IoT Security Podcast

Shifting Left: Vendor Responsibility for Cybersecurity ft. Kathleen Moriarty


Listen Later

"Discover how to hold vendors accountable for their cybersecurity responsibility and protect your business from attack."

In this episode, Brian and John are back, this time with Kathleen Moriarty discussing how to hold vendors accountable for their cybersecurity responsibility and protect your business from attack.

Kathleen Moriarty is a cybersecurity expert with over 25 years of experience in the field. She has served as a CISO multiple times and is currently the Chief Technology Officer at the Center for Internet Security. Kathleen is an IETF Security Area Director and author of the book "Transforming Information Security."

Kathleen Moriarty learned about vendor responsibility for cybersecurity through her experience as an Internet Service Provider in 1995. She noticed that vendors are pushing for security as code, which involves managing security at scale and setting up policies for posture assessments, configuration requirements, and more. She works for the Center for Internet Security, which supports under-resourced state, local, tribal, and territorial organizations. They are developing a document that provides general guidance for IoT vendors to be held more accountable and ensure the devices they provide are secure. There is a need for a tool to make sure that updates are provided, and vendors should rely on something other than the end user to ensure their device is secure. She is also working on standards to help the vendor responsible for cybersecurity and ultimately help protect people from the sophisticated threat actors out there today.

"We have to take a step back, look at how we have done security for the past 30 years and say, can we change it now as we implement these new requirements? We have to push security back to vendors with architectural patterns that scale."

In this episode, Brian and John discuss with Kathleen:
1. How can vendors be held more accountable for delivering secure products?
2. What strategies can organizations use to build resiliency into their infrastructure?
3. What techniques can be employed to reduce the burden of manual system maintenance?



Let’s connect about IoT Security!

Follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

...more
View all episodesView all episodes
Download on the App Store

IoT Security PodcastBy Phosphorus Cybersecurity

  • 5
  • 5
  • 5
  • 5
  • 5

5

5 ratings


More shows like IoT Security Podcast

View all
The Vergecast by The Verge

The Vergecast

3,652 Listeners

You're Welcome! With Chael Sonnen by Chael Sonnen

You're Welcome! With Chael Sonnen

2,316 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,010 Listeners

Jack Slack Podcast by Jack Slack

Jack Slack Podcast

401 Listeners

The Daily by The New York Times

The Daily

111,249 Listeners

Click Here by Recorded Future News

Click Here

387 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,816 Listeners

La Sueur by La Sueur

La Sueur

15 Listeners

The Industrial Security Podcast by PI Media

The Industrial Security Podcast

20 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

76 Listeners

La vie suffit ! by Chloé Bloom

La vie suffit !

58 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

118 Listeners

The Ezra Klein Show by New York Times Opinion

The Ezra Klein Show

15,191 Listeners

Fight Minds by Chris Genachte

Fight Minds

2 Listeners