Managing Your Security Program with the TrustedSec Advisory Team
TrustedSec TrustedSec
4.98K subscribers
74 views
0

 Published On Feb 7, 2024

Summary:

In this conversation, Carlos Perez and Alex Hamerstone talk about the role of the Advisory practice in helping organizations build and manage their security programs. They discuss best practices for prioritizing data and business processes, setting appropriate security goals, and understanding risk, all while highlighting the human element of security and the need for nuanced situational awareness. The impacts of data replication, asset management, and shadow IT as well as the value of planning, metrics, and continuous assessment are examined in this one-on-one dialogue.

Takeaways:

-The Advisory practice plays a crucial role in helping organizations build and manage their security programs.
- Identifying and prioritizing data and business processes is essential for effective security.
- Setting appropriate security goals and understanding risk are key components of a mature security program.
- The human element of security, including user behavior and relationships with other departments, is critical to success.
- Continuous assessment, planning, and execution are necessary for ongoing improvement and success. It is crucial to use security tools effectively and maximize their capabilities.
- Take the time to understand your entire environment and address the security program holistically.
- Avoid purchasing new tools without exploring the capabilities of existing ones.
- Misconceptions about tools can lead to gaps in security, so it's important to have a comprehensive approach.

Chapters:

00:07 Introduction and Overview
01:14 The Role of the Advisory Practice
02:57 Identifying and Prioritizing Data and Business Processes
05:09 Compliance and Setting Appropriate Security Goals
06:45 Understanding Risk and Building Effective Controls
08:12 The Human Element of Security
09:26 The Importance of Asset Management
11:17 The Impact of Availability and Dependencies
14:15 The Importance of Knowing Your Environment
16:19 The Impact of Data Replication and Control
18:43 The Need for Improved Situational Awareness
20:04 The Importance of Planning and Roadmapping
23:02 The Value of Metrics and Tracking Progress
25:08 The Challenge of Shadow IT and User Behavior
28:10 The Need for Understanding and Ownership
31:03 The Importance of Context and Realistic Expectations
33:06 The Need for Continuous Assessment and Improvement
36:04 The Importance of Stepping Back and Planning
39:08 The Value of Security Programs and Roadmaps
41:32 The Challenge of Reactive Approaches and Redundant Tools
42:15 The Importance of Execution and Implementation
42:27 Effective Use of Tools
43:22 Understanding the Entire Environment
44:15 Misconceptions About Tools

show more

Share/Embed