Player FMアプリでオフラインにしPlayer FMう!
Episode 77: How to Use Data to Make Cybersecurity Decisions
Manage episode 403582174 series 3382533
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Together, they discuss how to use data to inform your decision-making in cybersecurity. They begin by discussing the cybersecurity industry's lack of maturity in its use of data. From there, they explore the risks of not using data to make cybersecurity decisions. In Tony's words, the cybersecurity industry doesn't have to accept "perfection is the enemy of the good" as its paradigm. When we understand the data with which we can work, we can frame the information in a way to strengthen the cybersecurity posture of our respective organizations.
Resources
- Follow Roger on LinkedIn
- A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using
- Cybersecurity at Scale: Piercing the Fog of More
- Known Exploited Vulnerabilities Catalog
- Episode 60: Guiding Vendors to IoT Security by Design
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
101 つのエピソード
Manage episode 403582174 series 3382533
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Together, they discuss how to use data to inform your decision-making in cybersecurity. They begin by discussing the cybersecurity industry's lack of maturity in its use of data. From there, they explore the risks of not using data to make cybersecurity decisions. In Tony's words, the cybersecurity industry doesn't have to accept "perfection is the enemy of the good" as its paradigm. When we understand the data with which we can work, we can frame the information in a way to strengthen the cybersecurity posture of our respective organizations.
Resources
- Follow Roger on LinkedIn
- A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using
- Cybersecurity at Scale: Piercing the Fog of More
- Known Exploited Vulnerabilities Catalog
- Episode 60: Guiding Vendors to IoT Security by Design
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
101 つのエピソード
Tous les épisodes
×プレーヤーFMへようこそ!
Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。