Fique off-line com o app Player FM !
Defending the Endpoint: Sharing Responsibility Between IT and End Users
Manage episode 303977530 series 2683101
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?
In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.
Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 episódios
Manage episode 303977530 series 2683101
October is Cybersecurity Awareness month, which puts a spotlight on end-user knowledge and application of practices such as using strong passwords, MFA, and the ability to spot phishing scams. But what is the actual role of the end-user in the overall pursuit of cybersecurity? Where do IT tools and processes end, and where must the end-user take on a higher level of responsibility?
In this episode of ThreatTalk, Infoblox CIO Brad Bell and Infoblox CISO Ed Hunter join host Bob Hansmann in an exciting and relevant discussion. We will explore the threats, defenses, and pros & cons of user awareness from the endpoint perspective, with particular attention to the impact of our new work-from-anywhere reality.
Tune in to the live broadcast on LinkedIn, YouTube and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 episódios
Todos os episódios
×
1 The Good, the Bad, and the Cybersecurity AI to Sort It All Out 30:30

1 Meet the Authors: Abusing DNS as Transport 28:53

1 Meet the Authors: Countering Redirection and Misdirection with DNS 30:33

1 Outsourcing Teaming, Testing, and Trust with Third Parties 22:49

1 Meet the Authors: DNS Insecurity, or DNS in Security? 29:01

1 Overkill or ‘Just Right’? The Cybersecurity Role of Service Providers 29:20

1 The Care and Feeding of an Effective Threat Intelligence System 30:48

1 Security Outsourcing: Why, When and How to Make it Work 23:34

1 The community has spoken: Top Topics of Q2’ 23 29:41

1 Center Stage: Persistent Infrastructure Threat Actors 29:47

1 Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study 30:09

1 Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage 28:09

1 Show Me the Value: Understanding the Security Channel Landscape 21:37
Bem vindo ao Player FM!
O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.