
Sign up to save your podcasts
Or
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-how-much-do-you-know-about-your-data/
Do cybersecurity professionals even know what they're protecting? How aware are they of the data, its content and its sensitivity? What happens to your security posture when you do understand the data you're protecting? What can you do that you weren't able to do before?
Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, and Steve Zalewski, CISO, Levi Strauss, with our sponsored guest, Aidan Simister (@aidansimister), CEO, Lepide.
Thanks to our podcast sponsor, Lepide
Ninety eight percent of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Lepide’s unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats – fast.
In this episode:
4.8
7373 ratings
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-how-much-do-you-know-about-your-data/
Do cybersecurity professionals even know what they're protecting? How aware are they of the data, its content and its sensitivity? What happens to your security posture when you do understand the data you're protecting? What can you do that you weren't able to do before?
Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, and Steve Zalewski, CISO, Levi Strauss, with our sponsored guest, Aidan Simister (@aidansimister), CEO, Lepide.
Thanks to our podcast sponsor, Lepide
Ninety eight percent of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Lepide’s unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats – fast.
In this episode:
1,970 Listeners
361 Listeners
626 Listeners
366 Listeners
176 Listeners
1,006 Listeners
312 Listeners
408 Listeners
7,876 Listeners
166 Listeners
187 Listeners
314 Listeners
127 Listeners
43 Listeners
158 Listeners