Artwork

Innhold levert av Reimagining Cyber. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Reimagining Cyber eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

Data Security Unleashed - Ep 75

19:26
 
Del
 

Manage episode 389177714 series 3361845
Innhold levert av Reimagining Cyber. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Reimagining Cyber eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Welcome to another episode of Reimagining Cyber with Rob and Stan. In this episode, we dive deep into the crucial topic of data security. Stan shares insights from a recent cybersecurity event in Texas, emphasizing the growing threat of ransomware and the need for a dynamic approach to protect sensitive data.

Key Points:

1. Ransomware Challenges: Stan highlights the evolving landscape of ransomware attacks, where bad actors not only encrypt data but also extract and blackmail organizations. The importance of a robust backup strategy, including tiered storage with offline or air-gapped options, is emphasized.

2. Classification and Categorization of Data: Rob and Stan discuss the significance of understanding the types of sensitive data within an organization. They draw parallels to the Defense Department's classification system and stress the need for businesses to categorize their data to implement effective security measures.

3. SEC Cyber Ruling: The upcoming SEC ruling becomes a focal point, driving organizations to reassess their data security strategies. Rob explains how privacy regulations and regulatory actions, like the SEC ruling, act as catalysts for organizations to enhance their data security.

4. Discovering Hidden Risks: The hosts underscore the importance of comprehensive data discovery, revealing hidden risks and outdated systems. Stan likens undiscovered data to "toxic data" and emphasizes the need for continuous clean-up efforts to reduce both risk and costs.

5. AI and Bias in Data: The conversation shifts to the integration of AI in cybersecurity and the challenges of preventing bias in AI models. Stan discusses the importance of cleansing sensitive data before ingestion into AI models and the broader issue of unintentional biases in AI.

Conclusion: Rob and Stan wrap up the episode by reflecting on the evolution of cybersecurity terminology, from computer security to information assurance and now cyber security. They stress the multi-faceted nature of protecting information and the continuous effort required in today's dynamic threat environment.

Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via reimaginingcyber@gmail.com

  continue reading

103 episoder

Artwork
iconDel
 
Manage episode 389177714 series 3361845
Innhold levert av Reimagining Cyber. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Reimagining Cyber eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Welcome to another episode of Reimagining Cyber with Rob and Stan. In this episode, we dive deep into the crucial topic of data security. Stan shares insights from a recent cybersecurity event in Texas, emphasizing the growing threat of ransomware and the need for a dynamic approach to protect sensitive data.

Key Points:

1. Ransomware Challenges: Stan highlights the evolving landscape of ransomware attacks, where bad actors not only encrypt data but also extract and blackmail organizations. The importance of a robust backup strategy, including tiered storage with offline or air-gapped options, is emphasized.

2. Classification and Categorization of Data: Rob and Stan discuss the significance of understanding the types of sensitive data within an organization. They draw parallels to the Defense Department's classification system and stress the need for businesses to categorize their data to implement effective security measures.

3. SEC Cyber Ruling: The upcoming SEC ruling becomes a focal point, driving organizations to reassess their data security strategies. Rob explains how privacy regulations and regulatory actions, like the SEC ruling, act as catalysts for organizations to enhance their data security.

4. Discovering Hidden Risks: The hosts underscore the importance of comprehensive data discovery, revealing hidden risks and outdated systems. Stan likens undiscovered data to "toxic data" and emphasizes the need for continuous clean-up efforts to reduce both risk and costs.

5. AI and Bias in Data: The conversation shifts to the integration of AI in cybersecurity and the challenges of preventing bias in AI models. Stan discusses the importance of cleansing sensitive data before ingestion into AI models and the broader issue of unintentional biases in AI.

Conclusion: Rob and Stan wrap up the episode by reflecting on the evolution of cybersecurity terminology, from computer security to information assurance and now cyber security. They stress the multi-faceted nature of protecting information and the continuous effort required in today's dynamic threat environment.

Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via reimaginingcyber@gmail.com

  continue reading

103 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett