Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Upgrade GRC into a Profit Center and Business Enabler | Strategic CISOs by TrustCloud

A candid, practical session for CISOs and security leaders who need to map security to business priorities and show the ROI of their programs. What you’ll learn: A board-ready strategy that ties security to growth. How to present a four-row “business impact” view that shows contributions to revenue acceleration, product expansion, board protection, and culture, on a single timeline. The first 90 days set you up for the next 3 years. Map to business objectives from day one, educate on the “why”, not just the “what,” and listen so you can pivot with the business.

EAP and XDR: An Essential Marriage of Proactive and Reactive Security Operations

In cybersecurity, detection and response are table stakes. Attackers are faster, techniques more subtle, and the cost of even small missteps on the part of the defender is growing. For security teams investing in Extended Detection and Response (XDR) tools like Palo Alto Networks Cortex XDR, those investments are critical—but they are not enough on their own.

The Smartest Way to Start a Cybersecurity Career | Marius Poskus

Marius Poskus shares practical advice for those breaking into cybersecurity. He explains why beginners should start in Security Operations Centres (SOCs) rather than chasing rare pen‑testing roles. Building defensive skills first creates a stronger foundation and opens the door to any cybersecurity path—even in an AI‑driven future.

Why Africa's banks must recognize that trust is at the root of fraud prevention

As digital fraud rises across Africa, INETCO’s Eren Ramdhani explains why banks must rebuild trust through real-time, AI-driven fraud systems. Article by cybersecurity leader and INETCO’s Chief Product Officer, Eren Ramdhani Trust is the most valuable currency in today’s digital economy. For banks, it determines whether customers feel confident enough to save, invest, and transact. Yet across Africa, millions of people face daily fraud attacks that threaten that trust.

Zscaler + Torq: Inside the Zero Trust SOC

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series.

The Shift in SOC Escalation: From Manual to AI-Powered

Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world. Every SOC has an escalation process — but not every SOC has one that is truly effective.

Tanium Connector for Microsoft Intune - Tanium Tech Talks #145

Today see how Tanium can quickly synchronize device data from multiple tenants. Bring mobile devices in as native Tanium entities Consolidate multiple Intune tenants into a single view Mobile OS support:,,, etc. Two tiers of RBAC for Intune actions New sensors for Intune device data Sync device data to Super fast from time to configure to seeing data Use an Intune account with read-only access for synchronization.

Ask SME Anything: What is Unified Data Security?

Tired of the data security "alphabet soup"? DSPM. DLP. Protecting data in the AI era shouldn't require a glossary. In this episode of Ask SME Anything, Netskope expert Ankur Chadda cuts through the jargon and breaks down the fundamentals of unified data security, revealing four crucial questions every security professional must be able to answer to effectively protect your data from emerging threats.

Stop Alert Fatigue: Delivering Time and Assurance to the SOC Team

In his talk from Black Hat USA 2025, A10 Networks security expert Jamison Utter challenges the conventional approach to security alerting and automation. He argues against the "magic AI" hype and champions a model where intelligent systems augment human analysts, rather than overwhelming them. Jamison highlights the critical process of filtering security data to deliver real value to the SOC team.