Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 #683: Navigating the effect of AI on marketing jobs and the job market with Sue Keith, Landrum Talent Solutions 23:28
Zero trust fundamentals
Manage episode 365026653 series 2981977
Zero trust is not a product you buy.
The problem that most organizations have is that they are still not doing the fundamentals well.
CIS has a community defense model.
I did a detailed webinar on it where I covered a lot of these fundamentals.
https://www.qpcsecurity.com/2023/02/16/addressing-information-security-fundamentals-with-cis-and-community-defense-model/
Let's look at inventory management, asset management, change management, onboarding and offboarding.
You must have checks and balances. There must be practices codified in policy with a shared responsibility model which make it so that the issues that are created by mistakes in onboarding or offboarding are caught.
Fundamentally, the most effective thing in zero trust are the protections that are in an always on state.
Like for example the recent revelation about flaws in UEFI and SecureBoot.
These have prerequisites like TPM, BIOS configs, bios adm pwds, automated firmware updates, procurement policy alignment for supported hardware, onboarding configuration done properly on those endpoints, monitoring of the firmware updates, and of course, no admin access for end users!!!
FUNDAMENTALS MUST BE MASTERED
When an organization does not have a CISO that has policy and management authority over IT, you are guaranteed to have problems.
Forget CIO and CTO. I think those are old modes of thinking. Find a CISO that can be the leader of all IT strategy.
Procurement policy must include vetting and testing of cloud app integrations. Monitoring and technical controls must be in place to restrict or eliminate the ability of an end user to buy shadow IT and authorize it on their own. Azure AD has controls for this, but they are not on by default.
96 episodes
Manage episode 365026653 series 2981977
Zero trust is not a product you buy.
The problem that most organizations have is that they are still not doing the fundamentals well.
CIS has a community defense model.
I did a detailed webinar on it where I covered a lot of these fundamentals.
https://www.qpcsecurity.com/2023/02/16/addressing-information-security-fundamentals-with-cis-and-community-defense-model/
Let's look at inventory management, asset management, change management, onboarding and offboarding.
You must have checks and balances. There must be practices codified in policy with a shared responsibility model which make it so that the issues that are created by mistakes in onboarding or offboarding are caught.
Fundamentally, the most effective thing in zero trust are the protections that are in an always on state.
Like for example the recent revelation about flaws in UEFI and SecureBoot.
These have prerequisites like TPM, BIOS configs, bios adm pwds, automated firmware updates, procurement policy alignment for supported hardware, onboarding configuration done properly on those endpoints, monitoring of the firmware updates, and of course, no admin access for end users!!!
FUNDAMENTALS MUST BE MASTERED
When an organization does not have a CISO that has policy and management authority over IT, you are guaranteed to have problems.
Forget CIO and CTO. I think those are old modes of thinking. Find a CISO that can be the leader of all IT strategy.
Procurement policy must include vetting and testing of cloud app integrations. Monitoring and technical controls must be in place to restrict or eliminate the ability of an end user to buy shadow IT and authorize it on their own. Azure AD has controls for this, but they are not on by default.
96 episodes
All episodes
×

1 Mastering Operational Maturity: The Secret to AI Success 27:31

1 Driving Cultural Change Toward Profitability and Operational Maturity 27:32

1 Mastering the AI Landscape: A Guide for Businesses 27:55

1 Survive and Thrive in 2025: Empowering Your Team with Continuous Learning 28:55


1 The Hidden Risks of Data Centers: A Deep Dive with Dr. Eric Woodell 1:23:33

1 Why You Need a CTO: Avoiding Costly Mistakes in Document Management 27:43

1 Navigating the Cloud: Unveiling the Hidden Costs and Risks 27:34

1 Exploring Network Security and AI Threats with Crystal Redmann 28:49

1 The Real Skinny on Penetration Testing: Debunking the Myths 19:03


1 Navigating the AI Frontier: Caution, Control, and Opportunity 28:29

1 Understand implications of IT procurement using cabinets as an example 29:22


1 Incident response and mitigating supply chain attacks 28:44

1 K12 Technology and Cybersecurity Challenges and Solutions 29:12

1 Practical example of how operational maturity improves productivity while reducing risk 28:20

1 Unlocking Strategic IT Investments and Information Security 1:16:18

1 Domain/DNS hosting, account ownership, security issues and TCO 58:52

1 Cyber Insurance versus Cyber Warranty 1:25:57

1 Demystifying IT Services and the Shared Responsibility Paradigm 33:45

1 How establishing requirements properly results in best outcomes 29:51

1 Operational Maturity is required to have Information Security Risk Management 2:01:30

1 Managing the impact of changing IT service providers 29:43

1 CMMC and latest DoD memo implications and far reaching effects related to FedRAMP 29:25


1 Threats to mobile devices and how to manage them, part 2 29:47

1 Physical threats to mobile phones, SIM hijacking, out of band SMS, and Yubikeys 29:34

1 How to analyze workloads and decide how they should be hosted 29:28
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.