AI-Powered SASE , Cloud Security , Governance & Risk Management

Your Guide to Accelerate Secure Cloud Adoption

Webinar Preview by Mike Storm, Office of the Security CTO, Cisco
Mike Storm, Distinguished Engineer, Office of the Security CTO, Cisco

A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users at the edge. In this preview of an upcoming webinar, Cisco's Mike Storm discusses how to increase security and reduce complexity.

In this video interview with Information Security Media Group, previewing an upcoming webinar, Tran discusses:

  • The fundamental cloud challenges facing organizations;
  • How networking and security teams should approach Cybersecurity Network Transformation;
  • How to increase security and concurrently reduce complexity.

Storm, Cybersecurity Distinguished Engineer at Cisco and 15-year CCIE Security, focuses on Cybersecurity Solution Architectures and Security Platform Strategy for the Global Cisco Security business. A sought-after Keynote speaker with 30 years in the networking and cybersecurity industry, Storm has an affinity for Security Strategies and Security Threat Operations and frequently speaks, blogs and podcasts on cybersecurity topics. Storm is the host of the Online Reality TV Series - Cisco IT Security Makeover, currently in season 6, where he leads a team to help transform the security posture for companies of all sizes to maximize their protection from cyber-attacks. Storm also hosts the UNHACKABLE Podcast series where he shares his experience and insights on Cybersecurity best practices, threats and security-industry topics for both business and consumers alike.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.