<description>&lt;p&gt;All links and images can be found on &lt;a class="ql-link" href="https://cisoseries.com/is-least-privilege-dead/" target= "_blank" rel="noopener noreferrer"&gt;CISO Series.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Check out &lt;a class="ql-link" href= "https://www.linkedin.com/posts/kevin-paige-578547a_least-privilege-is-dead-im-not-saying-activity-7337863049657139201-qDrI/?rcm=ACoAABTPPZ4B1qQYPSxiaKsxlD-DogPwH6La93s" target="_blank" rel="noopener noreferrer"&gt;this post&lt;/a&gt; by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by &lt;a class="ql-link" href= "https://www.linkedin.com/in/davidspark/" target="_blank" rel= "noopener noreferrer"&gt;David Spark&lt;/a&gt;, the producer of &lt;a class="ql-link" href="https://cisoseries.com/" target= "_blank" rel="noopener noreferrer"&gt;CISO Series&lt;/a&gt;, and &lt;a class= "ql-link" href= "https://www.linkedin.com/in/geoffbelknap?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAATqPMBMBlkv1bBqllktUnsNHDfbRd7YHU" target="_blank" rel="noopener noreferrer"&gt;Geoff Belknap&lt;/a&gt;. Joining us is our sponsored guest, &lt;a class="ql-link" href= "https://www.linkedin.com/in/threatlockerrob?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABv32oBg0vU1itG6o_W1wlwefk1_7Mm4Wg" target="_blank" rel="noopener noreferrer"&gt;Rob Allen&lt;/a&gt;, chief product officer, &lt;a class="ql-link" href= "https://www.linkedin.com/company/threatlockerinc/" target="_blank" rel="noopener noreferrer"&gt;ThreatLocker&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;In this episode:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;When configuration drift becomes operational reality&lt;/li&gt; &lt;li&gt;The garden that never stops growing&lt;/li&gt; &lt;li&gt;From detection to cultural shift&lt;/li&gt; &lt;li&gt;The maturity gap&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Huge thanks to our sponsor, ThreatLocker&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;&lt;img src= "//assets.libsyn.com/show/156524/ThreatLocker_DAC_DigitalAd_1200x200px_1_3.jpg" alt="" width="600" height="100" /&gt;&lt;/em&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at &lt;a class="ql-link" href= "https://www.threatlocker.com/platform/defense-against-configurations?utm_source=ciso-series&amp;utm_medium=sponsor&amp;utm_campaign=dac_q4-oct-25&amp;utm_content=dac&amp;utm_term=display" target="_blank" rel= "noopener"&gt;https://www.threatlocker.com/&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description>

Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

How to Manage Configuration Drift

NOV 13, 202528 MIN
Defense in Depth

How to Manage Configuration Drift

NOV 13, 202528 MIN

Description

All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: When configuration drift becomes operational reality The garden that never stops growing From detection to cultural shift The maturity gap Huge thanks to our sponsor, ThreatLocker ThreatLocker® Defense Against Configurations continuously scans endpoints to uncover misconfigurations, weak firewall rules, and risky settings that weaken defenses. With compliance mapping, daily updates, and actionable remediation in one dashboard, it streamlines hardening, reduces attack surfaces, and strengthens security. Learn more at https://www.threatlocker.com/