Blueprint: Build the Best in Cyber Defense cover image

Strategy 1: Know What You Are Protecting and Why

Blueprint: Build the Best in Cyber Defense

00:00

How to Reconcile Moving Asset Data and Confluence of Different Asset Signal

Some of the best cybersecurity app or Addis as I've run into some of the best SOCs, right? And all their cybersecurity stakeholders. They have roughly as many dev and engineering resources on their composite asset inventory as they do their scene. So we just kind of talked about like, what are the systems that are important, but it's not just the system because the question isn't just always the system hack, or is it not? It's who are the people that can log into that systems?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app