Our CISO and current Chair of the IJIS Cybersecurity Working Group, Lawrence F. Zorio III, was joined by fellow Working Group member, Jeramy Cooper-Leavitt on the IJIS Institute Sounds of Safety Podcast to unpack the NIST “Respond” core function. In this episode, which is part of the broader “Navigating Cybersecurity: From Awareness to Action” Series, Larry and Jeramy breakdown the fifth core NIST function: Respond. They discuss how this function enables organizations to maintain the continuity and integrity of the organization's operations and data when they are the victim of a cyber-attack. This is a must listen! Stream the latest episode now: https://hubs.la/Q02--Lms0 #Cybersecurity #NIST #IJIS #Respond #CyberAwareness #PublicSafety #SecurityFirst
Mark43’s Post
More Relevant Posts
-
🚨 You've Been Breached...Now What? 🚨 In our latest IJIS Institute Podcast, we dive deep into how to effectively respond to a cyber incident. Using the NIST Cybersecurity Framework (CSF), we cover essential controls to have in place for taking action during a cyber event. Stay tuned until the end, where Jeramy Cooper-Leavitt and I share practical tips you can implement today! Don't miss out on this crucial episode! #CyberSecurity #NISTCSF #CyberIncidentResponse #IJISPodcast #PracticalTips
Our CISO and current Chair of the IJIS Cybersecurity Working Group, Lawrence F. Zorio III, was joined by fellow Working Group member, Jeramy Cooper-Leavitt on the IJIS Institute Sounds of Safety Podcast to unpack the NIST “Respond” core function. In this episode, which is part of the broader “Navigating Cybersecurity: From Awareness to Action” Series, Larry and Jeramy breakdown the fifth core NIST function: Respond. They discuss how this function enables organizations to maintain the continuity and integrity of the organization's operations and data when they are the victim of a cyber-attack. This is a must listen! Stream the latest episode now: https://hubs.la/Q02--Lms0 #Cybersecurity #NIST #IJIS #Respond #CyberAwareness #PublicSafety #SecurityFirst
To view or add a comment, sign in
-
-
In this episode of the The Smart IT Podcast, I welcomed Derek Krein, CASP, GSTRT Krein, to the show. We discussed cybersecurity and the challenges organizations face in protecting themselves from threats. The conversation explored the importance of validating the effectiveness of cybersecurity investments. The focus shifted to evaluating security controls, with an emphasis on technical assessments using various tools to gain an attacker's perspective. We talked about how to help answer our organization's question of "are we we getting a good return on our security investments?" The discussion touched on the significance of understanding threat actor tactics and behaviors, particularly interactive, hands-on attacks and the use of information stealers and administrative utilities for lateral movement and data exfiltration. The conversation concluded with a focus on proactively staying informed about threat trends and behavioral patterns to prioritize cybersecurity efforts and effectively defend against evolving cyber threats. Link to this episode: https://lnkd.in/gxhZKGEJ #cybersecurity #ciso #riskmanagement #threatintelligence #vulnerabilitymanagement #bas #smartit Brilliant Beam Media Syya Yasotornrat
To view or add a comment, sign in
-
In the latest episode of the Common Factor Series, Melanie E., CIO at Ventia, delves into the essential task of prioritising key threats and synchronising them with executive and board-level strategies. Melanie highlights the pivotal role of people as the primary defense in cybersecurity, asserting that the human element, not just technology, is at the forefront of safeguarding your business. Watch the full episode here: https://lnkd.in/gisajEVb #CyberSecurity #Factor #Leadership #ITStrategy #HumanElement #CIOInsights
To view or add a comment, sign in
-
As cyber threats increasingly target essential services, securing the UK’s critical national infrastructure (CNI) is more important than ever. In this Cyber Insiders episode, we speak with Liz Banbury, CISSP, CISO at Thames Water, about the high stakes of protecting water services for over 15 million people. Liz shares: 🔻 Effective strategies for stakeholder management 🔻 Navigating the complexities of a monopoly-regulated environment 🔻 Building a resilient cybersecurity culture With a background in financial services, Liz brings unique insights to CNI security. Don’t miss her expert perspective on tackling the ever-evolving risks facing CNI. 🎧 Listen now to gain valuable insights 👉 https://ow.ly/IC8k50U28kl #cybersecurity #secops #infosec #weareadarma #podcast
