Welcome to the What's Next! Podcast. I've met so many brilliant people as I traveled the globe and have had some fascinating conversations that I've wished had been recorded so I could share them with you - this podcast was a way for me to recreate those moments and let you in on some fantastic insights. My current conversations center around one objective: what's next for companies and individuals as they look to innovate and grow. I hope these conversations inspire you as much as they have ...
…
continue reading
MP3•Episode home
Manage episode 469959979 series 2318447
Content provided by TEISS. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TEISS or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
- Fortifying security defences with automated root cause analysis and prioritisation
- Managing security risk urgency across your application pipeline with real-time visibility and data visualisation capabilities
- Driving efficiency and prioritisation across your security ecosystem with practical remediation actions
This episode is hosted by Thom Langford:
https://www.linkedin.com/in/thomlangford/
John Heaton-Armstrong, Experienced Cyber security Leader, Confidential
https://www.linkedin.com/in/johnheatonarmstrong/
Danny Dresner, Professor of Cyber security, The University of Manchester
https://www.linkedin.com/in/danny-dresner-fciis-6382381/
Tiago Rosado, Chief Information Security Officer, Asite
https://www.linkedin.com/in/tiagorosado/
Derek Maki, VP Product Management, Veracode
https://www.linkedin.com/in/derekmaki/
293 episodes