
Sign up to save your podcasts
Or
It's not if, but rather when, companies are going to experience a breach. Today we are joined by Andrew Whittaker, Sales and Services Executive from Altron Security to unpack the rapid response required post a breach. It quickly becomes clear that Whittaker is an expert in this field. His past 17 years have been spent in and around security incidents and not much can fluster him – as host I did throw a curveball or two to test resolve which were handled well. Whittaker’s view is that security teams are largely impacted by the culture of the organsiation and therefore will have different responses to intrusions. He is quick to point out that there is no “one size fits all” approach to security however there are logical steps to manage and contain an incident. These are unpacked in some detail providing a good insight into how people and technology can play a role in minimizing damage. Winding back to foundational layers, Whittaker points to 3 tips for avoiding a breach: Have informed users, establish a culture of well managed systems and ensure that the maintenance team has a good handle on privileged account management. This post breach management has universal application and Whittaker summed it up by saying “Security teams need to provide price appropriate capabilities to add business value whilst delivering the right level of security and protection.”
It's not if, but rather when, companies are going to experience a breach. Today we are joined by Andrew Whittaker, Sales and Services Executive from Altron Security to unpack the rapid response required post a breach. It quickly becomes clear that Whittaker is an expert in this field. His past 17 years have been spent in and around security incidents and not much can fluster him – as host I did throw a curveball or two to test resolve which were handled well. Whittaker’s view is that security teams are largely impacted by the culture of the organsiation and therefore will have different responses to intrusions. He is quick to point out that there is no “one size fits all” approach to security however there are logical steps to manage and contain an incident. These are unpacked in some detail providing a good insight into how people and technology can play a role in minimizing damage. Winding back to foundational layers, Whittaker points to 3 tips for avoiding a breach: Have informed users, establish a culture of well managed systems and ensure that the maintenance team has a good handle on privileged account management. This post breach management has universal application and Whittaker summed it up by saying “Security teams need to provide price appropriate capabilities to add business value whilst delivering the right level of security and protection.”