ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Building SASE That Actually Works: What Everyone Gets Wrong | Vishal Goyal | EP 106

Автор: Musings from the Cyber Trench

Загружено: 2026-01-28

Просмотров: 34

Описание: Welcome to Musings from the Cyber Trench, the podcast that goes beyond surface-level conversations to explore the real-world challenges shaping public sector cybersecurity.

In this episode, host Vishal Masih is joined by Vishal Goyal, Vice President of Enterprise Architecture, for a deep dive into enterprise architecture, Zero Trust, and the realities of securing complex public-sector environments. With nearly two decades of international experience across consulting, engineering, and operations, Vishal Goyal shares how architecture decisions directly impact resilience, scalability, and security outcomes.

The conversation explores how cybersecurity strategy has evolved, why Zero Trust must be practical rather than theoretical, and how organizations can better align cloud, network, and security architectures. This episode also touches on stakeholder alignment, decision-making at scale, and what it takes to modernize legacy systems while maintaining trust and continuity.
If you work in cybersecurity, enterprise architecture, or public-sector technology — or you’re navigating complex security transformations — this episode offers grounded insights from the front lines.

⏱️ Timestamps
00:00 – Welcome to Musings from the Cyber Trench
00:25 – Podcast mission and focus on public sector cybersecurity
00:41 – Introducing today’s guest, Vishal Goyal
01:28 – Vishal’s role and scope in enterprise architecture
02:43 – Career journey and international consulting experience
05:12 – Evolution of enterprise architecture in cybersecurity
08:34 – Why Zero Trust matters in public sector environments
12:06 – Practical challenges implementing Zero Trust
16:18 – Cloud, network, and security architecture alignment
20:47 – Managing legacy systems in modern environments
25:31 – Stakeholder communication and architectural consensus
30:02 – Balancing innovation with operational stability
34:18 – Lessons learned from large-scale transformations
38:56 – Advice for architects and security leaders
42:10 – Closing thoughts on resilience and future readiness

👉 Subscribe for more conversations with leaders shaping cybersecurity strategy.
🔗 Share this episode with your architecture or security team.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Building SASE That Actually Works: What Everyone Gets Wrong | Vishal Goyal | EP 106

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

Джеффри Эпштейн прямо спросил: «Как давно вас привлекают несовершеннолетние девочки?» | APT

Джеффри Эпштейн прямо спросил: «Как давно вас привлекают несовершеннолетние девочки?» | APT

DMT Explained: How It Rewires Your Brain & Why Scientists Are Studying It

DMT Explained: How It Rewires Your Brain & Why Scientists Are Studying It

How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

How to Hide in Plain Sight: Next-Level Digital Privacy | Ivan Banov at BSidesCache 2025

Jonathan Blow on Why AI Can't Program

Jonathan Blow on Why AI Can't Program

The engineer turned CMO fixing Marketing Measurement | Pranav Piyush (Reforge, Adobe, Dropbox)

The engineer turned CMO fixing Marketing Measurement | Pranav Piyush (Reforge, Adobe, Dropbox)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Бывший рекрутер Google объясняет, почему «ложь» помогает получить работу.

Бывший рекрутер Google объясняет, почему «ложь» помогает получить работу.

Никто не сносит знаменитостей так, как Джим Кэрри в расцвете сил!

Никто не сносит знаменитостей так, как Джим Кэрри в расцвете сил!

Cybersecurity Architecture: Networks

Cybersecurity Architecture: Networks

Abstract wave pattern - Height Map | Footage | 1 hour 4k Background

Abstract wave pattern - Height Map | Footage | 1 hour 4k Background

You Are Definitely Fluent in British English If You Understand These

You Are Definitely Fluent in British English If You Understand These

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

DEF CON 33 - Exploiting Shadow Data from AI Models and Embeddings - Patrick Walsh

AI Fails at 96% of Jobs (New Study)

AI Fails at 96% of Jobs (New Study)

Уборщик испугался | Агрессивный бодибилдер против 32-килограммовой швабры в спортзале

Уборщик испугался | Агрессивный бодибилдер против 32-килограммовой швабры в спортзале

Cybersecurity Architecture: Who Are You? Identity and Access Management

Cybersecurity Architecture: Who Are You? Identity and Access Management

Cybersecurity Architecture Series

Cybersecurity Architecture Series

Making a ROMAN CROSSBOW - completely handmade - MANUBALLISTA

Making a ROMAN CROSSBOW - completely handmade - MANUBALLISTA

Pink Abstract wave pattern | Footage | 1 hour 4k background

Pink Abstract wave pattern | Footage | 1 hour 4k background

Protecting Pedophile Predators: Carole Cadwalladr on Jeffrey Epstein & the Elite's Veil of Silence

Protecting Pedophile Predators: Carole Cadwalladr on Jeffrey Epstein & the Elite's Veil of Silence

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]