13 episodes

A cybersecurity learning journey podcast hosted by Heather Holliday.

Cyber Security Cohort Heather Holliday

    • Technology

A cybersecurity learning journey podcast hosted by Heather Holliday.

    Access Management Solutions | S02.E04

    Access Management Solutions | S02.E04

    Cyber Security Cohort : S02.E04

    Access Management Solutions

    In today’s episode, cybersecurity consultant Heather Holliday explores several common Access Management Solutions. Heather will compare and contrast options such as Federated Identity Management, Same Sign-On, Multifactor Authentication and Single Sign-On, then she'll take a look at what makes each option unique so you can better understand why there is more than one option and how to choose the best option for your situation.


    ⁠Click for full transcript⁠



    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK 


    What is Single Sign-On Authentication? And...How Does it Work? (SSO)


    Tech Target:What is single sign-on (SSO)?  https://www.techtarget.com/searchsecurity/definition/single-sign-on 


    AWS: What is SSO (Single-Sign-On)? https://aws.amazon.com/what-is/sso/ 


    Onelogin: What is Federated ID?: https://www.onelogin.com/learn/federated-identity 


    Onelogin: SAML Explained in Plain English: https://www.onelogin.com/learn/saml 


    What is Kerberos?: https://www.simplilearn.com/what-is-kerberos-article 


    Microsoft: What is OpenID Connect?: https://www.microsoft.com/en-us/security/business/security-101/what-is-openid-connect-oidc 

    • 15 min
    Authentication and Access Management Policies | S02.E03

    Authentication and Access Management Policies | S02.E03

    Cyber Security Cohort : S02.E03

    Authentication and Access Management Policies

    In today’s episode Heather Holliday explores the topic of authentication and access management policies. Heather shares details about the overarching considerations for good authentication and access management practices in the context of cyber security.



    Click for full transcript



    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK 


    NIST Access Control Policy: https://csrc.nist.gov/glossary/term/access_control_policy 




    NIST Password Policy publication: https://csrc.nist.gov/pubs/ir/7970/final

    • 25 min
    Passwords, Passphrases and PINs | S02.E02

    Passwords, Passphrases and PINs | S02.E02

    Cyber Security Cohort : S02.E02
    Passwords, Passphrases and PINs

    In this episode Heather dives into the world of PINs, passwords and passphrases. This is one of the hottest topics in cyber security and one of the most important! After all, you use PINs, passwords and passphrases to secure some of your most valuable personal information.


    ⁠⁠Click here for full transcript⁠⁠



    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK 


    Are Password Managers Safe? https://cybernews.com/best-password-managers/are-password-managers-safe/ 


    John the Ripper Lab: https://greatadministrator.com/john-the-ripper-lab/ 

    • 15 min
    Auth & Auth | S02.E01

    Auth & Auth | S02.E01

    Cyber Security Cohort : S02.E01
    Auth & Auth

    In this first episode of a brand new season of the Cyber Security Cohort, Heather will pivot from her previous discussions on Governance, Risk and Compliance in season 1 to begin a new chapter on another of her favorite topics - Authentication and Authorization.


    ⁠Click here for full transcript⁠



    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
    Why Your Organization Needs Rule-Based Access Control: https://www.networkcomputing.com/network-security/why-your-organization-needs-rule-based-access-control
    Techtopia: Mandatory, Discretionary, Role and Rule Based Access Control: https://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Based_Access_Control

    • 17 min
    Are You the One in Control? | Episode 008

    Are You the One in Control? | Episode 008

    Cyber Security Cohort : Episode 008
    Are You the One in Control?

    In today’s episode Heather Holliday the importance of Controls in cyber security and how Controls are used to ensure safe cyber practices. As Janet Jackson said, “It’s all about control, and I’ve got lots of it.”

    Click here for full transcript


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    Janet Jackson’s “Control” video: https://www.youtube.com/watch?v=LH8xbDGv7oY
    3-2-1 Storage Method: https://youtube.com/shorts/FbMdH3d00l0
    3-2-1 Storage Method: https://www.cisa.gov/sites/default/files/publications/data_backup_options.pdf
    CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK

    • 14 min
    Organizational Considerations | Episode 007

    Organizational Considerations | Episode 007

    Cyber Security Cohort : Episode 007

    Organizational Considerations

    In today's episode Heather Holliday discusses the critical role that C-suite leaders play in cyber security. Heather will also take a deep dive into the importance of organizational design in creating a cyber safe culture equipped to tackle tough cyber security issues and concerns.



    Click here to download the full transcript



    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.


    Tech Target: https://www.techtarget.com/searchcio/definition/C-level
    Deloitte: https://www2.deloitte.com/content/dam/insights/us/articles/ciso-next-generation-strategic-security-organization/DR19_TheNewCISO.pdf

    • 12 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Darknet Diaries
Jack Rhysider
Hard Fork
The New York Times
Dwarkesh Podcast
Dwarkesh Patel