Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by David Spark and CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark and CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Tackling Misconfigurations with ThreatLocker

16:20
 
Share
 

Manage episode 511393850 series 3653744
Content provided by David Spark and CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark and CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

All links and images can be found on CISO Series.

Misconfigurations represent one of cybersecurity's most persistent and damaging vulnerabilities. Organizations often fall into the trap of deploying tools with overly permissive "permit everything" default settings, only to struggle with the operational overhead required to lock them down properly. Every configuration change away from these permissive defaults requires extensive testing and validation, creating what amounts to a prohibitive tax on implementing proper security controls. Is it any surprise that teams leave dangerous temporary configurations in place indefinitely?

In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Defense Against Configuration (DAC) solution addresses these challenges through automated daily security checks across Windows endpoints that identify common misconfigurations before they lead to breaches. Joining him are Andy Ellis, principal at Duha, and Montez Fitzpatrick, CISO at Navvis. The conversation explores how DAC's automated checks map misconfigurations against compliance frameworks, while ThreatLocker's broader platform consolidates multiple security functions into a single low-impact agent that can replace multiple endpoint tools.

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com

  continue reading

37 episodes

Artwork
iconShare
 
Manage episode 511393850 series 3653744
Content provided by David Spark and CISO Series. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Spark and CISO Series or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

All links and images can be found on CISO Series.

Misconfigurations represent one of cybersecurity's most persistent and damaging vulnerabilities. Organizations often fall into the trap of deploying tools with overly permissive "permit everything" default settings, only to struggle with the operational overhead required to lock them down properly. Every configuration change away from these permissive defaults requires extensive testing and validation, creating what amounts to a prohibitive tax on implementing proper security controls. Is it any surprise that teams leave dangerous temporary configurations in place indefinitely?

In this episode, Rob Allen, chief product officer at ThreatLocker, explains how their Defense Against Configuration (DAC) solution addresses these challenges through automated daily security checks across Windows endpoints that identify common misconfigurations before they lead to breaches. Joining him are Andy Ellis, principal at Duha, and Montez Fitzpatrick, CISO at Navvis. The conversation explores how DAC's automated checks map misconfigurations against compliance frameworks, while ThreatLocker's broader platform consolidates multiple security functions into a single low-impact agent that can replace multiple endpoint tools.

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at threatlocker.com

  continue reading

37 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play