"
IT Empathy ® Podcast S1 EP8: Cybersecurity Strategy in the age of SaaS


itempathy-podcast

IT Empathy ® Podcast Season 1, Episode 8

Cybersecurity Strategy in the age of SaaS

Hosted by Jon Bailey, IT Empathy ®

Published • 29 November 2023

This IT Empathy ® podcast provides an overview of Cybersecurity strategy going back two decades in time to current day 2020s SaaS. From a UK IT Consultant's perspective.

1. Introduction

IT Empathy ® podcast https://www.itempathy.com/podcast

About IT Empathy ® https://www.itempathy.com/about

2. Origins of Cybersecurity

"The fascinating history of cyber security you never knew" Via CyberTalk https://www.cybertalk.org/2023/06/14/the-fascinating-history-of-cyber-security-you-never-knew/

"What Is the Difference Between IT Security and Cybersecurity?" Via CompTIA https://www.comptia.org/blog/what-is-the-difference-between-it-security-and-cybersecurity

"Key research observation. "Please be aware the more articles you choose to read on this matter the more confused you will become with the evolved overlapping between Information Technology (IT) Security, Information Security (IS), Cybersecurity (or Cyber Security) and Cloud Security. This is naturally a complex broad area of expertise and open to the interpretation of differing expert professional experiences. For example the term 'Cybersecurity' was coined in the 1970's, but focuses on the defence of the developing Internetwork of networks (The Internet), which is the backbone of cyberspace. Because of this online historical niche focus for Cybersecurity it was not commonly used as a term by IT professionals who historically referred to broad technology and technology facilities security as IT Security. Also Information Security, which became a subset of IT when data evolved and is more about the protection of important sources of data based and paper based information. Anyway cutting to the chase since the Public Cloud took off Cybersecurity as a term and trend has become more commonly used as more digital assets sit directly in Cyberspace or in the The Cloud as common applications and servers moved away from private networks. Again plenty of confusion and overlap is there for the brave to digest if they wish. Via: Jon Bailey

3. Modern day Cybersecurity

What is Cyber Security or Cybersecurity?

Via National Cyber Security Centre (UK) https://www.ncsc.gov.uk/section/about-ncsc/what-is-cyber-security

Via: Microsoft https://www.microsoft.com/en-gb/security/business/security-101/what-is-cybersecurity

5. The need for less is more systems and portals.

"Reducing Complexity by Increasing Consolidation for SMEs" via The Hacker News https://thehackernews.com/2020/11/live-webinar-reducing-complexity-by.html

"The SEC Won't Let CISOs Be: Understanding New SaaS Cybersecurity Rules" via The Hacker News https://thehackernews.com/2024/01/the-sec-wont-let-cisos-be-understanding.html

6. Reactive Cybersecurity strategy

"High-level cyber security strategy" via IT Empathy ® https://www.itempathy.com/blog/2023/highlevelcybersecuritystrategy

"Reactive vs. Proactive Cybersecurity: Which Strategy is Best?" via Fortinet https://www.fortinet.com/blog/industry-trends/reactive-vs--proactive-cybersecurity--5-reasons-why-traditional-

7. Proactive Cybersecurity strategy

"High-level cyber security strategy" via IT Empathy ® https://www.itempathy.com/blog/2023/highlevelcybersecuritystrategy

"Five tips for embracing proactive cyber security" via BT https://business.bt.com/why-choose-bt/insights/the-future-is-now/safe-cyber-defence/

"Reactive vs. Proactive Cybersecurity: Which Strategy is Best?" via Fortinet https://www.fortinet.com/blog/industry-trends/reactive-vs--proactive-cybersecurity--5-reasons-why-traditional-

8. Thanks for listening

Contact IT Empathy ® for Cybersecurity help and support.

Cybersecurity services https://www.itempathy.com/cybersecurity

ITEmpathy_Logo

Cloud & Data Network Infrastructure | Cybersecurity | Technical Project Delivery | Unified Communications

ITEmpathy_Banner_1

Home IT Empathy Phone IT Empathy Email IT Empathy LinkedIn IT Empathy Twitter IT Empathy Youtube IT Empathy

About | Contact | Cookies | Privacy | Terms

© 2024, IT Empathy Limited. All rights reserved.

Registered in England & Wales, No. 10362337

itempathy-podcast

https://www.itempathy.com/podcast

IT Empathy ® Podcast

Podcast episodes

S1 EP13: AI Washing

S1 EP12: Rise of the YouTube Auditors

S1 EP11: Microsoft Cyber Signals and OpenAI

S1 EP10: Google Circle to Search

S1 EP9: Podcast Lessons

S1 EP8: Cybersecurity Strategy in the age of SaaS

S1 EP7: Business Startup Lessons

S1 EP6: What is IT Empathy?

S1 EP5: What are AI Deep Fakes?

S1 EP4: QR Code Cyber-attacks

S1 EP3: Platforms for innovation

S1 EP2: Innovation, Engagement and Communication

S1 EP1: Introducing the IT Empathy podcast


itempathy-logo-info

Extra Blog content

2023: There is opportunity in all problems. This leads to innovation!

2023: High-level Cybersecurity Strategy

2020: EPOS EXPAND 80T

2020: Amazon Distance Assistant Innovation

2018: NetApp ONTAP AI

2018: The Cybersecurity Yin and Digital Innovation Yang

2018: Why Is Corporate Internet Expensive?

2016: The Jenga Change Analogy