Discussion with AlgoSec around ransomware based off of the Extrahop Cyber Confidence Index 2022. I cover numerous questions about what organizations are doing today and what they should change to improve cyber defenses. The crux of this study shows the cognitive dissonance of cyber security leaders and IT decision makers. They believe one thing whereas the evidence completely contradicts what they say. Visit this link to learn more about Network Security in Cloud, Cloud Appl...
All content for Cyber Security Grey Beard® is the property of Cyber Security Grey Beard® and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Discussion with AlgoSec around ransomware based off of the Extrahop Cyber Confidence Index 2022. I cover numerous questions about what organizations are doing today and what they should change to improve cyber defenses. The crux of this study shows the cognitive dissonance of cyber security leaders and IT decision makers. They believe one thing whereas the evidence completely contradicts what they say. Visit this link to learn more about Network Security in Cloud, Cloud Appl...
In this episode I talk about incident response plans, what they are, why they are important and how to create one. NIST, the National Institute of Standards and Technology has a fabulous document entitled Computer Security Incident Handling Guide, Special Publication 800-61 Rev. 2. This document prescribes key data for incident response plans. In this episode I’ll review key components of this document and how and why these components play a key role in cyber security incide...
Cyber Security Grey Beard®
Discussion with AlgoSec around ransomware based off of the Extrahop Cyber Confidence Index 2022. I cover numerous questions about what organizations are doing today and what they should change to improve cyber defenses. The crux of this study shows the cognitive dissonance of cyber security leaders and IT decision makers. They believe one thing whereas the evidence completely contradicts what they say. Visit this link to learn more about Network Security in Cloud, Cloud Appl...