From Security Onions to Icebergs: Evolving Cybersecurity Strategies
Join us on a journey through the evolution of cybersecurity strategies! 🌐🛡️
Back in the day, we used to refer to it as the "security onion," where each layer represented a different piece of the puzzle, all in an effort to protect the precious asset at the core—your data or critical servers. But times have changed, and with the shift to the cloud and modern technology, we've adopted a new analogy: the "security iceberg."
Why the switch? Well, the iceberg analogy offers a clearer picture of the depth and complexity of modern cybersecurity challenges. Just like an iceberg, there's much more beneath the surface that needs safeguarding.
In this video, we explore the shift in mindset and the need to re-engineer our defense-in-depth strategies for the digital age. If you're interested in understanding the dynamic world of cybersecurity, from onions to icebergs, this discussion is a must-watch! 🚀🔒
GUEST BIOS
Jonathan Care
Jonathan Care is a recognised expert in the field of cybersecurity & fraud detection. A former top-rated Gartner analyst, Care was responsible for defining the Fraud market, and leading Gartner’s Insider Threat and Risk research. He regularly advises cybersecurity industry leaders on strategic growth and has worked with key figures in industry and government across the globe. He is a lead contributor for Dark Reading, an industry-defining publication. He has testified in court as an expert witness and forensic investigator and is a Fellow of the British Computer Society. He also fuels his creative passion as a composer of film/TV music.
Social media: @jonathanhcare & https://linkedin.com/in/computercrime
Chris Fielder
Christopher Fielder has been in the cybersecurity world for over 20 years with experience from a range of military, government and corporate environments. From this background, Christopher holds 18 industry certifications along with a Master's Degree in Information Security. While much of his career has involved traditional hands-on-keyboard security roles that covered offensive, defensive and analytics security positions, today he is the Field CTO for Arctic Wolf. This position allows him to research emerging security topics and remain at the forefront of highlighting the expertise of the entire Arctic Wolf team.
Other episodes you'll enjoy
Threat Intelligence & Collaboration
A Snapshot in Time: Why Penetration Testing Is Critical for Cybersecurity
For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com.
If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.
Linkedin: Razorthorn Security
Youtube: Razorthorn Security
Twitter: @RazorThornLTD
Website: www.razorthorn.com
#cybersecurity
#infosec
#shorts