
Understanding Identity Threats in Cybersecurity with Filipi Pires
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.
Takeaways
- Identity is a central theme in cybersecurity.
- Misconfiguration is a leading cause of security issues.
- Continuous learning is essential in the cybersecurity field.
- Tools should be used to understand techniques, not just for their own sake.
- Community engagement is vital for knowledge sharing.
- Phishing remains a simple yet effective attack method.
- Legacy software poses significant risks to organizations.
- Observability is crucial for effective security management.
- Respecting the journey in cybersecurity is important for growth.
Chapters
- 00:00 Introduction to Cybersecurity Journey
- 02:49 Exploring Cybersecurity Research and Trends
- 05:32 Tools and Techniques in Cybersecurity Research
- 08:34 Learning Through Capture The Flag Events
- 11:28 Identity Threats and Misconfigurations
- 14:16 Legacy Systems and Their Impact on Security
- 25:40 Understanding Use Cases in Security Permissions
- 27:36 The Principle of Least Privilege
- 29:31 The Complexity of Identity Management
- 30:28 Challenges in Observability and Access Control
- 32:16 Navigating Multi-Cloud Permissions
- 34:07 Tools for Enhancing Security Visibility
- 36:14 Continuous Learning in Cybersecurity
- 41:53 Community Engagement and Knowledge Sharing
- 45:32 Respecting the Journey in Cybersecurity
Todavía no hay opiniones