Both XDR and Zero Trust are useful security concepts, but they are sadly overhyped. Listen in as ISACA's Research Advisor, Brian Fletcher and Trend Micro's Bill Malik look into the realities behind ZDR and Zero Trust, how ransomware works, and how the both XDR and Zero Trust can help organizations minimize their vulnerabilities
Interested in reading Bill's full ISACA Blog? Click the link and download a copy today! https://www.isaca.org/resources/news-and-trends/industry-news/2021/using-zero-trust-and-xdr-to-stop-ransomware.
We would love to hear from you, please leave your comments below. If you enjoyed this episode, please click the like and subscribe buttons for more from ISACA!
Rethinking Identity Governance
2023: The Year of Risk
Improving Cyber Resilience in an Age of Continuous Attacks
Advancing Digital Trust Through Audit and Assurance
ISACA Live_Critical Infrastructure Security
ISACA Live | Risk Scenarios
ISACA Live | How to Mature Your Privacy Compliance Program
Career Coach Advice: How to Launch Your IT Audit Career
ISACA Live | Advancing Digital Trust Through Data Privacy
ISACA Live | The Dark Future of Privacy
Information Privacy Contradiction: Interest-Based Posture of Compliance and Violation
ISACA Live | Advancing Digital Trust Through IT
Should Cybersecurity Be Subject to a SOX-Type Regulation?
Beware the Traps of Data Governance and Data Management Practice
Convergence: Where Next?
Do Data Go To Waste
Protecting Your Enterprise and Deterring Fraud in a New Risk Era
The Circle of Failure: Why the Cyber Security Industry Doesn’t Work
Meeting Attackers Where They Are
Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast