Zero Trust to SCADA: Navigating the InfoSec Mandate
This podcast analyzes the strategic and operational requirements necessary to implement defense-in-depth, manage continuous cyber risk quantification, and secure the supply chain across multiple environments using technologies like API authentication, identity management (IAM), and Zero Trust models
🎧 Listen to this Episode
Show Notes
This podcast explores the comprehensive responsibilities of modern InfoSec professionals, ranging from core security operations like vulnerability management across operating systems, network devices, and containers, to ensuring physical security and managing application development standards. Dive deep into emerging and complex domains such as AI Governance, securing training data for GenAI models, managing IoT device identities, and navigating the convergence of IT, OT, and IoT/IIoT systems. Learn how leading security teams establish effective governance frameworks (like NIST, ISO, or CMMC), implement robust Incident Response Playbooks, and leverage automation (SOAR) to align security strategy with continuous corporate objectives and board oversight.
www.securitycareers.help/forget-the-hoodie-4-surprising-realities-of-modern-cybersecurity
Sponsors
www.cisomarketplace.com
Enjoying CISO Insights?
Subscribe to get new episodes delivered directly to your podcast app.