Identified Expertise

  1. Security & GRC20
  2. Applications & Platforms9
  3. Governance, Risk & Compliance9
  4. Engineering7
  5. Threat & Vulnerability Management6

Content Tomas is Following

Yes

No

Sometimes

View Results
111.8k viewscircle iconLightbulb on123 Upvotescircle icon58 Comments

Performance

High cost

Rate of Data Growth

Other (none of the above)

View Results
8.9k viewscircle iconLightbulb on1 Upvotecircle icon3 Comments
123 views
Tomas Honzak
Tomas HonzakVP, CISO at Vendavo in Software6 years ago
It depends on what the original authentication method is. We require multi factor PIV authentication and can only use FedRAMP approved cloud providers which have been vetted to meet NIST requirements so I wouldn’t have an ...read more
745 viewscircle icon1 Comment
Tomas Honzak
Tomas HonzakVP, CISO at Vendavo in Software2 years ago
Hard to give a specific answer without having context, but let me try anyways:
- Create network diagram and review the flow of data through it. Pay attention to understand their sensitivity.
- Review the segmentation ...read more
2k viewscircle icon1 Comment
Tomas Honzak, VP, CISO at Vendavo at Vendavo, Inc. | Gartner Peer Community