The Compliance Equation: Preparing for Regulatory Shifts Under Trump 2025
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Inside Out: Unveiling and Mitigating Insider Threats in the Modern Workplace
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Zero Trust Architecture: Implementing Best Practices in the US
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Compliance, Due Diligence, & More: Navigating Upcoming TPRM Trends
Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM
Inherent Risk vs. Residual Risk: The Foundation of Effective TPRM
Millicom Builds Transformational Identity Security Program
The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our…
Identity Management as a Foundation for Future-Proofing your Security
The perimeter is dissolving. Employees are using any device from any location for work. With limited visibility from our traditional networking and endpoint security controls, how do we protect our…
KLogix:Cyber Security Business Podcast
On this episode of Cyber Security Business, we sit down with John Masserini, CISO, Millicom, to discuss identity and access management in the current security environment. Excerpt: Kevin West: Welcome…
SecurityCurrent: Podcast with Barmak Meftah, President and CEO AlienVault, About Threat Detection and Response
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes…
One2One Summits: Episode 9: David Cass and John Masserini
One2One Summit podcast where David Cass, CSO for IBM Cloud and SaaS solutions, and I sit down and discuss the challenges of modern technology in a legacy environment, the hiring…