News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
#IMOS19 Profile Interview - Jennifer Leggio
#IMOS19 Profile Interview - Jennifer Leggio
Webinar
27 Mar 2019
Speakers
Michael Hill
Former Editor
,
Infosecurity Magazine
Email Michael
Follow @MichaelInfosec
Jennifer Leggio
Chief Marketing Officer, Flashpoint
Follow @mediaphyter
Why not watch?
#IMOS19 Keynote Address: Retaining and Growing Cybersecurity Talent - A proven Model
27 Mar 2019
#IMOS19 EMEA Profile Interview: Jenny Radcliffe, 'The People Hacker'
24 Sep 2019
#IMOS22 The Cybersecurity Landscape in 2022: Global Threats, Trends and Techniques
23 Mar 2022
EMEA Keynote ISACA State of Digital Trust 2022
27 Sep 2022
You may also like
Top CISO Challenges
News Feature
21 Dec 2023
Editorial: Common People (Q4 2017 Issue)
Editorial
18 Oct 2017
Video Interview: Dr Jessica Barker - Independent Cybersecurity Consultant
Interview
14 Jun 2016
The Three “M”s of a Successful Career in Information Security
Blog
1 Mar 2016
Ask the CISO
Blog
25 Feb 2015
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
One in 12 US/UK Employees Uses Chinese GenAI Tools
News
17 Jul 2025
1
Grok-4 Jailbroken Two Days After Release Using Combined Attack
News
14 Jul 2025
2
Education Sector is Most Exposed to Remote Attacks
News
16 Jul 2025
3
SaaS Security Adoption Grows Amid Rising Breach Rates
News
15 Jul 2025
4
Louis Vuitton UK Latest Retailer Hit by Data Breach
News
14 Jul 2025
5
Four Arrested in Connection with April UK Retail Attacks
News
10 Jul 2025
6
Indian Cyber Espionage Group Targets Italian Government
News
11 Jul 2025
1
ISACA Addresses Experience Gap with CISA Associate Designation
News
11 Jul 2025
2
IoT Devices at Risk Due to eSIM Flaw in Kigen eUICC Cards
News
14 Jul 2025
3
LLMs Fall Short in Vulnerability Discovery and Exploitation
News
10 Jul 2025
4
Microsoft Exposes Scattered Spider’s Latest Tactics
News
17 Jul 2025
5
MPs Warn of “Significant” Iranian Cyber-Threat to UK
News
11 Jul 2025
6
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
17 Jul 2025
1
Predicting and Prioritizing Cyber Attacks Using Threat Intelligence
Webinar
26 Jun 2025
2
Cybersecurity Employment: Making Sense of Conflicting Messaging
Webinar
19 May 2025
3
How CISO's Can Survive and Thrive in a Complex Cyber Landscape
Webinar
18 Feb 2025
4
Reimagining the SOC: From Reactive to Resilient
Webinar
17 Jun 2025
5
Safeguarding Critical Supply Chain Data Through Effective Risk Assessment
Webinar
10 Apr 2025
6
#Infosec2025: How CISOs Can Manage Budgets Effectively Amid Spending Restraints with Madelein van der Hout (video)
Interview
5 Jun 2025
1
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
News
6 Jun 2025
2
#Infosec2025: Understanding AI's Role in Exploiting Human Cyber Vulnerabilities (video)
Interview
5 Jun 2025
3
How to Incentivize Security by Design
News Feature
26 May 2025
4
How AI and Verifiable Credentials Are Redefining Digital Identities
Webinar
27 Mar 2025
5
#Infosec2025: NCA Cyber Intel Head on Cybercrime's New Post-Trust Era (video)
Interview
3 Jun 2025
6