Pillar Four: Application Security [Six Pillars of Security]

And There You Have IT! - Podcast tekijän mukaan Sirius

Kategoriat:

In this episode about application security, Cherie and Matt discuss: The importance of third-party risk assessment. How the rapid pace of application development affects security. The importance of trust after verification. Effectively handling sensitive information is a constant challenge, and transformational technologies like the cloud bring a new set of risks along with the opportunities they provide. Developing a comprehensive security strategy is your best defense. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Three, Compliance & Governance – Compliance is essential, but it does not equal security. Learn how to help your organization become more secure and not merely compliant. Security in the Cloud: Key Considerations & Tools an IT Security Conversation in the Boardroom – Learn how key security issues and controls vary depending on the cloud model you’re using. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.

Visit the podcast's native language site