התחל במצב לא מקוון עם האפליקציה Player FM !
Defending the Endpoint: Sharing Responsibility Between IT and End Users
Manage episode 303977530 series 2683101
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?
In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.
Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 פרקים
Manage episode 303977530 series 2683101
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?
In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.
Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 פרקים
All episodes
×
1 The Good, the Bad, and the Cybersecurity AI to Sort It All Out 30:30

1 Meet the Authors: Abusing DNS as Transport 28:53

1 Breaking Down Domain Takedown Services 34:19

1 Meet the Authors: Countering Redirection and Misdirection with DNS 30:33

1 Outsourcing Teaming, Testing, and Trust with Third Parties 22:49

1 Meet the Authors: DNS Insecurity, or DNS in Security? 29:01

1 Overkill or ‘Just Right’? The Cybersecurity Role of Service Providers 29:20

1 The Care and Feeding of an Effective Threat Intelligence System 30:48

1 Security Outsourcing: Why, When and How to Make it Work 23:34

1 The community has spoken: Top Topics of Q2’ 23 29:41

1 Center Stage: Persistent Infrastructure Threat Actors 29:47

1 Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study 30:09


1 Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage 28:09

1 Show Me the Value: Understanding the Security Channel Landscape 21:37

1 Are There Smarter Ways to Gather and Apply Threat Intelligence? 33:25

1 A SANS Author Interview: A DNS Security Architecture as a SecOps Force Multiplier 32:24

1 Part 2 | Eliminating Blind Spots: A Forrester Report on 20-20 Visibility 32:18

1 Eliminating Blind Spots: A Forrester Report on 20-20 Visibility 30:38

1 Bringing Shadow IT into the Light 29:55

1 Re:Bots in Disguise-Detecting Cyberthreat Camouflage 31:04

1 Losing Sleep over Security: A Halloween Review 31:54

1 Managing Risk While Getting Closer to the Network Edge 27:45

1 Paying for Protection: What is the Performance Cost of Security? 30:21

1 A Researchers Story: Uncovering the Omnatour Malvertising Network 31:48

1 Putting Threat Intelligence Labs Under the Microscope 29:56

1 Decisions, Decisions: Vulnerable, Exploitable, Patchable or Possibly Ignorable? 30:04

1 Summer Revival: Sharing Responsibility Between IT and End Users 31:45

1 Solving Hidden SecOps Vulnerabilities with Network Discovery 31:14

1 On Top of Everything Else - Why DNS for Security 30:00
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.