Artwork

İçerik Team Cymru tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Team Cymru veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure

33:53
 
Paylaş
 

Manage episode 422229537 series 3505151
İçerik Team Cymru tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Team Cymru veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

59 bölüm

Artwork
iconPaylaş
 
Manage episode 422229537 series 3505151
İçerik Team Cymru tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Team Cymru veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

59 bölüm

Minden epizód

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi