Ivanti Cybersecurity And Information Technology Solutions public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Loading …
show series
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes back Robert Waters (Lead PMM, Exposure Management) for a follow-up on Verizon's 2024 Data Breach Investigations Report, discussing the two main attack vectors used in most breaches -- phishing and credential attacks -- and how your organization should go about defending itself. To vie…
  continue reading
 
Ivanti's Chris Goettl (VP of Product, Patch Management) welcomes Robert Waters (Lead PMM, Exposure Management) as they discuss the key takeaways from Verizon's latest annual Data Breach Investigations Report: persistent risk from credentials, more and more sophisticated phishing attacks, and the rising prevalence of vulnerability exploits. To view …
  continue reading
 
What does CSO stand for at your organization? Is it short for Chief Security Officer... or Chief Scapegoat Officer? In this episode, Ivanti CSO Daniel Spicer talks about how he never thought he'd be a CSO, and the unique pressures that security executives face from their own internal leadership teams and external regulations or (worse) insurance co…
  continue reading
 
Daniel Spicer is back! Following up on last episode's discussion on the security risks of overemployment, Ivanti's Chief Security Officer returns to clear up the age-old myth of security tools being abused for employee investigations. Join Daniel, Chris and Ashley as they discuss: What is (and most definitely is not) allowed in an employee investig…
  continue reading
 
Chris and Ashley use the current overemployment media trend as an example case study on evaluating security risks versus potential organizational impact. They cover: How overemployment existed before remote work Weighing the various security implications of overemployment — including shadow IT and insider threats How far an organization should go t…
  continue reading
 
Chris (finally!) adds his insights to the 2023 Press Reset cybersecurity research report, especially how its findings impact vulnerability and patch prioritization processes — do you shoot for mission critical systems, active exploits, or something else first? — and why asset visibility lies at the core of every security framework on the planet. Jo…
  continue reading
 
JR Robinson, Head of Platform at generative AI startup Writer, joins VP of Endpoint Security Product Management Chris Goettl and Ashley Stryker to discuss current generative AI use cases for security teams that go beyond just chat bots. (Please. For everyone’s sanity… go beyond chat bots.) They’ll also preview a deeper webinar discussion with Chief…
  continue reading
 
Daniel and Ashley review the latest research report from Ivanti -- Press Reset: A 2023 Cybersecurity Status Report -- including prioritizing phishing and DDoS attacks, security ROI challenges, and why organizations should never increase their cybersecurity budget by sacrificing their IT allocations. Download the full report at Ivanti.com/Cybersecur…
  continue reading
 
It's vendor risk versus reward! Chris and Amanda educate Ashley on the core considerations, processes and requirements for robust vendor risk management programs... including when to be afraid of your IoT devices, especially those pesky Roomba vacuums and oh-so-convenient self-cleaning litter boxes. Remember to address these three components, no ma…
  continue reading
 
IT Director Tony Miller goes toe-to-toe with Chief Security Officer Daniel Spicer to justify – or condemn! – IT and cybersecurity posts found on Reddit, featuring a legendary story about hackers that patched endpoints faster than the company itself. #PatchHacks Plus, Ashley frets about the impact of a new security policy on her personal devices, cr…
  continue reading
 
Daniel, Chris, Amanda and Ashley revisit the coordinated disclosure conversation from Episode 25 and apply the prisoner’s dilemma thought experiment to create a (more?) perfect vendor disclosure policy. Find shownotes for this episode at Ivanti.com/SecurityInsights-30 Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)…
  continue reading
 
Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security. Find shownotes for this episode at Ivanti.com/SecurityInsights-28 Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)…
  continue reading
 
Do you want to work in cybersecurity, but not sure how to start? Ashley and Chris talk to three current cybersecurity experts on how they entered the industry – including Ivanti deputy CSO Amanda Wittern. (Also, bonus update on how Ashley pulled off her social engineering assignment from last episode!) Find shownotes for this episode at Ivanti.com/…
  continue reading
 
In this episode, Chris tries to convince Ashley that marketers naturally make excellent hackers, based on modern phishing attacks and techniques… And Ashley confirms his guess by revealing the lengths to which marketers will go to “spoof” natural conversation and drive their target audience to take action. Referenced materials: The DarkNet Diaries …
  continue reading
 
Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices fo…
  continue reading
 
We’re back and ready to roll with this week’s episode where our host Chris Goettl interviews Chad Holmes and Daniel Brody from Cynario. Today they discuss healthcare and security through EMT devices and much more. Watch to learn more about how cyber security is assisting healthcare innovation! For more information, check out Cynario’s website www.c…
  continue reading
 
In our first episode of 2022, Chris Goettl and Daniel Spicer unpack one of last year's biggest vulnerabilities: Apache Log4j. The conversation includes: What is Log4j? The difficulty of detecting Log4j and developing guidance for organizations Why security teams and IT teams are stuck in a Catch 22 of patching The latest guidance you can use for yo…
  continue reading
 
Host Adrian Vernon sits down with Daniel Spicer to bust some cybersecurity myths! The list of myths include: Passwords should be changed every 30 days You shouldn't write down your password Multi-factor Authentication is not secure You don't need antivirus VPNs keep my devices safe and secure IT is responsible for all of the cybersecurity at an org…
  continue reading
 
Host Adrian Vernon is joined by Ivanti's Senior Vice President of Security Products Sri Mukkamala, CEO of Cyber Security Works (CSW) Aaron Sandeen, and Senior Intelligence Analyst at Cyware Neil Dennis. They break down the recent collaborative Ransomware Index Spotlight Report to make sure you are up to date on today's cybersecurity landscape. The …
  continue reading
 
