Player FM - Internet Radio Done Right
Checked 1M ago
Added two years ago
Content provided by Microsoft. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Microsoft or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Uncovering Hidden Risks
Mark all (un)played …
Manage series 3395050
Content provided by Microsoft. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Microsoft or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us!
…
continue reading
Hosted on Acast. See acast.com/privacy for more information.
19 episodes
Mark all (un)played …
Manage series 3395050
Content provided by Microsoft. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Microsoft or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Uncovering Hidden Risks explores how enterprises can reduce their risk by moving to a more holistic approach to data protection. Each episode will feature a panel of Microsoft security professionals and community security experts. They’ll dive into topics like data governance, internal and external threats, risk management and compliance, industry trends, and customer challenges. Listen in to the podcast and follow us!
…
continue reading
Hosted on Acast. See acast.com/privacy for more information.
19 episodes
All episodes
×U
Uncovering Hidden Risks
1 Navigating Multicloud Security Risks: A Customer Story 17:52
17:52
Play Later
Play Later
Lists
Like
Liked
17:52Christian Koberg Pineda, Principal Security DevOps Engineer, Cloud Security & Innovation, Falabella joins Erica Toelle and guest host Bojan Magusic, on this week's episode of Uncovering Hidden Risks. In today's episode Erica, Christian and Bojan explore the complexities of managing security across multiple cloud platforms, highlighting the importance of standardization and centralized management. They also cover some of the challenges in identity management, securing cloud-native applications, and the evolving role of AI in both enhancing and threatening cloud security. Christian and Bojan share with Erica the need for innovative, adaptable approaches to stay ahead in the rapidly changing cloud security landscape. In This Episode You Will Learn : Importance of standardization and centralization for security solutions Centralizing identity management to handle multiple identity providers Implementing security checks in development pipelines to detect vulnerabilities Some Questions We Ask: What should organizations consider when standardizing CSPM across multiple clouds? How can organizations defend against next-gen AI attacks on cloud infrastructure? What future factors will impact securing multi-cloud environments? Resources: Download the “ 2024 State of Multicloud Security Report " today to identify your greatest risks and learn actionable strategies for strengthening multicloud security. View Christian Koberg Pineda on LinkedIn View Bojan Magusic on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Understanding Cloud Native Applications Protection Platform (CNAPP) 42:11
42:11
Play Later
Play Later
Lists
Like
Liked
42:11Giulio Astori , Principal PM at Microsoft, joins Erica Toelle and guest host Yuri Diogenes on this week's episode of Uncovering Hidden Risks. Giulio Astori works as a Principal Program Manager for Microsoft Defender for Cloud and Yuri has been at Microsoft for the past 18 years and manages a Product Management team for the Defender for Cloud Product. In this discussion, Giulio delves into the world of Cloud Native Application Protection Platforms (CNAPPs), explaining their significance and utility in enhancing cloud security and protecting workloads. He explores the distinction between CNAPPs and Cloud Security Posture Management, shedding light on their roles in bolstering organizational security. In This Episode You Will Learn : What a Cloud Native Application Protection Platform is and why it's useful The difference between CNAPP and Cloud Security Posture Management How organizations can start to plan for CNAPP adoption Some Questions We Ask: Why is a CNAPP crucial for improving Cloud security and workload protection? Do you have any tips for how organizations can increase their maturity level? What distinguishes CNAPP from Cloud Security Posture Management in bolstering security? Resources: View Giulio Astori on LinkedIn View Yuri Diogenes on LinkedIn View Erica Toelle on LinkedIn From planning to deploying to operationalizing, the complete guide to implementing a CNAPP strategy is here - aka.ms/mscnapp Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Securing the Digital Frontier: Global Regulatory Readiness with Microsoft 33:54
33:54
Play Later
Play Later
Lists
Like
Liked
33:54Beau Faull , Technology Specialist at Microsoft and Asia Security Strategy Leader, Dmitry Butko , join guest host Manny Sahota on this week's episode of Uncovering Hidden Risks. Today's episode sets the stage for a detailed exploration of regulatory challenges, cybersecurity trends, and Microsoft's approach to ensuring regulatory readiness in the digital landscape. Beau discusses Australian and global regulations, emphasizing the need to meet industry standards like GDPR and the Essential 8, while Dmitry expresses excitement about the increasing focus on regulatory compliance. The discussion highlights the complexities of balancing technology solutions with regulatory compliance, the importance of responsible data management practices, and the evolving culture of cybersecurity within organizations. In This Episode You Will Learn : The vital role of general counsel in tech solutions and compliance decisions Misconception surrounding AI's role in surfacing security issues within organizations The importance of aligning technology solutions with regulatory requirements Some Questions We Ask: How Microsoft integrates security in product development? What are some global cybersecurity trends, particularly in regions like Australia? How does Microsoft Copilot ensure global regulatory compliance? Resources: View Beau Faull on LinkedIn View Dmitry Butko on LinkedIn View Manny Sahota on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
