Special thanks to Jeff Gouge for sharing his thoughts on consolidating vulnerability management. We also thank our sponsor Nucleus Security for supporting this episode.
Consistently tracking and prioritizing vulnerabilities is a difficult problem. This episode talks about it in detail and helps you increase your understanding in:
Note a Full Transcript of this podcast can be found here:
https://docs.google.com/document/d/1dWDS8rd-iscZuZ28U27IBuPPfrlFAV69/
#42 - Third Party Risk Management (with Scott Fairbrother)
#41 - Got any Threat Intelligence?
#40 - Risky Business
#39 - Stressed Out? Find your Ikigai and 6 Invaluable Factors
#38 - CMMC and Me
#37 - Cyber Security Laws & Regulations
#36 - IPv6 Your Competitive Advantage (with Joe Klein)
#35 - Setting Up an Application Security Program
#34 - Metrics that Matter
#33 - 10 Steps to Cyber Incident Response Playbooks
#32 - Brace for Incident (with Bryan Murphy)
#31 - Executive Order on Improving the Nation’s Cybersecurity
#30 - Cloud Drift (with Yoni Leitersdorf)
#29 - Identity and Access Management is the New Perimeter
#28 - AI and ML and How to Tell When Vendors Are Full of It
#27 - Roses, Buds, & Thorns
#26 - Blockchain for CISOs
#25 - Slay the Dragon or Save the Princess?
#24 - Everything you wanted to know about Ransomware
#23 - NSA’s Top 10 Cybersecurity Mitigation Strategies
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Acquired