A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
The GDPR Guy - the podcast dedicated to all things privacy, hosted by Carl Gottlieb - the trusted privacy advisor to leading tech companies, helping them gain maximum advantage through the right privacy strategy. Each episode Carl will be providing information, insights and inspiration to help you on your privacy journey. There'll be regular interviews with leaders in the tech industry about how privacy and security are an essential part of their world. You’ll find show notes and useful reso ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
255: Navigating the AI Minefield: Best Practices for Data Governance - Polymer
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29
Yasser Ali, CEO of Polymer Data Security discusses data security amidst the rise of AI and machine learning, highlighting the increasing complexity of managing data integrity and risks in AI governance. The discussion shifts to AI governance, where Yasser outlines the primary risks, including data leakage, model biases, and the challenge of deep fa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
254: Here’s the Best Way to Achieve Comprehensive Cybersecurity - CyberConnective Corp
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32
Rodrigo Loureiro, CEO of CyberConnective Corporation (C3) emphasizes the importance of understanding and addressing fundamental security measures such as patching servers, closing vulnerable ports, and maintaining up-to-date controls before investing in advanced technologies. He highlights AI's role in enhancing both attack and defense capabilities…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Privacy litigation trends: A discussion with Darren Abernethy
45:16
45:16
Play later
Play later
Lists
Like
Liked
45:16
With the proliferation of comprehensive U.S. state privacy laws in recent years, there’s been an understandable focus by privacy professionals on this growing patchwork. But privacy litigation is also on the rise and the plaintiff’s bar has explored some novel theories, particularly around the use of onlin tracking technologies. Greenberg Traurig S…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
253: Inside the Mind of a Data Privacy Expert - John D. Cook Consulting
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress and challenges organizations face when sensitive information is compromised. We also cover the importanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
252: AI, ML, and NVMe: The Power Trio Driving Data Performance - Graid Technology
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
251: What Everyone Should Know About Immutable Storage - Scality
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
250: Choosing Your Tech Path: Field CTO vs. Technical Evangelist - DataCenterDude
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cybersecurity, this episode offers valuable insights for anyone in the tech industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
249: How Artificial Intelligence is Changing Data Protection - Quantum
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape storage, deduplication, and cloud solutions in modern data protection strategies, while also touching on…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
248: Immutability: Protecting Data Integrity in the Cyber Age - Scality
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
247: Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal - Nutanix
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hybrid and multi-cloud environments, emphasizing the role of customer-managed security policies and the r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
InfoSec Beat: Careers in Information Security – Tech & Ops
21:01
21:01
Play later
Play later
Lists
Like
Liked
21:01
This episode of the InfoSec Beat podcast mini-series focused on information security careers highlights the journey of Arun Chandrasekaran in conversation with Accenture CISO Kris Burkhardt. Listen to how Arun started as a senior network analyst to become infrastructure tools and standards lead today for our Information Security organization’s Tech…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
246: United Front: CISOs Collaborate to Navigate SEC Regulations - ZScaler
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35
Sam Curry, VP & CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is becoming more vulnerable and discusses new reporting standards introduced in 2024. The conversation also…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside the EU AI Act negotiations: A discussion with Laura Caroli
50:14
50:14
Play later
Play later
Lists
Like
Liked
50:14
For many of us following along with the EU AI Act negotiations, the road to a final agreement took many twists and turns, some unexpected. For Laura Caroli, this long, complicated road has been a lived experience. As the lead technical negotiator and policy advisor to AI Act co-rapporteur Brando Benefei, Caroli was immersed in high stakes negotiati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
245: Data Center Hunger Games: Only the Fittest Survive Mergers - Brass Valley
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35
Rocco D'Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance and regulations, chain of custody, and innovations in the ITAD industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
244: Cloud Security Insights: From Innovation to Evangelism - Plerion
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role's unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation officer, emphasizing expertise, opinion formation, and public engagement.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
243: Surviving the Unexpected: From Disaster Recovery to Cyber Recovery - BETSOL
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00
