World Wide Technology - Tec37

16. Top Considerations When Building Your Security Architecture

Informações:

Sinopsis

How do you know if your cybersecurity investments are being made in the right areas? Our collective rush to remote work has exposed additional surface ripe for security attacks. Spending may also be on the rise but, hopefully, not at the expense of strategy.  In this new TEC37 episode from World Wide Technology (WWT), Robb Boyd and WWT security experts Kent Noyes, Chris Konrad and Mark Wall, discuss the danger of running towards shiny objects, the importance of an architectural approach, the benefits of using value-stream mapping to identify workflow contributions to risk, and the rise of SecDevOps and security automation. Robb Boyd Kent Noyes, WWT Chris Konrad, WWT Mark Wall, WWT From WWT:  3 Considerations When Building Your Security Architecture