top of page

3GC POST

Our Expert Cybersecurity Panel & C-level Executive Discussion with Q&A Session

Updated: Oct 19, 2023

How does the cloud change the role of the CISO

Most new businesses are digital native, therefore a Chief Information Security Officer will need to be focused on Identity and data



Process changes within the organization are changing the role of the CISO


The optics of a security incident are that it’s an IT problem, but that’s not always the case.



The shift in the CIO’s role towards delivering data insights


The new CIO role is no longer focused around day to day operations. Given that they have the same access to information, the CIO’s role is to dig deeper, providing insights into that data.



How the Okta attack might have happened and the lessons to be learned


Initial breakdown of the Okta Breach and how to get ahead of crises events from some of the biggest names in technology leadership.



The common security shortcomings and how these can be corrected


Get the lowdown on real world security challenges from some of the biggest names in technology leadership.



Looking beyond and digging deeper into the cybersecurity news headlines


Ignore the distractions and learn how to re-think and prioritize your security strategy from some of the biggest names in technology leadership.


2 Comments


Suing credit bureaus? It’s like fighting an invisible enemy—they mess up your credit report, then act like they can’t see it or don’t care. But guess what? You can fight back. When they refuse to fix mistakes or don’t properly investigate disputes, the law is on your side. Credit bureaus love to hide behind their automated systems, but they’re legally required to fix errors, and if they don’t, you can take them to court. Want to know how to get started? Check out this article: https://consumerattorneys.com/article/how-to-sue-credit-bureaus. Because sometimes, the only way to make them listen is by making them pay for their mistakes.

Like

Ensuring your cybersecurity assessments cover modern infrastructure like container platforms is essential. This in-depth openshift security guide provides actionable best practices—such as enforcing RBAC with least privilege, network segmentation, container image scanning, etcd encryption, and using the OpenShift Container Security Operator—to help organizations secure OpenShift environments throughout development and deployment (iterasec.com). Integrating these guidelines into your assessment process ensures a comprehensive defense strategy that addresses current cloud-native and DevSecOps challenges.

Like

EMAIL ADDRESS

14622 Ventura Blvd Ste 2047

Sherman Oaks, CA 91403

MAILING ADDRESS

Toll Free: 877-3GC-GROUP

Phone: 213-632-0155

PHONE NUMBER

Contact Us

© 2025 3GC Group. All rights reserved.

3GC Group is a division of Pandoblox, Inc.

bottom of page