All links and images for this episode can be found on CISO Series.
With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our guest is Steve Zalewski who also hosts Defense in Depth.
Thanks to our podcast sponsor, AppOmni
Do you know which 3rd party apps are connected to your SaaS platforms? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk. Get visibility to all 3rd party apps — and their level of data access — with AppOmni. Visit AppOmni.com to request a free risk assessment. In this episode: • With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy? • Is the problem the architecture of the applications themselves or the fact that a non-security group is bringing these applications online? Is it both? • Is this problem solvable? • What technical controls can you put in place to mitigate risk from apps you deem risky?
All links and images for this episode can be found on CISO Series.
With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Our guest is Steve Zalewski who also hosts Defense in Depth.
Thanks to our podcast sponsor, AppOmni
Do you know which 3rd party apps are connected to your SaaS platforms? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk. Get visibility to all 3rd party apps — and their level of data access — with AppOmni. Visit AppOmni.com to request a free risk assessment. In this episode: • With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy? • Is the problem the architecture of the applications themselves or the fact that a non-security group is bringing these applications online? Is it both? • Is this problem solvable? • What technical controls can you put in place to mitigate risk from apps you deem risky?
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Dansk
Danmark