-
Breaking down the infamous Uber, Cisco and LastPass breaches, with David Lindstrom
- 2023/10/25
- 再生時間: 25 分
- ポッドキャスト
-
サマリー
あらすじ・解説
Assurance IT invited Identify and Deception Specialist, David Lindstrom, from SentinelOne, to chat about how unsophisticated attacks breached high-profile companies like Uber, Cisco, and LastPass.
In this episode, David Lindstrom and co-founder of Assurance IT, Luigi Tiano, answer the following questions:
- Do you need someone with high credentials to hack a system?
- Is Active Directory good at protecting the enterprise?
- Is it possible to understand the full scope of a data breach?
- What is a honey pot?
- Can you buy credentials on the dark web?
- How do you prevent an employee from being a target of social phishing?
- Is there a golden rule for creating a safe password?
- How do you avoid being the softest target for dark web credentials?
- What does it mean to secure your identity in an enterprise?
Resources:
Watch the episode: https://youtu.be/9zs2MzInI50
David Lindstrom's LinkedIn: https://www.linkedin.com/in/davidlindstrom/
SentinelOne's website: https://www.sentinelone.com/
Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
Assurance IT Website: http://www.assuranceit.ca/
About David Lindstrom:
Passionate cybersecurity sales professional focused on successful security and business outcomes. I’ve had the pleasure of working on behalf of enterprise and educational organizations across industries and have excelled in the role of start-up evangelist, team leader, and practice expert for established companies.
About 10 Questions to Cyber Resilience:
Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.
About Assurance IT:
Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.