Artwork

Indhold leveret af Joy Alatta. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Joy Alatta eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Penetration Testing as a Cybersecurity Survival Technique

12:58
 
Del
 

Manage episode 292613664 series 2926569
Indhold leveret af Joy Alatta. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Joy Alatta eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Many organizations spend their IT budgets on the wrong technology infrastructure. Would you consider knowing where to spend your IT budget? Even when an organization makes the right expenditure on the right IT infrastructure, would it not be competitive to protect those infrastructures? What would your customers do if they have the slightest reason to believe that their personal information is not secure with your enterprise systems? I do not know of any organization that looks good immediately after a cyberattack.

I mentioned in the last episode on security challenges in eLearning systems that some organizations have a mandatory requirement to maintain a penetration testing procedure. The fact that your organization did not have a mandatory compliance requirement to conduct penetration testing does not mean that it is safe for your organization not to use penetration testing to verify its security defense. Penetration testing will enable an organization to learn and understand any vulnerability or potential vulnerability in their computing systems...More

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20 episoder

Artwork
iconDel
 
Manage episode 292613664 series 2926569
Indhold leveret af Joy Alatta. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Joy Alatta eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

Many organizations spend their IT budgets on the wrong technology infrastructure. Would you consider knowing where to spend your IT budget? Even when an organization makes the right expenditure on the right IT infrastructure, would it not be competitive to protect those infrastructures? What would your customers do if they have the slightest reason to believe that their personal information is not secure with your enterprise systems? I do not know of any organization that looks good immediately after a cyberattack.

I mentioned in the last episode on security challenges in eLearning systems that some organizations have a mandatory requirement to maintain a penetration testing procedure. The fact that your organization did not have a mandatory compliance requirement to conduct penetration testing does not mean that it is safe for your organization not to use penetration testing to verify its security defense. Penetration testing will enable an organization to learn and understand any vulnerability or potential vulnerability in their computing systems...More

--- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
  continue reading

20 episoder

Semua episod

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning