Skip to main content

logo

Main menu

  • News
  • Security Agenda
  • CSO100
  • Threats
  • Compliance
  • Breaches
  • Videos
Home

Breadcrumb

  1. Home
  2. Security agenda

Top Security Leaders Define Cybersecurity Agenda for CISOs

An exclusive series of interviews that shines the spotlight on major security vendors and their blueprint for enterprises to create the optimum cybersecurity strategy.

Prasad-Mandava-Akamai-300X225.jpg
Security and business are intertwined: Prasad Mandava, Akamai India
Edgar-Dias-300X225.jpg
Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks
Surendra-Singh-300X225.jpg
Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint
Vaidyanathan-Iyer-300X225.jpg
A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia
Venkat-Krishnapur-300X225.jpg
Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India
Rajnish-Gupta-RSA-300X225.jpg
Businesses must focus on digital risk management : Rajnish Gupta, RSA
Nilesh-Jain-Trend-Micro-300X225.jpg
CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro
Bhaskar-Bakthavatsalu-Check-Point-300X225.jpg
Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point
Shrikant-Shitole-300X225_1.jpg
Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye
Rajesh-Maurya-Fortinet-300X225.jpg
Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet
Shrenik-Bhayani-300X225.jpg
AI, AR and blockchain are disrupting the cybersecurity landscape: Shrenik Bhayani, Kaspersky Labs
Anil-Bhasin-300X225.jpg
Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 
Gaurav-agarwal-Symantec-300X225.jpg
CISOs must shape IT security programs around overall corporate strategy: Gaurav Agarwal, Symantec

Security Trends for 2019

State of Cybersecurity

A simple app penetration test could have prevented the 7-Eleven data breach, say experts
McAfee in talks for US$1B public market return
Cisco sounds warning on 3 critical security patches for DNA Center
Latest cyberattack from the TrickBot malware family identified: Research

Hacked

Executive Interviews

You can't take a zero-trust view with traditional hub-and-spoke architecture: Scott Robertson, Zscaler
Vulnerability management, surface visibility is imperative for modern CSOs: Gerry Sillars
Spear phishing has come a long way since the ‘Nigerian prince’ racket: Hatem Naguib, Barracuda
Bring your own key to resolve trust issues: Jin MA, Alibaba Cloud

Footer

  • About Cso
  • ADVERTISING
  • PRIVACY POLICY
  • Contact Us
  • tw
  • fb
  • rss
X

idg

Copyright © 2005-2019 IDG Media Private Ltd. All rights reserved

Reproduction in whole or part in any form or medium without express written permission of IDG Media Pvt. Ltd is prohibited.

the idg network

  • THE IDG NETWORK:
  • Cio.in
  • ComputerWorld.in
  • Channelworld.in