Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/1e/3a/ce/1e3ace49-6dd7-5dcb-1ca1-7363c048c60c/mza_3733535226389102627.png/600x600bb.jpg
The Tea on Cybersecurity
Trava Security
52 episodes
4 days ago

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.

Show more...
Technology
Education,
News,
How To,
Tech News
RSS
All content for The Tea on Cybersecurity is the property of Trava Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.

Show more...
Technology
Education,
News,
How To,
Tech News
https://files.casted.us/9f70e1b1-3d31-4ac0-a1ee-b9ef3431dadc.png
Navigating Asset Management and Compliance with Marie Joseph, Trava
The Tea on Cybersecurity
18 minutes
1 year ago
Navigating Asset Management and Compliance with Marie Joseph, Trava

“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph


This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.

Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.


In this episode, you’ll learn: 


  • Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.
  • How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.
  • Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements. 



Things to listen for:


[00:00 - 00:18] Intro to The Tea on Cybersecurity

[00:48 - 02:44] The definition of asset inventory and asset management

[04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements

[04:34 - 05:51] Common challenges with establishing a complete asset inventory

[07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts

[09:34 - 10:29] How asset management contributes to maintaining compliance.

[12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance

[13:48 - 14:55] The importance of tracking all devices connected to a network

[15:23 - 17:48] Jara’s receipts


Resources:

From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets

Regular Software Updates and Patching: The Importance of Staying on Top of This


Connect with the Guest:

Marie Joseph's LinkedIn


Connect with the host:

Jara Rowe’s LinkedIn


Connect with Trava:

Website www.travasecurity.com 

Blog www.travasecurity.com/blog

LinkedIn @travasecurity

YouTube @travasecurity

The Tea on Cybersecurity

Cybersecurity—a word we hear all the time, but do you really know what it means?


The Tea on Cybersecurity breaks it down without the confusing jargon. We spill the truth about security and compliance in a way that is easy to understand and actually useful.


Perfect for SaaS startups and small to medium sized businesses starting their journey in cybersecurity and compliance. We've learned to keep it short -15-30 minutes per episode - so you get the facts and none of the fluff.