Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
?
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
TEC37 Security Strategy Security Transformation

Webinar

TEC37 Security Series E05: Top Considerations When Building Your Security Architecture

  • Details
  • Select an Option

Event Overview

In this TEC37 encore, we explore the role security architecture plays in an overall cybersecurity strategy. Historically, investments in security have been driven by the features and functionality of point products, leaving the average enterprise with around 100 unique security products in its environment. Organizations trying to secure a global remote workforce need a smarter, more integrated approach. Join host Robb Boyd as he speaks with WWT's Chris Konrad, Senior Director of Security for Global Accounts, Kent Noyes, Distinguished Security Architect, and Mark Wall, Senior Practice Manager for Automation and Application Services. They'll discuss what's needed for security architecture to meet today's business drivers and keep projects on track.

Goals and Objectives

After attending, you'll have better insight into how to create a strategic security architecture. You'll come away with practical steps to get the most out of your technology investments while increasing efficiency as your organization secures its remote workforce and sets the stage to develop new digital services for customers

Who should attend?

This episode is targeted toward Chief Information Security Officers, Cybersecurity Directors, and Cybersecurity Architects and Engineers.

Presenters

User Profile Picture

Robb Boyd

Explainerds.net

Chief Nerd

User Profile Picture

Kent Noyes

World Wide Technology

Sr. Director of Cloud Security

User Profile Picture

Mark Wall

World Wide Technology

Director

User Profile Picture

Chris Konrad

World Wide Technology

Area Vice President, Global Cyber

Invite people to join this event

© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies