Cloud Security , Security Operations

Insights on Securing Cloud Infrastructure

Trend Micro's Wendy Moore Shares Perspectives
Wendy Moore, vice president of product marketing, Trend Micro

As cloud-first and cloud-native become more common labels in the industry, organizations are focusing on achieving visibility and operational excellence, says Wendy Moore, vice president of product marketing at Trend Micro.

See Also: Live Webinar | Cybersecurity in Healthcare Supply Chains: A CISO Perspective

In a video interview with Information Security Media Group at RSA 2020, Moore discusses:

  • Reality of cloud migration;
  • Challenges around cloud-native;
  • Global best practices and innovations.

Moore, the vice president of product marketing at Trend Micro, has over 20 years of experience in IT, with the last 15 years focused on security. In her current role, she works with customers to understand their enterprise security challenges, and shapes market-winning strategies to help customers prepare for, withstand, and rapidly recover from threats. Prior to joining Trend Micro six years ago, Moore held market strategy, product and channel marketing positions at Mitel, Certicom, and Alcatel.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.