Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
SecureData: Cybersecurity Responding to Demand
![](/sites/default/files/styles/cropper_main_image/public/migration_image/ID%20118%20SecureData%20Cybersecurity%20Responding%20to%20Demand%20Image.jpg.webp?itok=mnbq7nq5)
SecureData: Cybersecurity Responding to Demand
Assessing, detecting, and responding to cyber threats are not new pursuits. However, evolving technology and innovating attackers make this a more challenging endeavour. More specifically, companies must be ahead of the changing nature of the threats and act at speed once encountered. Businesses today must have the necessary skills, agility, and underlying platforms to help them mitigate these risks.
In this podcast, hosted by freelance analyst Bob Tarzey, SecureData's Chief Strategy Officer, Charl van der Walt lends his expertise on the matter. Firstly, he discusses how organisations should prioritise their plan of action. Then, he outlines a basic strategy that businesses should be following. Finally, he offers his guidance on how to keep ahead of the changing landscape.
Join 34,209 IT professionals who already have a head start
Meet the panel
![](/sites/default/files/styles/user_profile_picture/public/2020-05/CharlvanderWaltSecureDataSensePost.jpg.webp?itok=xxFoqgpz)
Charl Van Der Walt
![](/sites/default/files/styles/user_profile_picture/public/2020-05/Bob%20Tarzey_4.jpg.webp?itok=xRZiZCNL)
Bob Tarzey
Recommended Content
Trending Content
Top 10 Best DCIM Software Solutions for 2024
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
What is Engagement Farming and is it Worth the Risk?
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Will TikTok Actually Be Banned? Exploring the US Congress Bill
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Hackers Are Exploiting the UEFA Euros for Phishing Attacks
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
What is Roko's Basilisk? The Terrifying AI Thought Experiment Explained
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)