DiscoverThe Tea on CybersecurityNavigating Asset Management and Compliance with Marie Joseph, Trava
Navigating Asset Management and Compliance with Marie Joseph, Trava

Navigating Asset Management and Compliance with Marie Joseph, Trava

Update: 2024-04-09
Share

Description

“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph


This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.

Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.


In this episode, you’ll learn: 


  • Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.
  • How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.
  • Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements. 



Things to listen for:


[00:00 - 00:18 ] Intro to The Tea on Cybersecurity

[00:48 - 02:44 ] The definition of asset inventory and asset management

[04:06 - 04:34 ] Maintaining an accurate software inventory for compliance with licensing agreements

[04:34 - 05:51 ] Common challenges with establishing a complete asset inventory

[07:42 - 09:27 ] Explanation of shadow IT, traditional asset management, and cybersecurity efforts

[09:34 - 10:29 ] How asset management contributes to maintaining compliance.

[12:04 - 13:30 ] Using automated tools in asset management tasks for continuous compliance

[13:48 - 14:55 ] The importance of tracking all devices connected to a network

[15:23 - 17:48 ] Jara’s receipts


Resources:

From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets

Regular Software Updates and Patching: The Importance of Staying on Top of This


Connect with the Guest:

Marie Joseph's LinkedIn


Connect with the host:

Jara Rowe’s LinkedIn


Connect with Trava:

Website www.travasecurity.com 

Blog www.travasecurity.com/blog

LinkedIn @travasecurity

YouTube @travasecurity

Comments 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Navigating Asset Management and Compliance with Marie Joseph, Trava

Navigating Asset Management and Compliance with Marie Joseph, Trava

Trava Security