Maxim and Mouser Electronics: 7 Experts on LiDAR Design
Issa Malke, LiDAR Calibration Engineer, Velodyne LiDAR, Inc. Silas Gschwender, International Applications Engineer, SICK Sensor Intelligence Giray Kömürcü, Chief Design Engineer, TUBITAK Binay Kumar Bajaj, Director of Business Management, Maxim Integrated Kai Zhou,...
Bourns and Mouser Electronics: How to Choose the Right Surge Protection Technology
Thomas Tran, Technical Marketing Manager, Bourns, Inc. Wayne Dossey, Strategic Marketing Engineer, Bourns, Inc. Ivan Fumagalli, Project Manager, Robertshaw Eddie Aho, Power Supply Design Engineer, KissAnalog Nida Qamar, Project and Design Engineer, Eaton Sneha...
Cloudinary: Digital-First Brand Experiences Require a Digital-First DAM
The book includes insights from the following experts: Russ Barr, Managing Director of DAM, Cloudinary Peter O’Neill, Research Director, Research in Action GmbH Mark Davey, Founder, The Codified DAM Consultant Lori Meyers, Digital Assets Manager, Monumental Sports and...
Trustwave: 7 Experts on Building and Maintaining Cyber Resilience
The book includes insights from the following experts: Kory Daniels, Global Director of Threat Detection and Response Consulting, Trustwave Spencer Ingram, Senior VP of Operations, Trustwave Steve Baer, Field CTO, Trustwave and Trustwave Government Solutions Erik...
Nisos: The Critical Value Outside Counsel Brings to Cyber Incident Response
The book includes insights from the following experts: Wynter Deagle, Partner, Sheppard Mullin Andrew Stanley, Chief Information Security Officer, Mars Aaron Carfoos, Partner, Paul Hastings Evan Wolff, Partner, Crowell & Moring Jan Grzymala-Busse, Security...
PAS: 7 Experts on Balancing Digital Transformation and OT Security
The book includes insights from the following experts: Tammy Klotz, Covanta, Chief Information Security Officer Spencer Wilcox, PNM Resources, Executive Director of Technology and Chief Security Officer Mike Carroll, Georgia-Pacific, VP Innovation & Transformation...
PAS: 7 Experts on Protecting OT Environments against Targeted Cyber Attacks
The book includes insights from the following experts: Tammy Klotz, Covanta, Chief Information Security Officer Spencer Wilcox, PNM Resources, Executive Director of Technology and Chief Security Officer Mike Carroll, Georgia-Pacific, VP Innovation & Transformation...
IRONSCALES: How to Stay Ahead of the Growing E-mail Security Threat
The book includes insights from the following experts: Scott Morgan, Information Security Officer, Florida Department of Highway Safety and Motor Vehicles Chuck Brooks, President, Brooks Consulting International Vito Sardanopoli, Managing Principal and Founder,...
Agustin Valencia Gil-Ortega: Apply State-of-the-Art IT Technology with OT Practices and Procedures
“You need state-of-the-art IT technology, but you need to use it with OT practices and procedures.” You need to understand the impact of any changes you make to controls and control systems in an OT...
Scott Wood: An MDR Provider Should Feel Like Part of Your Team
“What I need to see from the service provider, in addition to its technical capabilities, is that . . . its staffmust act like they’re part of my team.” The ability to detect and automatically respond to incidents in real time is essential in today’s threat...