
セキュリティとコンプライアンスのブログ
セキュリティ戦略を学び、ベンダーを比較し、リスクの高い第三者とのコミュニケーションによる侵害やコンプライアンス違反を防ぐためのベストプラクティスを実装しましょう。
Posts by Tim Freestone

Tim Freestone, Chief Strategy and Marketing Officer, Kiteworks
Tim joined Kiteworks as chief marketing officer in 2021 and brings over 15 years of experience in marketing and marketing leadership, including demand generation, brand strategy, and process and organizational optimization. Tim was previously vice president of marketing at Contrast Security, a scale-up application security company where he built out the marketing organization globally, modernized and mechanized the team's execution, and elevated the company into a world-class brand. Before Contrast, Tim was the vice president of corporate marketing at Fortinet, a multi-billion-dollar, next-generation firewall and cloud security company. In that role, he rebranded Fortinet and built out the comprehensive go-to-market operations for eight solutions encompassing more than 30 products. Prior to Fortinet, he was director of Americas demand, strategy and operations at NetApp where he built out the programmatic demand execution for the Americas and optimized operations to ensure effective lead flow and opportunity creation through sales. Before NetApp, Tim co-founded a marketing services agency where he created and led the execution of hundreds of marketing programs for large and small technology companies. Tim holds a Bachelor’s degree in Political Science and Communication Studies from The University of Montana.


防衛インフラ請負業者向けCMMC 2.0コンプライアンス

化学・生物防衛請負業者向けCMMC 2.0コンプライアンス

核防衛請負業者向けCMMC 2.0コンプライアンス

SFTPの脆弱性とファイル転送を安全にするための戦略

データプライバシーリスクが機密コンテンツ通信を導く

ダークウェブを活用してサイバーセキュリティを強化し、サイバー攻撃を阻止する

嵐を乗り越える: MOVEitの脆弱性と影響を受けた顧客への推奨事項

包括的なサイバーリスク管理のための継続的な監視と適応性を実現

ゼロトラストアプローチでジェネレーティブAIの信頼性を構築する

ゼロトラストアーキテクチャ: 信頼せず、常に検証

コンテンツ層にゼロトラストを拡張する意味とは

英国政府向けセキュアデータ通信の6つの必須機能

AIシステムにおけるデータセキュリティとプライバシーを強化する包括的アプローチ
