Vendor Risk Management & Compliance in Healthcare

Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast. Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM). He also discusses the latest threat landscape and provides some …

Vendor Risk Management & Compliance in Healthcare Read More »

The Evolution of Identity Standards & Identity Orchestration

Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of …

The Evolution of Identity Standards & Identity Orchestration Read More »

Critical Device Security Strategies & Tools

Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity. Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity …

Critical Device Security Strategies & Tools Read More »

Delivering Effective Cybersecurity Training

Ganesh Krishnan is the Co-Founder and CEO of Anzenna. Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian. He also launched Avid Secure in 2017 which was acquired just 18 months later. In this episode, Ganesh talks about why most cybersecurity …

Delivering Effective Cybersecurity Training Read More »

Endpoint Vulnerability Management

Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the “must haves” for any endpoint management platform and explains how IoT devices, including those with a …

Endpoint Vulnerability Management Read More »