The Security Strategist

EM360Tech

Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.

  1. EPISODE 7

    Rethinking Security in the Age of Zero Trust

    In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight the need for a new approach. Explore the critical components of Zero Trust, including explicit verification, least privilege access, continuous monitoring, and adaptive policies. Discover how shifting to a Zero Trust framework can better protect your organisation in today’s complex and evolving landscape.  In this episode of The Security Strategist, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, speaks to Alejandro Leal, Analyst at KuppingerCole, about why evolving your security strategy is essential for staying secure and resilient.  Key Takeaways: A layered approach to user, application, device, and network security is crucial for comprehensive protection, reducing the overall attack surface and focusing on newer threats.Common user vulnerabilities include weak authentication, insider threats, privilege escalation, misconfigured access controls, and unpatched vulnerabilities.Organisations can better protect against these risks at the identity level by implementing risk assessment procedures, enforcing strong password policies, monitoring user behaviour for anomalies, and providing context-based employee training. Chapters 00:00 Introduction and Challenges of Perimeter-Based Approach 05:09 Zero Trust: Critical Components and Differences 09:55 The Importance of a Layered Approach to Security 13:15 Common Vulnerabilities Associated with Users 18:04 Protecting Against Risks at the Identity Level 21:26 Translating the Zero Trust Philosophy into Actionable Steps with Managed Engine

    26 min
  2. EPISODE 8

    What Would 1% Do to Your Business: ML for Optimal Security Strategies

    Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats.  Embrace a dynamic approach to security that adapts to evolving risk profiles. ML optimises your security investments and ensures that measures are tailored to specific threats, enhancing protection and efficiency.  In this episode of the Security Strategist, Chris Steffen, EMA's VP of research, speaks to Brady Harrison, Kount's Director of Customer Analytics Solution Delivery, to discuss maximising value through optimal security strategies. Key Takeaways: Finding a balance between fraud prevention and sales generation is crucial for optimising security strategies.Machine learning can help businesses make informed, risk-based decisions by analysing large volumes of data in real-time.Optimising security investments involves evaluating the cost-benefit trade-offs and setting appropriate risk thresholds. Chapters: 00:00 - Introduction to the Security Strategist podcast 00:25 - Introduction to Kount and its focus on customer analytics and fraud prevention 01:49 - Differences between EU and US security strategies 05:12 - Balancing fraud prevention and sales conversion 08:59 - Optimizing security investments with machine learning 14:43 - Advantages of machine learning in security 18:31 - Setting security strategy based on machine learning 23:47 - Treating customers as good until proven otherwise 25:11 - Conclusion and call to action

    26 min
  3. EPISODE 9

    Cutting Through the Noise: Redefining Detection and Response With Secureworks

    When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies?  In this episode of the EM360 Podcast, Chris Steffen, EMA's Vice President of Research, speaks to Kyle Falkenhagen, Secureworks’ Chief Product Officer, to discuss how organizations are investing in extended detection and response solutions as a comprehensive approach to cybersecurity.  Key Takeaways: XDR (Extended Detection and Response) is a comprehensive approach that combines proactive risk reduction with reactive response. But not all solutions are equal, and it’s important to understand the distinction between basic and robust response.Identity plays a critical role in cybersecurity, with many breaches having an identity component. Organizations should focus on securing their identity environment and detecting and responding to identity-based threats.Balancing proactive security measures with traditional detection and response is vital for improving security posture. Organizations should look for security partners that can provide reactive and proactive capabilities. Chapters:  00:00 - Introduction and Background 02:48 - The Role of Response in XDR 08:50 - Balancing Proactive Security and Detection & Response 11:03 - The Significance of Identity in Cybersecurity 18:51 - Integrating Threat and Exposure Data for Better Security Posture 23:23 - Conclusion

    24 min

About

Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.