Topics
Industry
Events
Podcasts
Research
Recognition
Leadership
Business Security WeeklySubscribe
Asset Management, Hardware security, Configuration management, Careers, Blue team, Endpoint Security, Endpoint Security

BSW #187

September 14, 2020
Section 0

In the Leadership and Communications section, we’re playing 3 questions – Does Your Board Really Understand Your Cyber Risks?, How can the C-suite support CISOs in improving cybersecurity?, Think You’re Spending Enough on Security?, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

Cyber Risks, C-Suite Supporting CISOs, & Cybersecurity Spending

None

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Announcements

  • BSides Boston is back in action for their 10 year anniversary! The conference will be held on Saturday, September 26th & tickets are only $10! You can get yours at https://bsidesbos.org! Some of the Security Weekly team will be in our own channel on the BSides Boston Discord server answering questions and possibly doing some contests!

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting https://securityweekly.com/subscribe and clicking the button to join the list!

http://traffic.libsyn.com/sw-all/BSW_187_-_Articles-0_converted.mp3
Section 1

Sponsored By

sponsor
Visit https://securityweekly.com/eclypsium for more information!

Cyber adversaries have mastered the art of staying one step ahead of our controls. As endpoint protections grow stronger, attackers have adapted by going further down the stack – targeting firmware, hardware and device-level vulnerabilities. Eclypsium’s John Loucaides discusses recent exploits, and the steps business security leaders should be taking to protect the foundations of the enterprise.

This segment is sponsored by Eclypsium.

Visit https://securityweekly.com/eclypsium to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes!

Full Episode Show Notes

Cracks in the Foundation: Understanding the New Endpoint Challenge

None

Hosts

Jason Albuquerque

Jason Albuquerque – CIO & CSO

Matt Alderman

Matt Alderman – CEO

Paul Asadoorian

Paul Asadoorian – Founder & CTO

Guests

John Loucaides

John Loucaides – VP of Research & Development

Announcements

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting https://securityweekly.com/subscribe and clicking the button to join the list!

  • Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!

http://traffic.libsyn.com/sw-all/BSW_187_-_John_Loucaides_Exclypsium-0_converted.mp3

Related

Asset Management
Log4j heightens security, resources divide between healthcare and other sectors

Jessica DavisMay 19, 2022

Instances of Log4j have drastically reduced among entities with advanced security tools like automation. But in healthcare the vulnerability has only highlighted continued resource gaps.

Asset Management
Prominent IT security group recommends SEC reconsider proposed incident reporting rules

Karen HoffmanMay 11, 2022

The Internet Security Alliance weighed in on cybersecurity reporting rules proposed by the Securities and Exchange Commission that would require organizations to report significant incidents within four days.

Asset Management
White House rolls out new timelines, mandates for ‘post quantum’ encryption replacement

Derek B. JohnsonMay 4, 2022

In a newly released national security memorandum, the White House makes supremacy in the quantum realm the official policy of the United States and lays out a host of timelines and mandates for the “timely and equitable” replacement of classical, public-key encryption algorithms in federal systems and devices.

prestitial ad

About Us
SC MediaCyberRisk AllianceContact UsCareersPrivacy
Get Involved
SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us
Explore
Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.