Go offline with the Player FM app!
Should Deny By Default Be the Cornerstone of Zero Trust?
Manage episode 433100929 series 2478315
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest Rob Allen, chief product officer, ThreatLocker.
In this episode:
- Can you retrofit zero trust?
- The business case for deny by default
- Seizing an opportunity
- Zero trust doesn’t stand alone
Thanks to our podcast sponsor, ThreatLocker
ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
319 episodes
Manage episode 433100929 series 2478315
All links and images for this episode can be found on CISO Series.
Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest Rob Allen, chief product officer, ThreatLocker.
In this episode:
- Can you retrofit zero trust?
- The business case for deny by default
- Seizing an opportunity
- Zero trust doesn’t stand alone
Thanks to our podcast sponsor, ThreatLocker
ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
319 episodes
All episodes
×

1 Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem 28:40


1 What Are the Cybersecurity Trends We Need To Follow? 24:23


1 Is It Even Possible to Fast-Track Your Way Into Cybersecurity? 27:03


1 What's the Most Efficient Way to Rate Third Party Vendors? 28:27


1 Don't Ask "Can" We Secure It, But "How" Can We Secure It 28:29


1 Has the Shared Security Model for SaaS Shifted? 28:55


1 Improving the Efficiency of Your Threat Intelligence 26:40


1 Why Cybersecurity Professionals Lie on Their Resumes 32:19






1 Can You Have a Secure Software Environment Without Traditional Vulnerability Management? 29:07


1 How Much Should Salespeople Know About Their Product? 27:18


1 Why Are We Still Struggling to Fix Application Security? 28:14


1 What Can Someone with No Experience Do in Cybersecurity? 26:25


1 Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry? 26:47
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.