Player FM - Internet Radio Done Right
Checked 6d ago
اضافه شده در three سال پیش
محتوای ارائه شده توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
When negative feedback shakes your confidence, it can be difficult to get back to feeling like yourself at work. In this episode, Anne and Frances help a struggling listener who has spent years toning herself down in the workplace after being told that she was too assertive — now, she feels that her modest approach is holding her back. Together, they use Anne and Frances’s “trust triangle” framework to explore how empathy, authenticity, and logic can help you rebuild confidence and trust with your colleagues, and share helpful confidence hacks for getting comfy with discomfort. What problems are you dealing with at work? Text or call 234-FIXABLE or email fixable@ted.com to be featured on the show. For the full text transcript, visit ted.com/podcasts/fixable-transcripts Want to help shape TED’s shows going forward? Fill out our survey ! Hosted on Acast. See acast.com/privacy for more information.…
DevOps? DevSecOps? What Security Teams Need to Know
Manage episode 335761223 series 3376008
محتوای ارائه شده توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
VP of Security Engineering Bart Westerink and Head of Endpoint Security Product Management Chris Goettl discuss DevOps and DevSecOps -- and every "ops" version in between.
This conversation covers:
- What even is DevOps? And, what's the difference between DevOps and DevSecOps?
- Best practices on adopting and maturing your DevOps process
- What happens when DevOps processes fall apart -- and how to fix it when the house of cards collapses
- Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
52 قسمت
Manage episode 335761223 series 3376008
محتوای ارائه شده توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. تمام محتوای پادکست شامل قسمتها، گرافیکها و توضیحات پادکست مستقیماً توسط Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions یا شریک پلتفرم پادکست آنها آپلود و ارائه میشوند. اگر فکر میکنید شخصی بدون اجازه شما از اثر دارای حق نسخهبرداری شما استفاده میکند، میتوانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
VP of Security Engineering Bart Westerink and Head of Endpoint Security Product Management Chris Goettl discuss DevOps and DevSecOps -- and every "ops" version in between.
This conversation covers:
- What even is DevOps? And, what's the difference between DevOps and DevSecOps?
- Best practices on adopting and maturing your DevOps process
- What happens when DevOps processes fall apart -- and how to fix it when the house of cards collapses
- Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
52 قسمت
همه قسمت ها
×Exposure management is fundamentally changing the way we view cybersecurity. Ivanti's Chris Goettl and Robert Waters introduce five paradigm shifts brought on by this emerging technology and how your organization's security strategy might shift as a result. For more, check out our Exposure Management Strategy Guide: ( https://ivanti.com/resources/exposure-management-strategy-guide ) Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business context, overreliance on patch management, and poor metrics and reporting. Be sure to subscribe to our feed so you never miss an insight from the team. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
We promised we'd come back with the solutions to all your vulnerability management problems, so here we are. Plus, we're counting down in unranked order *and* starting from #10 on our list, just to keep you on your toes. Ivanti's Chris Goettl and Robert Waters will go through how you can address resource constraints, siloed tools and data, limited attack surface visibility, inaccurate view of exposures and data overload. And stay tuned for the rest of the list next time! Subscribe to our feed so you don't miss it. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Vulnerability management is not for the faint of heart. The pitfalls are many, and odds are you probably have at least one of these issues. Ivanti's Chris Goettl and Robert Waters run down the list of what can get in the way of vulnerability management done well -- from attack surface visibility to data overload and resource constraints -- all with an eye on how those problems can be addressed. (Which we'll have more on next time. We promise.) Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Chris Goettl and Robert Waters take on four big questions facing cybersecurity today, namely: Who gets the upper hand from AI, cyber adversaries or the legitimate organizations looking to stop them? What's going to win out, Everywhere Work or RTO? Exposure Management: sea change, or passing fad? And what's the bigger security risk, IoT devices or third-party vendors? Listen in for those questions and, if you're listening closely, a few answers too. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Robert Waters welcomes Grand Bank CTO Robert Hanson for a wide-ranging conversation on the emerging field of exposure management and how you can proactively safeguard your organization, because every organization faces risk. What separates the vulnerable from the well-protected isn’t whether you have exposure — it’s how you manage it. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Join Ivanti's Chris Goettl and Robert Waters as they take a Christmas-Carol-themed trip through the emerging field of exposure management, taking a close (and possibly ghostly) look at the past, present, and future of the field. To learn more about Ivanti's exposure management offerings, visit: https://ivanti.com/exposure-management Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a special episode for Cybersecurity Awareness Month, sourcing five tips from a range of Ivanti employees on how your organization and its users can stay secure. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Securin CEO Ram Movva joins the show to talk all things vulnerability intelligence: how to prioritize according to risk, how to manage your external attack surface and emerging trends in ransomware and security. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) to cover the dreaded costs of a cyberattack, and how organizations can work to proactively avoid them by addressing three strategic imperatives: attack surface, vulnerability prioritization, and data silos. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Robert Waters (Lead PMM, Exposure Management) is back with Chris Goettl (VP of Product, Patch Management) for the last of our three episodes covering Verizon's 2024 Data Breach Investigations Report, covering the third-most popular attack vector in breaches today: exploit vulnerabilities. And while they may be #3 in prevalence, they're #1 in Chris and Robert's hearts. To view Verizon's report, head to: https://www.verizon.com/business/resources/reports/dbir/ Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. To view Verizon's report, head to: https://www.verizon.com/business/resources/reports/dbir/ Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes Robert Waters (Lead PMM, Exposure Management) as they discuss the key takeaways from Verizon's latest annual Data Breach Investigations Report: persistent risk from credentials, more and more sophisticated phishing attacks, and the rising prevalence of vulnerability exploits. To view the report yourself, head to: https://www.verizon.com/business/resources/reports/dbir/ Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…

