Gå offline med appen Player FM !
Episode 77: How to Use Data to Make Cybersecurity Decisions
Manage episode 403582174 series 3382533
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Together, they discuss how to use data to inform your decision-making in cybersecurity. They begin by discussing the cybersecurity industry's lack of maturity in its use of data. From there, they explore the risks of not using data to make cybersecurity decisions. In Tony's words, the cybersecurity industry doesn't have to accept "perfection is the enemy of the good" as its paradigm. When we understand the data with which we can work, we can frame the information in a way to strengthen the cybersecurity posture of our respective organizations.
Resources
- Follow Roger on LinkedIn
- A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using
- Cybersecurity at Scale: Piercing the Fog of More
- Known Exploited Vulnerabilities Catalog
- Episode 60: Guiding Vendors to IoT Security by Design
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 episoder
Manage episode 403582174 series 3382533
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. Together, they discuss how to use data to inform your decision-making in cybersecurity. They begin by discussing the cybersecurity industry's lack of maturity in its use of data. From there, they explore the risks of not using data to make cybersecurity decisions. In Tony's words, the cybersecurity industry doesn't have to accept "perfection is the enemy of the good" as its paradigm. When we understand the data with which we can work, we can frame the information in a way to strengthen the cybersecurity posture of our respective organizations.
Resources
- Follow Roger on LinkedIn
- A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using
- Cybersecurity at Scale: Piercing the Fog of More
- Known Exploited Vulnerabilities Catalog
- Episode 60: Guiding Vendors to IoT Security by Design
- Episode 75: How GenAI Continues to Reshape Cybersecurity
- Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
If you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
108 episoder
すべてのエピソード
×Välkommen till Player FM
Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.