Adrian gets some insight from Chris and Daniel on some recent supply chain attack events. The conversation includes: The unique agenda of nation state attacks The numbers game associated with cloud services attacks There are way more attacks than what get covered in the news What makes an attack a "Supply Chain Attack" Microsoft's recommendations f…
  continue reading
 
Host Adrian Vernon is joined by the usual cast, Daniel Spicer and Chris Goettl, to talk about Cyber Security Awareness Month and some of the best security practices from experts that have seen it all! The conversation includes: When to rotate your credit cards and more! Why going paperless when you can is so important, and if you can't, get a shred…
  continue reading
 
Host Adrian Vernon and VP of Product Management Chris Goettl break down some of the biggest headlines in the world of cybersecurity right now! The conversation includes: The recent critical security flaw of Apple devices How threat actors use remote code execution to mine cryptocurrency Lessons learned from the SolarWinds breach Actions to take as …
  continue reading
 
Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer talk about the hottest buzzword in security right now: Zero Trust! The conversation includes: What Zero Trust is and what benefits it brings to security An overview of the federal government adopting the Zero Trust strategy The Zero Trust maturity mod…
  continue reading
 
Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer give you the rundown on everything Cyber Insurance! The conversation includes: What Cyber Insurance covers and why it's important What you need to know to be prepared for your conversation with a broker How to save MONEY on your plan The Cyber Insuran…
  continue reading
 
Host Adrian Vernon, VP of Product Managment Chris Goettl, and Chief Security Officer Daniel Spicer talk about the future of artificial intelligence and machine learning in cyber security including: The beginning of AI How AI and ML benefit organizations How AI and bots are used to attack organizations What kinds of AI will we need to stand up to th…
  continue reading
 
Host Adrian Vernon, Sr. Director of Product Management Chris Goettl, and former CEO of RiskSense Sri Mukkamala talk about the recent news of the Ivanti and RiskSense team up and what it means for patch management moving forward! The conversation includes: The history of RiskSense The importance of "Proactive Response" Some insights on the current r…
  continue reading
 
Host Adrian Vernon, Sr. Director of Product Management Chris Goettl, and VP of Security Daniel Spicer explore recent challenges concerning the rise in supply chain attacks. The conversation includes: How a supply chain can be attacked and why organizations should care The reality of building systems using multiple off the shelf products and the imp…
  continue reading
 
We are taking a break this week for Ivanti's Summer of Security, but don't worry we'll be back next week! Until then, if you missed it, check out one of our favorite episodes: The Balancing Act of Staying Secure While Working From Home. Host Adrian Vernon, Ivanti's Chef Security Officer Phil Richards, and Sr. Director of Product Management Chris Go…
  continue reading
 
Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms. Today's talk covers: Th…
  continue reading
 
Chef Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl talk about managing employees and protecting users in a new post-COVID era, in which 1,600+ survey respondents confirm that no workplace will ever return to solely on-premises employment. Find out who on the podcast wears pants to video calls (and who …
  continue reading
 
Head of Endpoint Security Product Management Chris Goettl continues his conversation with "the world's most connect human" and author of Don't Unplug: How Technology Saved My Life and Can Save Yours Too, Chris Dancy! This second half of the conversation pivots from personal user data considerations to security experiences and data collection in the…
  continue reading
 
Head of Endpoint Security Product Management Chris Goettl talks with "the world's most connected human" and author of Don't Unplug: How Technology Saved My Life and Can Save Yours Too, Chris Dancy! In this first half of the conversation, they cover: The risks against the rewards of modern information technology and data collection -- and how tech a…
  continue reading
 
Consider the humble QR code: an older marketing device that exploded in popularity when the world needed touchless solutions for information and payments. In fact, according to Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl, the latest cybersecurity research suggests that hackers aren't far behind…
  continue reading
 
VP of Security Engineering Bart Westerink and Head of Endpoint Security Product Management Chris Goettl discuss DevOps and DevSecOps -- and every "ops" version in between. This conversation covers: What even is DevOps? And, what's the difference between DevOps and DevSecOps? Best practices on adopting and maturing your DevOps process What happens w…
  continue reading
 
As COVID-19 weakens, Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl chat cybersecurity strategies in the brave new post-COVID working world. Shaped by the "new normal" of remote work and fueled by robust, hybrid security for both on-premises and cloud-based user experiences, their discussion revie…
  continue reading
 
New platform Clubhouse (and other social media apps like it) present uniquely appealing privacy risks for cybersecurity teams trying to secure their end users -- especially in light of new legislation from the United States and the European Union. Chief Security Officer Phil Richards and Head of Endpoint Security Product Management Chris Goettl dis…
  continue reading
 
This latest ransomware pandemic is infecting end users and security teams alike, exploiting old vulnerabilities and forcing new risk management strategies. Chief Security Officer Phil Richards reviews how organizations can avoid and remediate ransomware cyber attacks, including: Training employees to not open obvious phishing emails and links that …
  continue reading
 
How did hundreds of organizations and governments fall to the SolarWinds-FireEye hack? And, how can security teams better protect their end users and data from similar cyber attacks in the future? Chief Security Officer Phil Richards and head of Endpoint Security Product Management Chris Goettl join host Adrian Vernon to break down this classic glo…
  continue reading
 
Loading …

Quick Reference Guide