Tony LaRosa, CISSP
Boston, Massachusetts, United States
1K followers
500+ connections
View mutual connections with Tony
Tony can introduce you to 10+ people at Cisco
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedInās User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Tony
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedInās User Agreement, Privacy Policy, and Cookie Policy.
About
š Cybersecurity Leader | Building High-Performing Teams | Driving Zero Trust &ā¦
Activity
1K followers
-
Tony LaRosa, CISSP shared thisAI isnāt just accelerating developmentāitās redefining the entire security model. Ā Two recent SC Media perspectives highlight a growing reality: Ā š First, AI-driven development is creating both speed and chaos. Organizations are shipping code faster than ever, but security, governance, and compliance models havenāt kept up. The takeaway is clear: security canāt be an afterthoughtāit has to be embedded into workflows, aligned with incentives, and automated within pipelines to keep pace with AI-driven CI/CD. https://lnkd.in/eYrRV8Gq Ā š At the same time, frontier models like Claude Mythos are changing the threat landscape entirely. AI can now discover and even help weaponize vulnerabilities at machine speed, shrinking the window between exposure and exploitation. https://lnkd.in/eUDCbYtx Ā The takeaway is clear: AI is now both a force multiplier for innovation and attackers Ā So what does āgoodā look like? Ā It means shifting to embedded guardrails, identity-first controls, and real-time enforcement across the AI lifecycle. Ā This is where Cisco is taking a leading role: Ā š AI Defense (Build + Runtime Guardrails) Cisco AI Defense helps teams secure AI systems before and during deploymentāfrom adversarial testing (prompt injection, model abuse) to runtime protection, ensuring safe inputs/outputs and controlled agent behavior. š https://lnkd.in/ey8JN233 š https://lnkd.in/eT5acf_P Ā š Secure Access (Visibility + Control for AI Usage) Cisco Secure Access provides visibility and policy control over 3rd-party AI applications, helping organizations manage shadow AI and enforce usage policiesācombined with MCP-based enforcement to govern how users and agents interact with AI services. š https://lnkd.in/edgWR3AA š https://lnkd.in/egMxPKfW  𧬠Duo (Identity for the Agentic Workforce) Duo extends identity to AI agentsāestablishing verifiable identity, human accountability, and least-privilege access, so every AI action is governed and traceable. š https://lnkd.in/eX-WcJUK Ā Put together, this is a shift to: ā”ļø Securing the full AI lifecycle (build ā deploy ā run) ā”ļø Applying Zero Trust to both humans and AI agents ā”ļø Embedding guardrails without slowing innovation Ā Bottom line: The organizations that win in the AI era wonāt just move fastātheyāll move fast with control. Ā #CyberSecurity #AI #ZeroTrust #DevSecOps #Ciscosecurity #AISecurity
-
Tony LaRosa, CISSP shared thisš„ The Evolution of the Firewall: From Perimeter Defense to Platform-Powered Security Firewalls started as perimeter defendersābut today, the perimeter is gone. Weāve moved from: ā”ļø Stateful inspection ā”ļø Next-Gen Firewalls (Apps, Users, IPS) ā”ļø Now weāre entering the next phase: Hybrid Mesh Firewalling (HMF) Firewalls are no longer single devices or even single servicesātheyāre distributed enforcement points across: - Data centers - Cloud environments - Branches - Remote users - Workloads/Containers But distribution alone isnāt enough - This is where the platform becomes critical. š§© Why a Platform Matters in Hybrid Mesh Firewalling A true hybrid mesh firewall isnāt just multiple firewallsāitās a unified platform that delivers: ā Consistent policy everywhere ā Shared intelligence ā Integrated security services ā Simplified operations ā Protects the entire environment, not just the network š The firewall isnāt disappearingāitās becoming a platform. š Cisco Hybrid Mesh Firewall brings together distributed enforcement + centralized intelligenceādelivering consistent security across every environment without adding complexity. At its core, it enables organizations to: - Extend protection everywhere (on-prem, multicloud, workloads and users) - Unify policy and management through a single control plane - Secure applications and workloadsānot just networks - Segmentation built-in from network ā cloud ā workload All powered by an integrated platform that includes: Security Cloud Control for unified management and policy š https://lnkd.in/e8M_86kM Secure Firewall across all form factors (physical, virtual, and cloud-delivered) š https://lnkd.in/e2Ps3CK2 Firewall-as-a-Service (FWaaS) for scalable, cloud-delivered enforcement š https://lnkd.in/edBv2Ewb Secure Workload for application and microsegmentation visibility š https://lnkd.in/eSeeR7xw Multicloud Defense for consistent protection across cloud environments š https://lnkd.in/eNw3suaR Cisco Isovalent for eBPF-powered cloud-native networking, security, and observability š https://isovalent.com Cisco secures AI infrastructure with NVIDIA BlueField DPUs š https://lnkd.in/eRENfG-v #CyberSecurity #HybridMeshFirewall #ZeroTrust #Ciscosecurity
-
Tony LaRosa, CISSP shared thisš„ Excellent opportunity to join the Cisco Security š with a high performing and fun team led by an exceptional leader! ššTony LaRosa, CISSP shared thisšØ I'm Hiring: Cisco Security Product Specialist (Upstate NY) šØ Ciscoās security team is growing, and Iām looking for a strong Security Account Executive to cover Upstate NY. This role is for someone who is comfortable leading from the front, building real customer relationships, and closing complex security deals. If youāve carried a number in cybersecurity and have a track record of beating it, let's talk! Youāll own the territory, build pipeline, and help customers tackle real security challenges with Ciscoās portfolio. Itās a high-visibility role with real expectations and real upside. If youāre interested in joining my team, or know someone who is, reach out ASAP! Apply here: https://lnkd.in/eUCGvtjiSecurity Account Executive - Commercial East in New York, New York, United States of America | Sales at CiscoSecurity Account Executive - Commercial East in New York, New York, United States of America | Sales at Cisco
-
Tony LaRosa, CISSP reposted thisTony LaRosa, CISSP reposted thisIf anyone is underestimating how big this is, they should not be. This is a major shift. For the better part of the last two decades, there has been a relatively delicate balance between attackers and defenders. In just the last two months, that balance has started to change dramatically, and it is about to accelerate even more, benefiting attackers. One of the clearest examples is the jump in capability from Sonnet to Opus. Anthropic recently shared a slide at a conference showing just how dramatic the difference is when it comes to finding security vulnerabilities in source code. The improvement was not incremental. It was exponential. A simple way to see this for yourself: clone one of your favorite GitHub repos and ask Claude Code to look for security vulnerabilities. With Opus 4.6, the results are remarkably strong. Work that might have taken a skilled security researcher weeks or even months can now happen in minutes, and not always by a top-tier expert. It goes beyond code review too. When you combine agentic automation with platforms like the SANS SIFT forensic workstation, Opus becomes extremely effective at memory forensics, reverse engineering, and other advanced workflows. And this is only the beginning. With the unreleased Mythos model, this appears to be heading to another level entirely. That has serious implications for the security community. Attackers will be able to identify zero-days faster, operationalize them faster, and weaponize them faster. That is why efforts like Project Glasswing matter. We are working with Anthropic to get ahead of this coming wave and help defenders fend off this coming threat. Whether you are on the offensive side, the defensive side, or leading security strategy, this is one of those moments worth paying very close attention to. https://lnkd.in/ed6WQG3v #cisco #aidefense #aisecurity #ciscoseProject Glasswing: Securing critical software for the AI eraProject Glasswing: Securing critical software for the AI era
-
Tony LaRosa, CISSP shared thisšš¤ Reimagining Security for the Agentic Workforce ā”ļø The industry trend is clear: Agentic AI is evolving from chatbot-style assistance to systems that can plan, decide, use tools, and execute multi-step work with minimal human inputāquickly becoming the next enterprise software layer. But this shift is also introducing a new class of security risks. Trends Iām seeing: š Enterprises are shifting from assistance ā task-oriented agents š Real value is coming from orchestration (connecting AI to tools, data, and workflows) š Adoption is growingābut scaling safely is still a challenge š Security is now a primary decision factor, not an afterthought And on the risk side, this is where things get real: ā ļø Prompt injection becomes more dangerous when AI can take actions š« Over-permissioned agents can execute unintended or unauthorized tasks š¤ Data exposure risk increases as agents access more systems (email, CRM, code, etc.) š Tool and API integrations expand the attack surface ā Hallucinations are no longer just ābad answersāāthey can become bad actions Cisco Security is charging ahead, innovating and leading the