Jef Kazimer , Microsoft's Principal Product Manager, and Bailey Bercik , Senior Product Manager, join Erica Toelle and guest host Lisa Huang-North on this week's episode of Uncovering Hidden Risks. Today's episode will focus on security in the era of cloud and AI, with insights from Microsoft Security's product team. It will encompass AI-driven security measures, data protection, identity management, and compliance in the cloud while providing valuable insights for professionals navigating the evolving landscape of cloud security and AI's influence on it. Together, they discuss the importance of basic security hygiene, the implications of sophisticated AI-based attacks, and the necessity of adopting a defense-in-depth strategy to protect against emerging threats. In This Episode You Will Learn : The use of generative AI in attack vectors like phishing and social engineering Principles of zero trust and how they apply to AI systems Challenges and opportunities for securing identity and access in 2024 Some Questions We Ask: How can organizations leverage Microsoft’s Zero Trust framework to protect their data? What are the best practices when implementing passwordless authentication? Are the principles of Zero Trust still relevant to this new wave of threats? Resources: View Lisa Huang-North on LinkedIn View Jef Kazimer on LinkedIn View Bailey Bercik on LinkedIn View Erica Toelle on LinkedIn MITRE ATLAS: MITRE | ATLAS™ Book: Not with a Bug but with a Sticker Blog Post: Demystifing LLMs and Threats. Based off of my presentation for CSA | by Caleb Sima | csima | Medium Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of N2K media network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 How to Master Risk and Compliance Initiatives 37:50
37:50
Play Later
Play Later
Lists
Like
Liked
37:50Patrick Chavez , Chief Privacy Officer at Edward Jones, joins Erica Toelle and guest host Mark Diamond, CEO of Contoural, on this week's episode of Uncovering Hidden Risks. Patrick leads the firm's privacy efforts and develops and implements policies and processes for preparing for and responding to cyber and privacy incidents. He also oversees the firm’s Records and Information Management Program within the Legal Division. He provides legal guidance and advice to the firm’s business areas on eDiscovery, privacy, information and data security and protection, and information governance. Contoural is the largest independent provider of strategic Information Governance consulting services, including records management, privacy, litigation readiness, and employee collaboration. Contoural is also a trusted advisor to more than 30% of the Fortune 500 plus many mid-size and public sector organizations. In This Episode You Will Learn : How to successfully execute policies and meet regulatory requirements Management tools for privacy, eDiscovery, and Information Security conflicts How Edward Jones aligns its legal support for privacy and records management. Some Questions We Ask: How have you seen companies successful in building senior-level support? What is the most significant barrier to creating a unified or federated approach? How should organizations consider policy creation to ensure they can be executed? Resources: View Patrick Chavez on LinkedIn View Mark Diamond on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Microsoft Threat Intelligence Podcast Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week's episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs. In This Episode You Will Learn : Why more tools bring less security, but organizations still adopt them When organizations should allocate resources to optimize data security How security leaders can lead their teams with the goal of enhancing all-up security posture Some Questions We Ask: How can organizations enhance their data security posture? Should organizations purchase best-of-suite or best-of-breed solutions? What advice do you give organizations with the challenge of using isolated solutions? Resources: View Herain Oberoi on LinkedIn View Tina Ying on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Security Unlocked Security Unlocked: CISO Series with Bret Arsenault Microsoft Threat Intelligence Podcast Secure the Job: Breaking into Security Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Cloud Security Posture Management: Top Risks and Best Practice Solutions 30:37
30:37
Play Later
Play Later
Lists
Like
Liked
30:37Drew Nicholas, Microsoft Principal Security Global Black Belt, joins Erica Toelle and guest host Daniela Villarreal, Sr. Product Marketing Manager for Microsoft Defender for Cloud, on this week's episode of Uncovering Hidden Risks. Drew has spent eight-plus years at Microsoft in different roles. These roles include working for Microsoft's consulting services, Microsoft's customer-facing Incident Response team, and his current position. Drew, Erica, and Daniela provide insight into hidden risks in cloud-native apps to help customers gain visibility and control of their cloud security posture to take a risk-based approach to proactive cloud security. In This Episode You Will Learn : How cloud security posture fits into the big picture of security Qualities organizations should look for in a cloud security posture management tool How different platforms can help strengthen cloud security posture Some Questions We Ask: Regarding cloud-native application development, what security trends have you seen? Why is cloud security posture so important? What risks can a unified security posture management approach help address? Resources: View Drew Nicholas on LinkedIn View Daniela Villarreal on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Cybersecurity 101: What Are the Three Pillars of a Robust Strategy 36:30
36:30
Play Later
Play Later
Lists
Like
Liked
36:30Cybersecurity is not just a defensive strategy; it can be a powerful driver of an organization's success. In this episode, host Erica Toelle talks to Nashid Shaker , AVP, Information and Cyber Security Strategy at Canadian Western Bank Financial Group, and Antonio Maio , Managing Director at Protiviti, about how to tactically create a cybersecurity strategy that aligns with business goals, fosters trust, and enables innovation. Nash is an experienced and innovative cybersecurity leader passionate about orchestrating secure digital transformations that fuel growth—leveraging a multidisciplinary background in strategic planning and cybersecurity. In This Episode You Will Learn : When it’s time to re-evaluate your cybersecurity strategy. What cybersecurity leaders should think about today to prepare for a future that will use AI. Predictions for cybersecurity in the next 2-4 years. Some Questions We Ask: What is the top risk that organizations tend to overlook? What are some tips for how cybersecurity leaders should engage with the c-suite? Can cybersecurity contribute to an organization's bottom line or mission? Resources: View Nash Shaker on LinkedIn View Antonio Maio on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 How eDiscovery Can Help You Reduce Data and Risks in Three Steps 21:21
21:21
Play Later
Play Later
Lists
Like
Liked
21:21As data volumes continue to balloon, it's becoming clear that the quickest path to victory does not involve the fewest steps. This month's episode of Uncovering Hidden Risks explores ways to defensibly move data minimization decisions upstream to collaboratively expedite the eDiscovery process. EJ Bastien, Director of Discovery Programs at Microsoft, joins Erica Toelle and guest host Caitlin Fitzgerald for the discussion. EJ leads the eDiscovery and Litigation Support team at Microsoft. EJ shares his experience using technology to address the challenges of eDiscovery in the modern cloud world and shares some strategies and best practices to help mitigate risk. In This Episode You Will Learn : Advice for organizations trying to handle the growing amount of new data types Best practices for implementing an effective eDiscovery strategy Why you should be excited about the future of eDiscovery Some Questions We Ask: What trends are you seeing that are affecting the eDiscovery space? How you are approaching some of the new technology innovations? What benefits are there to using Purview eDiscovery Premium internally at Microsoft? Resources: View EJ Bastien on LinkedIn View Caitlin Fitzgerald on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Don’t Get Caught Unprepared: Three Steps to Manage the Risks of Multicloud 21:30
21:30
Play Later
Play Later
Lists
Like
Liked
21:30This month's episode of Uncovering Hidden Risks discusses the risks of running a multicloud strategy and how customers can think about this as they accelerate their digital transformation. Ashish Kumar, Principal PM Manager at Microsoft, joins Erica Toelle and guest host Daniel Hidalgo on this week's episode of Uncovering Hidden Risks. Ashish has over 25 years of experience in Engineering, Consulting, and Technology sales, helping businesses build products, increase revenue and market share, enhance branding, and lower operational costs. Ashish discusses the intersection between security and compliance, why knowing your posture is essential, and how we can have a safer digital world. You can also check out Ashish's book, "Managing Risks in digital transformation." In This Episode You Will Learn : The risks involved when you operate a multi-cloud environment The importance of having real-time view of your cloud configuration and associated threats Some Questions We Ask: What is multi-cloud, and why is it important? Can you share some takeaways for listeners looking to implement a multi-cloud strategy? What is the main difference between hybrid and multi-cloud? Resources: View Ashish Kumar on LinkedIn View Daniel Hidalgo on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Three Steps to Master Information Governance in Your Organization 31:04
31:04
Play Later
Play Later
Lists
Like
Liked
31:04Randolph Kahn, a globally recognized leader in information governance and President of Khan Consulting, joins Erica and guest host Natalie Noonan on this week's episode of Uncovering Hidden Risks. Randolph has been an expert witness in significant court cases and is a trusted advisor to corporations and governmental agencies. He is also an accomplished author, speaker, and adjunct professor of Law and Policy of Electronic Information and The Politics of Information. Randolph and Erica discuss Information Governance and the industry trends they are currently seeing in this space. In This Episode You Will Learn : How the increase in regulations affects current data management trends Why organizations are suffering information mismanagement failures If current technology capabilities and functionality are sufficient Some Questions We Ask: What requirements are important for information governance? Why should organizations take advantage of newer technologies? What's next after an organization has clearly identified its new requirements? Resources: View Randolph Kahn on LinkedIn View Natalie Noonan on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Cloud Native Data Loss Prevention: The Future of Data Security 26:28
