This week’s Cybersecurity Where You Are podcast highlights:
- Automated attestation processes
- Vendor attestation capabilities
- Root of trust via Trusted Platform Module (TPM)
- Method of verification for zero trust
Episode Resources
- Visit the CIS Website
- CIS Controls List
- About Kathleen Moriarty, Chief Technology Officer, CIS
- Related Blog on Zero Trust: Where Does Zero Trust Begin and Why is it Important?
In this edition of Cybersecurity Where You Are, host and CIS Chief Information Security Officer (CISO), Sean Atkinson welcomes guest Kathleen Moriarty, Chief Technology Officer (CTO) at CIS. Together, the duo discuss attestation in terms of hardware and software, and the process of performing a posture assessment.