Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
360View: March 2022
Channel

360View: March 2022

Truth in IT
03/24/2022

In this 360View episode, we take you through 3 leading disruptive technologies you must know how can impact your enterprise IT infrastructure. In this episode, we'll cover:
     * ML powered awareness cybersecurity training takes the perspective that your human element is not your weakest link and preventing phishing hacks can be easier on both the infosec team and the user community.
     * How you can get machine learning models into production usefully? And once you get them there, how do you maintain them and use them at scale?
     * A new approach to IT risk management that breaks down the silos between compliance and risk that empowers InfoSec teams with the actionable insights they need to avoid and mitigate risk and optimize security.

Categories:
  • » Small World Big Data
  • » Events » 360View
Tags:
  • wallaroo
  • cybeready
  • reciprocity
  • matchett
  • 360view

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


In this 360View episode, we take you through 3 leading disruptive technologies you must know how can impact your enterprise IT infrastructure. In this episode, we'll cover:
     * ML powered awareness cybersecurity training takes the perspective that your human element is not your weakest link and preventing phishing hacks can be easier on both the infosec team and the user community.
     * How you can get machine learning models into production usefully? And once you get them there, how do you maintain them and use them at scale?
     * A new approach to IT risk management that breaks down the silos between compliance and risk that empowers InfoSec teams with the actionable insights they need to avoid and mitigate risk and optimize security.

Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Browse Playlist
  •  

                Channel's Comments: 360View: March 2022

                Chat

                Featuring

                Upcoming Webinar Calendar

                • 03/26/2026
                  01:00 AM
                  03/26/2026
                  Reclaim Network Clarity and Accountability with Netskope DEM
                  https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
                • 03/26/2026
                  05:00 AM
                  03/26/2026
                  ITDR's Role in Strengthening Critical Security Architecture
                  https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                  https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  Making GPUs Available On Demand (Without Breaking the Budget)
                  https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
                • 04/08/2026
                  01:00 PM
                  04/08/2026
                  Managing Configuration at Scale Across Group Policy and Intune
                  https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
                • 04/15/2026
                  01:00 PM
                  04/15/2026
                  Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                  https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
                • 04/30/2026
                  10:00 AM
                  04/30/2026
                  The Reality of SaaS Data Protection: Insights from the Keepit Annual Data Report 2026
                  https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

                Upcoming Events

                • Mar
                  26

                  Reclaim Network Clarity and Accountability with Netskope DEM

                  03/26/202601:00 AM ET
                  • Mar
                    26

                    ITDR's Role in Strengthening Critical Security Architecture

                    03/26/202605:00 AM ET
                    • Mar
                      26

                      HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                      03/26/202601:00 PM ET
                      • Mar
                        26

                        Making GPUs Available On Demand (Without Breaking the Budget)

                        03/26/202601:00 PM ET
                        • Apr
                          08

                          Managing Configuration at Scale Across Group Policy and Intune

                          04/08/202601:00 PM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version