Artwork

Content provided by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

CCT 148: Understanding and Implementing Threat Modeling for the CISSP Exam (Domain 3.1)

42:37
 
Distribuie
 

Manage episode 422840534 series 3464644
Content provided by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Send us a Text Message.

What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the nuances of threats is essential to safeguarding your organization's data and systems. From system and threat identification to vulnerability assessments and risk evaluations, this episode is a treasure trove of strategies to fortify your cybersecurity defenses.
Ever wondered how to stay one step ahead of ransomware like CLOP or vulnerabilities in tools like MoveIt? In this episode, we tackle the complex world of threat and risk management, exploring how malicious actors operate and the importance of securing your software, hardware, and human processes. We highlight the necessity of protecting code repositories against unauthorized access and assess the financial implications of potential disruptions. You'll gain insights into aligning security measures with your organization's risk tolerance and learn practical strategies to mitigate these ever-evolving threats.
Finally, we demystify the STRIDE and TRIKE threat modeling frameworks, comparing their unique approaches and applications. You'll hear about each component of STRIDE, from spoofing to elevation of privilege, and learn the benefits and challenges of using this framework. On the other hand, TRIKE's methodical, risk-centric approach offers a holistic view of integrating security throughout the software development lifecycle. We also delve into defense-in-depth strategies and the importance of robust logging and monitoring. To cap it off, I share valuable tips on preparing for the CISSP exam, emphasizing the effectiveness of my comprehensive blueprint available at CISSP Cyber Training. Make sure you tune in and equip yourself with the knowledge to excel in your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capitole

1. CISSP Cyber Training Podcast (00:00:00)

2. Understanding Threats and Risk Management (00:12:16)

3. Understanding Threats and Security Modeling (00:19:42)

4. Understanding and Implementing Risk Management (00:28:28)

5. CISSP Cyber Training Blueprint (00:41:22)

159 episoade

Artwork
iconDistribuie
 
Manage episode 422840534 series 3464644
Content provided by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

Send us a Text Message.

What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the nuances of threats is essential to safeguarding your organization's data and systems. From system and threat identification to vulnerability assessments and risk evaluations, this episode is a treasure trove of strategies to fortify your cybersecurity defenses.
Ever wondered how to stay one step ahead of ransomware like CLOP or vulnerabilities in tools like MoveIt? In this episode, we tackle the complex world of threat and risk management, exploring how malicious actors operate and the importance of securing your software, hardware, and human processes. We highlight the necessity of protecting code repositories against unauthorized access and assess the financial implications of potential disruptions. You'll gain insights into aligning security measures with your organization's risk tolerance and learn practical strategies to mitigate these ever-evolving threats.
Finally, we demystify the STRIDE and TRIKE threat modeling frameworks, comparing their unique approaches and applications. You'll hear about each component of STRIDE, from spoofing to elevation of privilege, and learn the benefits and challenges of using this framework. On the other hand, TRIKE's methodical, risk-centric approach offers a holistic view of integrating security throughout the software development lifecycle. We also delve into defense-in-depth strategies and the importance of robust logging and monitoring. To cap it off, I share valuable tips on preparing for the CISSP exam, emphasizing the effectiveness of my comprehensive blueprint available at CISSP Cyber Training. Make sure you tune in and equip yourself with the knowledge to excel in your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capitole

1. CISSP Cyber Training Podcast (00:00:00)

2. Understanding Threats and Risk Management (00:12:16)

3. Understanding Threats and Security Modeling (00:19:42)

4. Understanding and Implementing Risk Management (00:28:28)

5. CISSP Cyber Training Blueprint (00:41:22)

159 episoade

Tutti gli episodi

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință