EPISODE 05
Navigating Breaches: Strategies for Response
Featuring guest Steve Mcnutt (Cisco)
Do you have topic or guest suggestions? Email us at podcast@katalystng.com
Episode Description
In this episode of Decrypting IT, host Ashley Wallace and guest Steven McNutt discuss the critical importance of perimeter security in today’s cybersecurity landscape. They explore the evolution of firewalls, the necessity of multi-factor authentication (MFA), and the significance of proper configuration and segmentation. The conversation also delves into breach response strategies, the role of sandboxing in threat detection, and the importance of geo-blocking. The episode concludes with actionable takeaways for organizations to enhance their firewall deployment and security posture.
Takeaways
- Perimeter security is essential for protecting organizational boundaries.
- Firewalls have evolved into comprehensive security platforms.
- Organizations must focus on both prevention and response to breaches.
- MFA is crucial for safeguarding against credential theft.
- Regularly patching firewalls is necessary to mitigate vulnerabilities.
- Understanding critical assets is key to effective network segmentation.
- Geo-blocking can significantly reduce the risk of attacks from certain regions.
- Sandboxing is an effective method for analyzing suspicious code.
- Organizations should prioritize their security strategies based on risk assessment.
- Effective firewall deployment requires knowledge of what needs protection.
Resources:
- Haven’t read the report yet? Grab your copy here: https://cybersolutions.katalystng.com/2025-cybersecurity-report-lp
- Register for the Annual Report Event: https://share.hsforms.com/1bcrrwQ6TRyeTsnu3xin1KAcp9os

Steve McNutt
Cybersecurity Technical Solutions Architect at Cisco
Steven brings a wealth of experience and credentials to the field of cybersecurity. He holds a master of science in cybersecurity and information assurance along with over 20 industry certifications and excels at simplifying complex concepts. Steve’s publications include the AWS Advanced Networking Certification Guide and the Detection and Response with XDR video training course. As a distinguished speaker, Steven shares his insights worldwide. He lives in Western North Carolina with his wife Caroline and their two dogs and enjoys mountain biking and snowboarding.

Ashley Wallace
Host of Decrypting IT and Client Success Team Lead at Katalyst