The Security Strategist

Duración total:15 h 39 min
The Cybersecurity Blind Spot Leaders Are Missing, and Why It’s About to Get Worse
The Security Strategist
41:27
Your API Security Wasn’t Built for AI Agents
The Security Strategist
24:36
Why Cybersecurity Policies Fail And How to Fix Them
The Security Strategist
29:14
How to Fix Microsoft 365 Security
The Security Strategist
19:12
How AI Is Reshaping Financial Crime Prevention and Why Explainability Is the New Battleground
The Security Strategist
24:56
Can Real-Time Identity Governance Replace Access Reviews for Good?
The Security Strategist
21:32
Non-Human Identities and Agentic AI: The New Frontier in Identity Security
The Security Strategist
28:59
How Can Enterprises Move from Cloud Security Visibility to Real Enforcement?
The Security Strategist
21:55
FedRAMP 20x: The Future of Compliance, Trends, and Best Practices
The Security Strategist
30:35
Why Patch Management Remains the Most Annoying Problem in IT Security
The Security Strategist
22:46
The Growing Challenge of Protecting Sensitive Enterprise Data Across Browsers, SaaS and AI Tools
The Security Strategist
24:05
Beyond the Firewall: Why Executive Risk Is Reshaping Cyber Strategy
The Security Strategist
22:03
Speed vs. Privacy: Navigating Digital Threats in Modern Counter Terrorism
The Security Strategist
23:12
Democratising Cybercrime: How AI is Changing Enterprise Security
The Security Strategist
22:06
Cyber Resilience in Microsoft 365: What Security Leaders Must Know
The Security Strategist
29:49
Why Do Most Cyber Breaches Stem from System Failures, Not Human Error?
The Security Strategist
19:42
Are Security Teams Wasting Resources on 99% of Vulnerabilities That Don’t Matter?
The Security Strategist
18:23
Are You Testing Cyber Recovery or Just Hoping Your Backups Work
The Security Strategist
27:58
Unmasking the Invisible Threat: Defend Your APIs Before Attackers Do
The Security Strategist
13:04
How CISOs Can Reduce Enterprise Data Risk Without Slowing the Business
The Security Strategist
28:22
Lessons from Offensive Security: How Organisations Can Improve Cyber Resilience
The Security Strategist
26:46
From Passwords to Ransomware: What 597 Real-World Breaches Tell CISOs in 2026
The Security Strategist
20:32
Are CISOs Blind to the Biggest Cloud Attack Surface?
The Security Strategist
31:47
The Human Factor in Cybersecurity: Behavioural Interventions That Work
The Security Strategist
27:16
Securing AI-Driven Development in Modern Enterprises
The Security Strategist
24:57
Is AI Quietly Breaking Email Security? Are False Positives Now the Real Breach?
The Security Strategist
20:15
How Can Enterprises Secure AI When Data Moves Faster Than Humans Can Track?
The Security Strategist
16:34
How Do Attackers Exploit Executives’ Personal Lives to Breach Companies?
The Security Strategist
18:28
Why Are AI Agents Forcing CISOs to Rethink Identity Security Architecture?
The Security Strategist
14:07
From Data to Insight: How Enterprises Are Making IoT Secure and Actionable
The Security Strategist
27:14
Human-Led, AI-Driven: The Next Chapter of Security Operations
The Security Strategist
15:25
Why Are Vulnerability Backlogs Still Growing Despite Better Detection?
The Security Strategist
25:10
What Happens to API Security When AI Agents Go Autonomous?
The Security Strategist
15:07
Why AI Agents Demand a New Approach to Identity Security
The Security Strategist
13:07
Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
The Security Strategist
24:09
From IoT to AIoT: Operational and Security Challenges for Modern Enterprises
The Security Strategist
27:24
Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally
The Security Strategist
24:54
How Can MSPs Move From Defense to Full Cyber Resilience?
The Security Strategist
30:19
What If We Could Fix Vulnerabilities Faster Than We Find Them?
The Security Strategist
20:54
Can Identity Security Close the AI Governance Gap?
The Security Strategist
21:29