Intelligent CISO Issue 12 | Page 4

intelligent security intelligence that transcends borders A intelligent PUBLICATION Securing a remote workforce Industry experts offer best practice modern, remote advice for securing workforce the Reducing risk exposure How a building materials compan analysis of its y obtained full networks vulnerability security intellig Securit y in a ence that transc multi-c loud world Critical conside rations for organisa on a multi-clo tions looking ud strategy to ends borde rs embark issue 12 | www.inte lligentciso.com ENA NETWORK BLING VISIBILITY ENTERPRISE FIREWALL PARTNER INTELLIGENT PARTNER The Ardagh Group, a worldwide leader powered solution in packaging solution to provide crucial s, utilised an AI- visibility into its global network. GLOBAL CISO KNOWLEDGE PARTNER INTELLIGENT PHISHING PARTNER GISEC PARTNER INTELLIGENT THREAT MANAGEMENT PARTNER DATA SECURITY PARTNER GLOBAL INNOVATION PARTNER INTELLIGENT DATA MANAGEMENT PARTNER INTELLIGENT ACCESS MANAGEMENT PARTNER 33. predictive intelligence Why your employees might be your biggest cyber-risk 33 36. feature Securing a remote workforce. The biggest cyberthreats facing the modern workforce and how to address them 41. expert opinion Prioritising security in a multi-cloud world: Scott Manson, Managing Director – Middle East and Turkey, at McAfee 36 51. case study LafargeHolcim utilises Tenable solution to reduce risk exposure 55. intelligent technologies 67 48 4 62. business surveillance 74 The potential pitfalls of which every CISO should be aware 67. decrypting myths 48. feature Access control systems are set to play an increasingly important role in shaping the cyberdefences of the future. Intelligent CISO hears from industry experts at HID Global and Genetec about the role of access control systems, the cyber-risks associated with them and the access control technology pillars defining the future-ready financial institution. Navigating the MSSP jungle. Marc Brungardt, President and co -founder Foresite 71. go phish Ofer Maor, Director Of Solutions Management, Synopsys 74. end-point analysis Keeper Security: Avoiding poor password practices and data breaches Issue 12 | www.intelligentciso.com