AMAROK: 8 Experts on Proactive vs. Reactive Perimeter Security
The book includes insights from the following experts: Michael Dorrington, SVP, Sales and Marketing, AMAROK Security Keith James, Security Director, Corporate Security, Exela Technologies Brock Josephson, Sr. Physical Security Specialist, Burns & McDonnell Drew...
Anomali: The Need to Focus on the Adversary
The book includes insights from the following experts: Micah Czigan, CISO, Georgetown University Mark Eggleston, CISO, CSC Nick Jones, CISO, TUI Bradley J. Schaufenbuel, VP & CISO, Paychex Saeed Valian, CISO, symplr Aaron Weismann, CISO, Main Line Health Joe...
Littelfuse and Mouser Electronics: 7 Experts on Automotive Powertrains
Jim Colby, Senior Manager, Business Development, Automotive Business Unit, Littelfuse Philippe di Fulvio, Business Development Manager, EV Infrastructure, Littelfuse Julia Nitti, Business Development Manager, eMobility – Commercial Vehicles, Littelfuse Juergen...
Mighty Guides: Launching a New B2B Enterprise Product
The book includes insights from the following experts: Div Manickam, Mentor | 2019-2021, Top 100 Product Marketing, Influencer Nicole Culver, Director of Product Marketing, Pindrop Thomas Dong, VP of Marketing, NetSpring Becky Trevino, Executive, Vice President of...
Security Compass: Developer-Centric Software Threat Modeling Powered by Automation
The book includes insights from the following experts: Dan Bowden, Global CISO, Marsh William Dougherty, Chief Information Security Officer, Omada Health Hemanta Swain, Global Head of Security and Compliance (CISO), Lucid Motors Derek Fisher, VP Application Security,...
Trustwave: 8 Experts on Achieving Better Supply Chain Security
The book includes insights from the following experts: Terry Wasti, Director - Infor FSM Supply Chain, Grant Thornton LLP Tyrone Watson-Ferguson, SVP/CISO, Security Bank of Kansas City Matthew Otwell, CISO, Maryland Department of Health Steven Parker, CISO, TBC...
Malwarebytes: A Defender’s Guide to Ransomware Resilience
The book includes insights from the following experts: Zachary Lewis, AVP, Information Technology, University of Health Sciences and Pharmacy in St. Louis Kelly Walsh, CIO, The College of Westchester Tom Dugas, Assistant Vice President and Chief Information Security...
Bourns and Mouser Electronics: 8 Experts on Magnetic Solutions for Next-Generation Applications
Kyle Mouldenhauer, Field and Applications Engineer, Bourns, Inc Cathal Sheehan, Senior Technical Market Manager, Bourns, Inc. Kasra Latifi Fard, Power Electronic Design Engineer, NanoStructured Coatings, Co. Ivan Fumagalli, RAMS Engineer, Eldor Corporation Inam...
Nisos: Building a World-Class Threat Intelligence Operation
The book includes insights from the following experts: Thom VanHorn, VP of Marketing, Nisos David Etue, CEO, Nisos Robert Raines, VP of Engineering, Nisos Justin Zeefe, President and Co-Founder, Nisos Julian Matossian, VP of Product Management, Nisos Landon...
Ironscales: How to Stay Ahead of the Growing Email Security Threat
The book includes insights from the following experts: Eyal Benishti, CEO, IRONSCALES Steven Parker, CISO, TBC Corporation Pieter VanIperen, SVP, Global Head of Cloud Security, 21st Century Fox Shitanshu Kumar, Director, Security Engineering Operations &...