How do you defend against automated attacks in an era of ChatGPT-formulated malware, coordinated nation-state actors, and a host of disgruntled laid-off security professionals? Want to find your vulnerabilities faster than the bad actors do? Come listen to Richard Ford to learn how to apply best practices in attack surface management and defend your crown jewels.
Special thanks to our sponsor Praetorian for supporting this episode.
Full Transcripts - https://docs.google.com/document/d/18QyrN-7V91nxOyRQ0KsNeJU0-k-bTlqj
Chapters:
#179 - The 7 Broken Pillars of Cybersecurity
#178 - Cyber Threat Intelligence (with Jeff Majka & Andrew Dutton)
#177 - 2024 CISO Mindmap (with Rafeeq Rehman)
#176 - Reality-Based Leadership (with Alex Dorr)
#175 - Navigating NYDFS Cyber Regulation
#174 - OWASP Top 10 Web Application Attacks
#173 - Mastering Vulnerability Management
#172 - Table Top Exercises
#171 - Navigating Software Supply Chain Security (with Cassie Crossley)
#170 - Responsibility, Accountability, and Authority
#169 - MFA Mishaps
#168 - Cybersecurity First Principles (with Rick Howard)
#167 - Cybersecurity Apprenticeships (with Craig Barber)
#166 - Cyber Acronyms You Should Know
#165 - Modernizing Our SOC Ingest (with JP Bourget)
#164 - The 7 Lies in Cyber
#163 - Operational Resilience
#162 - CISO Predictions for 2024
#161 - Secure Developer Training Programs (with Scott Russo) Part 2
#160 - Secure Developer Training Programs (with Scott Russo) Part 1
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room