way. š§āš» Identity-first security for AI agents Extending Zero Trust to non-human identities with visibility, ownership, and least-privilege controls š https://lnkd.in/eX-WcJUK š Secure Access as the control plane Enforcing policy, visibility, and governance across every agent interaction š https://lnkd.in/edgWR3AA š”ļø AI Defense (Explorer + validation) Red teaming agentic workflows for prompt injection, jailbreaks, and data leakage before production š https://lnkd.in/ey8JN233 š§Ŗ DefenseClaw (secure agent framework) Open approach to discovering, testing, and sandboxing agent behavior š https://lnkd.in/esx2KS6i š LLM Security Benchmarking Transparency into model risk with Ciscoās LLM Security Leaderboard š https://lnkd.in/eRVe3SRb Agentic AI isnāt just a model problemāitās an identity, access, and control problem. And the way forward is putting the right boundaries in place: šļø Know every agent š Control what it can access 𧬠Test how it behaves under attack š” Monitor every action in real time #CyberTechWithTony #CyberSecurity #AgenticAI #Ciscosecurity
-
Tony LaRosa, CISSP shared thisšØ The latest Cisco Talos 2025 Year in Review is outāand itās clear the threat landscape continues to evolve faster than ever. š https://lnkd.in/eBgCFyds A few key takeaways stood out: ā” Speed of exploitation is accelerating ā attackers are weaponizing new vulnerabilities in days (or hours), while still exploiting CVEs from over a decade ago š Identity is the new battleground ā compromised credentials and abuse of authentication systems are enabling deeper, stealthier access š Centralized systems = higher impact ā attackers are targeting shared platforms to scale attacks across environments šÆ AI + phishing + automation is increasing the effectiveness and scale of attacks, putting even more pressure on security teams š The reality: attackers are operating with speed and scale which traditional, siloed, point security approaches simply canāt keep up. š” So how do organizations defend against this? š”ļø Accelerate vulnerability management š Adopt a Zero Trust security model š Strengthen identity security š Increase visibility across the environment ā” Invest in detection & response capabilities š Implement segmentation strategies š How can Cisco Security help organizations defend against this? This is where a platform approach to security is critical, and Cisco Security Cloud Control delivers this through a unified platform that simplifies management, improves visibility, and enforces consistent security policies across your environment: š§© Cisco Security Cloud Control ā Deliver a unified platform to simplify management, improve visibility, and enforce consistent security policies across your environment http://cs.co/9000B6lDHQ š”ļø Cisco Hybrid Mesh Firewall & Secure Firewall ā Protect against rapid exploit attempts and provide deep visibility (including encrypted traffic) http://cs.co/9002B6lDrG š Segmentation (ISE / Firewall / Secure Workload / Isovalent) ā Both Macro & Micro to Limit lateral movement when breaches occur http://cs.co/9002B6lDrG š Cisco Secure Access (ZTNA/VPNaaS) ā Enforce identity-based access and reduce risk from credential compromise http://cs.co/9007B6lDwP š Cisco Duo Identity ā Leverage MFA, risk-based authentication, device trust, and identity intelligence to dynamically assess access and block unauthorized users in real time https://duo.com/ šļø Cisco XDR + Splunk ā Correlate telemetry, enhance visibility, and accelerate detection and response across endpoints, network, and cloud http://cs.co/9008B6lD5w https://www.splunk.com š§ Cisco AI-driven Security & Talos Intelligence ā Turn real-time threat intelligence into actionable defense https://lnkd.in/eT5acf_P https://lnkd.in/eGuRHG6n #CyberTechWithTony #CyberSecurity #AgenticAI #Splunk #CiscoTalos #Ciscosecurity
-
Tony LaRosa, CISSP shared thisšØ RSAC 2026 is here, and AI security is taking center stageāCisco Security is leading the charge with major innovation announcements this week. š¤š AI agents are no longer experimental - theyāre operating across enterprise environments with autonomy. That changes the security equation. Key Themes: š Zero Trust for AI agents - AI agents must be treated as non-human identities (NHIs) with: Ā·Ā Ā Ā Ā Ā Strong identity issuance and lifecycle management Ā·Ā Ā Ā Ā Ā Fine-grained access controls (least privilege, just-in-time access) Ā·Ā Ā Ā Ā Ā Continuous verification based on behavior, risk signals, and context Ā·Ā Ā Ā Ā Ā Integration with IAM, SSO, and policy engines (e.g., Duo, Secure Access) Ā·Ā Ā Ā Ā Ā This extends Zero Trust beyond users and devices to autonomous workloads and agents. š”ļø Secure AI at the source (AI Defense) - Security shifts left into the AI lifecycle: