Looks like the publisher may have taken this series offline or changed its URL. Please contact support if you believe it should be working, the feed URL is invalid, or you have any other concerns about it.
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية


1 Andrianna Natsoulas: Don't Cage Our Oceans 40:50
16. Top Considerations When Building Your Security Architecture
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on February 27, 2024 06:01 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 274459924 series 183220
How do you know if your cybersecurity investments are being made in the right areas? Our collective rush to remote work has exposed additional surface ripe for security attacks. Spending may also be on the rise but, hopefully, not at the expense of strategy.
In this new TEC37 episode from World Wide Technology (WWT), Robb Boyd and WWT security experts Kent Noyes, Chris Konrad and Mark Wall, discuss the danger of running towards shiny objects, the importance of an architectural approach, the benefits of using value-stream mapping to identify workflow contributions to risk, and the rise of SecDevOps and security automation.
From WWT: 3 Considerations When Building Your Security Architecture
83 حلقات
Fetch error
Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on February 27, 2024 06:01 (
What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.
Manage episode 274459924 series 183220
How do you know if your cybersecurity investments are being made in the right areas? Our collective rush to remote work has exposed additional surface ripe for security attacks. Spending may also be on the rise but, hopefully, not at the expense of strategy.
In this new TEC37 episode from World Wide Technology (WWT), Robb Boyd and WWT security experts Kent Noyes, Chris Konrad and Mark Wall, discuss the danger of running towards shiny objects, the importance of an architectural approach, the benefits of using value-stream mapping to identify workflow contributions to risk, and the rise of SecDevOps and security automation.
From WWT: 3 Considerations When Building Your Security Architecture
83 حلقات
Wszystkie odcinki
×
1 Networking: Segment Routing and SD-WAN - It Doesn't Have to Be One or the Other 38:02

1 A&O: Automate Your Infrastructure with AIOps 37:29

1 Security: 5 Security Priorities for 2022 37:49

1 Networking: Five Networking Priorities for 2022 45:43

1 A&O: Achieving Full Stack Observability with AIOps 38:20

1 Digital Workspace: Top 5 Priorities for Digital Workspace in 2022 39:00

1 Digital Workspace: Breaking Down the Barriers to Achieving an Anywhere Care Workspace 42:27

1 53. A&O: Accelerate AIOps Adoption with Cisco FSO 40:39

1 52. Security: The Four Pillars of Cyber Resilience 38:04

1 51. Digital Workspace: What’s Next for Customer EX and Workforce Productivity? 39:54

1 50. Cloud: Get the Most Out of Your Hybrid Cloud 40:04

1 49. Are You ACTUALLY Ready for a Private Cloud? 39:35

1 47. Digital Workspace: Is the Cloud the Right Place for Your Virtual Desktops? 36:24

1 46. Data Center: Data Insights: How to Make Accelerated Data Driven Decisions 39:01
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.