エピソード

  • Access Management Solutions | S02.E04
    2024/03/28

    Cyber Security Cohort : S02.E04

    Access Management Solutions In today’s episode, cybersecurity consultant Heather Holliday explores several common Access Management Solutions. Heather will compare and contrast options such as Federated Identity Management, Same Sign-On, Multifactor Authentication and Single Sign-On, then she'll take a look at what makes each option unique so you can better understand why there is more than one option and how to choose the best option for your situation.

    Click for full transcript


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK

    • What is Single Sign-On Authentication? And...How Does it Work? (SSO)

    • Tech Target:What is single sign-on (SSO)? https://www.techtarget.com/searchsecurity/definition/single-sign-on

    • AWS: What is SSO (Single-Sign-On)? https://aws.amazon.com/what-is/sso/

    • Onelogin: What is Federated ID?: https://www.onelogin.com/learn/federated-identity

    • Onelogin: SAML Explained in Plain English: https://www.onelogin.com/learn/saml

    • What is Kerberos?: https://www.simplilearn.com/what-is-kerberos-article

    • Microsoft: What is OpenID Connect?: https://www.microsoft.com/en-us/security/business/security-101/what-is-openid-connect-oidc


    続きを読む 一部表示
    15 分
  • Authentication and Access Management Policies | S02.E03
    2024/02/13

    Cyber Security Cohort : S02.E03

    Authentication and Access Management Policies

    In today’s episode Heather Holliday explores the topic of authentication and access management policies. Heather shares details about the overarching considerations for good authentication and access management practices in the context of cyber security.


    Click for full transcript


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK 

    • NIST Access Control Policy: https://csrc.nist.gov/glossary/term/access_control_policy 

    • NIST Password Policy publication: https://csrc.nist.gov/pubs/ir/7970/final



    続きを読む 一部表示
    25 分
  • Passwords, Passphrases and PINs | S02.E02
    2024/01/30

    Cyber Security Cohort : S02.E02 Passwords, Passphrases and PINs

    In this episode Heather dives into the world of PINs, passwords and passphrases. This is one of the hottest topics in cyber security and one of the most important! After all, you use PINs, passwords and passphrases to secure some of your most valuable personal information.

    ⁠⁠Click here for full transcript⁠⁠


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK 

    • Are Password Managers Safe? https://cybernews.com/best-password-managers/are-password-managers-safe/ 

    • John the Ripper Lab: https://greatadministrator.com/john-the-ripper-lab/ 

    続きを読む 一部表示
    15 分
  • Auth & Auth | S02.E01
    2024/01/09

    Cyber Security Cohort : S02.E01 Auth & Auth

    In this first episode of a brand new season of the Cyber Security Cohort, Heather will pivot from her previous discussions on Governance, Risk and Compliance in season 1 to begin a new chapter on another of her favorite topics - Authentication and Authorization.

    ⁠Click here for full transcript⁠


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK
    • Why Your Organization Needs Rule-Based Access Control: https://www.networkcomputing.com/network-security/why-your-organization-needs-rule-based-access-control
    • Techtopia: Mandatory, Discretionary, Role and Rule Based Access Control: https://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Based_Access_Control

    続きを読む 一部表示
    18 分
  • Are You the One in Control? | Episode 008
    2023/12/26

    Cyber Security Cohort : Episode 008 Are You the One in Control?

    In today’s episode Heather Holliday the importance of Controls in cyber security and how Controls are used to ensure safe cyber practices. As Janet Jackson said, “It’s all about control, and I’ve got lots of it.”

    Click here for full transcript

    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • Janet Jackson’s “Control” video: https://www.youtube.com/watch?v=LH8xbDGv7oY
    • 3-2-1 Storage Method: https://youtube.com/shorts/FbMdH3d00l0
    • 3-2-1 Storage Method: https://www.cisa.gov/sites/default/files/publications/data_backup_options.pdf
    • CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson: https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead/dp/B096D1LGSK

    続きを読む 一部表示
    14 分
  • Organizational Considerations | Episode 007
    2023/10/31

    Cyber Security Cohort : Episode 007

    Organizational Considerations

    In today's episode Heather Holliday discusses the critical role that C-suite leaders play in cyber security. Heather will also take a deep dive into the importance of organizational design in creating a cyber safe culture equipped to tackle tough cyber security issues and concerns.


    Click here to download the full transcript


    Episode Notes and References

    Information shared in this episode came from personal experience. More information on these topics can be found by searching these references.

    • Tech Target: https://www.techtarget.com/searchcio/definition/C-level
    • Deloitte: https://www2.deloitte.com/content/dam/insights/us/articles/ciso-next-generation-strategic-security-organization/DR19_TheNewCISO.pdf
    続きを読む 一部表示
    13 分
  • Risk and Compliance | Episode 006
    2023/10/24

    Cyber Security Cohort : Episode 006

    Risk and Compliance

    In today's episode Heather Holliday continues her exploration of the world of GRC, or Governance Risk and Compliance. Heather spoke about Governance in the previous episode, so today's podcast will cover Risk and Compliance.

    Click here to download the full transcript


    Resources mentioned in this episode:

    Information shared in this episode came from the references below and more information on these topics can be found by searching these references.

    • Governance, Risk, and Compliance for CompTIA Security+ by Christopher Rees: https://www.pluralsight.com/courses/governance-risk-compliance-comptia-security-plus
    • AICPA on SSAE 18: https://www.aicpa-cima.com/resources/download/aicpa-statement-on-standards-for-attestation-engagements-no-18
    • Sprinto Blog on SSAE 18: https://sprinto.com/blog/what-is-ssae-18/
    • NIST Cybersecurity Risk definition: https://csrc.nist.gov/glossary/term/cybersecurity_risk
    • NIST CSF: https://www.nist.gov/cyberframework
    続きを読む 一部表示
    23 分
  • The G in GRC | Episode 005
    2023/10/17

    Cyber Security Cohort : Episode 005

    The G in GRC

    In today's episode Heather Holliday dives into the world of GRC, or Governance Risk and Compliance. This is one of Heather's favorite topics in cyber security and she believes its importance is often overlooked or undervalued. This episode covers an overview of Governance, the G in GRC.

    Click here to download the full transcript.


    Resources mentioned in this episode:

    Information shared in this episode came from the references below.

    • CISA on Zero Trust: https://www.cisa.gov/zero-trust-maturity-model
    • Deloitte Article: https://www2.deloitte.com/us/en/pages/advisory/articles/modernizing-the-three-lines-of-defense-model.html
    • NIST on Data Governance: https://csrc.nist.gov/glossary/term/data_governance
    • Governance, Risk, and Compliance for CompTIA Security+ with Christopher Rees on Pluralsight: https://www.pluralsight.com/courses/governance-risk-compliance-comptia-security-plus



    続きを読む 一部表示
    18 分