Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Securing Edge Computing Use Cases by Aligning to Business Outcomes - Theresa Lanowitz, Scott Stout - BSW #325

Securing Edge Computing Use Cases by Aligning to Business Outcomes - Theresa Lanowitz, Scott Stout - BSW #325

FromSecurity Weekly Podcast Network (Audio)


Securing Edge Computing Use Cases by Aligning to Business Outcomes - Theresa Lanowitz, Scott Stout - BSW #325

FromSecurity Weekly Podcast Network (Audio)

ratings:
Length:
58 minutes
Released:
Oct 24, 2023
Format:
Podcast episode

Description

As the CISO role continues to transform from a technician to a risk manager, how do you secure emerging technologies, such as edge computing? By aligning to business objectives. In this segment, Theresa Lanowitz from AT&T Cybersecurity and Scott Stout From Cisco help us break down the challenges of the CISO and how to align security requirements to business outcomes to solve the emerging edge computing use cases. During the interview, we will tackle the Hospital at Home and Manufacturing edge computing uses cases. Tune in for this collaborative session from two of the leading cybersecurity giants. This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attcybersecurity to learn more about them! In the leadership and communications section, Cybersecurity should be a business priority for CEOs, What CISOs Should Exclude From SEC Cybersecurity Filings, Effective Communication: The Key to Workplace Success, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/bsw-325
Released:
Oct 24, 2023
Format:
Podcast episode

Titles in the series (100)

For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.