{"id":1699,"date":"2023-02-22T10:56:27","date_gmt":"2023-02-22T15:56:27","guid":{"rendered":"https:\/\/securityeverafter.com\/?p=1699"},"modified":"2023-02-27T08:21:31","modified_gmt":"2023-02-27T13:21:31","slug":"trust-but-verify","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/trust-but-verify\/","title":{"rendered":"Trust But Verify – Part 2"},"content":{"rendered":"

Trust But Verify – Part 2<\/span><\/h1>\n

\"Blocks<\/p>\n

 <\/p>\n

What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a prominent political leader? This one is former US President Ronald Reagan. And his statement, trust, but verify. I’m sure you remember him and likely the conditions under which he uttered those now-famous words.<\/span><\/p>\n

But how does this apply to cyber? I’m so glad you asked! I have an example that I hope will resonate. Well, it’s likely that in cyber, you have a dashboard. Honestly, you have a bunch of dashboards. And, when you look at your dashboard, it tells you how well things are doing, perhaps how well agents are phoning in and giving status or giving an update, and communicating into your dashboard.<\/span><\/p>\n

Looking at your dashboard, things look like they’re updating, but how do you know? How do you\u00a0<\/span>really<\/span><\/u>\u00a0know? How might you not just trust but verify that they are actually? They are phoning into the dashboard or have done so in the last few hours. It reminds me of a question I created several years ago. Feel free to use it.<\/span><\/p>\n

The question is this – “how long can you stand to not know”? As in, how long can you stand to not know those agents – you know, the ones I’m talking about – have not phoned in recently to your dashboard? So what’s the habit that I believe you can install this week?<\/span><\/p>\n

It’s simple. Put a weekly recurring calendar reminder to do a manual check, a weekly calendar reminder to not just trust, but to verify those agents are phoning in, in this case, a check to make sure that the security agents that are supposed to report into your dashboard are well reporting into your dashboard.<\/span><\/p>\n

Yes, there’s some manual labor. Yes, this practice has saved me more than just a few times to trust but verify. And when you do that, you can likely be more effective in cybersecurity and also get wisdom as cheaply as you can.\u00a0<\/span><\/p>\n

I have talked about this topic once before.<\/span><\/a><\/p>\n

What are you doing to Trust But Verify in your company? Please share with us in the comments section below.<\/p>\n

Subscribe t<\/span>o our email list<\/a> to get more cybersecurity content and information on our weekly events delivered<\/span>\u00a0to your Inbox!<\/p>\n

