
Sign up to save your podcasts
Or


In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.

229,780 Listeners

2,007 Listeners

370 Listeners

373 Listeners

650 Listeners

1,028 Listeners

320 Listeners

8,837 Listeners

8,103 Listeners

176 Listeners

314 Listeners

73 Listeners

10,225 Listeners

139 Listeners

26,665 Listeners