Artwork

Contenido proporcionado por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

CCT 114: Security Assessments and Audits - Unveiling Bulletproof Strategies for Cyber Defense (D6)

35:07
 
Compartir
 

Manage episode 400557256 series 3464644
Contenido proporcionado por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Send us a Text Message.

Are your organization's cybersecurity measures battle-tested against real threats? Let's unravel the complex tapestry of security assessments and audits together. As your host, Sean Gerber, I bring my red team experience to the forefront, dissecting the various layers of security evaluations that go far beyond simple box-ticking exercises. In this week's CISSP Cyber Training Podcast, we focus on the importance of rigorous, unbiased evaluations, not only to adhere to industry standards but also to solidify your company's defenses and uphold the trust of your clientele. Discover how internal, external, and third-party assessments each play a pivotal role in an organization's security strategy.
Ever wondered how an external perspective can transform your organization's security posture? I'll navigate you through designing a bulletproof assessment strategy, emphasizing the necessity of a methodical approach to spotlight and prioritize vulnerabilities. The episode peels back the curtain on various techniques and methodologies—from vulnerability scanning to security auditing—each vital in safeguarding your company's assets. By meticulously planning and documenting the assessment process, we ensure that every security measure aligns seamlessly with the overarching goals of your organization, and I'll show you precisely how to achieve that synergy.
Closing out, we tackle the crucial distinctions between security assessments and audits, and why audits are not simply reports gathering dust but are influential documents that command the attention of senior leadership. This episode not only primes you for the CISSP exam but also equips you with actionable insights necessary for making informed decisions post-audit. As a guiding light for your cybersecurity journey, I also highlight the treasure trove of resources available at CISSPcybertraining.com to bolster your exam preparation and practical knowledge. Stay sharp and join me for a deep dive into the world of security assessments and auditing, where every detail matters.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capíttulos

1. Audits and Security Assessments (00:00:00)

2. Understanding External Security Assessments and Testing (00:08:29)

3. Security Assessment Testing and Quality Assurance (00:19:55)

4. Overview of Audits and Assessments (00:27:26)

5. CISSP Cyber Training for Exam Success (00:33:47)

149 episodios

Artwork
iconCompartir
 
Manage episode 400557256 series 3464644
Contenido proporcionado por Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

Send us a Text Message.

Are your organization's cybersecurity measures battle-tested against real threats? Let's unravel the complex tapestry of security assessments and audits together. As your host, Sean Gerber, I bring my red team experience to the forefront, dissecting the various layers of security evaluations that go far beyond simple box-ticking exercises. In this week's CISSP Cyber Training Podcast, we focus on the importance of rigorous, unbiased evaluations, not only to adhere to industry standards but also to solidify your company's defenses and uphold the trust of your clientele. Discover how internal, external, and third-party assessments each play a pivotal role in an organization's security strategy.
Ever wondered how an external perspective can transform your organization's security posture? I'll navigate you through designing a bulletproof assessment strategy, emphasizing the necessity of a methodical approach to spotlight and prioritize vulnerabilities. The episode peels back the curtain on various techniques and methodologies—from vulnerability scanning to security auditing—each vital in safeguarding your company's assets. By meticulously planning and documenting the assessment process, we ensure that every security measure aligns seamlessly with the overarching goals of your organization, and I'll show you precisely how to achieve that synergy.
Closing out, we tackle the crucial distinctions between security assessments and audits, and why audits are not simply reports gathering dust but are influential documents that command the attention of senior leadership. This episode not only primes you for the CISSP exam but also equips you with actionable insights necessary for making informed decisions post-audit. As a guiding light for your cybersecurity journey, I also highlight the treasure trove of resources available at CISSPcybertraining.com to bolster your exam preparation and practical knowledge. Stay sharp and join me for a deep dive into the world of security assessments and auditing, where every detail matters.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Capíttulos

1. Audits and Security Assessments (00:00:00)

2. Understanding External Security Assessments and Testing (00:08:29)

3. Security Assessment Testing and Quality Assurance (00:19:55)

4. Overview of Audits and Assessments (00:27:26)

5. CISSP Cyber Training for Exam Success (00:33:47)

149 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida