Artwork

Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!

CCT 148: Understanding and Implementing Threat Modeling for the CISSP Exam (Domain 3.1)

42:37
 
Teilen
 

Manage episode 422840534 series 3464644
Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

Send us a text

What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the nuances of threats is essential to safeguarding your organization's data and systems. From system and threat identification to vulnerability assessments and risk evaluations, this episode is a treasure trove of strategies to fortify your cybersecurity defenses.
Ever wondered how to stay one step ahead of ransomware like CLOP or vulnerabilities in tools like MoveIt? In this episode, we tackle the complex world of threat and risk management, exploring how malicious actors operate and the importance of securing your software, hardware, and human processes. We highlight the necessity of protecting code repositories against unauthorized access and assess the financial implications of potential disruptions. You'll gain insights into aligning security measures with your organization's risk tolerance and learn practical strategies to mitigate these ever-evolving threats.
Finally, we demystify the STRIDE and TRIKE threat modeling frameworks, comparing their unique approaches and applications. You'll hear about each component of STRIDE, from spoofing to elevation of privilege, and learn the benefits and challenges of using this framework. On the other hand, TRIKE's methodical, risk-centric approach offers a holistic view of integrating security throughout the software development lifecycle. We also delve into defense-in-depth strategies and the importance of robust logging and monitoring. To cap it off, I share valuable tips on preparing for the CISSP exam, emphasizing the effectiveness of my comprehensive blueprint available at CISSP Cyber Training. Make sure you tune in and equip yourself with the knowledge to excel in your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Kapitel

1. CISSP Cyber Training Podcast (00:00:00)

2. Understanding Threats and Risk Management (00:12:16)

3. Understanding Threats and Security Modeling (00:19:42)

4. Understanding and Implementing Risk Management (00:28:28)

5. CISSP Cyber Training Blueprint (00:41:22)

190 Episoden

Artwork
iconTeilen
 
Manage episode 422840534 series 3464644
Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

Send us a text

What if you could transform your cybersecurity skills and become an expert in threat modeling? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as I guide you through the critical elements of threat modeling, a key topic for any cybersecurity professional gearing up for the CISSP exam. We'll discuss why grasping the nuances of threats is essential to safeguarding your organization's data and systems. From system and threat identification to vulnerability assessments and risk evaluations, this episode is a treasure trove of strategies to fortify your cybersecurity defenses.
Ever wondered how to stay one step ahead of ransomware like CLOP or vulnerabilities in tools like MoveIt? In this episode, we tackle the complex world of threat and risk management, exploring how malicious actors operate and the importance of securing your software, hardware, and human processes. We highlight the necessity of protecting code repositories against unauthorized access and assess the financial implications of potential disruptions. You'll gain insights into aligning security measures with your organization's risk tolerance and learn practical strategies to mitigate these ever-evolving threats.
Finally, we demystify the STRIDE and TRIKE threat modeling frameworks, comparing their unique approaches and applications. You'll hear about each component of STRIDE, from spoofing to elevation of privilege, and learn the benefits and challenges of using this framework. On the other hand, TRIKE's methodical, risk-centric approach offers a holistic view of integrating security throughout the software development lifecycle. We also delve into defense-in-depth strategies and the importance of robust logging and monitoring. To cap it off, I share valuable tips on preparing for the CISSP exam, emphasizing the effectiveness of my comprehensive blueprint available at CISSP Cyber Training. Make sure you tune in and equip yourself with the knowledge to excel in your cybersecurity career.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Kapitel

1. CISSP Cyber Training Podcast (00:00:00)

2. Understanding Threats and Risk Management (00:12:16)

3. Understanding Threats and Security Modeling (00:19:42)

4. Understanding and Implementing Risk Management (00:28:28)

5. CISSP Cyber Training Blueprint (00:41:22)

190 Episoden

Alla avsnitt

×
 
Loading …

Willkommen auf Player FM!

Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.

 

Kurzanleitung