Artwork

Contenuto fornito da Tech Demand. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Tech Demand o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

People-Centric Protection Against Evolving Cyber Threats

38:12
 
Condividi
 

Manage episode 398686163 series 3549583
Contenuto fornito da Tech Demand. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Tech Demand o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection.

This lively discussion focuses on how organizations can elevate their security posture by prioritizing the human element in the cybersecurity landscape. From targeted phishing attacks to insider threats, we explore real-world scenarios and practical strategies to safeguard sensitive data at the endpoint. Join us as we unravel the intricacies of people-centric protection and its role in fortifying your organization's defense against evolving cyber threats.

Join us as we explore the synergy between technology and human behaviour, unveiling a new era in endpoint security. "Insider Insight: Navigating Endpoint Security" is your backstage pass to understanding how Proofpoint's Endpoint DLP and ITM solutions converge to create a robust, people-centric defense against insider threats and data loss across every endpoint your company manages.

  continue reading

2 episodi

Artwork
iconCondividi
 
Manage episode 398686163 series 3549583
Contenuto fornito da Tech Demand. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Tech Demand o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.

In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection.

This lively discussion focuses on how organizations can elevate their security posture by prioritizing the human element in the cybersecurity landscape. From targeted phishing attacks to insider threats, we explore real-world scenarios and practical strategies to safeguard sensitive data at the endpoint. Join us as we unravel the intricacies of people-centric protection and its role in fortifying your organization's defense against evolving cyber threats.

Join us as we explore the synergy between technology and human behaviour, unveiling a new era in endpoint security. "Insider Insight: Navigating Endpoint Security" is your backstage pass to understanding how Proofpoint's Endpoint DLP and ITM solutions converge to create a robust, people-centric defense against insider threats and data loss across every endpoint your company manages.

  continue reading

2 episodi

Tutti gli episodi

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida