Artwork

Content provided by Joy Alatta. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joy Alatta or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Penetration Testing as a Cybersecurity Survival Technique

12:58
 
Share
 

Manage episode 292613664 series 2926569
Content provided by Joy Alatta. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joy Alatta or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Many organizations spend their IT budgets on the wrong technology infrastructure. Would you consider knowing where to spend your IT budget? Even when an organization makes the right expenditure on the right IT infrastructure, would it not be competitive to protect those infrastructures? What would your customers do if they have the slightest reason to believe that their personal information is not secure with your enterprise systems? I do not know of any organization that looks good immediately after a cyberattack.

I mentioned in the last episode on security challenges in eLearning systems that some organizations have a mandatory requirement to maintain a penetration testing procedure. The fact that your organization did not have a mandatory compliance requirement to conduct penetration testing does not mean that it is safe for your organization not to use penetration testing to verify its security defense. Penetration testing will enable an organization to learn and understand any vulnerability or potential vulnerability in their computing systems...More

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20 episodes

Artwork
iconShare
 
Manage episode 292613664 series 2926569
Content provided by Joy Alatta. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joy Alatta or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Many organizations spend their IT budgets on the wrong technology infrastructure. Would you consider knowing where to spend your IT budget? Even when an organization makes the right expenditure on the right IT infrastructure, would it not be competitive to protect those infrastructures? What would your customers do if they have the slightest reason to believe that their personal information is not secure with your enterprise systems? I do not know of any organization that looks good immediately after a cyberattack.

I mentioned in the last episode on security challenges in eLearning systems that some organizations have a mandatory requirement to maintain a penetration testing procedure. The fact that your organization did not have a mandatory compliance requirement to conduct penetration testing does not mean that it is safe for your organization not to use penetration testing to verify its security defense. Penetration testing will enable an organization to learn and understand any vulnerability or potential vulnerability in their computing systems...More

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide