Preview Mode Links will not work in preview mode

CIO Talk Network Podcast

Aug 26, 2022

While the zero-trust security model may offer excellent defense against emerging, unrecognized, and unpredictable threats, a piecemeal implementation approach, significant commitment for ongoing administration, and productivity concerns pose daunting challenges preventing organizations from adopting it fully. So...


Aug 5, 2022

Security breaches have increased in frequency and severity, with high-profile cases appearing almost weekly. In addition, third-party relationships, including contractors, cloud services, and other outsourced providers, are introducing new vulnerabilities and increasing the attack surface. So how effective are the...


Jul 3, 2022

There’s no question that people are the weakest link in Cybersecurity. So we invest in educating people about security risks and how to handle them. We try building cybersecurity champions who can help spread the word about good security practices. We introduce incentive programs for “security-first” behaviors....


May 31, 2022

To support digital, an organization needs to develop custom software applications or use third-party software packages and tools, migrate workloads and infrastructure to the cloud, and standardize management and governance of multi-cloud environments. First, however, security must be ingrained holistically to...


Dec 8, 2021

Organizations want their security investments to achieve intended results and drive significant positive ROI like any business function. For such clarity, how much security organizations need and how much they should pay must be calculated based on operations and technology costs, risks mitigated, and benefits realized....