Episode 37 - Manage effective Container/ K8 Security Assessments
Future of Cyber Security
by Rasool Irfan
1y ago
Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). Digital business require lean team with talented expertise to conduct assessment services.  --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 36 - Vulnerability Management Maturity Assessment Program
Future of Cyber Security
by Rasool Irfan
1y ago
Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external professionals to conduct assessments based on defined framework across building blocks and act to mature your vulnerability management program. Listen to this podcast for more details --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 35 - Threat Hunting Capability Development Framework
Future of Cyber Security
by Rasool Irfan
1y ago
With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 34 - Cyber security table top exercise (TTX)
Future of Cyber Security
by Rasool Irfan
1y ago
Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success.  --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 33 - Microsoft Endpoint DLP use cases
Future of Cyber Security
by Rasool Irfan
1y ago
Microsoft Endpoint DLP helps organizations to adopt data protection strategies with most common use cases such as protecting sensitive data based on regulatory compliance, prevent unintentional or accidental exposure of critical data and restricting unwanted activities on windows devices.   --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 32 - Azure Information Protection - Getting Started and Best Practices
Future of Cyber Security
by Rasool Irfan
1y ago
Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions. Microsoft Azure Information Protection has been widely purchased by many customers, but struggling to find ways to get started and require assistance in adopting best practices. Let's explore it in this podcast. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 31 - Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk
Future of Cyber Security
by Rasool Irfan
1y ago
Cloud business leaders prefers multi cloud deployment strategies either within the region or across regions to have cost effective solution. IT security managers require security event management solutions prefers to have deployed on the cloud environment or either prefer SaaS offerings IBM QRadar and Splunk are the leading vendors in the market today offers wide range of SIEM use-cases. It require design and cost considerations to make it effective and fit for business purpose.  --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 30 - Microsoft E5 can replace 16 Security vendors
Future of Cyber Security
by Rasool Irfan
1y ago
Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendors. However, if customer’s have unique requirements that are achievable only with marketplace security products should continue to leverage other security solutions. --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 29 - Simplify network security with SASE
Future of Cyber Security
by Rasool Irfan
1y ago
SASE (Security access service edge) concept is to have all the functional components of network and security required for enterprise available on cloud based services that are globally accessible for the digital business --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website
Episode 28 - People is the most critical vulnerability in any organization
Future of Cyber Security
by Rasool Irfan
1y ago
Every organization will have opportunity to learn from their security incidents. While performing root cause analysis, often organization fail to analyze deeper to figure-out the human element associated with it.  --- Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message ..read more
Visit website

Follow Future of Cyber Security on FeedSpot

Continue with Google
Continue with Apple
OR