www.scworld.com Open in urlscan Pro
104.26.4.70  Public Scan

URL: https://www.scworld.com/podcast-segment/13192-leveraging-ai-and-automation-to-prevent-the-next-crowdstrike-outage-vivek-...
Submission: On December 20 via manual from SG — Scanned from SG

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
CISO Stories
Topics
Topic Hubs
Events
Podcasts
Research
Recognition
About
Open Search Bar

ADVERTISEMENT



BlackHat 2024Subscribe
Black Hat


LEVERAGING AI AND AUTOMATION TO PREVENT THE NEXT CROWDSTRIKE OUTAGE – VIVEK
BHANDARI – BH24 #2

August 7, 2024


The recent CrowdStrike outage and subsequent disruption tested organizations'
resiliency and confidence as the world went offline. It served as a reminder
that in an increasingly technology-dependent world, things will go wrong – but
security leaders can plan accordingly and leverage emerging technologies to help
minimize the damage. In this interview, Tanium’s Vice President of Product
Marketing Vivek Bhandari explains how AI and automation can help with
remediation and even prevent similar outages from happening in the future, and
breaks down the future of Autonomous Endpoint Management (AEM) as the solution
for continuous cyber resilience in the face of disruption.

Segment Resources:
https://www.tanium.com/blog/the-future-of-converged-endpoint-management-is-autonomous-endpoint-management-aem/

This segment is sponsored by Tanium. Visit https://securityweekly.com/taniumbh
to learn more about them!

SPONSORED BY



Full episode and show notes

GUEST

Vivek Bhandari
Vice President of Product Marketing at Tanium


As the Vice President of Product Marketing, Vivek Bhandari leads the
organization responsible for positioning, messaging, and go-to-market strategies
for Tanium’s products globally. Prior to Tanium, Vivek led product marketing for
VMware’s network security business. Before VMware, Vivek held leadership roles
in product management at Google Cloud, Area 1 Security, Cisco, and VeriSign,
working on enterprise security products. Vivek has a master’s degree in Computer
Science and a bachelor’s degree in Electrical Engineering.

HOST

Mandy Logan
Brainstem Hacker and InfoSec Enthusiast at Redacted
@survivatrix#0613


RELATED

Black Hat

SAAS SECURITY BEYOND JUST MISCONFIGURATION & EXPERT INSIGHTS ON CYBERSECURITY
ETHICS – ED SKOUDIS, MAOR BIN – ESW #374

August 29, 2024

In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses
the evolving landscape of SaaS Security. He highlights the challenges posed by
the security gap resulting from the rapid adoption of SaaS applications and why
SaaS security is beyond just misconfiguration management. Segment Resources:
https://www.adaptive-shield.com/la...
AI/ML

LET’S GET REAL ABOUT WHERE AI CAN HELP SECOPS & AI, AUTOMATION & LOW-CODE – MIKE
LYBORG, BRANDON POTTER – ESW #373

August 22, 2024

Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy
Logan as they cut through the AI peanut butter! While Generative AI is the
not-so-new hot topic, it's also not the first time the cybersecurity industry
has embraced emerging technology that can mimic human actions. Security
automation and its ability to take action on ...
Endpoint/Device Security

SECURE WEB GATEWAYS HAVE FAILED US & USING AI TO PREVENT THE NEXT CROWDSTRIKE
OUTAGE – VIVEK RAMACHANDRAN, VIVEK BHANDARI – ESW #373

August 22, 2024

SquareX With employees spending most of their working hours on the browser, web
attacks are one of the biggest attack vectors today. Yet, both enterprises and
security vendors today aren’t focused on securing the browser – a huge risk
given that attackers can easily bypass Secure Web Gateways, SASE and SSE
solutions. This segment will demonstrate...


ADVERTISEMENT



ADVERTISEMENT





X



--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies