Рет қаралды 64
Learn how Halcyon stops ransomware: bit.ly/3CohulD
In today’s cybersecurity landscape, one of the most foundational yet overlooked aspects is effective asset inventory and management.
Our Chief Security and Trust Officer, Ben Carr had the opportunity to sit down with J.J. Guy, CEO and Co-Founder of Sevco Security, to delve into J.J.’s journey through the cybersecurity industry, how knowing what’s truly in your environment affects everything from patch management to vulnerability prioritization, and Sevco’s innovative approach to asset visibility.
Learn more about:
J.J.’s Transition from Federal to Commercial Cybersecurity: Including 12 years as a “fed” and J.J.’s shift from government to the private sector with startups like Carbon Black and now Sevco.
The Importance of Accurate Asset Inventory: One of the primary challenges facing cybersecurity teams is ensuring every endpoint is accounted for, given that missing assets can lead to major vulnerabilities.
The 80% Challenge in IT vs. Security Ownership: J.J. highlights the divide between IT and security - while IT often operates on an 80% coverage metric, security requires 100% visibility to ensure no gaps exist.
The Role of Asset Inventory in Cybersecurity: Despite being a foundational element, asset inventory often lacks unified oversight, leading to significant security blind spots.
Addressing the “Denominator Problem” in Vulnerability Management: Without an accurate denominator (total asset count), determining effective vulnerability management becomes nearly impossible.
Aggregating and Normalizing Data for True Asset Visibility: Sevco’s approach on collecting various asset data from different sources, deduplicating it, and creating a unified, comprehensive view.
The IT-Security Divide and Organizational Solutions: How organizational structure often complicates asset management, and why some organizations are moving toward integrating IT and security under a single leader.
Learn how Sevco Security and Halcyon are addressing one of cybersecurity’s biggest challenges: achieving full asset visibility and securing your entire network.