Pillar Two: Threat and Vulnerability Management [Six Pillars of Security]

And There You Have IT! - A podcast by Sirius

Categories:

In this episode about threat and vulnerability management, Cherie and Matt discuss How sometimes even the most dangerous cyber threats boil down to the simple principles of an old-fashioned con How the uptick in social engineering has affected threat and vulnerability management The importance of vulnerability assessments and the surprising security gaps they can reveal Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principal consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we’ll explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the series: The Six Pillars of Security: Pillar One, Data Protection. The Six Pillars of Security: Pillar One, Data Protection – The first episode in, “The Six Pillars of Security,” series. In this episode, our expert discusses why shifting to a comprehensive data-centric strategy is critical to securing a business, how human nature has affected the evolution of cyber attacks, and how employee education is essential to security success. 8 Steps to an Effective Vulnerability Assessment – Vulnerability assessments can be invaluable, but only if their results are weighed in the context of the business and existing security infrastructure. By analyzing assessment output with business risk in mind, and applying that knowledge to the development of a sound security strategy, you can make the most of your security budget and strengthen your overall security and compliance posture. Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.