Skip to main content
Live Stream | ISSQUARED

Live Stream | ISSQUARED

By Live Stream | ISSQUARED Solutions
The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.

The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
Zero Trust and Passwordless Authentication
When it comes to the Zero Trust model, the hard question is where to start the journey. Watch this episode where host Nikolay Chernavsky (CISO at ISSQUARED), and guest Shahrokh Shahidzadeh (CTO at SecureAuth) explore what it takes to implement Zero Trust in the identity space. Implementing Zero Trust in the authentication process is a step in the right direction which can lead to the reduction of cyber breach exposure by 85%.
49:27
July 11, 2022
NextGen SIEM – Deep Dive | Staying Ahead of the Threat Actors
SIEM solutions aggregate a lot of data across enterprises from various systems and applications. This rich data collection could be tapped to solve many use cases in non-security-related areas. Watch this episode to find out in-depth what other problems NextGen SIEM can help solve. Join Nikolay Chernavysky (CISO at ISSQUARED) with the co-host Suchinth Kumar (CRO at ISSQUARED) as they explore what you can do to help your organization in staying ahead of the threat actors.
39:16
July 11, 2022
MANAGING CYBER SECURITY RISK
Cyber Security and Risk Management go hand in hand. Every successful Cyber Security program requires a great deal of articulating the risk and its mitigation techniques.   Please join us in this episode as we explore what it takes to understand and properly characterize Cyber Security risks.
36:49
June 24, 2022
Securing APIs – Next Perimeter
As Information Technologies continue to grow and transform, the transformational process changes the information security controls of organizations. Not so long ago the main objective of Information Security was to secure the firewall-defined perimeter. #Clouds, #SaaS, #Data Exchanges have extended and in many cases removed the perimeter altogether and brought new challenges to the information #security table to take care of in the form of APIs, #Cloud #Services, and a #software defined perimeter. APIs are a new frontier that Information Security practitioners need to pay close attention to. Securing #APIs is a challenging effort and requires a creative approach. 
35:40
June 24, 2022
NextGen SIEM – staying ahead of the game : Live Stream
SIEM technologies have been around for more than 20 years now. Cyber Security professionals heavily rely on them to aggregate, correlate, and help to find the proverbial needle in the haystack. Yet, after 20 years of trying, in many ways we still haven’t found the needle.  Next-Generation SIEM technologies take a different approach in finding the needle and in many ways provide Cyber Security Professionals with the vital information necessary to prevent an event before it happens.  Join the show to find out and learn what you can do to help your organization in staying ahead of the threat actors.  The security breach is an adverse scenario and most businesses that prioritize their data will put IT security experts and technologies to work as a defender against anyone who might try to cause trouble.
45:03
June 24, 2022
Latest Trends in IAM | ISSQUARED
Join Suchinth Kumar (CRO at ISSQUARED) for a discussion on the latest industry trends in Identity and Access Management (IAM) in 2022 and beyond as businesses look to maintain centralized control and visibility over the remote and distributed workforce.  Today, it is critical for security and risk management leaders to implement a more flexible IAM infrastructure to meet the changing needs of your organization.
21:48
June 20, 2022
Securing Active Directory | Cyber Talk with Nikolay | ISSQUARED
Did you know that Active Directory is the prime target for cyber attackers to access all connected user accounts, applications, and databases eventually?  Join us Live at Cyber Talk with ISSQUARED CISO Nikolay Chernavsky and CRO Suchinth Kumar to know the best solutions to secure your Active Directory from cyberattacks.  The show talks about challenges of different types in managing cybersecurity, recently evolved attacks and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world..
43:40
June 08, 2022
Intro on External Identity Access and Governance by Suchinth
The number of external users that organizations work with and the amount of sensitive #data disclosed to them is increasing every year. But, a minor discrepancy in your third-party’s #security and #privacy routines may lead to multiple cybersecurity challenges for your organization. The immediacy and criticality of third-party security #threats mean you need an external #identity access & #governance solution right now.
19:29
May 12, 2022
Show Introduction & Security Trends | Live Stream | Cyber Talk with Nikolay
Broaden your horizons and perspectives in the cyber security space by joining our show 'Cyber Talk with Nikolay' hosted by Nikolay Chernavsky,  Chief Information Security Officer (CISO) at ISSQUARED, Inc.  The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
17:14
April 12, 2022
Best Cybersecurity Practices | Cyber Talk with Nikolay
The show talks about challenges of different types in managing cybersecurity, recently evolved attacks, and threats to organizations and individuals.  The Cyber Talk not only updates participants on modern cybersecurity strategies but also aims at helping potential organizations to be less vulnerable to various cyberattacks around the world.
00:35
April 12, 2022