DiscoverLive Stream | ISSQUARED
Live Stream | ISSQUARED

Live Stream | ISSQUARED

Author: Live Stream | ISSQUARED Solutions

Subscribed: 0Played: 1
Share

Description

The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.

The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
12 Episodes
Reverse
Accelerated digital transformation and the increasing adoption of hybrid work have placed businesses under enormous pressure to deal with a staggering number of users across various applications, devices, and platforms. Many organizations are striving to keep up with expanding proliferation of identities and systems.  Join Suchinth Kumar (CRO at ISSQUARED) and Neville Mendonca (Senior Architect - IAM at ISSQUARED) for a discussion on the emerging trends in IAM and best practices for managing identities in this age of cloud and hybrid work culture.  During the show, they explore Cloud infrastructure entitlement Management (CIEM) and how this identity-centric SaaS solution enables businesses to manage cloud identities and their entitlements in hybrid and multi-cloud infrastructure and services.
Where do we start on the journey of Zero Trust?  Let’s find out together what role Authentication plays in the Zero Trust Architecture. Join host Nikolay Chernavsky (CISO at ISSQUARED, Inc.) and guest Shahrokh Shahidzadeh (CTO, SecureAuth) on the live streaming show Cyber Talk with Nikolay
When it comes to the Zero Trust model, the hard question is where to start the journey. Watch this episode where host Nikolay Chernavsky (CISO at ISSQUARED), and guest Shahrokh Shahidzadeh (CTO at SecureAuth) explore what it takes to implement Zero Trust in the identity space. Implementing Zero Trust in the authentication process is a step in the right direction which can lead to the reduction of cyber breach exposure by 85%.
SIEM solutions aggregate a lot of data across enterprises from various systems and applications. This rich data collection could be tapped to solve many use cases in non-security-related areas. Watch this episode to find out in-depth what other problems NextGen SIEM can help solve. Join Nikolay Chernavysky (CISO at ISSQUARED) with the co-host Suchinth Kumar (CRO at ISSQUARED) as they explore what you can do to help your organization in staying ahead of the threat actors.
Cyber Security and Risk Management go hand in hand. Every successful Cyber Security program requires a great deal of articulating the risk and its mitigation techniques.   Please join us in this episode as we explore what it takes to understand and properly characterize Cyber Security risks.
As Information Technologies continue to grow and transform, the transformational process changes the information security controls of organizations. Not so long ago the main objective of Information Security was to secure the firewall-defined perimeter. #Clouds, #SaaS, #Data Exchanges have extended and in many cases removed the perimeter altogether and brought new challenges to the information #security table to take care of in the form of APIs, #Cloud #Services, and a #software defined perimeter. APIs are a new frontier that Information Security practitioners need to pay close attention to. Securing #APIs is a challenging effort and requires a creative approach. 
SIEM technologies have been around for more than 20 years now. Cyber Security professionals heavily rely on them to aggregate, correlate, and help to find the proverbial needle in the haystack. Yet, after 20 years of trying, in many ways we still haven’t found the needle.  Next-Generation SIEM technologies take a different approach in finding the needle and in many ways provide Cyber Security Professionals with the vital information necessary to prevent an event before it happens.  Join the show to find out and learn what you can do to help your organization in staying ahead of the threat actors.  The security breach is an adverse scenario and most businesses that prioritize their data will put IT security experts and technologies to work as a defender against anyone who might try to cause trouble.
Join Suchinth Kumar (CRO at ISSQUARED) for a discussion on the latest industry trends in Identity and Access Management (IAM) in 2022 and beyond as businesses look to maintain centralized control and visibility over the remote and distributed workforce.  Today, it is critical for security and risk management leaders to implement a more flexible IAM infrastructure to meet the changing needs of your organization.
Did you know that Active Directory is the prime target for cyber attackers to access all connected user accounts, applications, and databases eventually?  Join us Live at Cyber Talk with ISSQUARED CISO Nikolay Chernavsky and CRO Suchinth Kumar to know the best solutions to secure your Active Directory from cyberattacks.  The show talks about challenges of different types in managing cybersecurity, recently evolved attacks and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world..
The number of external users that organizations work with and the amount of sensitive #data disclosed to them is increasing every year. But, a minor discrepancy in your third-party’s #security and #privacy routines may lead to multiple cybersecurity challenges for your organization. The immediacy and criticality of third-party security #threats mean you need an external #identity access & #governance solution right now.
Broaden your horizons and perspectives in the cyber security space by joining our show 'Cyber Talk with Nikolay' hosted by Nikolay Chernavsky,  Chief Information Security Officer (CISO) at ISSQUARED, Inc.  The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
Comments 
loading