Cyber Security Cohort Heather Holliday
-
- Technology
A cybersecurity learning journey podcast hosted by Heather Holliday.
-
Access Management Solutions | S02.E04
Cyber Security Cohort : S02.E04
Access Management Solutions
In today’s episode, cybersecurity consultant Heather Holliday explores several common Access Management Solutions. Heather will compare and contrast options such as Federated Identity Management, Same Sign-On, Multifactor Authentication and Single Sign-On, then she'll take a look at what makes each option unique so you can better understand why there is more than one option and how to choose the best option for your situation.
Click for full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
What is Single Sign-On Authentication? And...How Does it Work? (SSO)
Tech Target:What is single sign-on (SSO)? https://www.techtarget.com/searchsecurity/definition/single-sign-on
AWS: What is SSO (Single-Sign-On)? https://aws.amazon.com/what-is/sso/
Onelogin: What is Federated ID?: https://www.onelogin.com/learn/federated-identity
Onelogin: SAML Explained in Plain English: https://www.onelogin.com/learn/saml
What is Kerberos?: https://www.simplilearn.com/what-is-kerberos-article
Microsoft: What is OpenID Connect?: https://www.microsoft.com/en-us/security/business/security-101/what-is-openid-connect-oidc -
Authentication and Access Management Policies | S02.E03
Cyber Security Cohort : S02.E03
Authentication and Access Management Policies
In today’s episode Heather Holliday explores the topic of authentication and access management policies. Heather shares details about the overarching considerations for good authentication and access management practices in the context of cyber security.
Click for full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
NIST Access Control Policy: https://csrc.nist.gov/glossary/term/access_control_policy
NIST Password Policy publication: https://csrc.nist.gov/pubs/ir/7970/final -
Passwords, Passphrases and PINs | S02.E02
Cyber Security Cohort : S02.E02
Passwords, Passphrases and PINs
In this episode Heather dives into the world of PINs, passwords and passphrases. This is one of the hottest topics in cyber security and one of the most important! After all, you use PINs, passwords and passphrases to secure some of your most valuable personal information.
Click here for full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
Are Password Managers Safe? https://cybernews.com/best-password-managers/are-password-managers-safe/
John the Ripper Lab: https://greatadministrator.com/john-the-ripper-lab/ -
Auth & Auth | S02.E01
Cyber Security Cohort : S02.E01
Auth & Auth
In this first episode of a brand new season of the Cyber Security Cohort, Heather will pivot from her previous discussions on Governance, Risk and Compliance in season 1 to begin a new chapter on another of her favorite topics - Authentication and Authorization.
Click here for full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
Why Your Organization Needs Rule-Based Access Control: https://www.networkcomputing.com/network-security/why-your-organization-needs-rule-based-access-control
Techtopia: Mandatory, Discretionary, Role and Rule Based Access Control: https://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Based_Access_Control -
Are You the One in Control? | Episode 008
Cyber Security Cohort : Episode 008
Are You the One in Control?
In today’s episode Heather Holliday the importance of Controls in cyber security and how Controls are used to ensure safe cyber practices. As Janet Jackson said, “It’s all about control, and I’ve got lots of it.”
Click here for full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
Janet Jackson’s “Control” video: https://www.youtube.com/watch?v=LH8xbDGv7oY
3-2-1 Storage Method: https://youtube.com/shorts/FbMdH3d00l0
3-2-1 Storage Method: https://www.cisa.gov/sites/default/files/publications/data_backup_options.pdf
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK -
Organizational Considerations | Episode 007
Cyber Security Cohort : Episode 007
Organizational Considerations
In today's episode Heather Holliday discusses the critical role that C-suite leaders play in cyber security. Heather will also take a deep dive into the importance of organizational design in creating a cyber safe culture equipped to tackle tough cyber security issues and concerns.
Click here to download the full transcript
Episode Notes and References
Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.
Tech Target: https://www.techtarget.com/searchcio/definition/C-level
Deloitte: https://www2.deloitte.com/content/dam/insights/us/articles/ciso-next-generation-strategic-security-organization/DR19_TheNewCISO.pdf