intelligent
security intelligence that transcends borders
A
intelligent
PUBLICATION
Securing a remote
workforce
Industry experts
offer best practice
modern, remote
advice for securing
workforce
the
Reducing risk
exposure
How a building
materials compan
analysis of its
y obtained full
networks
vulnerability
security intellig
Securit y in a
ence that transc
multi-c
loud world
Critical conside
rations for organisa
on a multi-clo
tions looking
ud strategy
to
ends borde
rs
embark
issue 12 | www.inte
lligentciso.com
ENA
NETWORK BLING
VISIBILITY
ENTERPRISE
FIREWALL PARTNER
INTELLIGENT
PARTNER
The Ardagh Group,
a worldwide leader
powered solution
in packaging solution
to provide crucial
s, utilised an AI-
visibility into its
global network.
GLOBAL CISO
KNOWLEDGE
PARTNER
INTELLIGENT
PHISHING PARTNER
GISEC
PARTNER
INTELLIGENT
THREAT
MANAGEMENT
PARTNER
DATA SECURITY
PARTNER
GLOBAL
INNOVATION
PARTNER
INTELLIGENT
DATA
MANAGEMENT
PARTNER
INTELLIGENT
ACCESS
MANAGEMENT
PARTNER
33. predictive intelligence
Why your employees might be your
biggest cyber-risk
33
36. feature
Securing a remote workforce. The
biggest cyberthreats facing the modern
workforce and how to address them
41. expert opinion
Prioritising security in a multi-cloud
world: Scott Manson, Managing Director
– Middle East and Turkey, at McAfee
36
51. case study
LafargeHolcim utilises Tenable solution
to reduce risk exposure
55. intelligent technologies
67
48
4
62. business surveillance
74
The potential pitfalls of which every
CISO should be aware
67. decrypting myths
48. feature
Access control systems are set to
play an increasingly important role
in shaping the cyberdefences of the
future. Intelligent CISO hears from
industry experts at HID Global and
Genetec about the role of access
control systems, the cyber-risks
associated with them and the access
control technology pillars defining the
future-ready financial institution.
Navigating the MSSP jungle.
Marc Brungardt, President and
co -founder Foresite
71. go phish
Ofer Maor, Director Of Solutions
Management, Synopsys
74. end-point analysis
Keeper Security: Avoiding poor
password practices and data breaches
Issue 12
|
www.intelligentciso.com