Rumble’s Chris Kirsch: How Asset Discovery Can Help with Detection and Response
Have you ever thought you could find more assets in your network that you thought you would have? Do you have segments that haven't been scanned yet? Or maybe subnets that you have ignored?
These and much more is what asset discovery brings to the table to any security team, helping to prevent the next big incident.
In today's episode we sat down with Chris Kirsch, CEO and co-founder of Rumble and chatted about why covering the basics, like having a full inventory of your network with all the managed and unmanaged devices, is a best practice to secure any environment.
Topics discussed in this episode:
- Rumble's founding story and background
- Why Rumble's engine is very bening to the network
- Where customers that migrate to Rumble come from
- Why vulnerability scanners don't tell much about what a particular asset is
- A two point approach for asset discovery in a cloud environment
- How customers use Rumble in a response situation
- 3 Pieces of advice to succeed at asset management and device security in the future.
Cisco Secure’s J. Wolfgang Goerlich: Rebuilding Trust in Security Tools
J Wolfgang Goerlich, Advisory CISO at Cisco Secure, discusses how trust is a determinant factor in building the security tools of the future, why so many CISOs lost trust over SIEMs and what we can do to rebuild it.
Netflix’s Srinath Kuruvadi: Securing The Cloud Footprint With an Adaptive, Agile, and People Leadership Approach
Srinath Kuruvadi, head of cloud infrastructure security at Netflix, shares how his leadership skills have evolved over time, where he puts his focus when approaching infrastructure security, and what he believes are the key ingredients any security team should have today.
The Value of Agility and Education For Scaling Security with Dropbox’s Matt Jezorek
Matt Jezorek from DropBox discusses how security has always been a puzzle in which the only variable we do get to control is time; specifically, all the decisions that enable us to control how fast we detect threats.