Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2

Navigating Asset Management and Compliance with Marie Joseph, Trava

This is a podcast episode titled, Navigating Asset Management and Compliance with Marie Joseph, Trava. The summary for this episode is: <p>“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph</p><p><br></p><p>This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.</p><p>Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.</p><p><br></p><p>In this episode, you’ll learn:&nbsp;</p><p><br></p><ul><li>Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.</li><li>How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.</li><li>Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements.&nbsp;</li></ul><p><br></p><p><br></p><p>Things to listen for:</p><p><br></p><p>[00:00 - 00:18] Intro to The Tea on Cybersecurity</p><p>[00:48 - 02:44] The definition of asset inventory and asset management</p><p>[04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements</p><p>[04:34 - 05:51] Common challenges with establishing a complete asset inventory</p><p>[07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts</p><p>[09:34 - 10:29] How asset management contributes to maintaining compliance.</p><p>[12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance</p><p>[13:48 - 14:55] The importance of tracking all devices connected to a network</p><p>[15:23 - 17:48] Jara’s receipts</p><p><br></p><p><strong>Resources:</strong></p><p><a href="https://travasecurity.com/learn-with-trava/blog/from-bonnie-and-clyde-to-hackers-taking-the-first-step-to-protecting-your-digital-assets?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=thetea" rel="noopener noreferrer" target="_blank">From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets</a></p><p><a href="https://travasecurity.com/learn-with-trava/blog/regular-software-updates-and-patching-the-importance-of-staying-on-top-of-this?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=thetea" rel="noopener noreferrer" target="_blank">Regular Software Updates and Patching: The Importance of Staying on Top of This</a></p><p><br></p><p><strong>Connect with the Guest:</strong></p><p><a href="https://www.linkedin.com/in/marie-joseph-a81394143/" rel="noopener noreferrer" target="_blank">Marie Joseph's LinkedIn</a></p><p><br></p><p><strong>Connect with the host:</strong></p><p><a href="https://www.linkedin.com/in/jararowe/" rel="noopener noreferrer" target="_blank">Jara Rowe’s LinkedIn</a></p><p><br></p><p><strong>Connect with Trava:</strong></p><p>Website <a href="http://www.travasecurity.com/?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">www.travasecurity.com&nbsp;</a></p><p>Blog <a href="https://travasecurity.com/learn-with-trava/blog?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">www.travasecurity.com/blog</a></p><p>LinkedIn <a href="https://www.linkedin.com/company/travasecurity/?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p><p>YouTube <a href="https://www.youtube.com/@travasecurity?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p>