In this Vendor Recognition Videocast, CISOs Connect™ President David Cass speaks with Conceal’s Brian Stone about their innovative browser isolation solution. Conceal was recognized in the 2022 CISO Choice Awards as a finalist in the Cloud Security Posture Management Category. In this interview David and Brian discuss how a layered security strategy, especially in the browser and at endpoints, is an essential part of the pathway to zero trust.

In this Vendor Recognition Videocast, Christine Vanderpool speaks with Conceal’s Brian Stone about their innovative browsers isolation solution. Conceal was recognized in the 2022 CISO Choice Awards as a finalist in the Cloud Security Posture Management Category for their browser isolation technology that allows users to go to unfamiliar websites but then still protects the company’s greater work environment from potential hazards through browser segmentation.

CISOs Connect™ is excited to announce the inaugural episode of our Vendor Recognition Videocast Series. In this first episode, David Cass sits down with Amir Ofek, CEO of AxoniusX, the innovation unit of Axonius, to discuss their novel approach to asset management as many organizations continue to embrace cloud and SaaS.

Congratulations to TrueFort for winning the CISO Choice Awards Cloud Workload Protection Platform category. In this interview, leading analyst Richard Stiennon talks with TrueFort CEO Sameer Malhotra, about how their purpose-built solution provides built-in and effective telemetry that allows for tracking application behaviors and policies for suspicious behavior.

Congratulations to SecureAuth for winning the CISO Choice Awards Identity and Access Management category. In this interview, leading analyst Richard Stiennon talks with SecureAuth Corp. CEO Paul Trulove, about their next-gen access management and authentication solution and how it can be deployed in cloud, hybrid and on-premises environments.

Congratulations to Safe Security for winning the CISO Choice Awards Risk Management category. In this interview, leading analyst Richard Stiennon talks with Safe Security CEO and Co-Founder Saket Modi about their platform’s ease of deployment collates the API feeds from existing environments to provide a comprehensive overview of the risk facing an organization.

Congratulations to Black Kite for winning the CISO Choice Awards Partner in Success and Third Party Risk Management categories. In this interview, leading analyst Richard Stiennon talks with Black Kite CEO Paul Paget, about how their solution is differentiated from TPRM providers. Hear how Paul describes how their security ratings system provides unprecedented visibility into and organization’s supply chain and third parties. For more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com

Leading author and analyst Richard Stiennon speaks with legal and cybersecurity expert attorney Mark Rasch on the conviction of Joe Sullivan (formerly of Uber). Watch as they discuss the felony convictions, what they may indicate for CISOs and for Sullivan directly.

Congratulations to Secureworks for their win in the CISO Choice Awards in the Security Analytics Category. In this interview, leading analyst Richard Stiennon talks with Ed Martin, Director of Product Management for Secureworks, about their security analytics product, Secureworks Taegis, a cloud-native XDR solution that offers broad visibility into complex attacks by tracking threats across an entire ecosystem.

Stay tuned for more interviews from the CISO Choice Awards and for more value-added content, request complimentary access to CISOs Connect today: https://CISOsConnect.com

Congratulations to Zero Networks for their recognition in the 2021 CISO Choice Awards. In this interview, leading analyst Richard Stiennon talks with Benny Lakunishok, Co-Founder and CEO of Zero Networks, to discuss their Access Orchestrator which was recognized in the Network Security Technology Category. Zero Networks’ Access Orchestrator uses microsegmentation to protect all servers and devices within a network with agentless and automated self-service.

1 2 3 15