内容由XenTegra / Andy Whiteside / Bill Sutton提供。所有播客内容(包括剧集、图形和播客描述)均由 XenTegra / Andy Whiteside / Bill Sutton 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

People love us!

User reviews

“最爱离线功能”
“这是管理播客订阅的"最好"方法。这也是发现新播客的好方法。”

The Citrix Session: Help mitigate your organization’s cybersecurity risks - Part 2

49:32
 
分享
 

Manage episode 321964988 series 2797405
内容由XenTegra / Andy Whiteside / Bill Sutton提供。所有播客内容(包括剧集、图形和播客描述)均由 XenTegra / Andy Whiteside / Bill Sutton 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s is about risk management — layering on controls to reduce risk to an acceptable level.

Cybersecurity risk management requires a multi-faceted approach, and organizations should evaluate risk and choose the appropriate option(s) to address it. After a thorough risk assessment, the organization can choose to:

  • Accept the risk: Organizations can acknowledge the risk and choose not to resolve, transfer, or mitigate it if it is not feasible.
  • Avoid or eliminate the risk: This option may involve elimination of the risky service or feature to remove the risk from the equation.
  • Mitigate the risk: This option is where technical and administrative controls are implemented to reduce the likelihood or impact of risk.
  • Transfer the risk: This option assigns or moves the risk to a third-party via cyber liability insurance.

Host: Andy Whiteside
Co-host: Bill Sutton
Co-host: Ben Rogers

  continue reading

149集单集

icon分享
 
Manage episode 321964988 series 2797405
内容由XenTegra / Andy Whiteside / Bill Sutton提供。所有播客内容(包括剧集、图形和播客描述)均由 XenTegra / Andy Whiteside / Bill Sutton 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Cybersecurity can often seem to present impossible challenges as organizations strive to repel attack attempts. But, really, cybersecurity’s is about risk management — layering on controls to reduce risk to an acceptable level.

Cybersecurity risk management requires a multi-faceted approach, and organizations should evaluate risk and choose the appropriate option(s) to address it. After a thorough risk assessment, the organization can choose to:

  • Accept the risk: Organizations can acknowledge the risk and choose not to resolve, transfer, or mitigate it if it is not feasible.
  • Avoid or eliminate the risk: This option may involve elimination of the risky service or feature to remove the risk from the equation.
  • Mitigate the risk: This option is where technical and administrative controls are implemented to reduce the likelihood or impact of risk.
  • Transfer the risk: This option assigns or moves the risk to a third-party via cyber liability insurance.

Host: Andy Whiteside
Co-host: Bill Sutton
Co-host: Ben Rogers

  continue reading

149集单集

Alle Folgen

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

Player FM -播客应用
使用Player FM应用程序离线!

快速参考指南