
Sign up to save your podcasts
Or


Send us a text
Bold Statement: "Your company's security depends on more than just your own vigilance. It also hinges heavily on third parties. In today's episode, we tackle that reality head-on, using a case study of a Windows 7 PC from a high-security fencing company that was hacked to infiltrate sensitive military and research sites. This real-life example serves as a stark reminder of the need for constant assessment and monitoring of third parties to safeguard your firm. Additionally, we shed light on the trusted computing base and its key components like the system kernel and hardware, the security kernel, and mandatory access controls, which are all essential in fortifying your environment against threats.
Tantalizing Teaser: "Trust us, you won't want to miss our deep-dive into trusted computing for data integrity and security. We lay bare the distinctions between TPM and HSM and illustrate how the trusted computing base (TCB) can be harnessed to craft a robust multi-level security system. We also illuminate the TCB's applications for financial systems, device identification and verification, and the Internet of Things. Towards the end, we unravel the HRU Model for Access Control, breaking down its components, outlining its practical applications, and discussing its limitations. This episode is designed to demystify complex cybersecurity concepts, so tune in and prepare to ace the CISSP exam.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!
By Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur4.4
3232 ratings
Send us a text
Bold Statement: "Your company's security depends on more than just your own vigilance. It also hinges heavily on third parties. In today's episode, we tackle that reality head-on, using a case study of a Windows 7 PC from a high-security fencing company that was hacked to infiltrate sensitive military and research sites. This real-life example serves as a stark reminder of the need for constant assessment and monitoring of third parties to safeguard your firm. Additionally, we shed light on the trusted computing base and its key components like the system kernel and hardware, the security kernel, and mandatory access controls, which are all essential in fortifying your environment against threats.
Tantalizing Teaser: "Trust us, you won't want to miss our deep-dive into trusted computing for data integrity and security. We lay bare the distinctions between TPM and HSM and illustrate how the trusted computing base (TCB) can be harnessed to craft a robust multi-level security system. We also illuminate the TCB's applications for financial systems, device identification and verification, and the Internet of Things. Towards the end, we unravel the HRU Model for Access Control, breaking down its components, outlining its practical applications, and discussing its limitations. This episode is designed to demystify complex cybersecurity concepts, so tune in and prepare to ace the CISSP exam.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!

185 Listeners

2,004 Listeners

371 Listeners

374 Listeners

638 Listeners

1,023 Listeners

322 Listeners

8,010 Listeners

174 Listeners

314 Listeners

189 Listeners

73 Listeners

134 Listeners

44 Listeners

169 Listeners