CyberHub Podcast

Friday Conversation between Two CISO's: The Pillars of Zero Trust, Assuming Breach


Listen Later

### Podcast Summary: Embracing Zero Trust in the Digital Workplace

The hosts James Azar and Chris Foulon delve into the critical concept of zero trust, emphasizing the "assume breach" mindset. This approach is essential for robust cybersecurity, particularly in the context of work-from-home setups and the increasing reliance on cloud services. Here are the primary talking points from the discussion:

1. Studio Update and Security Measures: The episode kicks off with news about the podcast studio undergoing renovations, introducing a humorous but pertinent discussion on physical and network security, including hidden cameras and microphones.

2. Zero Trust and Assume Breach Principle: The core of the podcast is the principle of zero trust, specifically the need to always assume a breach has occurred. This mindset shifts security from perimeter-based defenses to more robust, identity-centric strategies.

3. Work from Home Security Challenges: The hosts explore the security vulnerabilities introduced by remote work. They discuss how traditional security measures like VPNs and IPsec tunneling are no longer sufficient, underscoring the importance of identity management and endpoint monitoring.

4. Importance of Identity Access Management (IAM): The conversation highlights IAM solutions, emphasizing least privilege access and the necessity of monitoring identity behavior to prevent unauthorized access.

5. Phishing and Password Management: The hosts address common entry points for cyber threats, such as phishing and poor password practices, stressing the importance of educating users about security hygiene.

6. Shadow IT and SaaS Risks: They also discuss the risks posed by Shadow IT and Shadow SaaS, where unauthorized apps and services can expose organizations to data breaches.

7. Strategic Security Responses: Detailed discussions on how organizations should structure their security responses, including segmenting networks, monitoring critical data flows, and implementing user entity behavior analytics to detect anomalies.

8. Business Enablement through Security: The hosts argue that security should not restrict business but enable it. This involves understanding the business operations thoroughly and choosing security solutions that support business productivity without compromising security.

9. Future Preparations and Studio Changes: They wrap up by sharing their excitement for the upcoming changes to the studio and the potential improvements in acoustics, which ties back to the ongoing theme of continual improvement, whether in physical spaces or cybersecurity practices.

This episode encapsulates a deep dive into how businesses can adapt to modern security threats through a zero trust framework, emphasizing proactive measures and the importance of adapting security practices to the evolving digital landscape.

Connect with the Hosts:

https://www.linkedin.com/in/james-j-azar/

https://www.linkedin.com/in/christophefoulon/

 

Apply now to be a featured partner on the show: https://www.cyberhubpodcast.com/contact

******

Listen here: https://linktr.ee/cyberhubpodcast

******

Website: https://www.cyberhubpodcast.com

Youtube: https://www.youtube.com/c/TheCyberHubPodcast

Rumble: https://rumble.com/c/c-1353861

Facebook: https://www.facebook.com/CyberHubpodcast/

Linkedin: https://www.linkedin.com/company/cyberhubpodcast/

Twitter: https://twitter.com/cyberhubpodcast

Instagram: https://www.instagram.com/cyberhubpodcast

 

Thank you for watching and Please Don't forget to Like this video and Subscribe to my Channel!

 The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

#cybernews #infosec #cybersecurity #cyberhubpodcast #practitionerbrief #cisotalk #ciso #infosecnews #infosec #infosecurity #cybersecuritytips #podcast #technews #tinkertribe #givingback #securitytribe #securitygang #informationsecurity

...more
View all episodesView all episodes
Download on the App Store

CyberHub PodcastBy James Azar

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

5 ratings


More shows like CyberHub Podcast

View all
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

636 Listeners

Callan's Kicks by RTÉ

Callan's Kicks

47 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,009 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,913 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Afternoon Cyber Tea with Ann Johnson by Microsoft

Afternoon Cyber Tea with Ann Johnson

37 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

The Weekly Show with Jon Stewart by Comedy Central

The Weekly Show with Jon Stewart

10,613 Listeners

IoT Security Podcast by Phosphorus Cybersecurity

IoT Security Podcast

5 Listeners

Safe Mode Podcast by Safe Mode Podcast

Safe Mode Podcast

8 Listeners

Unconfuse Me with Bill Gates by Gates Notes

Unconfuse Me with Bill Gates

487 Listeners

NatSec Matters by Beacon Global Strategies LLC

NatSec Matters

256 Listeners

Security You Should Know by CISO Series

Security You Should Know

5 Listeners