Remove Accountability Remove Architecture Remove CISO Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Cisco Secure Endpoint Shines in the 2020 MITREĀ® Engenuity ATT&CK Evaluation

Cisco Security

This action accounted for over 38% of the contributions to our findings during the evaluation. Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. Cisco Secure Endpoint is security that works for your secure remote worker, SASE, XDR, and Zero Trust architecture. Orbital Advanced Search.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Secure Endpoint Shines in the 2022 MITREĀ® Engenuity ATT&CK Evaluation

Cisco Security

In 2017, Sandworm infiltrated Ukrainian accounting software MeDoc and hijacked the companyā€™s update mechanism which resulted in malicious software being introduced to copies of the MeDoc software used by its customers. Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. Scenario 2: Sandworm. Protection Test.

Software 121
article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco Security

On the heels of President Bidenā€™s Executive Order on Cybersecurity (EO 14028) , the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that ā€œsets forth a Federal zero trust architecture (ZTA) strategy.ā€ In other words, one size does not fit all.

article thumbnail

The Zero-Trust Approach to Important Control Planes

Duo's Security Blog

Zero Trust Key Concepts Zero trust, as a set of design ideas and principles for a security architecture allows for numerous interpretations about how to approach an efficient and safe implementation. These policies take into account the risk level of the resource that is being accessed as well as the conditions of the access.