Artwork

コンテンツは Nisos, Inc. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Nisos, Inc. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal
Player FM -ポッドキャストアプリ
Player FMアプリでオフラインにしPlayer FMう!

Building and Implementing Security Programs within Fast Growing Technology Companies

27:36
 
シェア
 

Manage episode 323720303 series 3331602
コンテンツは Nisos, Inc. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Nisos, Inc. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

In episode 51 of The Cyber5, we are joined by Chris Castaldo. Chris is the Chief Information Security Officer for CrossBeam and has been CISO for a number of emerging technology companies.

In this episode, we talk about his newly released book, “Startup Secure” and how different growth companies can implement security at different funding stages. He also talks about the reasons security professionals should want to be a start-up CISO at a growing technology company and how success can be defined as a first time CISO. We also talk about how start up companies can avoid ransomware events in a landscape that is not only constantly changing but also gives little advantage for defenders of small and medium sized enterprises.

Two Topics Covered in this Episode:

  1. 4 Security Lessons for Founders of Start-up Technology Companies

When a B2B company is pre-seed or before Series A funding, customers might have leeway for lax cybersecurity controls. However, after an A round, policies, certifications (SOC2 or ISO27001), procedures will be required to ensure customer data is staying safe. A B2C technology company might not be asked by the public for certifications, but auditors and regulators may. Basic policies include:

  1. Single Sign-On or an Okta authentication into applications, cloud, and workstations
  2. Password management implementation (LassPass or OnePassword)
  3. Encryption at rest and transit
  4. Vulnerability scanning
  1. Combating Ransomware from The Inside-Out Approach and Integrating Threat Intelligence

Blocking and tackling from inside-out to get in front of ransomware is challenging. The simple items to tackle are the following:

  1. Auto-updates for patch management on operating systems
  2. Endpoint Detection and Response products
  3. Proper asset management to have full visibility on all network devices and services

At the point when resilience and compliance controls are in place and an organization can bounce back from an incident in a timely manner, adversary insights via threat intelligence is a logical next step.

  continue reading

91 つのエピソード

Artwork
iconシェア
 
Manage episode 323720303 series 3331602
コンテンツは Nisos, Inc. によって提供されます。エピソード、グラフィック、ポッドキャストの説明を含むすべてのポッドキャスト コンテンツは、Nisos, Inc. またはそのポッドキャスト プラットフォーム パートナーによって直接アップロードされ、提供されます。誰かがあなたの著作物をあなたの許可なく使用していると思われる場合は、ここで概説されているプロセスに従うことができますhttps://ja.player.fm/legal

In episode 51 of The Cyber5, we are joined by Chris Castaldo. Chris is the Chief Information Security Officer for CrossBeam and has been CISO for a number of emerging technology companies.

In this episode, we talk about his newly released book, “Startup Secure” and how different growth companies can implement security at different funding stages. He also talks about the reasons security professionals should want to be a start-up CISO at a growing technology company and how success can be defined as a first time CISO. We also talk about how start up companies can avoid ransomware events in a landscape that is not only constantly changing but also gives little advantage for defenders of small and medium sized enterprises.

Two Topics Covered in this Episode:

  1. 4 Security Lessons for Founders of Start-up Technology Companies

When a B2B company is pre-seed or before Series A funding, customers might have leeway for lax cybersecurity controls. However, after an A round, policies, certifications (SOC2 or ISO27001), procedures will be required to ensure customer data is staying safe. A B2C technology company might not be asked by the public for certifications, but auditors and regulators may. Basic policies include:

  1. Single Sign-On or an Okta authentication into applications, cloud, and workstations
  2. Password management implementation (LassPass or OnePassword)
  3. Encryption at rest and transit
  4. Vulnerability scanning
  1. Combating Ransomware from The Inside-Out Approach and Integrating Threat Intelligence

Blocking and tackling from inside-out to get in front of ransomware is challenging. The simple items to tackle are the following:

  1. Auto-updates for patch management on operating systems
  2. Endpoint Detection and Response products
  3. Proper asset management to have full visibility on all network devices and services

At the point when resilience and compliance controls are in place and an organization can bounce back from an incident in a timely manner, adversary insights via threat intelligence is a logical next step.

  continue reading

91 つのエピソード

Alle afleveringen

×
 
Loading …

プレーヤーFMへようこそ!

Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。

 

クイックリファレンスガイド