and investor at several security and healthcare companies. With over 25 years’ experience in the private and public healthcare sectors, Green has consulted with federal and state government healthcare agencies and private companies.
Wang, CISO at VeryGood Security, is an internationally recognized malware expert, having researched, developed, evaluated and operationalized solutions for detecting and preventing client-side attacks used by advanced persistent threat groups as they target common digital platforms. She has over 20 years of digital security experience, including at GitLab.

originally appeared on Source link

Tagged with:



Leave a Reply