26:28
Play Later
Play Later
Lists
Like
Liked
26:28Maithili Dandige, Partner Group Product Manager at Microsoft, joins Erica Toelle and guest host Shilpa Bothra on this week's episode of Uncovering Hidden Risks. Maithili's team is behind Microsoft Purview products such as Information Protection, Data Loss Prevention, Data Lifecycle Management, Records Management, eDiscovery, and Audit. Maithili discusses Data Loss Prevention, some recent DLP research, and what's upcoming in this space. In This Episode You Will Learn : The journey of DLP solutions and where the market is today What customers should be expecting from DLP solution providers The benefits of adopting a cloud-native solution Some Questions We Ask: What do you see as the future of DLP space? How can you empower your users to make the right data-handling decisions? What trends do you currently see evolving? Resources: View Maithili Dandige on LinkedIn View Shilpa Bothra on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Three Steps to Build a Comprehensive Data Security Strategy 21:12
21:12
Play Later
Play Later
Lists
Like
Liked
21:12Raman Kalyan, Director of Product Marketing, Microsoft and former podcast host, joins Erica Toelle and guest host Liz Willets on this week's episode of Uncovering Hidden Risks. Raman's team leads product marketing initiatives to increase broad enterprise adoption and awareness of Microsoft 365 Risk Management and Investigation solution categories while partnering closely with leaders across engineering, planning, and strategy teams to determine and recommend critical product/service investments. Raman discusses why a comprehensive data security approach is an essential consideration for companies, how to implement an effective data security strategy, and what he sees as the future of the data security space. In This Episode You Will Learn : What it means to have a comprehensive data security approach How you can leverage insights from risky insider activities Why comprehensive data security should matter Some Questions We Ask: What does an end-to-end data protection strategy look like? How do you balance data security without hindering employee productivity? When should teams get started on their data security strategy? Resources: View Raman Kalyan on LinkedIn View Liz Willets on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 Tips for Internal Investigations While Maintaining Privacy 24:12
24:12
Play Later
Play Later
Lists
Like
Liked
24:12Randyll Newman, Supervisor of Student Data and Information Security for Prince William County Public Schools in Virginia, joins host Erica Toelle and guest host Christophe Fiessinger on this week's episode of Uncovering Hidden Risks. Randyll oversees the planning, operation, and management of security for the school division's network infrastructure, data, and student information systems. He also served 10 years as a police officer and detective in Fairfax County, Va., retiring from the United States Naval Reserves after serving 26 years. Randyll discusses how organizations approach internal investigations, how important it is to maintain privacy for students and faculty during these investigations, and examples from previous case studies. In This Episode You Will Learn : Prince William County Public Schools' reputation for innovative education How important it is to maintain privacy for students and faculty Business requirements for internal investigations Considerations and adherence to regulatory compliance: Family Educational Rights and Privacy Act (FERPA); and Children’s Internet Protection Act (CIPA) Tips and advice for other organizations Some Questions We Ask: What principles guided the initiative to ensure user privacy? Can you outline the privacy principles you follow during investigations? How did you design the technical solution to meet these business requirements? Resources: For more background, read the PWCS Case Study View Randyll Newman on LinkedIn View Christophe Fiessinger on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
U
Uncovering Hidden Risks
1 How Compliance, Data Protection, and Privacy Come Together 27:03
27:03
Play Later
Play Later
Lists
Like
Liked
27:03Alym Rayani, General Manager for Compliance and Privacy Marketing at Microsoft, joins host Erica Toelle and guest host Hammad Rajjoub on this week's episode of Uncovering Hidden Risks. Alym works closely with engineering leadership to drive product strategy and roadmap while overseeing the product value proposition, marketing efforts, and customer experience. Due to these changes in regulations and increased cybersecurity risk, these areas are converging. Erica, Hammad, and Alym are taking a closer look at a top industry trend: convergence of compliance, data protection, and privacy requirements, and discussing what this means for Chief Information Security Officers. In This Episode You Will Learn : What areas create quick wins for organizations that create momentum for larger initiatives What the answer is for CISOs to stay in compliance with regulations Risks CISOs will face focusing on data protection without considering compliance and privacy Some Questions We Ask: What challenges are CISOs, privacy officers, and CCOs seeing from this convergence? How are data protection and privacy changing the way CISOs approach new problems? What should CISOs look for in a data protection technology solution? Resources: View Alym Rayani on LinkedIn View Hammad Rajjoub on LinkedIn View Erica Toelle on LinkedIn Related Microsoft Podcasts: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Uncovering Hidden Risks is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.