CISO Workshop Module 4a: Threat Protection Strategy

Explore key learnings about threat protection, security evolution, strategies, and security road maps.

Introduction: Threat Protection Strategy (4:37)

Part 1: Learnings about Threat Protection (9:11)

Part 2: Security Evolution: Overview (3:29)

Part 3: Security Evolution: Office 365 (7:33)

Part 4: Security Evolution: Azure (15:54)

Part 5: Strategies and Success Criteria (9:09)

Part 6: Roadmap for Application Development & Platform as a Service (6:07)

Part 7: Roadmap for Shadow IT Risk from Third-Party Software as a Service (5:05)

Part 8: Roadmap for Office 365 Security (16:36)

Part 9: Roadmap for Infrastructure as a Service and On-Premises (24:38)

Part 10: Roadmap for Windows 10 Security (7:31)

Part 11: Roadmap for Securing Privileged Access (22:26)

Part 12: Roadmap for (Not) Petya and Critical Security Hygiene (10:28)