CSO Perspectives (public)
Security compliance and privacy compliance are cybersecurity first principle strategies. Can security compliance add value to your organization as a first principle strategy? In this session, we learn about the value of technology compliance and compliance technologies.
Adversary playbooks as a cybersecurity first principle strategy. Rick Howard and Ryan Olson discuss the history of shifting the offense/defense balance, the three components of a proactive defense, and the evolution of adversary playbooks and the intrusion kill chain.
Adversary playbooks as a cybersecurity first principle strategy. Rick Howard proves that proactive defense and adversary playbooks give the advantage to the defender.
Orchestrating the security stack is a cybersecurity first principle strategy. Rick Howard, Bob Turner, and Kevin Magee identify data governance and policy strategy as a crucial first step. They also talk about the first principles of speaking with the C-suite, as well as the darkside of automation and orchestration.
Orchestrating the security stack is a cybersecurity first principle strategy. Rick Howard reviews SOAR/SIEM platforms, SASE, and DevSecOps strategies from the perspective of orchestrating the security stack. He discovers key methods to build zero trust, intrusion kill chain prevention, resiliency, and risk forecasting within these tools.