Artwork

المحتوى المقدم من Tracy Holtz. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tracy Holtz أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

The Holtz Story

مشاركة
 

Manage series 2903893
المحتوى المقدم من Tracy Holtz. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tracy Holtz أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. This has them investing in cybersecurity technology like never before. In fact, Gartner projects the worldwide information security market will reach $170 billion by next year.As the world’s leading end-to-end technology distributor, Tech Data plays a key role in the cybersecurity supply chain. This puts the company right in the middle of the action, sitting between strategic vendors building defense technology and the troops in the field working with companies to prevent security breaches. Tech Data’s point person for security is Tracy Holtz, Vice President, Security Solutions, Americas. “The Holtz Story” is where Tracy shares what she is hearing from both the security vendor’s and channel partner’s perspectives. Hear Tracy and her guests discuss threat levels, specific threats, and what strategic vendors and businesses are doing right now to adapt to the rapidly evolving threat landscape.
  continue reading

28 حلقات

Artwork

The Holtz Story

updated

iconمشاركة
 
Manage series 2903893
المحتوى المقدم من Tracy Holtz. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Tracy Holtz أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
A war between cybercriminals and businesses is raging. The global pandemic only served to increase the volume of hacked and breached data. As everyone began working from home everyday resources like mobile phones and IoT devices became targets. In fact, data breaches exposed over 36 billion records in the first half of 2020 alone according to RiskBased.Additionally, recent security research suggests most companies have unprotected data and poor cybersecurity practices in place, making them vulnerable to data loss. This has them investing in cybersecurity technology like never before. In fact, Gartner projects the worldwide information security market will reach $170 billion by next year.As the world’s leading end-to-end technology distributor, Tech Data plays a key role in the cybersecurity supply chain. This puts the company right in the middle of the action, sitting between strategic vendors building defense technology and the troops in the field working with companies to prevent security breaches. Tech Data’s point person for security is Tracy Holtz, Vice President, Security Solutions, Americas. “The Holtz Story” is where Tracy shares what she is hearing from both the security vendor’s and channel partner’s perspectives. Hear Tracy and her guests discuss threat levels, specific threats, and what strategic vendors and businesses are doing right now to adapt to the rapidly evolving threat landscape.
  continue reading

28 حلقات

Tutti gli episodi

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع