Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/4b/06/ec/4b06ec64-18c6-bee9-b9bd-c139198b4d60/mza_12952958078077283119.jpg/600x600bb.jpg
Ask A CISO
Horangi Cyber Security
76 episodes
4 days ago
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.
Show more...
Technology
RSS
All content for Ask A CISO is the property of Horangi Cyber Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode/18328942/18328942-1675829429766-6c9697cfee038.jpg
Understanding DSPM & CSPM for Optimal Data Security
Ask A CISO
25 minutes 58 seconds
2 years ago
Understanding DSPM & CSPM for Optimal Data Security

On this episode, we had the opportunity to speak to Tyler Young, the CISO at BigID, a leading modern data security vendor that helps organizations with their data security, privacy, compliance, and governance. 

Find out what key lessons Tyler learned as a newly-appointed CISO, how you can protect your data, and what he, as a CISO, thinks is the best way to implement and communicate security needs to various departments and people in an organization.

You'll also learn more about Data Security Posture Management or DSPM and how and why Identity Management is closely tied to Data Security.

Read the associated blog:
Understanding DSPM & CSPM for Optimal Data Security here: https://www.horangi.com/blog/understanding-dspm--cspm-for-optimal-data-security

- About Horangi Cybersecurity --
More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast
About Horangi Cyber Security: https://www.horangi.com

- About the Guest --
Tyler's LinkedIn: https://www.linkedin.com/in/tyler-young-07841085/

Ask A CISO
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.