1 Chief Scapegoat Officer: How to Keep "Fighting the Good Fight" for Ethical Security Standards 32:42
What does CSO stand for at your organization? Is it short for Chief Security Officer... or Chief Scapegoat Officer? In this episode, Ivanti CSO Daniel Spicer talks about how he never thought he'd be a CSO, and the unique pressures that security executives face from their own internal leadership teams and external regulations or (worse) insurance companies. Listen in as Daniel and Ashley dig into: What counts as a "breach" -- legally and ethically -- and the conflicting pressures to either report or not. How hackers try to bluff their way into a breach... ... and how "breach coach" insurance lawyers may or may not try to pressure teams out of reporting incidents they should. Where to find the best internal allies to help you stand up to undue pressures and maintain your ethical high grounds. The #1 thing security leaders should do during their interview process to make sure they're signing on with the right organization How -- if you do get fired due to a breach -- it's not the end of your career as a security professional. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Daniel Spicer is back! Following up on last episode's discussion on the security risks of overemployment, Ivanti's Chief Security Officer returns to clear up the age-old myth of security tools being abused for employee investigations. Join Daniel, Chris and Ashley as they discuss: What is (and most definitely is not) allowed in an employee investigation -- especially if the Security Team is requested to assist User and management's misconceptions about security data, and how it's less "Big Brother," and more "Death by Data" The invaluable technique of using HR and Legal both to cover your asks and avoid abuse of security tools during investigations How you're more likely to investigate an employee due to a media outlet's DMCA request than overemployment What a manager's "tipping point" is to request a more robust employee investigation, and what would trigger Security to get involved Join us for another episode in which empathetic management and a sympathetic legal department might be the best security tools you'll ever deploy when it comes to cracking down on bad employee behavior -- well, that, and a solid VPN / MDM combo. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Chris and Ashley use the current overemployment media trend as an example case study on evaluating security risks versus potential organizational impact. They cover: How overemployment existed before remote work Weighing the various security implications of overemployment — including shadow IT and insider threats How far an organization should go to remediate security risks due to unknown overemployed employees... and the cultural trade offs organizations may be required to make. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Chris (finally!) adds his insights to the 2023 Press Reset cybersecurity research report , especially how its findings impact vulnerability and patch prioritization processes — do you shoot for mission critical systems, active exploits, or something else first? — and why asset visibility lies at the core of every security framework on the planet. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

JR Robinson, Head of Platform at generative AI startup Writer , joins VP of Endpoint Security Product Management Chris Goettl and Ashley Stryker to discuss current generative AI use cases for security teams that go beyond just chat bots. (Please. For everyone’s sanity… go beyond chat bots.) They’ll also preview a deeper webinar discussion with Chief Security Officer Daniel Spicer on the risks and rewards generative AI offers security teams at every organization, airing on April 26 — save your spot and bring your questions to " Generative AI for Infosec and Hackers: What Security Teams Need to Know !" Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Daniel and Ashley review the latest research report from Ivanti -- Press Reset: A 2023 Cybersecurity Status Report -- including prioritizing phishing and DDoS attacks, security ROI challenges, and why organizations should never increase their cybersecurity budget by sacrificing their IT allocations. Download the full report at Ivanti.com/CybersecurityReport Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

