98 | The Importance of Digital Asset Inventories in Incident Response

98 | The Importance of Digital Asset Inventories in Incident Response

This episode of the ADCG Privacy and Cybersecurity Podcast features Ken Westin, Field CISO for Panther Labs. Ken has been in the cybersecurity field for over 15 years, working with companies to improve their security posture through threat hunting, insider threat programs, and vulnerability research. We discuss how the lack of good application and data inventories impact incident response. When data is spread across data centers, clouds, and SaaS providers, it becomes difficult to track and trace an incident and understand its impact, but it becomes especially hard if the data involves confidential or proprietary business data that is not tracked by privacy officers or if it includes sensitive data that may involve regulators. The recent MOVEit breach, which involved software used to transfer sensitive data between servers, systems, and applications, provided rich lessons in the need for data asset inventories and SIEMs that can correlate data across providers and platforms.

Episoder(107)

Cybersecurity: The Threat Environment & What to Do (with Tom Kellermann)

Cybersecurity: The Threat Environment & What to Do (with Tom Kellermann)

Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

6 Okt 202121min

Hearing the Views of the CISO Community (with Bill Sieglein)

Hearing the Views of the CISO Community (with Bill Sieglein)

Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

29 Sep 202135min

Cybersecurity Aspects of Election Security (with Harri Hursti)

Cybersecurity Aspects of Election Security (with Harri Hursti)

Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

22 Sep 202140min

New Wave of SEC Enforcement on Cybersecurity (with John Reed Stark)

New Wave of SEC Enforcement on Cybersecurity (with John Reed Stark)

Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

15 Sep 202134min

Data Protection and Remote Online Notarization (with Gary Weingarden)

Data Protection and Remote Online Notarization (with Gary Weingarden)

Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

9 Sep 202127min

Exploring Cyberattack Policy and Legal Issues (with Gary Corn)

Exploring Cyberattack Policy and Legal Issues (with Gary Corn)

*****Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

1 Sep 202141min

44 | Exploring Compliance with Evolving Privacy Requirements (with Sherry-Maria Safchuk)

44 | Exploring Compliance with Evolving Privacy Requirements (with Sherry-Maria Safchuk)

*****Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

26 Aug 202132min

New Imperatives for Cyber Governance

New Imperatives for Cyber Governance

*****Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

18 Aug 202127min

Populært innen Samfunn

giver-og-gjengen-vg
rss-spartsklubben
aftenpodden
konspirasjonspodden
rss-nesten-hele-uka-med-lepperod
alt-fortalt
aftenpodden-usa
popradet
grenselos
wolfgang-wee-uncut
synnve-og-vanessa
sektpodden-2
fladseth
198-land-med-einar-trnquist
den-politiske-situasjonen
rss-fetisha-anine
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
kaffeskal-med-hollund-krogh
min-barneoppdragelse
fryktlos