One of the most salient statements Harold makes here is "Different providers take different approaches to architecture, security content, and code updates." Having a commanding understanding of the underlying issues is a key factor for the future effectiveness of CISO's. For many CISOs, the impact of the July 19, 2024, tech outage extends beyond business and operational implications. Trellix CISO Harold Rivas offers a helping hand for those aiming to reevaluate technologies, communicate effectively with leadership, and practice #ResponsibleSecurity post-outage.
Jason Coleman’s Post
More Relevant Posts
-
Insightful article from colleagues James Kaplan, Richard Isenberg, Charlie Lewis, Jan Shelly Brown (JSB), Jim B., and Raghavan Janardhanan about what CEOs should be asking their team following the Crowdstrike outage. For large organizations, re-paveable cloud-based systems, geo-resilient application architectures, and generally asking where to invest in technology updates (e.g., secure network enclaves) are some of the several actions proposed to reduce forward-looking risk. More here: https://lnkd.in/eqkURd_P
What should you be asking your team after the CrowdStrike outage?
mckinsey.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
Guidehouse Defense and Security has helped large agencies manage a shift to a Zero Trust architecture by gaining executive buy-in, understanding key technology architecture shifts, and communicating with users and multiple stakeholders across the organization. Learn more in this article.
Tearing Down Cyber Walls
guidehouse.com
To view or add a comment, sign in
-
As more organizations adopt a Zero Trust architecture, some overlook the increased prevalence of API-based access to sensitive application functionality and data. At the upcoming New York CISO Executive Summit, Steve Winterfeld, Advisory CISO at Akamai, will discuss API strategies to ensure security from the network layer to the application layer – here’s a preview. #EvantaCISO #CISO #Security
From Z to A - Extending Zero Trust to APIs
evanta.com
To view or add a comment, sign in
CEO at 🚀 VisualSitemaps
3moJason >> 🔥 <<