Navigating Asset Management and Compliance with Marie Joseph, Trava

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Navigating Asset Management and Compliance with Marie Joseph, Trava. The summary for this episode is: <p>“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph</p><p><br></p><p>This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.</p><p>Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.</p><p><br></p><p>In this episode, you’ll learn:&nbsp;</p><p><br></p><ul><li>Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.</li><li>How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.</li><li>Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements.&nbsp;</li></ul><p><br></p><p><br></p><p>Things to listen for:</p><p><br></p><p>[00:00 - 00:18] Intro to The Tea on Cybersecurity</p><p>[00:48 - 02:44] The definition of asset inventory and asset management</p><p>[04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements</p><p>[04:34 - 05:51] Common challenges with establishing a complete asset inventory</p><p>[07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts</p><p>[09:34 - 10:29] How asset management contributes to maintaining compliance.</p><p>[12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance</p><p>[13:48 - 14:55] The importance of tracking all devices connected to a network</p><p>[15:23 - 17:48] Jara’s receipts</p><p><br></p><p><strong>Resources:</strong></p><p><a href="https://travasecurity.com/learn-with-trava/blog/from-bonnie-and-clyde-to-hackers-taking-the-first-step-to-protecting-your-digital-assets?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=thetea" rel="noopener noreferrer" target="_blank">From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets</a></p><p><a href="https://travasecurity.com/learn-with-trava/blog/regular-software-updates-and-patching-the-importance-of-staying-on-top-of-this?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=thetea" rel="noopener noreferrer" target="_blank">Regular Software Updates and Patching: The Importance of Staying on Top of This</a></p><p><br></p><p><strong>Connect with the Guest:</strong></p><p><a href="https://www.linkedin.com/in/marie-joseph-a81394143/" rel="noopener noreferrer" target="_blank">Marie Joseph's LinkedIn</a></p><p><br></p><p><strong>Connect with the host:</strong></p><p><a href="https://www.linkedin.com/in/jararowe/" rel="noopener noreferrer" target="_blank">Jara Rowe’s LinkedIn</a></p><p><br></p><p><strong>Connect with Trava:</strong></p><p>Website <a href="http://www.travasecurity.com/?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">www.travasecurity.com&nbsp;</a></p><p>Blog <a href="https://travasecurity.com/learn-with-trava/blog?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">www.travasecurity.com/blog</a></p><p>LinkedIn <a href="https://www.linkedin.com/company/travasecurity/?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p><p>YouTube <a href="https://www.youtube.com/@travasecurity?utm_source=casted&amp;utm_medium=podcast&amp;utm_campaign=podcast_share" rel="noopener noreferrer" target="_blank">@travasecurity</a></p>
The definition of asset inventory and asset management
01:09 MIN
Maintaining an accurate software inventory for compliance with licensing agreements
00:27 MIN
Common challenges with establishing a complete asset inventory
01:16 MIN
Explanation of shadow IT, traditional asset management, and cybersecurity efforts
01:45 MIN
How asset management contributes to maintaining compliance and align with standards.
00:55 MIN
Using automated tools in asset management tasks for continuous compliance
01:26 MIN
The importance of tracking all devices connected to a network
01:07 MIN
Jara's Receipts
02:24 MIN

DESCRIPTION

“Keeping the inventory up to date, make sure that you have all possible points of entry covered and accounted for, similar to a building. When people try to put safeguards for a building, you're doing it, but just like on a network that you can't really physically see if you're missing an asset, that is a hole for an attacker to get into, and we do not want to give them easy access to things for sure.” - Marie Joseph


This episode's conversation covers the basics of asset inventories and asset management with host Jara Rowe and guest Marie Joseph, Senior Security Solutions Engineer at Trava. We discuss the categories of assets and the challenges of establishing a comprehensive asset inventory.

Hear how tracking and managing hardware and software within an organization is necessary for cybersecurity compliance. We dissect the impact of Bring Your Own Device (BYOD) policies on asset management, the concept of shadow IT, and the role of automated tools and technologies in asset management tasks.


In this episode, you’ll learn: 


  • Why asset inventories are a crucial part of cybersecurity and compliance and the challenges of continuous upkeep.
  • How “Bring Your Own Device” (BYOD) policies help and hinder operations, including cybersecurity risk levels.
  • Why most compliance frameworks require companies to maintain different types of inventories to ensure that security and privacy measures are in place and monitored to meet regulatory requirements. 



Things to listen for:


[00:00 - 00:18] Intro to The Tea on Cybersecurity

[00:48 - 02:44] The definition of asset inventory and asset management

[04:06 - 04:34] Maintaining an accurate software inventory for compliance with licensing agreements

[04:34 - 05:51] Common challenges with establishing a complete asset inventory

[07:42 - 09:27] Explanation of shadow IT, traditional asset management, and cybersecurity efforts

[09:34 - 10:29] How asset management contributes to maintaining compliance.

[12:04 - 13:30] Using automated tools in asset management tasks for continuous compliance

[13:48 - 14:55] The importance of tracking all devices connected to a network

[15:23 - 17:48] Jara’s receipts


Resources:

From Bonnie and Clyde to Hackers: Taking the First Step to Protecting Your Digital Assets

Regular Software Updates and Patching: The Importance of Staying on Top of This


Connect with the Guest:

Marie Joseph's LinkedIn


Connect with the host:

Jara Rowe’s LinkedIn


Connect with Trava:

Website www.travasecurity.com 

Blog www.travasecurity.com/blog

LinkedIn @travasecurity

YouTube @travasecurity