Justin Gesso, Senior Director of Marketing at BetSol, dives into critical disaster recovery strategies, emphasizing the need for thorough planning and testing. He talks about the evolving role of backup administrators in the age of cloud computing and automation, and the importance of maintaining a balance between human oversight and technological …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Top trends in cybersecurity: A chat with James Dempsey and John Carlin
1:07:55
1:07:55
Play later
Play later
Lists
Like
Liked
1:07:55
In tandem with privacy, cybersecurity law is rapidly evolving to meet the needs of an increasingly digitized and complex economy. To help practitioners keep up with this ever-changing space, the IAPP published the first edition of Cybersecurity Law Fundamentals in 2021. But there have been a lot of developments since then. Cybersecurity Law Fundame…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
242: From Vulnerability to Strength: Transforming Your Data Security Posture - Clarify360
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
Jo Peterson, Vice President of Cloud and Security Services at Clarify360 discusses the critical importance of Data Security Posture Management (DSPM) in protecting against modern cyber threats. She covers the essential aspects of understanding exposure and accessibility of data, the importance of determining access levels, and how DSPM benefits org…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
241: Securing Active Directory Against Modern Cyber Threats - Cayosoft
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51
Dmitry Sotnikov, Chief Product Officer at Cayosoft a dives into the rising threat of ransomware, emphasizing the necessity of robust business continuity and disaster recovery plans for active directory. The conversation covers best practices for protecting and recovering Active Directory, the significance of having automated recovery solutions, and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
240: Are LLMs Too Large for Traditional Storage? - OSNEXUS
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Steven Umbehocker, Founder & CEO of OSNEXUS a dives into the current state and future of storage solutions in the age of AI and ML but also ignites a conversation on the readiness of traditional storage systems to handle the massive scale of LLMs. Through technical insights, forward-looking predictions, and practical advice, he highlights the criti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Regulating AI in the UK: A discussion with Lord Holmes
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05
For those following the regulation of artificial intelligence, there is no doubt passage of the AI Act in the EU is likely top of mind. But proposed policies, laws and regulatory developments are taking shape in many corners of the world, including in Australia, Brazil, Canada, China, India, Singapore and the U.S. Not to be left behind, the U.K. he…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
239: The Executive's Guide to Cybersecurity Incidents, Materiality, and the SEC - Clark Hill PLC
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57
Richard Halm, Senior Attorney, Cybersecurity, Data Protection, & Privacy at Clark Hill PLC explores the complexities of the new SEC rule on incident and risk disclosures. We dive into the resurgence of ransomware, the impact of AI on cybersecurity threats, and the critical elements of the SEC's requirements. The episode also covers the crucial conc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
238: Navigating AI, Data Protection, and Beyond - Conexus
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48
Eric Daimler, CEO of Conexusdeep dives into the realms of AI, autonomous technologies, and data security. As a former Presidential Innovation Fellow under the Obama administration, Daimler shares his insights on AI's potential, its implications for data protection, and the revolutionary work of Conexus in solving the data deluge challenge. With dis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
237: From NIST CSF to CMMC: Evolving Cybersecurity Standards Explained - Petronella Technology Group
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34
Craig Petronella, CEO of Petronella Technology Group dives into the complexities of the Cybersecurity Maturity Model Certification (CMMC). We discuss the inception and necessity of CMMC within the defense sector, its evolution from NIST standards, and the challenges of self-attestation. The conversation also touches on the financial aspects of comp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
236: The Intersection of Testing Backups and Tech Layoffs 2024 - Servosity
38:54
38:54
Play later
Play later
Lists
Like
Liked
38:54
Damien Stevens, Founder and CEO of Servosity delves into the critical importance of regular backup testing amidst the landscape of technological advancements and the recent trends in tech layoffs. He navigates through the complexities of maintaining data integrity in a time of tech industry fluctuations, highlighting the essential role of diligent …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
235: How to Store Data Virtually Forever - Cerabyte
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54
Martin Kunze, Founder and Chief Marketing Officer at Cerabyte discusses the long-term durability and efficiency of storing data. This approach addresses issues like data longevity, ecological impact, and the increasing volume of digital information. We also touch on the technical and philosophical implications of preserving digital heritage for fut…
…
continue reading
Accenture CISO Kris Burkhardt hosts a conversation with Harpreet Sidhu, Accenture senior managing director and North America Security lead, who talks about the findings of Accenture’s “The Cyber-Resilient CEO” report. Listen to learn more about today’s cyber challenges, risks, reporting of metrics and practical actions leaders can take to take to e…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
