meta_pixel
Tapesearch Logo
Log in
Mike Drop

You Might Also Like: Threat Vector by Palo Alto Networks

Mike Drop

Mike Ritland

Society & Culture, Documentary, Politics, News

4.96.3K Ratings

🗓️ 6 January 2025

⏱️ 29 minutes

🧾️ Download transcript

Summary

Introducing Mastering the Basics: Cyber Hygiene and Risk Management from Threat Vector by Palo Alto Networks.

Follow the show: Threat Vector by Palo Alto Networks

In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Dr. Daniel Ford, Chief Information Security Officer of Jovia Financial Credit Union. With over 25 years in cybersecurity, Dr. Ford shares his expertise on the evolving practice of cyber hygiene and its impact on managing risk and protecting data in today’s digital environment. They discuss key strategies for improving cybersecurity resilience, from multi-factor authentication and vulnerability management to fostering cyber literacy. Listeners will gain actionable insights into building a robust cyber hygiene strategy and understand why risk management is more than just protocols—it’s an ongoing journey.


Join the conversation on our social media channels:


About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.


The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.


Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.


Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.3

Is your endpoint stuck in the past?

0:12.7

Cortex-XDR certainly isn't.

0:14.7

For the second year in a row, Cortex-XDR delivers 100% detections in the 2024 mitre attack evaluation.

0:22.6

This is a historic first.

0:24.4

No configuration changes.

0:26.3

No delays.

0:27.5

No compromises.

0:29.0

Just the industry's best.

0:30.4

Ready to see what perfection looks like?

0:32.4

Visit paloato networks.com today.

0:34.1

Thank you.com today.

0:46.0

Where are you at your in your journey? Because cybersecurity is a journey.

0:48.5

It's never a destination.

0:50.2

And it has consistently and constantly evolved over time.

0:53.4

And I don't see that ending anywhere in the

0:55.2

near future where do you want to be and you take a look at your organization and take a look

1:00.4

and determine what is the what you believe is going to be the most common way in which you're

1:06.3

going to get breached and in those areas when we focus on that maturity journey, those are the ones you want to

1:12.5

try to get to a five. There's some things you should strive for that five on the maturity scale,

1:19.3

and then everything else should be at baseline. It takes a long time, and cybersecurity can take a

1:23.5

long time to be matured. The bigger the organization, the longer it's going to take.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Mike Ritland, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Mike Ritland and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.