
Sign up to save your podcasts
Or
Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense.
This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management.
Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential for balancing security and usability. While Brian Hajost, COO at SteelCloud, highlights the challenge of automating manual controls.
Tune in on your favorite podcast platform today for expert insights on balancing security with usability, maintaining continuous compliance, and how AI and large language models could reshape the future of STIG implementation.
ss.
5
55 ratings
Any individual would know keeping operating systems up to date is a no-brainer when it comes to cybersecurity. But what happens when you’re managing an estimated seven million devices? This is the challenge for the Department of Defense.
This week on Feds At The Edge, we unpack the concept of applying Security Technical Implementation Guides, otherwise known as STIG, crucial tools for configuration management.
Dr. Kurt Jarvis, Technical Director for Cyber for the Air Force Sustainment Center, explains why each environment's unique risk profile makes STIG essential for balancing security and usability. While Brian Hajost, COO at SteelCloud, highlights the challenge of automating manual controls.
Tune in on your favorite podcast platform today for expert insights on balancing security with usability, maintaining continuous compliance, and how AI and large language models could reshape the future of STIG implementation.
ss.