<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>90</height>
  <width>600</width>
  <title>How to Manage Configuration Drift</title>
  <description>All links and images can be found on&amp;amp;nbsp;CISO Series. Check out&amp;amp;nbsp;this post&amp;amp;nbsp;by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week’s episode co-hosted by&amp;amp;nbsp;David Spark, the producer of&amp;amp;nbsp;CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode:  When configuration drift becomes operational reality The garden that never stops growing From detection to cultural shift The maturity gap  Huge thanks to our sponsor, ThreatLocker  ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at https://www.threatlocker.com/ </description>
  <author_name>Defense in Depth</author_name>
  <author_url>https://cisoseries.com/</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/38955570/height/90/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="90" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/item/38955570</thumbnail_url>
</oembed>
