ETR Insights presents an interview with the CISO for a very large technology manufacturing organization whose scale presents particular challenges when it comes to vulnerability management, identity management, and perimeter protection. Read on to learn how the company leverages security vendors like Rapid7, Splunk, Cisco, and Check Point within its environment and why employee awareness and training are such a focus. Vendors Mentioned in this Interview: Auth0 / BeyondTrust / Check Point / Cisco / Datadog / Fortinet / Linux / Microsoft / Okta / Palo Alto Networks / Ping Identity / QRadar / Qualys / Rapid7 / Sands / Splunk / Tenable