Security Operations and the Vulnerability Shell Game – Dave Merkel – RSA23 #3
While emerging cyber threats and vulnerabilities tend to dominate headlines, criminals often exploit known vulnerabilities to gain access to critical systems and data for nefarious purposes. And with the number of vulnerabilities rising constantly, they can pose significant risk to organizations, especially if defenders don’t know which ones are critical. Learn how Expel is helping to pull back the curtain on how organizations can more effectively prioritize their most critical vulnerabilities.
Segment Resources: Blog post on new integrations - "Integrations roundup: new integrations to manage overall business risk" : https://expel.com/blog/integrations-roundup-new-integrations-to-manage-overall-business-risk/
Press release on MDR for Kubernetes - "Expel Advances Leadership in Cloud Security with MDR for Kubernetes " : https://expel.com/resource/expel-advances-leadership-in-cloud-security-with-mdr-for-kubernetes/
This segment is sponsored by Expel. Visit https://securityweekly.com/expelrsac to learn more about them!
Dave Merkel (aka “Merk”) is the co-founder of Expel as well as our Chief Executive Officer (CEO). Dave has been involved in the information security field for nearly 30 years, first as a federal agent pursuing cyber criminals in the era of floppy disks and 2400 baud modems, then as Chief Technology Officer (CTO) and vice president of products at Mandiant. Following FireEye’s acquisition of Mandiant, Dave served as the global CTO of FireEye.
Before Dave’s 10 years as a solutions provider, he spent another decade as a security practitioner. He got his start as a special agent in the Air Force Office of Special Investigations, pursuing cyber criminals and conducting digital forensic investigations, and later as head of AOL’s technical security organization. While at AOL, he created and ran the first incident response capability for AOL and Time Warner, managed software security and policy programs, and built technologies for AOL’s security infrastructure.