Cybersecurity Where You Are (video)

Episode 26: Automating the Secure Configuration Management Process


Listen Later

Resources

  • Follow Brian Hajost on LinkedIn
  • Prioritizing a Zero Trust Journey Using CIS Controls v8
  • Webinar | Align and Achieve CMMC Compliance Utilizing CIS Best Practices
  • Episode 11: Remote Attestation Helps Zero Trust
  • CIS Critical Security Controls v8 Cybersecurity Maturity Model Certification Mapping
  • Where Does Zero Trust Begin and Why is it Important?

In episode 26 of Cybersecurity Where You Are, co-host Tony Sager is joined by Brian Hajost, Chief Operating Officer at SteelCloud. They discuss some of the common issues around secure configuration management, the struggles that organizations face, and ways to overcome those challenges. 

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity Where You Are (video)By Center for Internet Security

  • 5
  • 5
  • 5
  • 5
  • 5

5

13 ratings


More shows like Cybersecurity Where You Are (video)

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,969 Listeners

Risky Business by Patrick Gray

Risky Business

361 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

626 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

363 Listeners

Hacked by Hacked

Hacked

183 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,004 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

311 Listeners

Click Here by Recorded Future News

Click Here

398 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,883 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

169 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

77 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

129 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

158 Listeners