Ā·Ā Ā Ā Ā Ā Model evaluation against prompt injection, jailbreaks, and adversarial inputs Ā·Ā Ā Ā Ā Ā Runtime guardrails to constrain agent actions and outputs Ā·Ā Ā Ā Ā Ā Continuous validation of model drift and behavior over time Ā·Ā Ā Ā Ā Ā Visibility into agent reasoning paths and tool usageāØThe goal is to reduce exploitability before agents interact with production systems. āļø Agentic SOC (AI-driven SecOps) - Platforms like Splunk Enterprise Security are evolving to include: Ā·Ā Ā Ā Ā Ā AI agents for automated triage and investigation (enrichment, correlation, root cause analysis) Ā·Ā Ā Ā Ā Ā Workflow orchestration across detection, SOAR, and response pipelines Ā·Ā Ā Ā Ā Ā Natural language interfaces for querying security data Ā·Ā Ā Ā Ā Ā Feedback loops where analysts supervise and refine AI-driven decisionsāØResult: faster MTTR, reduced alert fatigue, and more scalable operations. š From reactive to agentic security Traditional SOC workflows rely on alerts ā investigation ā response. In an agentic model, AI systems continuously ingest telemetry (network, identity, endpoint, app signals) and dynamically prioritize, correlate, and act on threats. This shifts detection toward real-time, context-aware decisioning instead of static rules and delayed human triage. The bottom line:āØSecurity architectures must evolve to support machine-speed actors, enforce identity-first controls, and deliver continuous, AI-driven defense loops. š Learn more: Ā·Ā Ā Ā Ā Ā Cisco: Reimagining security for the agentic workforce:āØhttps://lnkd.in/edgWR3AA Ā·Ā Ā Ā Ā Ā Cisco: Zero Trust for AI agents:āØhttps://lnkd.in/eFp9XKeq Ā·Ā Ā Ā Ā Ā Cisco AI Defense Explorer:āØhttps://lnkd.in/ey8JN233 Ā·Ā Ā Ā Ā Ā Splunk at RSAC 2026: From reactive to agentic security:āØhttps://lnkd.in/eA8rtKE9 #CyberTechWithTony #CyberSecurity #AgenticAI #Splunk #RSAC2026 #ZeroTrust #Ciscosecurity
-
Tony LaRosa, CISSP shared thisExcited to share that Iļæ½ve completed the Cybersecurity and AI Strategy Program from eCornell. A great experience focused on aligning AI innovation with strong cybersecurity strategy, governance, and risk management. Looking forward to putting these insights into action. #Cybersecurity #AI #Leadership #ContinuousLearning https://lnkd.in/eT48tQAf
-
Tony LaRosa, CISSP shared thisExcited to share that Iļæ½ve completed the Cybersecurity and AI Strategy Program from eCornell. A great experience focused on aligning AI innovation with strong cybersecurity strategy, governance, and risk management. Looking forward to putting these insights into action. #Cybersecurity #AI #Leadership #ContinuousLearning https://lnkd.in/eT48tQAf
-
Tony LaRosa, CISSP reacted on thisTony LaRosa, CISSP reacted on thisI recently completed Cornell University's Psychology of Leadership program. Grateful to Cisco for investing in my growth and continuing to create space for leaders to expand how they think, operate, and show up. What stood out most wasn't just the frameworks, it was the reminder that leadership is less about tactics, and more about awareness: - how we interpret situations - how we influence others - how our own patterns shape outcomes This work goes deeper than the workplace; because how you lead at work, is a reflection of how you lead in your life. https://lnkd.in/ehsT-kk9
-
Tony LaRosa, CISSP liked thisTony LaRosa, CISSP liked thisYesterday Jared Sharifi, Mary Swigart and Myself hosted local Healthcare Executives for our bi-annual Executive Symposium. We brought together executives from some of the top healthcare providers in New England to discuss how to drive towards a better patient experience through technology. During our time together, we had roundtable discussions around AI in Healthcare, with Mary Swigart at the helm with her thought leadership, a Special Agent from the FBI joined us to talk about cyber crime in Healthcare, and worked through the challenges of hypervisor migrations in healthcare with EchoStor Technologies, followed by an amazing dinner and even better conversation. Thank you to all the Healthcare Executives that came out to make this a successful and impactful day! Thanh Tran, CISSP Renee Fosberg Peter Medeiros Jim Feen Matt Shaw Jeannette Currie Samuel Ash Greg Van Buren Justin Bell Jeffrey Pozz Caleb Morgan Michael Hale , MBA Matt Hoeg Sonia Kaszuba
-
Tony LaRosa, CISSP liked thisTony LaRosa, CISSP liked this"The pace of progress keeps catching everybody by surprise." Dario Amodei talks about this in the AI documentary film -- The AI Doc: Or How I Became an Apocaloptimist. The only way to keep up is to make AI education a priority. Not a day goes by now where I don't leverage an AI tool in some way, in business or in my personal life. I make it a point to carve out time every week to learn something new and experiment with AI. I have also taken a step back to pursue some foundational education related to AI tools and infrastructure. I'm proud to share that I've earned my first of several credentials I'm pursuing from Cornell University through their eCornell program -- my Generative AI for Productivity certificate. Now on to a certificate in Agentic AI Architecture! https://lnkd.in/eE593mdv