Russell<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Trust But Verify – Part 2   What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a prominent political leader? This one is former US President Ronald Reagan. And his statement, trust, but verify. I’m sure you remember him and […]<\/p>\n","protected":false},"author":4,"featured_media":1705,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[12,7,31],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\nTrust But Verify - Part 2 - Security Ever After - vCISO<\/title>\n<meta name=\"description\" content=\"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityeverafter.com\/trust-but-verify\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trust But Verify - Part 2 - Security Ever After - vCISO\" \/>\n<meta property=\"og:description\" content=\"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityeverafter.com\/trust-but-verify\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Ever After - vCISO\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-22T15:56:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-27T13:21:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1015\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Russell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:site\" content=\"@russelleubanks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Russell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/\"},\"author\":{\"name\":\"Russell\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\"},\"headline\":\"Trust But Verify – Part 2\",\"datePublished\":\"2023-02-22T15:56:27+00:00\",\"dateModified\":\"2023-02-27T13:21:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/\"},\"wordCount\":412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1\",\"articleSection\":[\"cyber security\",\"Leadership\",\"Lessons Learned\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/securityeverafter.com\/trust-but-verify\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/\",\"url\":\"https:\/\/securityeverafter.com\/trust-but-verify\/\",\"name\":\"Trust But Verify - Part 2 - Security Ever After - vCISO\",\"isPartOf\":{\"@id\":\"https:\/\/securityeverafter.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1\",\"datePublished\":\"2023-02-22T15:56:27+00:00\",\"dateModified\":\"2023-02-27T13:21:31+00:00\",\"description\":\"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityeverafter.com\/trust-but-verify\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1\",\"width\":2048,\"height\":1015},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityeverafter.com\/trust-but-verify\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityeverafter.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust But Verify – Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityeverafter.com\/#website\",\"url\":\"https:\/\/securityeverafter.com\/\",\"name\":\"Security Ever After - CISO\",\"description\":\"vCISO\",\"publisher\":{\"@id\":\"https:\/\/securityeverafter.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityeverafter.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securityeverafter.com\/#organization\",\"name\":\"Security Ever After\",\"url\":\"https:\/\/securityeverafter.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1\",\"width\":1169,\"height\":826,\"caption\":\"Security Ever After\"},\"image\":{\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/russelleubanks\",\"https:\/\/www.linkedin.com\/in\/russelleubanks\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3\",\"name\":\"Russell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg\",\"caption\":\"Russell\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trust But Verify - Part 2 - Security Ever After - vCISO","description":"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityeverafter.com\/trust-but-verify\/","og_locale":"en_US","og_type":"article","og_title":"Trust But Verify - Part 2 - Security Ever After - vCISO","og_description":"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.","og_url":"https:\/\/securityeverafter.com\/trust-but-verify\/","og_site_name":"Security Ever After - vCISO","article_published_time":"2023-02-22T15:56:27+00:00","article_modified_time":"2023-02-27T13:21:31+00:00","og_image":[{"width":2048,"height":1015,"url":"https:\/\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg","type":"image\/jpeg"}],"author":"Russell","twitter_card":"summary_large_image","twitter_creator":"@russelleubanks","twitter_site":"@russelleubanks","twitter_misc":{"Written by":"Russell","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#article","isPartOf":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/"},"author":{"name":"Russell","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3"},"headline":"Trust But Verify – Part 2","datePublished":"2023-02-22T15:56:27+00:00","dateModified":"2023-02-27T13:21:31+00:00","mainEntityOfPage":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/"},"wordCount":412,"commentCount":0,"publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"image":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1","articleSection":["cyber security","Leadership","Lessons Learned"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/securityeverafter.com\/trust-but-verify\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/securityeverafter.com\/trust-but-verify\/","url":"https:\/\/securityeverafter.com\/trust-but-verify\/","name":"Trust But Verify - Part 2 - Security Ever After - vCISO","isPartOf":{"@id":"https:\/\/securityeverafter.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage"},"image":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1","datePublished":"2023-02-22T15:56:27+00:00","dateModified":"2023-02-27T13:21:31+00:00","description":"Trust But Verify is a concept in cybersecurity that takes a more critical look at assumptions you may be making in cybersecurity.","breadcrumb":{"@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityeverafter.com\/trust-but-verify\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#primaryimage","url":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1","contentUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1","width":2048,"height":1015},{"@type":"BreadcrumbList","@id":"https:\/\/securityeverafter.com\/trust-but-verify\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityeverafter.com\/"},{"@type":"ListItem","position":2,"name":"Trust But Verify – Part 2"}]},{"@type":"WebSite","@id":"https:\/\/securityeverafter.com\/#website","url":"https:\/\/securityeverafter.com\/","name":"Security Ever After - CISO","description":"vCISO","publisher":{"@id":"https:\/\/securityeverafter.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityeverafter.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/securityeverafter.com\/#organization","name":"Security Ever After","url":"https:\/\/securityeverafter.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","contentUrl":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2020\/04\/SECURITY-e1589664916497.jpg?fit=1169%2C826&ssl=1","width":1169,"height":826,"caption":"Security Ever After"},"image":{"@id":"https:\/\/securityeverafter.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/russelleubanks","https:\/\/www.linkedin.com\/in\/russelleubanks\/"]},{"@type":"Person","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/38dd34bdece8068be18430e4c96ce5f3","name":"Russell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityeverafter.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8567bffe1f64223494326650c53f921b?s=96&r=pg","caption":"Russell"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/securityeverafter.com\/wp-content\/uploads\/2023\/02\/Trust.jpg?fit=2048%2C1015&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/1699"}],"collection":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/comments?post=1699"}],"version-history":[{"count":6,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/1699\/revisions"}],"predecessor-version":[{"id":1708,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/posts\/1699\/revisions\/1708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/media\/1705"}],"wp:attachment":[{"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/media?parent=1699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/categories?post=1699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityeverafter.com\/wp-json\/wp\/v2\/tags?post=1699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}