Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11
Introduction
00:00 • 2min
The Foundation of Information Security Management Systems
01:38 • 2min
The Importance of Data in Cybersecurity
03:31 • 3min
How to Use Templates to Classify New Data
06:26 • 2min
Zero Trust: A Real Thing
08:29 • 2min
Zero Trust: A Simple Definition
10:52 • 2min
Layering Threat Management and Vulnerability Together
13:09 • 4min
Layer Six: A Formalized Risk Management Program
16:54 • 3min
The Importance of Monitoring and Integrity
19:30 • 3min
The Ninth Layer of the Cybersecurity Cake
22:13 • 3min
The 9 Layer Cake
25:24 • 4min