1 Vendor Cyber Risk Management 101: Balancing Supply-Chain Risk with Remote Work DEX and IoT Litter Boxes 43:34
It's vendor risk versus reward! Chris and Amanda educate Ashley on the core considerations, processes and requirements for robust vendor risk management programs... including when to be afraid of your IoT devices, especially those pesky Roomba vacuums and oh-so-convenient self-cleaning litter boxes. Remember to address these three components, no matter if your vendor is a major IT software provider or just your friendly neighborhood paper salesman: What data are you granting your vendor? What can they access? Due diligence and 200+ item questionnaires are everything. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

IT Director Tony Miller goes toe-to-toe with Chief Security Officer Daniel Spicer to justify – or condemn! – IT and cybersecurity posts found on Reddit, featuring a legendary story about hackers that patched endpoints faster than the company itself. #PatchHacks Plus, Ashley frets about the impact of a new security policy on her personal devices, creating an impromptu case study on the importance of explaining (or just reading) new security policies. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Daniel, Chris, Amanda and Ashley revisit the coordinated disclosure conversation from Episode 25 and apply the prisoner’s dilemma thought experiment to create a (more?) perfect vendor disclosure policy. Find shownotes for this episode at Ivanti.com/SecurityInsights-30 Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Amanda and Ashley talk about their experiences as women in the cybersecurity and technology industries. (Spoiler alert: it’s on the up-and-up!) Find shownotes for this episode at Ivanti.com/SecurityInsights-29 Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )
S
Security Insights - Cybersecurity for Real-World Workplaces

Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security. Find shownotes for this episode at Ivanti.com/SecurityInsights-28 Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Do you want to work in cybersecurity, but not sure how to start? Ashley and Chris talk to three current cybersecurity experts on how they entered the industry – including Ivanti deputy CSO Amanda Wittern. (Also, bonus update on how Ashley pulled off her social engineering assignment from last episode!) Find shownotes for this episode at Ivanti.com/SecurityInsights-27 Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

1 Phishing Attacks and Marketing Minds: How Hackers Use Unexpected Skills to Break Their Targets 23:04
In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action. Referenced materials: The DarkNet Diaries Podcast, Episode 69: Human Hacker - https://darknetdiaries.com/transcript/69/ Ashley’s “Social Engineering” booklist - https://www.amazon.com/hz/wishlist/ls/1INOW5WGDDUO5?ref_=wl_share Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices for vendor coordinated disclosures of vulnerabilities for cloud versus on-prem products and much more! Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Hello and welcome back to this week’s episode of Ivanti’s Security Insights! Today Chris Goettl and Daniel Spicer go over their takeaways from the recent Gartner Security & Risk Management Summit. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )
S
Security Insights - Cybersecurity for Real-World Workplaces

We’re back and ready to roll with this week’s episode where our host Chris Goettl interviews Chad Holmes and Daniel Brody from Cynario. Today they discuss healthcare and security through EMT devices and much more. Watch to learn more about how cyber security is assisting healthcare innovation! For more information, check out Cynario’s website www.cynerio.com or their social media @cynerio. Be sure to follow us on our socials @goivanti for more episodes like this! Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

