エピソード
-
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) to cover the dreaded costs of a cyberattack, and how organizations can work to proactively avoid them by addressing three strategic imperatives: attack surface, vulnerability prioritization, and data silos.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
エピソードを見逃しましたか?
-
Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris and Robert's hearts.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
To view Verizon's report, head to:
https://www.verizon.com/business/resources/reports/dbir/ -
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
To view Verizon's report, head to:
https://www.verizon.com/business/resources/reports/dbir/ -
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes Robert Waters (Lead PMM, Exposure Management) as they discuss the key takeaways from Verizon's latest annual Data Breach Investigations Report: persistent risk from credentials, more and more sophisticated phishing attacks, and the rising prevalence of vulnerability exploits.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
To view the report yourself, head to:
https://www.verizon.com/business/resources/reports/dbir/ -
What does CSO stand for at your organization?
What counts as a "breach" -- legally and ethically -- and the conflicting pressures to either report or not.How hackers try to bluff their way into a breach...... and how "breach coach" insurance lawyers may or may not try to pressure teams out of reporting incidents they should.Where to find the best internal allies to help you stand up to undue pressures and maintain your ethical high grounds.The #1 thing security leaders should do during their interview process to make sure they're signing on with the right organizationHow -- if you do get fired due to a breach -- it's not the end of your career as a security professional.Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
Is it short for Chief Security Officer... or Chief Scapegoat Officer?
In this episode, Ivanti CSO Daniel Spicer talks about how he never thought he'd be a CSO, and the unique pressures that security executives face from their own internal leadership teams and external regulations or (worse) insurance companies.
Listen in as Daniel and Ashley dig into: -
Daniel Spicer is back! Following up on last episode's discussion on the security risks of overemployment, Ivanti's Chief Security Officer returns to clear up the age-old myth of security tools being abused for employee investigations. Join Daniel, Chris and Ashley as they discuss:
What is (and most definitely is not) allowed in an employee investigation -- especially if the Security Team is requested to assistUser and management's misconceptions about security data, and how it's less "Big Brother," and more "Death by Data" The invaluable technique of using HR and Legal both to cover your asks and avoid abuse of security tools during investigationsHow you're more likely to investigate an employee due to a media outlet's DMCA request than overemploymentWhat a manager's "tipping point" is to request a more robust employee investigation, and what would trigger Security to get involvedJoin us for another episode in which empathetic management and a sympathetic legal department might be the best security tools you'll ever deploy when it comes to cracking down on bad employee behavior -- well, that, and a solid VPN / MDM combo.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
Chris and Ashley use the current overemployment media trend as an example case study on evaluating security risks versus potential organizational impact.
How overemployment existed before remote workWeighing the various security implications of overemployment — including shadow IT and insider threatsHow far an organization should go to remediate security risks due to unknown overemployed employees... and the cultural trade offs organizations may be required to make.Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
They cover: -
Chris (finally!) adds his insights to the 2023 Press Reset cybersecurity research report, especially how its findings impact vulnerability and patch prioritization processes — do you shoot for mission critical systems, active exploits, or something else first? — and why asset visibility lies at the core of every security framework on the planet.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
JR Robinson, Head of Platform at generative AI startup Writer, joins VP of Endpoint Security Product Management Chris Goettl and Ashley Stryker to discuss current generative AI use cases for security teams that go beyond just chat bots.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
(Please. For everyone’s sanity… go beyond chat bots.)
They’ll also preview a deeper webinar discussion with Chief Security Officer Daniel Spicer on the risks and rewards generative AI offers security teams at every organization, airing on April 26 — save your spot and bring your questions to "Generative AI for Infosec and Hackers: What Security Teams Need to Know!" -
Daniel and Ashley review the latest research report from Ivanti -- Press Reset: A 2023 Cybersecurity Status Report -- including prioritizing phishing and DDoS attacks, security ROI challenges, and why organizations should never increase their cybersecurity budget by sacrificing their IT allocations.
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
Download the full report at Ivanti.com/CybersecurityReport -
It's vendor risk versus reward!
What data are you granting your vendor?What can they access?Due diligence and 200+ item questionnaires are everything.Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
Chris and Amanda educate Ashley on the core considerations, processes and requirements for robust vendor risk management programs... including when to be afraid of your IoT devices, especially those pesky Roomba vacuums and oh-so-convenient self-cleaning litter boxes.
Remember to address these three components, no matter if your vendor is a major IT software provider or just your friendly neighborhood paper salesman: -
IT Director Tony Miller goes toe-to-toe with Chief Security Officer Daniel Spicer to justify – or condemn! – IT and cybersecurity posts found on Reddit, featuring a legendary story about hackers that patched endpoints faster than the company itself. #PatchHacks
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
Plus, Ashley frets about the impact of a new security policy on her personal devices, creating an impromptu case study on the importance of explaining (or just reading) new security policies. -
Daniel, Chris, Amanda and Ashley revisit the coordinated disclosure conversation from Episode 25 and apply the prisoner’s dilemma thought experiment to create a (more?) perfect vendor disclosure policy.
Find shownotes for this episode at Ivanti.com/SecurityInsights-30Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security.
Find shownotes for this episode at Ivanti.com/SecurityInsights-28 Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
Do you want to work in cybersecurity, but not sure how to start? Ashley and Chris talk to three current cybersecurity experts on how they entered the industry – including Ivanti deputy CSO Amanda Wittern. (Also, bonus update on how Ashley pulled off her social engineering assignment from last episode!)
Find shownotes for this episode at Ivanti.com/SecurityInsights-27 Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action.
Referenced materials:The DarkNet Diaries Podcast, Episode 69: Human Hacker - https://darknetdiaries.com/transcript/69/
Ashley’s “Social Engineering” booklist - https://www.amazon.com/hz/wishlist/ls/1INOW5WGDDUO5?ref_=wl_share
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) -
Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices for vendor coordinated disclosures of vulnerabilities for cloud versus on-prem products and much more!
Join the conversation online on LinkedIn (linkedin.com/company/Ivanti) - もっと表示する