Player FM 앱으로 오프라인으로 전환하세요!
Securing the Super Bowl and Other Huge Events
Manage episode 289461304 series 2478315
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-securing-the-super-bowl-and-other-huge-events/
How do cybersecurity professionals secure a huge event like the Olympics, the Superbowl, or a city's New Year's Eve party? What are the unique considerations that come into play?
Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, guest co-host Geoff Belknap (@geoffbelknap), CISO, LinkedIn, and our guest Tomás Maldonado (@tomas_mald), CISO, NFL
Thanks to our podcast sponsor, Lepide
Ninety eight percent of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Lepide’s unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast.
In this episode
- Protecting large events starts long before, like years before
- How threat actors targeting events differ from than those targeting companies
- It's not just the target - there's also public safety
- When it goes live, it GOES LIVE
259 에피소드
Manage episode 289461304 series 2478315
All links and images for this episode can be found on CISO Series
https://cisoseries.com/defense-in-depth-securing-the-super-bowl-and-other-huge-events/
How do cybersecurity professionals secure a huge event like the Olympics, the Superbowl, or a city's New Year's Eve party? What are the unique considerations that come into play?
Check out this post for the basis for our conversation on this week’s episode which features me, David Spark (@dspark), producer of CISO Series, guest co-host Geoff Belknap (@geoffbelknap), CISO, LinkedIn, and our guest Tomás Maldonado (@tomas_mald), CISO, NFL
Thanks to our podcast sponsor, Lepide
Ninety eight percent of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Lepide’s unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast.
In this episode
- Protecting large events starts long before, like years before
- How threat actors targeting events differ from than those targeting companies
- It's not just the target - there's also public safety
- When it goes live, it GOES LIVE
259 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.