Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have the visibility required to detect and remediate earlier.
This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!
Kathy Wang is CISO at Very Good Security, and is a recognized thought-leader in information security with a strong background in research and security leadership. She has worked in government, commercial, and technology startup environments, and currently advises security services/products startup companies. Wang is also an internationally recognized malware expert, who has researched, developed, evaluated, and operationalized various solutions for detecting and preventing client-side attacks used by advanced persistent threats (APT), as they target common platforms. She has spoken at many conferences and panels, including RSAC, DEFCON, and REcon. Wang has co-authored a book, Beautiful Security, and holds a BS and MS in electrical engineering from the University of Michigan, Ann Arbor.