We usually think about the most efficient way to do things while working in production environments. Still, often employees forget about an insecure environment once the work has been completed and they have moved on to another project.
“We don’t always need to audit things; sometimes you can gauge risk by having a conversation with stakeholders…on how they manage databases,” says Adam Kohnke, Cybersecurity Architect for Charter Next Generation.
Adam joins ISACA’s Jon Brandt in this episode to discuss his recently released ISACA Journal article, “Managing Security Across Disparate Database Technologies.” Adam breaks down best practices for User Access Management, Encryption, and Logging. He comments on the best ways to start the conversation about security beyond what management considers vital for IT.
Tune in now for the full episode!
To read the full article, visit www.isaca.org/managing-security-across-disparate-database-technologies.
To listen to more ISACA podcasts, visit: www.isaca.org/podcasts
HCL State of Cybersecurity 2021
ISACA’s New CyberPro – Jon Brandt
ISACA Live: Emerging Tech - Cloud
ISACA Live: State of Cybersecurity Pt. 2
ISACA Live: Global Strategy
Digital Body Language
The Cybersecurity Workforce
ISACA Conference Europe – Keynote Speaker: Vinh Giang
Getting Started with Risk Quantification
Cyber Risk and Communicating to a Board of Directors
US DoD’s CMMC Guidelines — What You Need to Know
Security As A Service
IT Audit in Practice: Survival When You are Small-business Continuity and Resilience
Privacy-Preserving Analytics and Secure Multiparty Computation
Why Should I Listen to You?
The Lowdown on IoT
Breaking Down the ESET Threat Report
Cybersecurity Isn’t Real, Right? Wrong!
Building a Zero-Trust Network Platform
Advanced Security for Secret Information
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast