Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/14/fa/fa/14fafa49-99be-17c4-69b1-d5ddb4e6cf38/mza_18080915492885783432.jpg/600x600bb.jpg
CYBR.Signal
CYBR.SEC.Media
53 episodes
2 days ago
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....
Show more...
Technology
RSS
All content for CYBR.Signal is the property of CYBR.SEC.Media and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/14/fa/fa/14fafa49-99be-17c4-69b1-d5ddb4e6cf38/mza_18080915492885783432.jpg/600x600bb.jpg
Configuration Management
CYBR.Signal
5 minutes
1 year ago
Configuration Management
Michael talked about security control monitoring a few weeks ago. In this #CyberSunday, he is digging in a bit around an essential part of control monitoring: configuration management/monitoring. What is config management/monitoring, what do you need to do before you can even start monitoring and managing configs, etc. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC.CON ·&nbs...
CYBR.Signal
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....