1585: Female Leadership in Cybersecurity With S3 Founder Johanna Baum

1585: Female Leadership in Cybersecurity With S3 Founder Johanna Baum

Johanna Baum is the founder and CEO of Strategic Security Solutions (S3) Consulting and is a CPA in the state of Georgia with over 20 years of security, eGRC, IDG, and SAP technical and strategic advisory experience. Her vast expertise in the security and compliance field has served both industry and large consulting organizations.

Johanna sought to build an organization that approached security and identity initiatives differently. She wanted a community of experts focused on the holistic needs of the client and their employees rather than simply a technology reseller. She also sought to change the approach of boutiques looking to build the entire employee, not simply utilization-driven targets without empathy and investment in the individual.

Johanna founded S3 Consulting in 2005 to provide strategic professional services and guidance around security, eGRC, and IDG services for Fortune 2000 companies. Since beginning the company 15 years ago, Johanna has been hands-on in providing successful assessment, implementation, and deployment solutions throughout the full life cycle of both technical and strategic initiatives.

Identity threats will increase exponentially, causing organizations to focus on prevention: Identity attacks are also happening faster. In 2021, the focus is shifting from authenticating identity and authorization to controlling access.

Even if a business keeps the attack contained, they still have a significant issue – identity was compromised. Increasingly, organizations will take cyber security awareness training to better secure and manage user identities and scrub for inactive identities. Talking points/key messages: tips / best practices for ensuring strong identity. What does identity mean?

Also, with the rise of 'contactless' everything means authentication will become more complex. Amid COVID-19, e-commerce, online banking/payment systems, contactless travel, and other transactions are rising, however they require a high level of identity assurance and authentication.

In 2021 and beyond, preventing credential compromise will depend on stronger, more complex authentication security and identity validation. Increasingly, an individual's identity will become their credentials (face scans, finger prints, etc.) We also discuss how enterprises are slowly shifting away from enterprise password use and over to more secure alternatives.

Avsnitt(2000)

The Lucid Software Playbook For Aligning People, Process, And AI

The Lucid Software Playbook For Aligning People, Process, And AI

How do you bring people together to do better work when everything around them feels increasingly complex, distributed, and uncertain? In today's episode, I sat down with Jessica Guistolise from Lucid...

8 Apr 31min

EvoluteIQ On Rethinking ROI In The Age Of Enterprise AI

EvoluteIQ On Rethinking ROI In The Age Of Enterprise AI

What happens when the very pricing model meant to speed up AI adoption ends up slowing it down? In this episode of Tech Talks Daily, I sit down with Sameet Gupte, CEO and co-founder of EvoluteIQ, to d...

7 Apr 40min

Closing The AI Trust Gap In Customer Experience With Cyara

Closing The AI Trust Gap In Customer Experience With Cyara

How many bad customer experiences does it take before someone walks away for good? In my conversation with Amitha Pulijala, we explore why the answer might be fewer than most businesses are prepared f...

6 Apr 33min

Turning AI Ambition Into Real Business Value

Turning AI Ambition Into Real Business Value

What does it really take to move AI from endless experimentation into something that creates real business value? In this episode, I sat down with Tom Alexander, Head of Innovation and Transformation ...

5 Apr 30min

Adapting To Rising Costs And Constant Threats

Adapting To Rising Costs And Constant Threats

Is the endpoint still just a device, or has it quietly become one of the most important control points in modern enterprise security? Recording live from IGEL Now And Next in Miami, I sat down once ag...

5 Apr 18min

The Rise Of Contextual Access And Adaptive Security

The Rise Of Contextual Access And Adaptive Security

What does it really take to move from talking about Zero Trust… to actually making it work in the real world? Recording live from IGEL Now And Next in Miami, I caught up with John Walsh for what has n...

4 Apr 20min

When Recovery Takes Weeks: The Endpoint Problem With James Millington

When Recovery Takes Weeks: The Endpoint Problem With James Millington

How long would it actually take your organization to recover every endpoint after a major cyber incident? Recording live from IGEL Now And Next in Miami, I sat down with James Millington to explore a ...

3 Apr 23min

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

The Convergence Of IT And OT With Matthias Haas At IGEL Now And Next

What does it actually take to rethink the endpoint in a world shaped by AI, Zero Trust, and the growing convergence of IT and operational technology? Recording live from IGEL Now and Next in Miami, I ...

2 Apr 26min

Populärt inom Politik & nyheter

svenska-fall
aftonbladet-krim
p3-krim
rss-krimstad
flashback-forever
spar
rss-krimreportrarna
rss-sanning-konsekvens
rss-vad-fan-hande
politiken
motiv
rss-flodet
rss-frandfors-horna
krimmagasinet
olyckan-inifran
aftonbladet-daily
blenda-2
rss-klubbland-en-podd-mest-om-frolunda
rss-aftonbladet-krim
grans