-
Tony LaRosa, CISSP reacted on thisTony LaRosa, CISSP reacted on thisExcited to welcome Katie Lopez to the Northeast Commercial Operations team! Sheāll be supporting our security business across the Upstate NY region, and weāre thrilled to have her on board. Looking forward to the impact sheāll make as we continue to build momentum and drive growth in the region. #CiscoSecurity
-
Tony LaRosa, CISSP liked thisTony LaRosa, CISSP liked thisAI adoption is accelerating, but enterprise AI security still has a visibility and governance gap. Ciscoās expansion of AI Defense to Google Cloud is a meaningful step toward helping organizations secure AI wherever it runs - across AWS, Azure, and now Google Cloud. What stands out to me is the focus on the realities of production AI: ā Automated model and application validation ā Runtime protection against risks like prompt injection, tool misuse, and data exfiltration ā Visibility into AI assets, agents, models, data sources, and tools ā Supply chain risk management for models, repositories, and MCP servers ā Security controls that can support agentic AI workflows without requiring major code changes As more enterprises move from experimentation to production-scale AI, security canāt be an afterthought. It needs to be embedded into the AI lifecycle: from development, to deployment, to runtime governance. This is especially important as teams build across multiple clouds and need consistent controls, policy enforcement, and compliance readiness. Great to see Cisco continuing to advance enterprise AI security in a practical, cloud-native way. Article here: https://lnkd.in/emvUyUn7 #AI #Cybersecurity #CloudSecurity #GoogleCloud #Cisco #EnterpriseAI #AISecurity #AgenticAISecuring Enterprise AI: Cisco AI Defense Expands to Google CloudSecuring Enterprise AI: Cisco AI Defense Expands to Google Cloud
Experience
Recommendations received
-
LinkedIn User
“There are few sales engineers that understand how to listen to a customer, understand what the customer is asking for, and then work with the customer to implement the desired solution. Tony is one of the few individuals who gives 110% to make it work, takes pride in his work, knows his product lines in depth, and becomes an extension of the clientās team. Tony has been available both pre and post sales proving he is an engineer, before he is a sales engineer.”
5 people have recommended Tony
Join now to viewView Tonyās full profile
-
See who you know in common
-
Get introduced
-
Contact Tony directly
Other similar profiles
Explore more posts
-
Mike Fitzpatrick
NCX Group - www.ncxgroup.com ⢠9K followers
Ransomware thrives on poor governance. Without secure access from day one, your defenses are wide open. This article breaks down why lifecycle governance is critical to staying ahead of these threats. Read now to protect your business smarter:
-
Raj Samani
Rapid7 ⢠17K followers
Exploitation timelines are increasingly measured in days rather than weeks. Our latest report from Rapid7 Labs correlates vulnerability publication data, confirmed exploitation trends, frontline MDR incident response telemetry, and dark web, cybercrime, and nation-state intelligence to provide a unified view of how exposure evolves into compromise. One of the biggest standouts: how rapidly AI is being integrated into attacker playbooks, accelerating the operationalization of exposure. Many of the incidents we investigate still originate from known, unaddressed exposure. In those cases, attackers donāt need sophistication - they need opportunity. As remediation windows shrink, reducing that opportunity becomes essential to limiting compromise. You can download the 2026 Global Threat Landscape report here: https://r-7.co/4bQOAtq #infosec #cybersecurity
37
1 Comment -
Vaibhav Ppulekar
TĆV SĆD ⢠5K followers
The CSA STAR certification brings clarity and confidence by harmonizing multiple security frameworks into a globally recognized standard. Its tiered assurance model empowers cloud providers to: ā Document and assess their security posture ā Demonstrate compliance with global expectations ā Proactively manage risks and build stakeholder trust Whether youāre a cloud provider, security leader, or compliance professional, CSA STAR offers the framework to strengthen governance and future-proof your cloud security.
