Date: Wednesday, December 09, 2020
Time: 12:00 PM Eastern Standard Time
Duration: 1 hour
From an executive perspective, security design and risk tolerance have taken on new meaning. Distributed IT, remote workforces, and emerging digital requirements have all forced CISOs to look at security and compliance in a new light—one that heavily focuses on visibility into both IT and business functions. In this webinar, we'll examine today's IT landscape from a CISO perspective, exploring topics such as corporate-wide configuration management, how CISOs view security, and best practices for risk and compliance.
Specific topics include:
- Top IT challenges CISOs face today
- Understanding risk, compliance, and IT visibility
- The business impacts of IT asset inventory
- Key points around visibility, configuration management, and integration
- Best practices and advice from the field
Brought to you by:
Bill Kleyman, Contributing Editor, ITPro Today
Bill is Executive Vice President of Digital Solutions at Switch. Using the latest innovative technology, Mr. Kleyman delivers solutions that help customers excel in competitive markets. As technology thought leader, Bill was ranked #16 globally in an Onalytica study of the top 100 most influential people in the cloud landscape, and #4 in its study of top data security experts. Follow Bill on Twitter @QuadStack and @Switch
Edward Rossi, VP, Product Management, Qualys
Ed Rossi is an experienced product management leader with over 20 years in the IT Asset Management and Software Asset Management space. He recently joined Qualys as Vice President, Product Management, focused on Asset Inventory & Discovery. Ed spent six years at Flexera Software, leading the product team driving their ITAM & SAM offerings and concentrating on helping clients manage their technology investment from on-premises hardware and software to SaaS & Cloud Infrastructure. Previously, Ed was with IBM, where he focused on IT Asset Management, Discovery & Service Management products across several roles. Ed is passionate about the need for strong visibility across the IT ecosystem to support a strong IT Security program and to manage assets more effectively in an increasingly complex technological world.