234: Beyond Basics: A Masterclass in AI That's Shaping the Industry! - Pangea Tech Consulting
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19
Dr. Ali Sekmen, CEO at Pangea Tech Consulting, and Chris Jones, Chief Technology Officer discuss the forefront of AI and machine learning, focusing on the development and application of these technologies in solving complex data science and engineering problems. With a blend of academic insight and practical industry experience, the episode delves …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
InfoSec Beat: Careers in Security - Cyber Incident Response
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09
This is the latest episode in an ongoing mini-series covering careers in information security, featuring Accenture people from across our Information Security team. In this episode of InfoSec Beat, Accenture CISO Kris Burkhardt talks with Paula Wlos, who leads cyber investigations for the Americas and Europe as part of the cyber incident response t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
233: Every Second Counts: Identity Orchestration's Answer to Cyber Attacks - Strata Identity
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Gerry Gebel, Head of Standards at Strata Identity explores the evolving landscape of identity management and cybersecurity. The conversation delves into identity orchestration, policy orchestration, the importance of access policies, and the impact of emerging technologies like AI on cybersecurity practices. We also discuss the staggering increase …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
232: The 3-2-1 Rule Revisited: Overkill or a Cybersecurity Must-Have? - Synergy Six Degrees
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13
Kevin Bailey, Chief Analyst and Founder at Synergy Six Degrees talks about the evolving nature of data protection focusing on the 3-2-1 backup strategy and its relevance in modern cybersecurity. Kevin challenges traditional data protection methods, emphasizing the increasing sophistication of cyber-attacks and the importance of protecting active da…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
231: The Maestro of Cyber Defense: A CISO's Guide to Orchestrating Protection - Carbide
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33
Darren Gallop, Co-Founder and CEO at Carbide shares his unique journey from the music industry to leading a cybersecurity firm. The discussion covers a wide range of topics including the importance of leadership in cybersecurity, the evolving role of artificial intelligence in data protection, and the challenges faced by modern Chief Information Se…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
230: The Future of Digital Currencies and Blockchain Security - Mimo
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50
Claude Eguienta, Chief Executive Officer at Mimo discusses the company's role in providing tools and assets for users across different market cycles, particularly in crypto. We dive into the evolution of crypto, the security aspects of blockchain compared to traditional banking, and the potential of Central Bank Digital Currencies (CBDCs). We also …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
229: Dirty Little Secrets of Being a CISO - NeuEon
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46
Candy Alexander, Chief Information Security Officer and Security Practice Lead at NeuEon Inc. discusses the challenges and realities of being a CISO, emphasizing the importance of technical skills, strategic thinking, and effective communication with the C-suite. She further highlights the necessity of understanding and aligning with business strat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
228: Post-Ransomware Attack: Critical Actions You Can't Ignore - Quorum
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27
Gabe Gambill, VP Product and Tech Operations at Quorum provides a detailed guide for individuals and organizations recovering from a ransomware attack. He emphasizes the urgent need for immediate action to isolate and assess affected systems. He advises on the importance of clear communication with stakeholders and law enforcement, and the crucial …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
227: Why Simple Backups Don't Cut It Anymore - Scality
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52
Paul Speciale, Chief Marketing Officer at Scality discuss critical issues in cybersecurity, including ransomware and immutable storage. The episode emphasizes the role of immutable storage in enhancing cybersecurity strategies amidst increasing cyber threats and the integration of AI in data protection. It also highlights the importance of thorough…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Privacy and data protection in 2023: A year in review with Joe Jones
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13
Hard to believe we’re at the twilight of 2023. For those following data protection and privacy developments, each year seems to bring with it a torrent of news and developments. This past year was no different. The EU General Data Protection Regulation turned five, and the Snowden revelations turned 10. From a finalized EU-US Data Privacy Framework…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
226: Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15
Guy Holmes, Founder and CEO of Tape Ark discusses various topics related to data protection, tape storage, and the evolution of data storage technologies. He also talks about the challenges and solutions in migrating legacy tape data to the cloud, enabling innovative uses of historical data. He shares insights on data liberation, and interesting pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
