November 01, 2018. Podcasts Security Author: David Fearne, Richard Holmes

Arrow Bandwidth Security Series with FireEye | General Principles for Managing Risk

Welcome to Arrow Bandwidth, the podcast from Arrow ECS to help the channel better understand the trends, technologies, and concepts facing the IT industry today #ArrowBandwidth 

If you have any questions about what you hear in our podcasts or would just like to join the conversation, tweet us using #ArrowBandwidth and @ArrowECS_UK. Prefer to email? Get in touch here.

 

Arrow Bandwidth Security Series with FireEye | General Principles for Managing Risk

In this interview, the team are joined by Mike Trevett to talk about the more general principles for managing risk in cyber security.

An interesting look at some of the developments in both security and the threats it faces.

Thanks for listening.  

 

Hosts:

David Fearne, Arrow Global Practice Leader - Data Intelligence @davidfearne 

Richard Holmes, Arrow Business Development Director for IoT @_Rich_Holmes

Guest:

Mike Trevett, Director UK & Ireland at FireEye @FireEye

 

   

Listen to the podcast on iTunes or SoundCloud

 

What did you think about today's podcast? We'd love to hear from you in the comments.

If you have any questions or topics you’d like to hear David and Rich talk about, please let us know below or over on @ArrowECS_UK.

 

Related Posts

  • Arrow Bandwidth S3, Episode 11 | WannaCry - Interview with Malware Tech at InfoSec Europe 2017

    We have a very special interview on Bandwidth this week - David Fearne interviews Malware Tech, the man who stopped the WannaCry worm in it's tracks.

    > More

  • The Need for Security in the Internet of Things | Part 1: The IoT Phenomenon

    In this two-part series, John Watkins looks at the security side of IOT. In Part One he gives us an overview of the phenomenon that is the Internet of Things and its security risks

    > More

  • Arrow Bandwidth Security Series with RSA | Trying to Control the Cloud

    This week on Bandwidth with RSA, trying to control the cloud. How to control and secure a perimeter that’s constantly changing and constantly challenging.

    > More

Blog Updates

Popular Posts

Challenges and Solutions for Managed Services Providers in IoT

> More

VMC NetApp Storage

> More

Bandwidth On Point Takeover | Episode 1 - IoT Foundations

> More

Being a Disruptor in the Market

> More

Dell Technologies World - "Make it Real"

> More

Blog Archive