Artwork

Content provided by David Spark, Steve Zalewski, and Geoff Belknap. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark, Steve Zalewski, and Geoff Belknap or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Managing Obsolete (Yet Business Critical) Systems

28:23
 
Share
 

Manage episode 398858187 series 2478315
Content provided by David Spark, Steve Zalewski, and Geoff Belknap. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark, Steve Zalewski, and Geoff Belknap or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-managing-obsolete-yet-business-critical-systems/)

Obsolete systems that are critical to your business. They're abandoned, unpatchable and unmanaged. We've all got them, and often upgrading is not an option. What do you do?

Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode is Mitch Parker (@mitchparkerCISO), Exec. Director, InfoSec and Compliance, Indiana University Health.

Thanks to this week’s podcast sponsor, SecurityBridge

Advanced cybersecurity for SAP, from codebase to production. Powered by anomaly detection, detect threats in real-time so that they can be remediated before any harm is done. Eliminate false-positives and focus on actionable intelligence. Ensure compliance with direction to actual vulnerabilities, with amazing intelligence dashboards guiding remediation.

On this episode of Defense in Depth, you'll learn:

  • This issue appears to affect every security and IT person. At one time they've all had to deal with it.
  • Obsolete technology should not be treated like any new technology. It needs to be isolated.
  • Lots of great advice from the community regarding containing the outdated technology through firewalls, air gapping, segmenting, virtual machines, and a jump box.
  • Constantly measure the risk of not just intrusion of the outdated technology, but the cost of keeping the thing running as you can't rely on outside support or updates.
  • As you're reporting the risk, constantly push for solutions to end reliance on this outdated technology.
  • The obsolete technology is often an expensive and critical piece of hardware that's difficult if not impossible to replace.
  • The UK National Cyber Security Center has some great guidance on what to do with obsolete platforms.

  continue reading

279 episodes

Artwork
iconShare
 
Manage episode 398858187 series 2478315
Content provided by David Spark, Steve Zalewski, and Geoff Belknap. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark, Steve Zalewski, and Geoff Belknap or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

All links and images from this episode can be found at CISO Series (https://cisoseries.com/defense-in-depth-managing-obsolete-yet-business-critical-systems/)

Obsolete systems that are critical to your business. They're abandoned, unpatchable and unmanaged. We've all got them, and often upgrading is not an option. What do you do?

Check out this post and discussion for the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the creator of CISO Series and Allan Alford (@AllanAlfordinTX). Our guest for this episode is Mitch Parker (@mitchparkerCISO), Exec. Director, InfoSec and Compliance, Indiana University Health.

Thanks to this week’s podcast sponsor, SecurityBridge

Advanced cybersecurity for SAP, from codebase to production. Powered by anomaly detection, detect threats in real-time so that they can be remediated before any harm is done. Eliminate false-positives and focus on actionable intelligence. Ensure compliance with direction to actual vulnerabilities, with amazing intelligence dashboards guiding remediation.

On this episode of Defense in Depth, you'll learn:

  • This issue appears to affect every security and IT person. At one time they've all had to deal with it.
  • Obsolete technology should not be treated like any new technology. It needs to be isolated.
  • Lots of great advice from the community regarding containing the outdated technology through firewalls, air gapping, segmenting, virtual machines, and a jump box.
  • Constantly measure the risk of not just intrusion of the outdated technology, but the cost of keeping the thing running as you can't rely on outside support or updates.
  • As you're reporting the risk, constantly push for solutions to end reliance on this outdated technology.
  • The obsolete technology is often an expensive and critical piece of hardware that's difficult if not impossible to replace.
  • The UK National Cyber Security Center has some great guidance on what to do with obsolete platforms.

  continue reading

279 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide