meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Security remediation automation. [CSO Perspectives]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 30 September 2024

⏱️ 19 minutes

🧾️ Download transcript

Summary

Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Rick Doten, the VP of Information Security at Centene and one of the original contributors to the N2K CyberWire Hash Table.  He makes the case to invigorate the automation first principle cybersecurity strategy. In this case, he is specifically addressing remediation automation. References: Staff, n.d. National Pie Championships [Website]. American Pie Council. Rick Doten. Rick’s Cybersecurity Videos [Youtube Channel]. YouTube. Joe, 2020. The Unbearable Frequency of PewPew Maps [Explainer]. Stranded on Pylos. Aanchal Gupta, 2022. Celebrating 20 Years of Trustworthy Computing [Explainer]. Microsoft Security Blog. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Now a word from our sponsor, the Johns Hopkins University Information Security Institute,

0:18.3

who's currently seeking qualified applicants for its innovative Master of science in security informatics degree

0:25.0

program. Study alongside world-class interdisciplinary experts and gain unparalleled

0:31.1

educational research and professional experience in information security

0:36.0

and assurance.

0:37.7

Interested U.S. citizens should consider the Department of Defense's Cyber Scholarship Program, which covers tuition, required fees, textbooks, and a

0:46.1

laptop, as well as providing a $32,000 additional annual stipend.

0:52.1

Apply for the spring 2025 semester by November 15th and apply for this scholarship by February 1st.

0:58.8

Learn more about both at CS. J-H-U. dot edu slash M.S.I.

1:07.0

Hey everybody, welcome back to season 15 of the CSO

1:16.6

perspectives podcast. This is episode 3 where we turn the microphone over to

1:21.6

some of our regulars who visit us here at the

1:24.2

N2K CyberWire hash table. You all know that I have a stable of friends and

1:28.8

colleagues who graciously come on the show to provide some clarity about the issues we are trying to

1:34.4

understand. That's the official reason we have them on the show. In truth though,

1:39.2

I bring them on to hip-check me back into reality when I go on some of my more crazier rans.

1:45.4

We've been doing it that way for almost four years now.

1:48.1

And it occurred to me that these regular visitors to the hash table were some of the smartest and well respected

1:53.8

thought leaders in the business and in a podcast called CSO perspectives

1:58.6

wouldn't it be interesting and thought-provoking to turn the mic over to them for

2:02.4

an entire show.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.