Learning Center Home > Data Security > Tips to Automate Your Cybersecurity Processes

Tips to Automate Your Cybersecurity Processes
Data Security



SecurityMetrics Podcast | 7

Automate All the Things!

Tom Hatch, Co-founder and CTO of Salt Stack, Inc and host of "The Hacks" sits down with Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) to discuss:

  • How cybercriminal activity has become automated and widespread
  • How to use automation to help close your security gaps and reduce infrastructure management challenges
  • The need maintaining your applications and having different types of IT individuals address security issues


"We live in the era of continual cyber warfare, and that warfare isn't just between nation states. It's between crime syndicates, crime groups, and hacker groups that seemingly spawn from nowhere. Even a handful of folks–or even a single person–can have a very big impact when they perform these attacks." Thomas Hatch

"As an assessor, I'm seeing a gap between the people that knows there's a problem, the people who have to fix the problem, and then the people who have to approve that there was a problem and that the problem has been fixed." Jen Stone


Resources:

2020 SecurityMetrics HIPAA Guide

2020 SecurityMetrics PCI Guide

Check out Tom's "The Hacks" podcast!

SecurityMetrics Podcast: The latest in data security and compliance

Subscribe

This podcast is available on all your favorite podcast platforms, such as:





[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.

We are excited to work with you.

*Required

Thank you!

Your request has been submitted.