Artwork

Вміст надано Anthony Kent. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Anthony Kent або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !

S1, E11 - 10 Lessons from Safeguarding a DoD Network

17:33
 
Поширити
 

Manage episode 409730483 series 3555974
Вміст надано Anthony Kent. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Anthony Kent або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In this episode, we dive deep into the fundamental practices necessary for safeguarding your organization's digital infrastructure.

Join us as we explore crucial topics such as patch management, application control, vulnerability scanning, and the principle of least privilege. With insights gleaned from years of experience in protecting sensitive networks, we offer actionable strategies that apply to every level of your organization.

Learn why patching everything is non-negotiable, and why it's imperative to speak with authority when it comes to operating securely. Discover the importance of limiting applications and questioning the necessity of ubiquitous tools like Chrome.

We delve into the necessity of vulnerability scans, emphasizing the need for regular, credentialed scans to ensure your defenses remain robust. And when vulnerabilities are found, we discuss mitigation strategies to minimize risk effectively.

But security isn't just an IT concern—it's a company-wide responsibility. Find out why all IT personnel, from help desk to data analysts, should possess a baseline understanding of security principles.

Discover how the use of Security Technical Implementation Guides (STIGs) and CISA Benchmarks can elevate your security posture, reinforcing the principle of least privilege and hardening your systems against potential threats.

In our discussion on policy enforcement, we highlight the importance of technical solutions in achieving compliance. While policies are crucial, we emphasize the need for practical, technical measures to fortify your network against evolving threats.

So join us as we share our insights, lessons learned, and practical advice in "Securing Your Network." Because in today's digital landscape, proactive defense is the key to staying ahead of the curve.

Tune in to uncover the 10 essential lessons learned from protecting a DoD network, and embark on your journey towards a more secure tomorrow.

  continue reading

14 епізодів

Artwork
iconПоширити
 
Manage episode 409730483 series 3555974
Вміст надано Anthony Kent. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Anthony Kent або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.

In this episode, we dive deep into the fundamental practices necessary for safeguarding your organization's digital infrastructure.

Join us as we explore crucial topics such as patch management, application control, vulnerability scanning, and the principle of least privilege. With insights gleaned from years of experience in protecting sensitive networks, we offer actionable strategies that apply to every level of your organization.

Learn why patching everything is non-negotiable, and why it's imperative to speak with authority when it comes to operating securely. Discover the importance of limiting applications and questioning the necessity of ubiquitous tools like Chrome.

We delve into the necessity of vulnerability scans, emphasizing the need for regular, credentialed scans to ensure your defenses remain robust. And when vulnerabilities are found, we discuss mitigation strategies to minimize risk effectively.

But security isn't just an IT concern—it's a company-wide responsibility. Find out why all IT personnel, from help desk to data analysts, should possess a baseline understanding of security principles.

Discover how the use of Security Technical Implementation Guides (STIGs) and CISA Benchmarks can elevate your security posture, reinforcing the principle of least privilege and hardening your systems against potential threats.

In our discussion on policy enforcement, we highlight the importance of technical solutions in achieving compliance. While policies are crucial, we emphasize the need for practical, technical measures to fortify your network against evolving threats.

So join us as we share our insights, lessons learned, and practical advice in "Securing Your Network." Because in today's digital landscape, proactive defense is the key to staying ahead of the curve.

Tune in to uncover the 10 essential lessons learned from protecting a DoD network, and embark on your journey towards a more secure tomorrow.

  continue reading

14 епізодів

Усі епізоди

×
 
Loading …

Ласкаво просимо до Player FM!

Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.

 

Короткий довідник