انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Adopting Zero Trust with Dom Glavach: Staffing Up
Manage episode 359460720 series 3462572
This week we chat with Dom Glavach, Chief Security Officer (CSO) of CyberSN (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and tool upgrades, and the hunt for red teams focused on prodding Zero Trust architectures. For those unfamiliar with CyberSN, they connect cybersecurity professionals to in-demand jobs and have some of the best visibility into hiring trends and how/if Zero Trust is being staffed up for.
Be sure to get the full recap on adoptingzerotrust.com
51 حلقات
Manage episode 359460720 series 3462572
This week we chat with Dom Glavach, Chief Security Officer (CSO) of CyberSN (Cyber Security Network) and a security consultant, and we dig into Zero Trust as a journey, the delta between buzzwords and tool upgrades, and the hunt for red teams focused on prodding Zero Trust architectures. For those unfamiliar with CyberSN, they connect cybersecurity professionals to in-demand jobs and have some of the best visibility into hiring trends and how/if Zero Trust is being staffed up for.
Be sure to get the full recap on adoptingzerotrust.com
51 حلقات
Tutti gli episodi
×![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Kicking Off Season 4 of Adoption Zero Trust (AZT) 22:43
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 The key to growing a cybersecurity career are soft skills 50:38
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Behind the scenes of cybersecurity media and reporting 1:04:53
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 GRC tool or spreadsheets, that is the question | GRC Uncensored Preview 43:13
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Podcast Preview: GRC Uncensored and the commoditization of compliance 41:30
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 How to prepare your operations team for Zero Trust 46:17
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Log4j Continues to act as Organizational Vulnerability 47:56
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Overturning of Chevron Deference’s Impact on Cybersecurity Regulation 51:44
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Applying Vulnerability Management to Zero Trust 45:43
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 The Unstoppable Phish: A Discussion with Vivek Ramachandran 26:31
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall 46:22
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Decoding Emerging Threats: MITRE, OWASP, and Threat Intel 25:00
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Navigating the Ever-Changing Landscape of Cybersecurity Regulations With Lacework and Drata 30:10
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
![Adopting Zero Trust podcast artwork](/static/images/64pixel.png)
1 Cyber Insurance: Sexy? No. Important? Critically yes. 1:14
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.