Artwork

Treść dostarczona przez Team Cymru. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Team Cymru lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure

33:53
 
Udostępnij
 

Manage episode 422229537 series 3505151
Treść dostarczona przez Team Cymru. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Team Cymru lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

41 odcinków

Artwork
iconUdostępnij
 
Manage episode 422229537 series 3505151
Treść dostarczona przez Team Cymru. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Team Cymru lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

41 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi