Real Edge Computing Use Cases from the AT&T Cybersecurity Insights Report – Theresa Lanowitz, Mark Freifeld – BSW #330
Full Audio
View Show IndexSegments
1. Real Edge Computing Use Cases from the AT&T Cybersecurity Insights Report – Theresa Lanowitz, Mark Freifeld – BSW #330
Theresa Lanowitz joins Business Security Weekly to review real edge computing use cases from the AT&T Cybersecurity Insights Report. Specifically, we'll cover the following industry sector reports, including:
- Healthcare
- Manufacturing
- Retail
- US SLED
- Transportation
Research for the AT&T Cybersecurity Insights Report was conducted during July and August 2022. AT&T surveyed 1,418 security practitioners from the United States, Canada, the United Kingdom, France, Germany, Ireland, Mexico, Brazil, Argentina, Australia, India, Singapore, and South Korea. Respondents come from organizations with 1,000+ employees except for US SLED and energy and utilities verticals. Respondents were limited to those whose organizations have implemented edge use cases that use newer technologies such as 5G, robotics, virtual reality, and/or IoT devices. Respondents are involved in decision-making for edge use cases, including cybersecurity, that involves new technologies such as 5G and IoT devices.
This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attcybersecurity to learn more about them!
Announcements
Join our cybersecurity community on Discord! Connect directly with our expert hosts, join discussions with fellow audience members, and customize your notifications to receive alerts every time an episode of your favorite show publishes. Get your invite at securityweekly.com/discord!
Guests
Theresa Lanowitz is the Chief Cybersecurity Evangelist at LevelBlue, a strategic alliance between AT&T and WillJam Ventures, that simplifies cybersecurity for the businesses fueling our global economy.
With a distinguished career in the technology industry, she has held influential roles at companies including Gartner, Borland, Taligent, and Sun Microsystems, significantly impacting application security and emerging technologies.
Theresa is a globally respected leader known for her deep and diverse experience in cybersecurity. Theresa frequently speaks at major industry conferences, sharing her insights on high tech trends, AI integration, and the evolving threat landscape.
Theresa holds a Bachelor of Science in Computer Science from the University of Pittsburgh, Pittsburgh, PA.
Mark has been with AT&T for 23 years. His career has included sales, product management, and cybersecurity marketing. In his current role, Mark helps to create and publish thought leadership content in cybersecurity.
Hosts
2. Uber CISO Speaks Out as CISOs Draft Letters to the CEO, CMO, and CCO – BSW #330
In the leadership and communications section, A Letter from the CISO to the CEO, The High Cost Of Ignoring Cybersecurity: Why Your Business Needs Protection, The Art of Speaking Cadence: Unleashing a Powerful Leadership Tool, and more!
Announcements
Stay up-to-date with us on X (formerly known as Twitter) for the latest show clips and updates! Find us @SecWeekly and stay connected with our cybersecurity community.
Hosts
- 1. Former Uber CISO Speaks Out, After 6 Years, on Data Breach, SolarWinds
Joe Sullivan, spared prison time, weighs in on the lessons learned from the 2016 Uber breach and the importance of the SolarWinds CISO case.
- 2. A Letter from the CISO to the CEO
In an upcoming series of articles, I frame the key concerns of the modern day CISO geared to the perspective of the other C-Suite members. Cybersecurity may be the specialty of the CISO, but good cybersecurity allows every executive to be more effective in their role.
In today’s letter, we talk about cybersecurity to the CEOs of the world. Here's the other articles in the series:
- 3. Steps CISOs Should Take Before, During & After a Cyberattack
While each cyberattack is unique and requires its own procedure and recovery plan, there are three considerations chief information security officers (CISOs) should raise with their security teams and business leaders today to ensure they are prepared accordingly.
- 4. How the Evolving Role of the CISO Impacts Cybersecurity Startups
CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.
- 5. The High Cost Of Ignoring Cybersecurity: Why Your Business Needs Protection
In our world where digital is king, cybersecurity is not just a technical issue; it’s the lifeline of your business’s security. Let’s delve deeper into why ignoring cybersecurity can be a disastrous oversight for your business, potentially leading to severe consequences.
- 6. The Transactional Leadership Style: Is It Right For You?
In this post, we’ll go over what precisely transactional leadership is, its benefits, and where it falls short so you can see how you relate to this leadership model.
- 7. The Art of Speaking Cadence: Unleashing a Powerful Leadership Tool
In the fast-paced world of business, leaders often focus on honing their communication skills, from crafting compelling messages to mastering body language. However, one often overlooked yet potent tool in a leader’s arsenal is speaking cadence. The rhythm and pace at which we speak can significantly impact how our messages are received and interpreted, making it a valuable asset for effective leadership.