Security Sandbox

It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.​

Technology
Business
Science
1
Honest Security - Discussing the Learnings, Mis...
Honest Security Discuss Relativity Security Program History
35 min
2
A How-To Guide on Perfecting Your Pentesting Pr...
Pentest Program People Offensive Cybersecurity
29 min
3
Moving Faster - Securely. Why Your Org Should A...
Why You Should Add Security to your DevOps Program
31 min
4
P/P/T, Kangaroos, and New Hire Slides: What to ...
25 min
5
Perfecting the Automation Equation To Optimize ...
Perfecting Automation Equation Optimize People Security Program
36 min
6
Whose Title Is It Anyway? A discussion on the r...
36 min
7
Data Privacy Is the New Data Security: Putting ...
Organisations today have a solid grasp of their data security posture, but do they have a solid understanding of what goes into an effective and globally relevant data privacy program?
33 min
8
Navigating New-Age Crisis Situations with a Peo...
38 min
9
Building Trust in a Zero Trust World
32 min
10
From Aware to Care: How to Get Your Employees I...
43 min
11
How to Protect Yourself While Holiday Giving an...
What goes together better than the holidays and hackers? Well, just about everything. Protect yourself this season with these best practices.
19 min
12
Preparation on All Fronts: How Military Experie...
In honor of Veteran's Day, ponder how a military background preps experts for today's cybersecurity landscape—where adaptability and quick thinking are everything.
20 min
13
Stand Up for Security: How Comedic Resilience C...
Cybersecurity issues are rarely what you’d call funny, but as it turns out, comedic relief—and personal resilience—can be as helpful in this arena as any other.
24 min
14
Looking to the Stars to Find Common Ground
Listen in for some tips on peeling the onion (or parfait?) of your personality and fostering greater creativity and collaboration.
23 min
15
Building Your Winning Game Plan on the Court an...
Learn about great coaching, the importance of planning and goal setting, and how to motivate your team—in basketball and in tech.
28 min
16
Coffee and Collaboration: A Security Pick-Me-Up
Turns out cybersecurity and coffee make a brew-tiful pair—and not just because caffeine helps the world go ’round.
19 min
17
Small Breach to Big Screen: Security and the Mo...
Movies and security have a lot more in common than hacker storylines (though we don’t blame you if you’re picturing Nedry’s, “You didn’t say the magic word,” when he shuts down Jurassic Park).
27 min
18
Conducting a Security Symphony
Learn how taking risks and finding rhythm can make an unlikely duo, even in business and data security, and how you can start conducting your team like an orchestra.
21 min
19
Scoring on Defense: Mixing Krav Maga with Data ...
Listen in for tips on good self-defense—of your person and your data—as a Krav Maga expert joins to help us explore how this Israeli martial art can teach us a thing or two about cybersecurity.
20 min
20
Digging for Truth: The Missing Link Between Arc...
Learn why archeologists and security teams alike must always seek the unexpected; understand the best tools, processes, and people for every investigation; and really embrace the “aha!” moment.
20 min
21
It Isn't Brain Surgery: Dissecting the Cyber Ce...
For our first episode, the sandbox has been sculpted into an operating table where we'll race against the clock to stem and stitch up a nasty data breach.
20 min