Cloud Migration Keeps CISOs Awake at Night 

ETR Insights presents an interview with the CISO for a very large technology manufacturing organization whose scale presents particular challenges when it comes to vulnerability management, identity management, and perimeter protection. Read on to learn how the company leverages security vendors like Rapid7, Splunk, Cisco, and Check Point within its environment and why employee awareness and training are such a focus. Vendors Mentioned in this Interview: Auth0 / BeyondTrust / Check Point / Cisco / Datadog / Fortinet / Linux / Microsoft / Okta / Palo Alto Networks / Ping Identity / QRadar / Qualys / Rapid7 / Sands / Splunk / Tenable

Leave a Comment

Request to Join

The ETR Community is an exclusive group of IT decision makers. If you have purview over the tech spend in your organization, please fill out the form below to see if you qualify to join the ETR Community. Ready to jump in quicker? Applications with LinkedIn links included are able to be reviewed more quickly. Thank you!

Name(Required)