In our first episode of 2022, Chris Goettl and Daniel Spicer unpack one of last year's biggest vulnerabilities: Apache Log4j. The conversation includes: What is Log4j? The difficulty of detecting Log4j and developing guidance for organizations Why security teams and IT teams are stuck in a Catch 22 of patching The latest guidance you can use for your organization Check out cisecurity.org and Ivanti's article on Log4j Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Host Adrian Vernon sits down with Daniel Spicer to bust some cybersecurity myths! The list of myths include: Passwords should be changed every 30 days You shouldn't write down your password Multi-factor Authentication is not secure You don't need antivirus VPNs keep my devices safe and secure IT is responsible for all of the cybersecurity at an organization "Stay safe, be secure, and keep smiling!" Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon is joined by Ivanti's Senior Vice President of Security Products Sri Mukkamala, CEO of Cyber Security Works (CSW) Aaron Sandeen, and Senior Intelligence Analyst at Cyware Neil Dennis. They break down the recent collaborative Ransomware Index Spotlight Report to make sure you are up to date on today's cybersecurity landscape. The conversation includes: How the report was put together What you can expect from the report The importance of the collaboration Surprising contexts Why a yearly compliance checkpoint may not be enough The possible future of ransomware CYBER HYGIENE! Check out the report at ivanti.com Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
Adrian gets some insight from Chris and Daniel on some recent supply chain attack events. The conversation includes: The unique agenda of nation state attacks The numbers game associated with cloud services attacks There are way more attacks than what get covered in the news What makes an attack a "Supply Chain Attack" Microsoft's recommendations for providers and customers Proactive steps you can take For more on supply chain attacks check out our episode The Human Element of Preventing Supply Chain Attacks Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon is joined by the usual cast, Daniel Spicer and Chris Goettl, to talk about Cyber Security Awareness Month and some of the best security practices from experts that have seen it all! The conversation includes: When to rotate your credit cards and more! Why going paperless when you can is so important, and if you can't, get a shredder! Best travel cyber hygiene practices for your personal devices Wifi security in the air and on the road When it's appropriate to bring separate travel-only devices The importance of using power packs while in airports When and how to use social media while you are traveling Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon and VP of Product Management Chris Goettl break down some of the biggest headlines in the world of cybersecurity right now! The conversation includes: The recent critical security flaw of Apple devices How threat actors use remote code execution to mine cryptocurrency Lessons learned from the SolarWinds breach Actions to take as cybersecurity threats increase October is Cybersecurity Awareness Month! Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer talk about the hottest buzzword in security right now: Zero Trust! The conversation includes: What Zero Trust is and what benefits it brings to security An overview of the federal government adopting the Zero Trust strategy The Zero Trust maturity model What it takes for a company to begin moving to Zero Trust Thoughts on missing elements from the Biden executive order and what we'd like to see added or changed The importance of making sure work can still get done with Zero Trust in place Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer give you the rundown on everything Cyber Insurance! The conversation includes: What Cyber Insurance covers and why it's important What you need to know to be prepared for your conversation with a broker How to save MONEY on your plan The Cyber Insurance grey area and avoiding fines Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer talk about the future of artificial intelligence and machine learning in cyber security including: The beginning of AI How AI and ML benefit organizations How AI and bots are used to attack organizations What kinds of AI will we need to stand up to those attacks? How do we get Skynet to go up against Ultron? The human element behind AI and the danger of over-automation Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Host Adrian Vernon, Sr. Director of Product Management Chris Goettl, and former CEO of RiskSense Sri Mukkamala talk about the recent news of the Ivanti and RiskSense team up and what it means for patch management moving forward! The conversation includes: The history of RiskSense The importance of "Proactive Response" Some insights on the current realities in our world of vulnerabilities Why the White House is encouraging a risk-based assessment strategy Best practices on approaching the challenges that organizations face Cyber Hygiene! Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

1 Weak User Links in Supply Chain Cyber Attacks: How Security Teams Manage the Risk of Insecure Vendors and User Error 16:22
Host Adrian Vernon, Sr. Director of Product Management Chris Goettl, and VP of Security Daniel Spicer explore recent challenges concerning the rise in supply chain attacks. The conversation includes: How a supply chain can be attacked and why organizations should care The reality of building systems using multiple off the shelf products and the importance of making sure those products and vendors are secure Best practices around defending against supply chain attacks The new cybersecurity executive order Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

We are taking a break this week for Ivanti's Summer of Security , but don't worry we'll be back next week! Until then, if you missed it, check out one of our favorite episodes: The Balancing Act of Staying Secure While Working From Home. Host Adrian Vernon, Ivanti's Chef Security Officer Phil Richards, and Sr. Director of Product Management Chris Goettl discuss the new security landscape formed by the "new normal" of remote working including: Ivanti's new Secure Consumer Cyber Report revealing chilling insights The "Password Nirvana" The importance of two-factor authentication on your personal devices Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms. Today's talk covers: The start of ransomware as malware hidden in floppy disks containing AIDS education materials that required victim users to mail paper checks as ransom to Panama The recent explosion in value of ransomware extortions from a few thousand USD and four days down time... to $4.1 million USD ransoms of the Colonial Pipeline and weeks or months of time to restoration. Why the ransomware business model requires users to trust the criminal actors (as odd as that seems!) How ransomware gangs are expected to adapt to modern cybersecurity defenses, requiring security teams to implement multiple tactics to prevent successful ransom attempts and interruption to business operations Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Chef Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl talk about managing employees and protecting users in a new post-COVID era, in which 1,600+ survey respondents confirm that no workplace will ever return to solely on-premises employment. Find out who on the podcast wears pants to video calls (and who doesn't!), plus: The alarming increase of after-hours work, when you can work from anywhere How 64% of respondents said they'd choose remote work over a promotion New network security and IOT endpoint security concerns in hybrid and remote work environments -- and how to remediate the new risks at-home and public networks present The dark side of remote work, including depression and decreased movement, but how both Phil and Chris encourage their teams to bond and stay healthy and productive despite long-term remote work Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

