

Strategy 1: Know What You Are Protecting and Why
8 snips May 8, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 3min
The Importance of Situational Awareness in Cybersecurity
02:59 • 3min
The OODA Loop in Cybersecurity Operations
06:13 • 2min
The Importance of Situational Awareness in Security Operations
07:59 • 2min
The Importance of Understanding the Basics
09:52 • 2min
The Importance of Data in Cybersecurity
12:16 • 3min
The Importance of Situational Awareness in Security Operations
15:17 • 2min
The Importance of Understanding the SOC Mission
17:13 • 3min
How to Make Data Accessible in a SOC
20:26 • 2min
How to Motivate People in a Sock
22:50 • 3min
The Importance of Collaborative Share in Incident Response
25:46 • 3min
The Importance of Situational Awareness
28:53 • 2min
The Future of Data Retention Regulation
30:36 • 2min
The Future of Security in the Cloud
32:22 • 2min
The Importance of Asset Inventory
34:28 • 4min
How to Prioritize Alerts to Incident Response
38:43 • 2min
How to Prioritize Your SOC
40:23 • 2min
How to Reconcile Moving Asset Data and Confluence of Different Asset Signal
41:58 • 2min
Zero Trust Architectures
44:13 • 2min
How Socks Can Be Used to Track Unexpected Behavior
45:49 • 4min
The Importance of Context Building in SOCs
49:20 • 2min
The Importance of Service to Service Interactions in Situational Awareness
51:28 • 2min
The Importance of External Threat Intelligence
53:42 • 3min
The Importance of Thinking About the Threat
56:15 • 2min
Building Awareness Over Time
57:49 • 2min
How to Build Awareness Over Time
59:46 • 2min