Protecting your C-Suite's private lives to protect the enterprise
- Threat trends - how threat actors are targeting C-Suite executives to access the enterprise
- Empowering your C-Suite to identify and avoid social engineering
- Creating social media policies that your C-Suite understand so that they can lead by example
Featuring:
Thom Langford, Host, teissTalk
Thomas Wendrich, Associate Partner, IBM
Jacqueline Hanson-Kotei, Senior Manager, Enterprise Information Security & Governance, MTN Ghana
Torsten Wiedemeyer, VP Europe, Cyble
Threat actors are coming up with new techniques to target your C-suite. Full network visibility won’t help if your C-Suite fall victim to social engineering.
How do you extend your perimeter to effectively include the private lives and personal devices of your most senior colleagues?
In our next episode of teissTalk with Thom Langford, we’ll explore:
- Threat trends - how threat actors are targeting C-Suite executives to access the enterprise
- Empowering your C-Suite to identify and avoid social engineering
- Creating social media policies that your C-Suite understand so that they can lead by example
Take away examples of crafting internal polices and practices that your C-Suite can follow externally, leading by example.
Please register or log-in to watch this on-demand episode
Featured SpeakersView All
Thom Langford
Thomas Wendrich
Jacqueline Hanson-Kotei
Torsten Wiedemeyer
When you register on our site you are automatically registered for all teissTalk episodes