CISO Workshop Module 4a: Threat Protection Strategy
- Article
-
-
Explore key learnings about threat protection, security evolution, strategies, and security road maps.
Introduction: Threat Protection Strategy (4:37)
Part 1: Learnings about Threat Protection (9:11)
Part 2: Security Evolution: Overview (3:29)
Part 3: Security Evolution: Office 365 (7:33)
Part 4: Security Evolution: Azure (15:54)
Part 5: Strategies and Success Criteria (9:09)
Part 7: Roadmap for Shadow IT Risk from Third-Party Software as a Service (5:05)
Part 8: Roadmap for Office 365 Security (16:36)
Part 9: Roadmap for Infrastructure as a Service and On-Premises (24:38)
Part 10: Roadmap for Windows 10 Security (7:31)
Part 11: Roadmap for Securing Privileged Access (22:26)
Part 12: Roadmap for (Not) Petya and Critical Security Hygiene (10:28)