CISO Answers – Interview with Michael Schindler
#CISOAnswers is a series of interviews with thought leaders in IT/IS seasoned with valuable insights on a variety of important topics.
Watch our interview with – Michael Schindler – a leader with strong roots in the global cybersecurity community and the Dallas area. He has over 23 years of IT experience in cybersecurity, storage engineering, network engineering, messaging, datacenter development, consulting, training, and IT compliance. Michael is an exCISO, founder of non-profit cybersecurity organization in Texas and currently Sales Engineer at ENSILO.
Michael Schindler gives some handy-dandy advice for SMBs on most efficient security controls to be in place, future trends in cybersecurity, benefits of being in the cybersecurity community and standing alone vs. with a partner against cybersecurity threats.
Podcast Host: Viktoria Miliar, Head of BD at UnderDefense
Guest: Michael Schindler, Sales Engineer at ENSILO
SUBSCRIBE to get more Cybersecurity content!
Get the Help You Need
Cybersecurity is our core expertise. Let’s get in touch and you will learn more about how UnderDefense can benefit your organization
Next Readers
Russian Сybercriminals Spreading New Tricky Phishing Emails
Russian Cybercriminals "Armageddon Group" Spreading New Tricky Phishing Emails with Great Deanonymization FlowOn April 4, 2022, the government emergency response team of Ukraine CERT-UA has warned of a massive spear-phishing campaign launched by a hacking group...
Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analyst
Splunk ES vs. Elastic (ELK) Stack: Comparison from the SOC Analystby Iryna Yamborska1. What are Splunk ES and Elastic (ELK) Stack? 2. Main Differences Between Splunk ES and Elastic (ELK) Stack 3. Summary Comparison 4. ConclusionThe modern digital and globalized world...
Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228)
Log4Shell: How to Mitigate Log4j Vulnerability (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104)by Iryna Yamborska1. What is Log4Shell? 2. What makes Log4j uniquely dangerous even though you seem protected 3. Which Version is not affected? 4. How to Mitigate the...