Preempt Blog

The latest insights and advice to keep your company protected from insider threats and breaches

M&A cyber diligence, talent shortages, and the challenges facing CISOs [Podcast]

Enterprises are often forced to implement multiple moving parts as the traditional network perimeter is no longer sufficient to protect against modern threats. These disjointed security solutions rarely talk to each other, causing security silos and an overwhelming number of distracting security alerts, Preempt CEO Ajit Sancheti explains in a podcast this week.

The interview between Sancheti and UberKnowledge COO Ashwin Krishnan covers the cybersecurity talent shortage, the future of integrating point solutions within cybersecurity software stacks, and the all-too-overlooked challenge of cybersecurity due diligence during M&A and other large scale financial transactions.

Listen to the UberKnowledge podcast to learn:

  • The vital role of identity to security, and how Conditional Access leverages Identity, Behavior, and Risk to provide comprehensive enterprise visibility of who and what is accessing your environment, as well as the ability to automatically prevent threats

  • Why the cybersecurity industry can “win” if vendors demonstrate the willingness to talk to each other and collaborate with open standards and APIs

  • The cybersecurity negligence in M&A: as worldwide mergers and acquisitions total trillions each year, companies across all industries are opening themselves up to threats as they incorporate cybersecurity risks from acquired companies and their subsidiaries

UberKnowledge_podcast 

Topics: CISO, Risk,

Posted by Monnia Deng on March 26, 2019 12:35 PM

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More

Developer

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus...

Read More

Events

A Simplified Approach to Network Segmentation

Network segmentation has long been one of the most valuable tools for protecting ...

Read More

Research

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major

Read More

Product

Brute Force Attacks: Denying the Attacker, Not the User

According tohaveIbeenpwned.com, close to 8 billion accounts have been compromised...

Read More