{"id":978,"date":"2023-05-08T12:30:00","date_gmt":"2023-05-08T12:30:00","guid":{"rendered":"https:\/\/www.linkcyb.com\/information-security-vs-product-security-whos-to-navigate-whos-to-steer-post-by-linkcyb\/"},"modified":"2023-05-08T12:50:34","modified_gmt":"2023-05-08T12:50:34","slug":"information-security-vs-product-security-whos-to-navigate-whos-to-steer-post-by-linkcyb","status":"publish","type":"post","link":"https:\/\/www.linkcyb.com\/information-security-vs-product-security-whos-to-navigate-whos-to-steer-post-by-linkcyb\/","title":{"rendered":"Information Security vs. Product Security: Who&#039;s to Navigate, Who&#039;s to Steer? &#8211; post by LinkCyb"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div class=\"hs-featured-image-wrapper\">\n<\/div>\n<p><span>In a recent Ed TALKS, I had the distinct pleasure of hosting three prolific industry thought leaders in cybersecurity:&nbsp;<\/span><a rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/in\/matthewrosenquist\/\"><span>Matthew Rosenquist<\/span><\/a><span>,&nbsp;<\/span><a rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/in\/shirarubinoff\/\"><span>Shira Rubinoff<\/span><\/a><span>, and&nbsp;<\/span><a rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/in\/johnyeoh\/\"><span>John Yeoh<\/span><\/a><span>. Our discussion was broad-ranging and included everything from the impact of artificial intelligence on security to cryptocurrency and security roles.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/track.hubspot.com\/__ptq.gif?a=49125&amp;k=14&amp;r=https%3A%2F%2Fblog.securityinnovation.com%2Finformation-security-vs-product-security&amp;bu=https%253A%252F%252Fblog.securityinnovation.com&amp;bvt=rss\" alt=\"\" width=\"1\" height=\"1\" style=\"min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important\"><br \/>\n<br \/><br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent Ed TALKS, I had the distinct pleasure of hosting three prolific industry thought leaders in cybersecurity:&nbsp;Matthew Rosenquist,&nbsp;Shira Rubinoff, and&nbsp;John Yeoh. Our discussion was broad-ranging and included everything from the impact of artificial intelligence on security to cryptocurrency and security roles.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/posts\/978"}],"collection":[{"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/comments?post=978"}],"version-history":[{"count":1,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/posts\/978\/revisions"}],"predecessor-version":[{"id":979,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/posts\/978\/revisions\/979"}],"wp:attachment":[{"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/media?parent=978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/categories?post=978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linkcyb.com\/wp-json\/wp\/v2\/tags?post=978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}