Fostering a Better Understanding of Networking Within the Information Security Community

Channel:
Subscribers:
4,530
Published on ● Video Link: https://www.youtube.com/watch?v=eeosr-xfko4



Category:
Guide
Duration: 46:55
71 views
2


A Conversation with Justin Elze and Mick Douglas | Redefining CyberSecurity Podcast With Sean Martin

Guests:

Justin Elze, CTO at TrustedSec [@TrustedSec]

On LinkedIn | https://www.linkedin.com/in/justinelze/

On Twitter | https://twitter.com/HackingLZ

Mick Douglas, Founder and Managing Partner at InfoSec Innovations [@ISInnovations]

On LinkedIn | https://linkedin.com/in/mick-douglas

On Twitter | https://twitter.com/bettersafetynet

____________________________

Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________

This Episode’s Sponsors

Imperva | https://itspm.ag/imperva277117988

Edgescan | https://itspm.ag/itspegweb

___________________________

Episode Notes

In this new Redefining Cybersecurity Podcast episode, Justin Elze, Mick Douglas, and Sean Martin delve into the importance of understanding networking concepts in the realm of cybersecurity. They discuss the misconceptions surrounding networking knowledge and how it often becomes cumbersome for people to learn. They highlight the underappreciated areas of networking that are frequently encountered in enterprise environments, such as DNS issues, virtual machines, VLANs, and more. The conversation also touches on the OSI model and the need for a structured approach to learning and adapting to various enterprise environments.

The episode highlights how the shift to cloud-based solutions and remote work has made certain aspects of networking easier while also changing the landscape of network security. The discussion examines the importance of understanding and implementing effective security controls based on the organization's needs and threat surface rather than relying on outdated or ritualistic practices. The trio further explores the concept of abstraction versus understanding the intricate details of IT security policy and controls.

Justin and Mick also talk about the need for a standard body of knowledge for cybersecurity professionals when it comes to networking concepts. They emphasize that while it's not necessary to be a networking expert, a deeper understanding of core concepts can significantly improve the effectiveness of network defense. By fostering a better understanding of networking within the information security community, professionals can better identify and address potential vulnerabilities and misconfigurations within their environments.

____________________________

Watch this and other videos on ITSPmagazine's YouTube Channel

Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist

📺 https://www.youtube.com/playlist?list=PLnYu0psdcllQZ9kSG7X7grrP_PsH3q3T3ITSPmagazine YouTube Channel📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe!

____________________________

Resources



____________________________

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcast

Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq

Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network




Other Videos By ITSPmagazine


2023-04-28Driving into the Future: Paving the Way for Autonomous and Connected Vehicles | The 3rd ICA Summit
2023-04-27Welcome to the Aerospace Village | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA
2023-04-26Augmenting the InfoSec Analyst | A Conversation with Leah McLean, Diana Kelley, and Davi Ottenheimer
2023-04-25Elephants in the Room: How the Pentesting and GRC Worlds Collide | A Conversation with Chaz Lever
2023-04-21Project and Risk Management for Programs and Teams | Locked Down Podcast
2023-04-21It’s Difficult to Secure the Invisible: Reinventing Asset Management for Modern Tech Challenges
2023-04-20Should Educators embrace or ban ChatGPT use? How AI and ChatGPT are Transforming Education & Society
2023-04-20The Mainframe Advantage: Robust Security Meets Infrastructure Modernization
2023-04-20Navigating the AI Security Frontier: Balancing Innovation and Cybersecurity
2023-04-20The Looming Identity Crisis: Learning to Embrace Human-AI Symbiosis in Cybersecurity and Identity
2023-04-20Fostering a Better Understanding of Networking Within the Information Security Community
2023-04-20The Past of the Future: Pioneering Decryption with AI and Quantum Physics
2023-04-20Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Chris Roberts | Episode 38
2023-04-20Strategies for Building a Positive Work Environment for Security Teams and CISOs with Dr. Rebecca Wy
2023-04-19Introducing 'The Leadership Student Podcast' | A Conversation With Podcast Host MK Palmore
2023-04-19From Tech Silos to Cyber Synergy: Smarter Vulnerability Management with Brinqa
2023-04-19The C-Suite Culture Compass: A Diplomat's Guide to Cyber Leadership and Culture
2023-04-19Ethical Dilemmas in the Age of AI: Balancing AI Advancements and Cybersecurity
2023-04-17One Health Lessons: Inspiring Understanding & Change Through Education and global collaboration.
2023-04-16Hacking the Skies: A Deep Dive into Airplane Cybersecurity. The reality of hacking airplanes RSAC 23
2023-04-14Ready for Takeoff: The Autonomous Aviation Revolution. The New Air Mobility On Redefining Society



Tags:
structured approach
dns
network defense
remote work
justin
technology
mick douglas
controls
it security policy
networking
standard body of knowledge
cybersecurity podcast
workstation
sean martin
misconfigurations
people
area
infosec
justin elze
network
cybersecurity
subnet
business
vulnerabilities
segmentation
organizations
understanding
enterprise environments
cloud-based solutions
virtual machines
vlans
firewall
security
protocols
osi model
traffic
abstraction