23
-
Ivor Coons
1Password ⢠2K followers
Running a high-profile event? You need more than just a firewall. You need a strategy. Ciscoās new Event SOC Guide breaks down the essential steps to securing temporary, high-density networks against modern threats. Key Takeaways: š¹ Why visibility is your greatest weapon. š¹ How to build a temporary team that performs like a veteran unit. š¹ The tech stack required for security. Don't start from scratch. Use the guide the pros use. Check it out: https://cs.co/6048hjKse #SOC #CiscoSecurity
5
-
Peter Z.
Barracuda MSP ⢠2K followers
See how the Borough of West Chester strengthened its cybersecurity posture over time with Barracuda. Learn about their journey with early BarracudaONE adoption and a comprehensive, layered defense strategy. http://cuda.co/csbowĀ #BarracudaONE #CaseStudy #cybersecurity
2
-
David Howorth
Rapid7 ⢠5K followers
āļø As cloud workloads evolve, security teams need to proactively tackle the exposures that matter. New innovations in Rapid7 Exposure Command bring together continuous runtime validation and data security posture management to help security, development, and business teams identify, in real-time, what is actively exploited. Get the full scoop in a new press release: https://r-7.co/479uojW
42
-
Paul Warnagiris
The Teneo Group ⢠2K followers
Exploring alternatives to Broadcom, VMware, Hyper-V, and Nutanix can be a challenging task. However, consider this: licensing should be free of penalties, offering VMs, all feature sets, unlimited core counts, and scaling. Our approach does not involve charges per core, per feature, or for scaling. The pricing remains the same whether you have five VMs or fifty. 50 TB on on server or 10. This perspective will surely have the /r/sysadmin community calling bull****. Typically, licensing models come with hidden constraints such as support tiers, feature locks, and per-cluster limits. If a vendor were to provide flat licensing without regard to cores, features, or workloads, it would disrupt the entire business model in the HCI market, including VMware, Nutanix, Red Hat, and Scale. Even open-source platforms with enterprise support, like Proxmox or XCP-ng, often implement per-socket or subscription-tiered pricing to sustain development and support. While this proposition is remarkable, it may seem almost unbelievable when applied at scale. Until you see what we are doing. Comment spill the beans if you want me to drop a dime on you.
16
-
Antonio Feninno
Semperis ⢠7K followers
It took #Merck three months to fully restore #ActiveDirectory after the #NotPetya attack.Three months of global disruption.Three months of identity chaos. A $1.4 billion price tag. In this episode of the Hybrid Identity Protection Podcast, Lance Peterman takes us inside the aftermathāwhat it really meant to rebuild Merckās identity infrastructure from scratch, under massive pressure, and with the world watching. Now ask yourself: 1ļøā£What if your Active Directory went down today? 2ļøā£How many days of lost productivity, revenue, and trust could your business survive? And hereās the uncomfortable question: Is it really worth not having a robust AD security and recovery strategy in place? If you think the cost of #prevention is high, wait until you see the cost of #recovery. Donāt miss this powerful episode. #TeamSemperis #Semperis #Cybersecurity #Identitysecurity
8
-
Shakeel Khan
Okta ⢠8K followers
The Indian market is at a tipping point. As enterprises shift toward AI-first strategies, the conversation around Identity has never been more critical. I spoke with Arsh Goyal about how we are responding to this shift and why the work being done in our Bengaluru hub is vital for our customers globally. Identity is the new perimeter of security. See the strategy in action: https://lnkd.in/dHcZ9a5nĀ #IdentitySecurity #CustomerSuccess #AI #OktaIndia
21
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
2h 27m
AI Data Strategy: Data Procurement and Storage
-
1h 19m
Sustainable AI for Developers: Strategies, Techniques, and Best Practices