Endpoint Security , Events , Governance & Risk Management

The Top 5 Security Practices With the Best Outcomes

Helen Patton, Advisory CISO of Duo Security/Cisco, Discusses New Research
Helen Patton, advisory CISO, Duo Security/Cisco

What are the top five security activities that lead to the best outcomes, and why do they work so well? Those critical issues were closely examined in a recent study commissioned by Duo Security/Cisco, says Helen Patton, advisory CISO, who discusses the findings.

See Also: Fireside Chat | Zero Tolerance: Controlling The Landscape Where You'll Meet Your Adversaries

In a video interview with Information Security Media Group at RSA Conference 2022, Patton also discusses:

  • The top practices found to be the most effective in creating a successful cybersecurity strategy;
  • The least effective security practices;
  • The key areas where cybersecurity teams should focus when it comes to preparation;

Patton has spent more than 20 years in consulting, banking and higher education, leading security programs and sharing security strategies.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.