Artwork

المحتوى المقدم من The EPAM Continuum Podcast Network and EPAM Continuum. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة The EPAM Continuum Podcast Network and EPAM Continuum أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Silo Busting 36: Zero-Trust Networking with Mike Gorman and Boris Khazin

27:31
 
مشاركة
 

Manage episode 323559028 series 3215634
المحتوى المقدم من The EPAM Continuum Podcast Network and EPAM Continuum. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة The EPAM Continuum Podcast Network and EPAM Continuum أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
“Zero trust to me is a set of principles, and the degree to which you operate those principles is very much a risk-management exercise,” says Mike Gorman, Head of Security and Compliance at NetFoundry. This remark set the tone for the informed dialogue Gorman recently had with Boris Khazin, our Global Head of DRM Services, in our latest #CybersecurityByDesign conversation. The environment that requires zero-trust networking, Gorman says, is complex. “The more we advance the information age, the more we are struggling to get ahold of our security and the more we are struggling to reach the kind of business agility that we want and all of these competing factors.” Listen to Gorman-Kahzin back-and-forth as it ranges from GDPR and CCPA, to improving the implementation of private networks, to including GRC within the software development lifecycle and the *solution* development lifecycle. These are essential topics that all businesses need to address, whether they recognize the need or not. “Vulnerabilities always exist,” says Gorman. “If you don't know about them, then there's a zero-day out there [and] some security researcher, good or bad, is gonna find it for you.” One way to combat the bad guys: Get into the network early and protect it. “By getting the networking piece right, you can reduce the threat actor space by literally orders of magnitude,” says Gorman. Want to start making your organization less vulnerable? Hit “play.” Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

165 حلقات

Artwork
iconمشاركة
 
Manage episode 323559028 series 3215634
المحتوى المقدم من The EPAM Continuum Podcast Network and EPAM Continuum. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة The EPAM Continuum Podcast Network and EPAM Continuum أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
“Zero trust to me is a set of principles, and the degree to which you operate those principles is very much a risk-management exercise,” says Mike Gorman, Head of Security and Compliance at NetFoundry. This remark set the tone for the informed dialogue Gorman recently had with Boris Khazin, our Global Head of DRM Services, in our latest #CybersecurityByDesign conversation. The environment that requires zero-trust networking, Gorman says, is complex. “The more we advance the information age, the more we are struggling to get ahold of our security and the more we are struggling to reach the kind of business agility that we want and all of these competing factors.” Listen to Gorman-Kahzin back-and-forth as it ranges from GDPR and CCPA, to improving the implementation of private networks, to including GRC within the software development lifecycle and the *solution* development lifecycle. These are essential topics that all businesses need to address, whether they recognize the need or not. “Vulnerabilities always exist,” says Gorman. “If you don't know about them, then there's a zero-day out there [and] some security researcher, good or bad, is gonna find it for you.” One way to combat the bad guys: Get into the network early and protect it. “By getting the networking piece right, you can reduce the threat actor space by literally orders of magnitude,” says Gorman. Want to start making your organization less vulnerable? Hit “play.” Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

165 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع