Artwork

Conteúdo fornecido por Tech Demand. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Tech Demand ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

People-Centric Protection Against Evolving Cyber Threats

38:12
 
Compartilhar
 

Manage episode 398686163 series 3549583
Conteúdo fornecido por Tech Demand. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Tech Demand ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection.

This lively discussion focuses on how organizations can elevate their security posture by prioritizing the human element in the cybersecurity landscape. From targeted phishing attacks to insider threats, we explore real-world scenarios and practical strategies to safeguard sensitive data at the endpoint. Join us as we unravel the intricacies of people-centric protection and its role in fortifying your organization's defense against evolving cyber threats.

Join us as we explore the synergy between technology and human behaviour, unveiling a new era in endpoint security. "Insider Insight: Navigating Endpoint Security" is your backstage pass to understanding how Proofpoint's Endpoint DLP and ITM solutions converge to create a robust, people-centric defense against insider threats and data loss across every endpoint your company manages.

  continue reading

2 episódios

Artwork
iconCompartilhar
 
Manage episode 398686163 series 3549583
Conteúdo fornecido por Tech Demand. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Tech Demand ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In this part two of our podcast series on transformation endpoint data security, we are joined by Richard Zaluski, the CEO of CSCIS (Centre for Strategic Cyberspace + International Studies), and once again by Proofpoint’s EMEA Cybersecurity Strategist, Carl Leonard, who into delve into the crucial aspect of people-centric protection.

This lively discussion focuses on how organizations can elevate their security posture by prioritizing the human element in the cybersecurity landscape. From targeted phishing attacks to insider threats, we explore real-world scenarios and practical strategies to safeguard sensitive data at the endpoint. Join us as we unravel the intricacies of people-centric protection and its role in fortifying your organization's defense against evolving cyber threats.

Join us as we explore the synergy between technology and human behaviour, unveiling a new era in endpoint security. "Insider Insight: Navigating Endpoint Security" is your backstage pass to understanding how Proofpoint's Endpoint DLP and ITM solutions converge to create a robust, people-centric defense against insider threats and data loss across every endpoint your company manages.

  continue reading

2 episódios

Todos os episódios

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências