Artwork

A tartalmat a Team Cymru biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Team Cymru vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.
Player FM - Podcast alkalmazás
Lépjen offline állapotba az Player FM alkalmazással!

Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure

33:53
 
Megosztás
 

Manage episode 422229537 series 3505151
A tartalmat a Team Cymru biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Team Cymru vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

59 epizódok

Artwork
iconMegosztás
 
Manage episode 422229537 series 3505151
A tartalmat a Team Cymru biztosítja. Az összes podcast-tartalmat, beleértve az epizódokat, grafikákat és podcast-leírásokat, közvetlenül a Team Cymru vagy a podcast platform partnere tölti fel és biztosítja. Ha úgy gondolja, hogy valaki az Ön engedélye nélkül használja fel a szerzői joggal védett művét, kövesse az itt leírt folyamatot https://hu.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

59 epizódok

Minden epizód

×
 
Loading …

Üdvözlünk a Player FM-nél!

A Player FM lejátszó az internetet böngészi a kiváló minőségű podcastok után, hogy ön élvezhesse azokat. Ez a legjobb podcast-alkalmazás, Androidon, iPhone-on és a weben is működik. Jelentkezzen be az feliratkozások szinkronizálásához az eszközök között.

 

Gyors referencia kézikönyv