
Sign up to save your podcasts
Or


In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.

227,718 Listeners

2,001 Listeners

370 Listeners

375 Listeners

637 Listeners

1,017 Listeners

322 Listeners

8,530 Listeners

8,010 Listeners

175 Listeners

314 Listeners

73 Listeners

9,830 Listeners

134 Listeners

26,663 Listeners