MYSEC.TV

Home   /   RESOURCES   /   MYSEC.TV   / Security Sandbox – Digging into the APAC Threat Landscape

Security Sandbox – Digging into the APAC Threat Landscape

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

We speak with Relativity’s CSO & CIO, Amanda Fennell and the APAC Managing Director, Georgia Foster for an insight into the company and trends in the APAC region.

Relativity is on the mission to help organizations organize data, discover the truth, and act on it. This is especially resonant for customers who are dealing with sensitive data, demanding investigations and complicated litigation.

The changing security threat landscape for APAC has made risk mitigation and data protection strategies more crucial than ever. Relativity’s security team, Calder7, frequently conduct research on the threat landscape to help readers stay up to date on the latest threats.

Security Sandbox is a Relativity podcast aiming to help listeners learn about new fields and fortify their security programs. The goal is to share insights and inspire a few laughs, reward curiosity, and bring a little more excitement to the day-to-day work of our industry.

#securitysandbox #relativity #calder7 #womenincyber #womenincybersecurity #mysecuritytv

OTHER VIDEOS IN THIS SERIES

Astronomers
April 18, 2024
An international team of astronomers has discovered 49 new gas-rich galaxies using the MeerKAT radio telescope in South Africa. Watch Now
apsm_03
April 8, 2024
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Watch Now
apsm_01
April 8, 2024
With the rapidly evolving challenges in global travel, trade, and security, we speak to Australian Border Force Commissioner, Michael Outram APM at the Milipol APAC and TechX Summit 2024 in Singapore. Watch Now
apsm
April 2, 2024
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over your true security posture. Be proactive in fixing vulnerabilities, misconfigurations, leaked credentials, and privileges before they are exploited. Watch Now