Shownotes
Don’t be stuck in the IT stone age! The castle walls of defense in depth are down or at least damaged due to a combination of constant attack and the digital transformation.
The digital transformation constantly moves data away from traditional enterprise control:
- Rapid expansion of SaaS Applications hosted everywhere
- Branch offices on SDWANs
- Explosion of IoT
- Teleworkers logging in from unsecured locations
Michael Zuckerman joins ThreatTalk to discuss how adopting a robust framework like ISO27001 and ISO27002 can provide a roadmap to taking the initiative back from the attackers. The ISO standards provide key policies and procedures that inform the actions to be taken in advance or in response to an attack.
DNS security products provide the extended visibility necessary to implement ISO frameworks beyond the network by encompassing cloud resources and remote users. Combined with NAC devices, DNS security provides foundational security to detect, block, and quarantine infected machines and return control to the enterprise.