How BT Drives Security from a Necessity to a Beacon of Business Responsibility

Article published by Intelligent CIO

Steve Benton, BT Deputy CISO, GM Cyber and Physical Security Operations and Programmes, tells us how the company operates with full control over its complex IT estates and explains how the major telecom provider functions in a way that aims to make cyberattacks worthless for those targeting the business.

TECHNICAL CENTER

  • OS icon
  • deployment icon
  • installation icon

For technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.

Visit the Tech Center