Share Just Unsecure
Share to email
Share to Facebook
Share to X
By Babz & OO
The podcast currently has 28 episodes available.
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series, we will be discussing the roles of CISO vs BISO, who wins? Is it really a competition?
1.W hat is the difference between a CISO and a BISO
2. Is it time for a dedicated BISO?
3. CISO Vs BISO
4. BISO Responsibilities
5. BISO Role in the Security Function
6. BISO Soft Skills
7. Is the BISO role still necessary?
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#JustUnsecure , #CISO , #BISO #cybersecurity, #cloudsecurity, #informationsecurity, #risk , #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series, we will be discussing Achieving Data Residency in Africa
1. What is Data Residency
2. Difference between Data residency and Sovereignty
3. Why is Data Residency Important to Africa and its businesses
4. How can you ensure data remains in Africa
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#JustUnsecure , #dataresidency , #cybersecurity, #cloudsecurity, #informationsecurity, #risk , #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will be discussing the Best Way to Organize and run a GRC Programme.
1. What is governance, risk and compliance (GRC)?
2. Core GRC principles
3. Why is GRC important today?
4. GRC strengths and limitations
5. GRC software and tools
6. GRC maturity model
7. Do's and Don'ts
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#JustUnsecure , #Governanceriskcomplaince , #GRC , #Compliance , #cybersecurity, #cloudsecurity, #informationsecurity, #risk , #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we talk about passwords, are they going away soon?
Removing passwords is a solid goal as they are fraught with vulnerability issues – reuse, common construction patterns and the almighty leaked password problem.
Reasons why most organizations are not ready to abandon on-premises Active Directory and move towards a cloud-only model.
Reason 1: Hybrid directory will continue to dominate
Reason 2: Passwordless methods still rely on passwords in the background
Reason 3: Cybersecurity risks associated with passwordless
Do not neglect password security
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#JustUnsecure #passwordless, #cybersecurity, #cloudsecurity, #informationsecurity, #attack , #CISO , #identitytheft , #Africa
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we have a discussion on Blockchain and Identity Management with a Software development and engineering manager with over 15 years of experience and one of the pioneers in identity management in Nigeria. His areas of interest spans different sectors.
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#blockchain, #identitymanagement, #Smart contract , #DLT , #Didtributed Ledger transaction , #cybersecurity, #cloudsecurity, #informationsecurity, #attack , #CISO , #identitytheft , #Nigeria
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about Deep Fake: New Cyber Security Warfare?
Deepfakes (a portmanteau of "deep learning" and "fake"[1]) are synthetic media[2] in which a person in an existing image or video is replaced with someone else's likeness. While the act of faking content is not new, deepfakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content with a high potential to deceive.
We look at
1. Hyper-Connectivity Provides Opportunity
2. Deepfakes Present a Major Security Threat
3. Audience Manipulation
4. Role of Security Leaders
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#Deepfake #warfare #cybersecurity, #cloudsecurity, #informationsecurity, #attack , #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about Prioritizing Patching in Cybersecurity
Just an overview that FortiGuard Labs has found that very few vulnerabilities see widespread exploitation in the wild. Among all exploits logged by their sensors over the last two years, only 5% were detected by more than 10% of organizations. Three out of four exploits didn’t reach one in 1,000 firms.
What to do lets go through this
1. Asset Inventory
2. Risk assessment
3. Exploit and Vulnerability being exploited in the wild
4. Patch Internet/Public facing
5. Industry compliance requirement
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#patching #cybersecurity, #cloudsecurity, #informationsecurity, #attack , #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about CISO & Deep Dark Web
1. What is the difference in the type of web
2. How is the Dark Web Relevant to a CISO?
3. What to do within the dark web
4.. Some examples of how Dark Web intelligence could be relevant to your security operations:
-Tracking the development and sale of malware and exploit kits
-Monitoring data dumps that could contain your IP
-Finding stolen credentials such as login passwords belonging to your organization
-Discovering vendors on the Dark Web actively selling access to corporate networks and MSPs
-You require Combatting Cyber Fraud that might directly affect your customers or the business that you support. E.g. recent trojan targeted at android users to steal their banking details.
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#Darkweb #cybersecurity, #cloudsecurity, #informationsecurity, #web, #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about Active Directory Security
1. Agree on a Frame work categories.
2. Establish Priorities
3. Develop the Strategy and Projects as a Team
4. Keep Your Strategy Flexible
Remember to SUBSCRIBE, SHARE , LIKE and COMMENT
#enterprise security #Activedirectory #cybersecurity, #cloudsecurity, #informationsecurity, #NIST, #CISO
Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we wrap-up 2021 and look at some highlights and what to expect for 2022.
#informationsecurity,#cybersecurity,#infosec,#InformationSecurity,#CISO
The podcast currently has 28 episodes available.