1 Frictionless Convenience or Human Connection? - Security for Post-COVID Remote Work With Chris Dancy (Part Two) 22:33
Head of Endpoint Security Product Management Chris Goettl continues his conversation with "the world's most connect human" and author of Don't Unplug: How Technology Saved My Life and Can Save Yours Too , Chris Dancy! This second half of the conversation pivots from personal user data considerations to security experiences and data collection in the hybrid and remote workplaces now common in a post-COVID world, including: Renewed user safety considerations, now that organizations can no longer rely on the "walled gardens" of known network security considerations. Chris (Dancy) breaking down how "technology can be good, or it can be easy, but it can't be both" -- and how that's not always the case. Chris (Goettl)'s experience with information technology solutions designed to circumvent the dreaded password and other digital employee experience (DEX) developments. Chris (Dancy)'s parting observation that, "We don't know how to measure what we care about, so we care about what we measure." Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

1 Managing the IT of Me: Privacy Risks and Personal Rewards of User Data with Chris Dancy (Part One) 21:47
Head of Endpoint Security Product Management Chris Goettl talks with "the world's most connected human" and author of Don't Unplug: How Technology Saved My Life and Can Save Yours Too , Chris Dancy! In this first half of the conversation, they cover: The risks against the rewards of modern information technology and data collection -- and how tech augments more analog pursuits, such as exercise or creativity. How Chris (Dancy) came to be known as "the world's most connected human," and how he truly earned that nickname The cognitive disconnect of the average user worried about data privacy and sovereignty on social media and personal health apps... but who also immediately hand over their personal information for a ten-cent discount on snacks. What disconnecting and "unplugging" really means for today's information age. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

Consider the humble QR code: an older marketing device that exploded in popularity when the world needed touchless solutions for information and payments. In fact, according to Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl, the latest cybersecurity research suggests that hackers aren't far behind in leveraging QR code vulnerabilities -- and security teams may be unprepared for a new attack on their managed devices and endpoints. Today's conversation covers: New security findings from QRurb Your Enthusiasm 2021: Why the QR code Remains a Top Security Threat and What You Can Do About It What a QR code is, how it works -- and how hackers can leverage the black box of trusted QR codes to siphon money from the intended recipient. Additional QR code vulnerabilities that hackers could exploit. How QR codes have risen in popularity with the need for "touchless" solutions during the pandemic and post-COVID. The importance of mobile device security -- particularly with expanded BYOD policies in a post-COVID workplace. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

VP of Security Engineering Bart Westerink and Head of Endpoint Security Product Management Chris Goettl discuss DevOps and DevSecOps -- and every "ops" version in between. This conversation covers: What even is DevOps? And, what's the difference between DevOps and Dev Sec Ops? Best practices on adopting and maturing your DevOps process What happens when DevOps processes fall apart -- and how to fix it when the house of cards collapses Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

As COVID-19 weakens, Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl chat cybersecurity strategies in the brave new post-COVID working world. Shaped by the "new normal" of remote work and fueled by robust, hybrid security for both on-premises and cloud-based user experiences, their discussion reviews: Chilling insights from Ivanti's new Secure Consumer Cyber Report The "Password Nirvana" of cyber hygiene best practice Two-factor authentication (2FA) and multi-factor authentication (MFA) on user devices and endpoints Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

New platform Clubhouse (and other social media apps like it) present uniquely appealing privacy risks for cybersecurity teams trying to secure their end users -- especially in light of new legislation from the United States and the European Union. Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl discuss the inherent security concerns social media brings, including: Developments in privacy legislation around the world cybersecurity teams must adhere to. Why and how Clubhouse and other personal social media apps invade user privacy and present a risk to employer organizations. Social media privacy best practices, including proper cyber hygiene training and user education. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
This latest ransomware pandemic is infecting end users and security teams alike, exploiting old vulnerabilities and forcing new risk management strategies. Chief Security Officer Phil Richards reviews how organizations can avoid and remediate ransomware cyber attacks, including: Training employees to not open obvious phishing emails and links that make networks vulnerable to ransomware The security vulnerabilities of old or unpatched software The pros and con of having backups How to use credential management to combat privilege escalation Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
S
Security Insights - Cybersecurity for Real-World Workplaces

How did hundreds of organizations and governments fall to the SolarWinds-FireEye hack? And, how can security teams better protect their end users and data from similar cyber attacks in the future? Chief Security Officer Phil Richards and head of Endpoint Security Product Management Chris Goettl join host Adrian Vernon to break down this classic global cyber attack. Join the conversation online on LinkedIn ( linkedin.com/company/Ivanti )…
به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.