To view or add a comment, sign in
-
-
#WilliamsAdley proudly releases Ep. 6 of CyberStorm! In this episode, we are joined by Jennifer Franks, Director at the Center for Enhanced Cybersecurity within the U.S. Government Accountability Office, to discuss key trends in the industry, recent cyber events, and how to run an effective cybersecurity team. #Cybersecurity, #InfoSec, #CybersecurityAwareness, #CyberDefense, #CyberThreat, #ThreatIntelligence, #WomenInCybersecurity, #CybersecurityCareer, #Governance, #Podcast
To view or add a comment, sign in
-
In a world where breaches are becoming increasingly common, the trust and security of your members depend on proactive measures. Read Boardroom Magazine Chief Editor Remi Deve's insightful article on why cybersecurity should be at the top of every association's agenda. Protect your data, your reputation, and your members. https://lnkd.in/dbTf8Ste #DAC #DubaiAssociationCentre #CyberSecurity #AssociationManagement #Leadership #DataProtection
To view or add a comment, sign in
-
-
Our CISO and current Chair of the IJIS Cybersecurity Working Group, Lawrence F. Zorio III, was joined by fellow Working Group member, Jeramy Cooper-Leavitt on the IJIS Institute Sounds of Safety Podcast to unpack the NIST “Detect” core function. In this episode, which is part of the broader “Navigating Cybersecurity: From Awareness to Action” Series, Larry and Jeramy breakdown the Detect function, while providing practical controls that can be put in place to elevate cyber resilience. This is a must listen! Stream the episode now: https://hubs.la/Q02YV4t50 #Cybersecurity #NIST #IJIS #Detect #Podcast #CyberAwareness #PublicSafety #SecurityFirst
To view or add a comment, sign in
-
-
🎙️ Are you ready to navigate the complexities of cybersecurity compliance? In our latest episode of DIB Innovators, we sit down with Matthew Titcombe, CEO and Sr. Information Security Consultant at Peak InfoSec, to discuss the critical steps companies must take to prepare for certification. Matt shares his insights on the importance of conducting a thorough gap assessment as the first step in the journey. He also emphasizes that understanding your current status is crucial for building a tailored plan that ensures success. Tune in to learn how to effectively manage the certification process and transform your organizational culture for better security practices! Full episode: https://lnkd.in/dmMfq-xw 🎧 Listen on Apple: https://lnkd.in/d7_sPgkU 🎵 Tune in on Spotify: https://lnkd.in/dAQYRVby 📺 Watch on YouTube: https://lnkd.in/d5KPi6VP ✍️Read our Blog: https://lnkd.in/dmMfq-xw #DIBInnovators #defenseindustrialbase #SMBsintheDIB #cybersecurity #nationaldefense #defensetech
To view or add a comment, sign in
-
Ready to transform your approach to cybersecurity? In this eye-opening episode of Life of a CISO, Dr. Eric Cole tackles the dangerous misconception that "no news is good news" when it comes to your security measures. He reveals how many organizations are lulled into a false sense of security simply because they aren't detecting visible attacks, missing the silent threats lurking beneath the surface. Dr. Cole challenges us to rethink how we measure success in cybersecurity, urging a shift toward real accountability and independent oversight. Tune in to discover how to protect your organization from the risks that go unnoticed—and to lead with the clarity and confidence that true security demands. Catch this essential episode now and take the first step toward a more secure future. LINK: https://buff.ly/3AFo1r4 #Cybersecurity #Leadership #LifeOfACISO #EricCole #CyberResilience
To view or add a comment, sign in
-
-
Explore Matt Riley's approach to cybersecurity, blending risk storytelling with strategic decisions to tackle the challenge of supply chain threats. Discover insights on protecting your business effectively. #cybersecurity #security #news https://lnkd.in/ejQphiQ6
To view or add a comment, sign in