GenAI with Trace3

April 17, 2024

You might also enjoy

AI is a Data Security Problem: How to Secure the Autonomous Enterprise with Sentra & Trace3

Is your organization ready for AI, or is hidden 'shadow data' creating massive security risks? In this Trace PressBox discussion, Trace3 Advisory CISOs Gina Yacone and Jim Hunter dive deep with Sentra's Co-Founder Yoav Regev into why data security is the heart of the AI challenge. Check out these key moments:

[00:48] Why AI is a Data Security Problem

[02:14] The 3 Pillars: Discovery, Classification, and Context

[05:17] Complementing Microsoft 365 and Copilot

[08:06] AI as a "Risk Magnifier"

[11:13] Scaling Data Security for the Enterprise

[13:17] Requesting a Proof of Value (POV)

[15:21] Identifying Shadow Data and Reducing Cloud Costs

Future of App Security: Why the Trace3 + F5 Partnership is Critical for the Autonomous Enterprise

How do you maintain application performance across a fragmented multi-cloud footprint? In this Trace3 PressBox episode, we sit down with F5 to discuss application security, delivery, and the shift toward automated infrastructure.

0:00 - Introduction to the PressBox

1:30 - The Current State of Application Security

3:45 - Why F5 is Moving Beyond Load Balancing

6:20 - Solving Multi-Cloud Complexity

9:10 - Future Outlook: AI and App Delivery

11:00 - Closing Thoughts & Resources

Why Continuous Monitoring is Replacing Legacy GRC Tools | Trace3 & Vanta

It's time to stop managing GRC with spreadsheets. This Trace3 PressBox session with Vanta explains how 'Trust Management' and continuous monitoring are revolutionizing SOC 2 compliance and third-party risk management. Trace3 Advisory CISOs Jim Hunter and Gina Yacone sit down with Ethan Heller from Vanta and unpack automated compliance.

Check out these key moments:

00:00 - Introduction: Vanta and Trace3 Partnership

00:48 - The Shift from GRC to Trust Management

03:00 - Why Legacy GRC Tools (like Archer) Become "Shelfware"

04:30 - The ROI of Continuous Monitoring vs. Point-in-Time Audits

07:40 - Solving the "Black Box" of Third-Party Risk Management

10:45 - How to Present Security Metrics to the Board of Directors

14:30 - Continuous Verification: Mapping 40+ Frameworks

16:30 - Using a "Trust Center" to Speed Up Sales Cycles

20:45 - How to Scale Security Teams with AI