Artwork

Content provided by Team Cymru. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Team Cymru or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Sentry’s Cody Florek on Enabling Business Processes through Making Them More Secure

33:53
 
Distribuie
 

Manage episode 422229537 series 3505151
Content provided by Team Cymru. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Team Cymru or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

41 episoade

Artwork
iconDistribuie
 
Manage episode 422229537 series 3505151
Content provided by Team Cymru. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Team Cymru or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, Cody Florek, Director of Information Security Operations at Sentry, offers his insights into the intricacies of building robust cybersecurity programs run by robust teams. He shares his unique journey from high school tech enthusiast to a seasoned security professional, giving excellent advice on balancing technology with human factors.

Cody also touches on understanding and managing cyber risk, and the necessity of continuous learning in the constantly evolving field. He also talks about the importance of building agility and designing security programs that are adaptable while also supporting and enabling the client’s business.

Topics discussed:

  • Insights on managing vulnerabilities and application security to strengthen overall cybersecurity defenses, including utilizing data analytics to assess vulnerabilities and make informed decisions.
  • The importance of clear communication with stakeholders to understand environments and facilitate effective security measures.
  • The necessity of ongoing education to stay current with cybersecurity trends and advancements.
  • Adopting an automation-first approach to improve response times and ensure consistency in security operations.
  • Designing security strategies that are adaptable to emerging threats and changes in the business environment so that the business is not only secure but able to thrive.

Key Takeaways:

  • Prioritize clear communication with stakeholders to understand their environments and needs for effective security solutions.
  • Educate your team and clients on vulnerability management and application security to strengthen overall security posture.
  • Utilize data analysis to understand vulnerabilities and make informed decisions for risk management.
  • Encourage ongoing education to stay updated with the latest cybersecurity trends and technologies.
  • Develop a multi-layered security strategy to mitigate risks and protect against diverse cyber threats.
  • Work closely with different teams to build security into business processes from the start.
  • Adopt an automation-first approach to enhance response times and maintain consistency in security operations.
  • Regularly assess and communicate risk levels to ensure all stakeholders are aware and can act accordingly.
  • Design your security program to be agile, enabling quick adaptation to emerging threats and changes in the environment.
  continue reading

41 episoade

كل الحلقات

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință