ADCG on Privacy & Cybersecurity

98 | The Importance of Digital Asset Inventories in Incident Response


Listen Later

This episode of the ADCG Privacy and Cybersecurity Podcast features Ken Westin, Field CISO for Panther Labs. Ken has been in the cybersecurity field for over 15 years, working with companies to improve their security posture through threat hunting, insider threat programs, and vulnerability research. We discuss how the lack of good application and data inventories impact incident response. When data is spread across data centers, clouds, and SaaS providers, it becomes difficult to track and trace an incident and understand its impact, but it becomes especially hard if the data involves confidential or proprietary business data that is not tracked by privacy officers or if it includes sensitive data that may involve regulators. The recent MOVEit breach, which involved software used to transfer sensitive data between servers, systems, and applications, provided rich lessons in the need for data asset inventories and SIEMs that can correlate data across providers and platforms.
...more
View all episodesView all episodes
Download on the App Store

ADCG on Privacy & CybersecurityBy Association for Data and Cyber Governance

  • 5
  • 5
  • 5
  • 5
  • 5

5

16 ratings


More shows like ADCG on Privacy & Cybersecurity

View all
Bloomberg Law by Bloomberg

Bloomberg Law

358 Listeners

Motley Fool Money by The Motley Fool

Motley Fool Money

3,173 Listeners

The Lawfare Podcast by The Lawfare Institute

The Lawfare Podcast

6,284 Listeners

The Privacy Advisor Podcast by Jedidiah Bracy, IAPP Editorial Director

The Privacy Advisor Podcast

67 Listeners

The Daily by The New York Times

The Daily

111,083 Listeners

MIT Technology Review Narrated by MIT Technology Review

MIT Technology Review Narrated

257 Listeners

The Weekly Show with Jon Stewart by Comedy Central

The Weekly Show with Jon Stewart

10,294 Listeners

To Catch a Thief: China’s Rise to Cyber Supremacy by Rubrik | Nicole Perlroth | Pod People

To Catch a Thief: China’s Rise to Cyber Supremacy

220 Listeners