Yoav Nathaniel, CEO of Silk Security, joins us to discuss the transformative role of AI-driven solutions in cybersecurity risk management. Exploring how to leverage AI to enhance security operations and streamline risk assessment processes. Yoav offers unique insights into tackling the overwhelming challenge of managing security alerts. We delve in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Luca Bertuzzi on the EU AI Act political deal and what's next
35:32
35:32
Play later
Play later
Lists
Like
Liked
35:32
After a gruelling trilogue process that featured two marathon negotiating sessions, the European Union finally came to a political agreement 8 December on what will be the world’s first comprehensive regulation of artificial intelligence. The EU AI Act will be a risk-based, horizontal regulation with far-reaching provisions for companies and organi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
224: How Generative AI is Changing the Security Questionnaire Game - Vendict
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35
Udi Cohen, CEO and Co-founder of Vendict explores the groundbreaking impact of generative AI on the security compliance landscape. We dive deep into how this innovative technology is transforming the traditional processes, making the completion of security questionnaires faster, more accurate, and less resource-intensive.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Martin Abrams: A look back at a career in information privacy and consumer policy
51:06
51:06
Play later
Play later
Lists
Like
Liked
51:06
Martin Abrams knows a little something about information privacy and consumer policy. Over the course of the last 40-plus years, Abrams has had his hands in a number of initiatives, including as co-founder and president of the Center for Information Policy Leadership and founder of the Information Accountability Foundation. He took part in the deve…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
223: Ransomware Resilience: Proven Strategies to Render It Powerless - Calamu
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Paul Lewis, CEO of Calamu, goes deep into the evolving landscape of cybersecurity and data protection. He explores cutting-edge strategies for combating ransomware, the role of AI in both offensive and defensive cybersecurity tactics, and the future of data storage solutions. He also shares his expert views on the challenges and solutions in cyber …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
222: Ransom Paid: Now, How Do We Catch Cyber Criminals? - Panther Protocol
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Anish Mohammed, co-founder and CTO of Panther Protocol delves into the use of cryptocurrency in ransomware and data exfiltration, focusing on the traceability of blockchain transactions and the mechanisms for transaction shielding. We also dive into decentralized finance (DeFi), blockchain, and the concept of Web 3.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
EU policymakers discuss the EU AI Act negotiations at DPC23
42:17
42:17
Play later
Play later
Lists
Like
Liked
42:17
The EU AI Act negotiations recently hit a major roadblock after EU Council Member States France and Germany unexpectedly pushed back on the European Parliament's draft position on regulating foundation models. The obstacle was so sudden, it appeared the negotiations were in a stalemate. Though the issue has not yet been fully resolved, the Spanish …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
221: Your Data, Your Rules: Exploring Self-Sovereign Identities - Verida
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Chris Were, CEO and Co-Founder of Verida drops details on self-sovereign identities, security, and how to keep control of your personal data in the midst of cyber incidents on the rise.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
220: The Pitfalls of Cybersecurity Incident Response - Sygnia
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
Oren Wortman, VP of Cybersecurity Services, NA at Sygnia shares invaluable insights on the pitfalls of incident response and the importance of preparation. He emphasizes the adversarial mindset, where understanding and simulating potential attackers' moves is crucial for robust cybersecurity. The conversation touches on the sophistication of cyberc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
219: The Rise of Virtual CISO Neighborhood Watch - Health-ISAC
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
Errol Weiss, Chief Security Officer at Health ISAC dives into cybersecurity, privacy, and data protection discussing the role of CISOs and their responsibilities. We also discuss ransomware attacks and data backup strategies, cybersecurity talent shortages, and internship programs for those aspiring to enter the cybersecurity industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
218: Breaking Down the Hype of Airgap and Immutable Backups - Mr. Backup
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33
We dive deep with W. Curtis Preston, aka Mr. Backup, as we discover the real-world implications, benefits, and truths behind the buzzwords of Airgap and Immutability and learn why they're essential in today's data protection landscape.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
InfoSec Beat: Supplier Cyber Risk Management
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52
Listen to this InfoSec Beat podcast for a conversation about supplier cyber risk management. Accenture CISO Kris Burkhardt and David Wright, the lead of supplier cyber risk management (SCRM) for the Information Security organization at Accenture discuss the importance of third-party supplier risk management and explore how Accenture launched its ow…
…
continue reading