
Sign up to save your podcasts
Or


In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.
By Dr. Chase Cunningham5
77 ratings
In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.
Takeaways
You can't control what you can't measure.
Assume breach and prepare accordingly.
Progress over perfection is key in cybersecurity.
Best practices often aren't implemented effectively.
Building cybersecurity expertise in-house is expensive.
Partnering with an MSSP can be cost-effective.
Integrity management is crucial for IT security.
Leadership support is essential for cybersecurity initiatives.
Compliance does not guarantee a good cybersecurity posture.
Understanding your IT assets is foundational for security.

229,169 Listeners

2,011 Listeners

373 Listeners

374 Listeners

653 Listeners

1,022 Listeners

318 Listeners

8,549 Listeners

8,039 Listeners

181 Listeners

315 Listeners

74 Listeners

9,927 Listeners

138 Listeners

26,620 Listeners