Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Scott Alldridge

๐Ÿ‘ค Speaker
685 total appearances

Appearances Over Time

Podcast Appearances

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

One of the things that people get kind of in love with this idea with a new tool.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

So if we know my, you know, IT guys said we're going to deploy this one new tool and that somehow one tool is going to put us in a better, you know, protected state.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And that's just a fallacy.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

That's not true because you've got to have all the layers.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And so we joke about a fool if the tool is still a fool.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

You really you really got to have a strategy and a philosophy around how you're deploying and protecting your business with your cybersecurity.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And it starts with leadership.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And I talk about that in the book a lot.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

Yeah.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And we usually get pulled in ex post facto right after the fact of the hack or the breach and they're looking for stuff.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And it'll cost a business between seven and 10 times more money.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

after a breach happens than if they did put the preventative tools a little bit like brushing your teeth right you do the or medical you do the preventive maintenance stuff and you're going to avoid hopefully some catastrophic event yeah it's like would you rather have you guys on hand when it when and if it happens or after and maybe you can't even fix it at that point

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

yeah exactly a lot of times it's too far gone yeah if a hack actually happens or a breach like that one of the important things actually a lot of people is they'll just start erasing rebuilding stuff but it's actually really important to protect the forensic data because if you are going to bring in you'll report at the fbi or even bring in some of the you know smart folks

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

that we work with and that we do to do the forensics to understand how it happened to prevent, you know, kind of root cause you can prevent the breach from happening again.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

So it's kind of important to stop, drop and roll, if you will, when a breach happens and not overreact, but yet you're concerned because you're trying to get your business back in, you know, back in business or back online.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

And it's very, very stressful.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

It's a very difficult situation and you really don't want to be in that situation.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

the hackers so um pretty small percentage because they're pretty smart um like i said they're kind of winning the game but um i think statistically they're saying that less than 20 percent okay you can actually get to sources that is small yeah there's a lot of interesting technologies you know like proton mill which is a switzerland-based system they have proton technologies they really are become proxies and hiding people behind things you really can't

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

You know, nobody can trace down where it's actually coming from.

Digital Social Hour
Scott Alldridge: Zero-Trust Cybersecurity: The Key to Staying Safe | DSH #1513

From ProtonMail.