Both XDR and Zero Trust are useful security concepts, but they are sadly overhyped. Listen in as ISACA's Research Advisor, Brian Fletcher and Trend Micro's Bill Malik look into the realities behind ZDR and Zero Trust, how ransomware works, and how the both XDR and Zero Trust can help organizations minimize their vulnerabilities
Interested in reading Bill's full ISACA Blog? Click the link and download a copy today! https://www.isaca.org/resources/news-and-trends/industry-news/2021/using-zero-trust-and-xdr-to-stop-ransomware.
We would love to hear from you, please leave your comments below. If you enjoyed this episode, please click the like and subscribe buttons for more from ISACA!
Auditee Buy-In—A Key Component of Effective Audits
Breaking Down the ESET T2 2022 Threat Report
Enabling Digital Trust through Canada’s Digital Charter
It’s About (Down) Time
How Social Engineering Bypasses Technical Controls
What Makes Risk Assessments So Unpleasant and How to Change That
ISACA CyberPros – Naomi Buckwalter
Quantifying the Qualitative Risk Assessment
Gaining More Actionable Intelligence Using a Smarter Security Data Lake
ISACA Industry Spotlight | Ali Pabrai
Managing Cybersecurity Risk as Enterprise Risk
Implementing Artificial Intelligence: Capabilities and Risk
Audit in Practice: Auditing Culture
Incident Report & Continuous Control Monitoring
Industry Spotlight - Lisa Young
Defending Data Smartly
Foco de la industria - Arnulfo Espinosa Dominguez Parte II
Ethical AI Shifting the Conversation Left
Foco de la industria - Arnulfo Espinosa Dominguez Parte I
Why (And How to) Dispose of Digital Data
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast