2023 RSAC
Subscribe2023 RSAC #4
Full episode and show notesSegments
Is Your Org Ready for its Next Breach? Preparing for a Security Incident – Jon Check – RSA23 #4
The reality is no organization is insusceptible to a breach – and security teams, alongside the C-suite, should prepare now to make the response more seamless once a crisis does happen. Based on his experience working 1:1 with security leaders in the private and public sectors, Jon Check, executive ...
How Automated Security Validation is Revolutionizing Security – Amitai Ratzon – RSA23 #4
While companies utilize dozens of security solutions, they continue to be compromised and are continually searching for their real cybersecurity gaps amongst the overload of vulnerability data. A primary issue security teams face is that they lack a way to continuously validate the effectiveness of ...
DigiCert: Digital Trust is a Strategic Imperative – Deepika Chauhan – RSA23 #4
In today’s hyper-connected world, devices are everywhere, people are online constantly and sensitive data has moved to the cloud. Given these trends, organizations are making digital trust a strategic imperative. More than ever, companies need a unified platform, modern architecture and flexible dep...
How No-code Automation is Tackling Burnout and Human Error in Cybersecurity – Thomas Kinsella – RSA23 #4
Security teams are always on the lookout for external threats that can harm our organizations. However, an internal threat can derail productivity and lead to human error and burnout: repetitive, mundane tasks. To effectively defend against evolving threats, organizations must leverage no-code autom...
How to Get and Stay Cyber Ready – Nick Biasini – RSA23 #4
“Man plans, the Universe laughs” - unfortunately, that’s been the saying for far too long when it comes to cybersecurity. Security leaders know it's only a matter of time before their organization gets breached, but instead of being ready for it, they rely on fixing the problem after it happens. In ...
Malicious Packages Unwrapped – Getting Ahead of Application Infiltration – Jeff Martin – RSA23 #4
Unlike vulnerabilities, which can and do often exist for months or years in application code without being exploited, a malicious package represents an immediate threat to an organization, intentionally designed to do harm. In the war for cybersecurity, attackers are innovating faster than companies...
2023 RSAC #3
Full episode and show notesSegments
Identity: The Key to an Enhanced, Safer Connected Car Experience – Eve Maler – RSA23 #3
Cars have evolved from a physical mode of transportation to a digitized experience, bringing with it new risks and challenges in security, privacy and user experience. Putting identity at the center of the connected world solves simplicity and safety challenges, including physical safety, digital se...
Business Priorities – Not Tools – Should Dictate Cybersecurity Strategy – Mayeuresh Ektare – RSA23 #3
Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization’s...
How Security Leaders can Demonstrate Value by Reducing Costs Securely – Lenny Zeltser – RSA23 #3
Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organizati...
Digital Identity: The Key to Unlocking Trust Online With Your Customers – Michaël Lakhal – RSA23 #3
There is a war on trust in the digital world, and people are caught in the crosshairs. Everywhere we look, there are identity risks with crippling repercussions for businesses, whether fake people, fake content, or insecure web links. With the rise of generative AI tools in business, threat actors a...
Shrinking AppSec Risk: New Invicti Research Sees Systematic Testing Proving its Worth – Patrick Vandenberg – RSA23 #3
Without visibility into your entire web application attack surface and a continuous find and fix strategy, dangerous threats can expose your organization's blind spots and create risk. Invicti analyzes common web application vulnerabilities across thousands of assets yearly and releases the Invicti ...
It’s Time for CISOs to Prioritize XDR – Jason Rolleston – RSA23 #3
Today’s CISOs are laser focused on three imperatives: reducing risk; reducing operational costs, and attracting or retaining top talent. All three priorities are driven by creating a better SOC analyst experience which translates to less time to detect and respond to an attack. In this discussion, w...
How to Effectively Identify and Mitigate Business Logic Attacks – Karl Triebes – RSA23 #3
Flaws in the design and implementation of an application can create business logic vulnerabilities that allow attackers to manipulate legitimate functionality to achieve a malicious goal. What’s more, API-related security incidents exploit business logic, the programming that manages communication b...
How to Improve Active Directory Resilience When the Cards Are Stacked Against You – Mickey Bresman – RSA23 #3
Semperis CEO Mickey Bresman sits down with SC Magazine to share practical steps for improving Active Directory resilience in the face of escalating cyberattacks, using real-world examples. With cybercrime costs projected to reach $8 trillion in 2023 and AD being the top target for attackers, organiz...
Security Operations and the Vulnerability Shell Game – Dave Merkel – RSA23 #3
While emerging cyber threats and vulnerabilities tend to dominate headlines, criminals often exploit known vulnerabilities to gain access to critical systems and data for nefarious purposes. And with the number of vulnerabilities rising constantly, they can pose significant risk to organizations, es...
2023 RSAC #2
Full episode and show notesSegments
Detecting Software Supply Chain Breaches with GitGuardian Honeytoken – Eric Fourrier – RSA23 #2
In the ever-evolving world of cybersecurity, attackers are constantly finding new ways to infiltrate your software supply chains. But with GitGuardian's Honeytoken, you can stay ahead of the game. Deploy honeytokens at scale, monitor for unauthorized use, and detect intrusions before they can wreak ...
Balancing Security Maturity and Operational Burden – John Grancarich – RSA23 #2
Today’s security products are evolving to meet the changing attack surface, each one targeting a specific set of risks. For organizations, this typically means that to increase security maturity, they need to implement a number of different solutions, and as the attack surface continues to expand, t...
Hackers Increasingly Targeting Mobile Apps – Asaf Ashkenazi – RSA23 #2
Learn how hackers are exploiting the trust that mobile app owners place in their customers. Hackers are increasingly modifying app code, posing as trusted customers, and infiltrating IT infrastructure.
This segment is sponsored by Verimatrix. Visit https://securityweekly.com/verimatrixrsac to learn...
Build Resiliency in Security Posture – Rhett Dillingham – RSA23 #2
Resilience and the capacity for reinvention have never been more important. In a world evolving at the speed of tech and roiled by the pandemic, enterprises that have security innovation woven into their DNA enjoy a distinct advantage. Learn more.
This segment is sponsored by Sumo Logic. Visit htt...
Streamline Your Security Position and Strengthen It in the Process – Richard Yew – RSA23 #2
New security vulnerabilities are growing by more than 24% YoY and critical zero day exploits are occuring at an increasing frequency. At least a quarter of internet traffic is from botnets that are constantly scanning and attacking websites 24x7. Recently, cyber attack group i.e. Killnet and Anonymo...
Why CISOs Should Consider an MSSP and How to Choose the Right One for You – Jim Broome – RSA23 #2
A resilient cybersecurity strategy is essential to running your business while protecting against security threats and preventing data breaches. For CISOs, partnering with a managed service security provider (MSSP) means you can be in control of your organization’s information and infrastructure sec...
AI-Powered Phishing Campaigns on the Rise: New Research – Deepen Desai – RSA23 #2
The increased prevalence of phishing kits sourced from black markets and chatbot AI tools like ChatGPT has seen attackers quickly develop more targeted phishing campaigns. This improved targeting has simplified the process of manipulating users into taking actions that compromise their security cred...
Reduce Your Attack Surface by Automating IT Management and Security Operations – Ashley Leonard – RSA23 #2
Enterprises are struggling to manage and reduce their organizational attack surface, especially with a shortage of skilled staff. Find out how some security executives are tackling this challenge by automating their IT and vulnerability management.
Segment Resources:
https://hubs.la/Q01K-vgs0
http...
Why Insider Risk is One of the Hardest Cybersecurity Threats to Solve – Joe Payne – RSA23 #2
Insider Risk is a problem that continues to grow - and that companies are still struggling to solve. CISOs state that it is the number one most difficult threat to detect, placing it over malware and ransomware. Code42 President and CEO Joe Payne will explain why the Insider Risk problem is so chall...
2023 RSAC #1
Full episode and show notesSegments
Lateral Security Is The New Cybersecurity Battleground – Christopher Kruegel – RSA23 #1
Christopher will delve into what lateral security/lateral movement are and identify key lateral security tools (network segmentation, micro-segmentation, advanced threat prevention systems, network sandboxes, and network traffic analysis/network detection and response).
He will also touch on why a...
Understanding the Edge Ecosystem and its Impact on Business – Theresa Lanowitz – RSA23 #1
AT&T Cybersecurity released its 12th annual Cybersecurity Insights Report, “Edge Ecosystem,” which highlights the dramatic shift in computing underpinned by 5G, the edge, and the convergence of networking and security. The report found that business and technology leaders are finally coming toge...
The Evolution of External Attack Surface Management (EASM) – Vinay Anand – RSA23 #1
EASM is a critical component of continuous threat exposure management and a necessary step in improving validation and vulnerability management processes. Gartner recently published a report describing the evolution of EASM and where it's headed in the market.
We're excited to see the market move i...
RSA Conference 2023: A report from the trenches – Steve Ragan – RSA23 #1
Bill Brenner, VP of content strategy at CyberRisk Alliance, and Cisco storyteller/team leader/editor Steve Ragan discuss the issues security professionals are sinking their teeth into at RSA Conference 2023, including:
- Threats organizations face amid geopolitical strife (Russia/Ukraine, China, No...
OpenText Cybersecurity: Delivering Smarter, Simpler Security – Geoff Bibby – RSA23 #1
OpenText Cybersecurity is on a mission to simplify security by delivering smarter, innovative solutions. Geoff Bibby, the SVP of OpenText Cybersecurity Marketing & Strategy, will offer insight into the company’s purpose-built approach to create a powerhouse cybersecurity portfolio that scales to...
So You Want to be a CISO? Here’s What You Need to Know. – Kunal Anand – RSA23 #1
CISOs face the complex challenge of protecting organizations against an expanding array of cybersecurity risks. While the role requires constant adaptation to protect against new threats, CISOs often bear the blame when defenses are breached. In this segment Kunal Anand, CTO & CISO, Imperva, dis...
The Rise of MDR: Combating Cyber Threats Amidst Headcount Shortages – Randy Watkins – RSA23 #1
The continued headcount shortage facing cybersecurity teams is driving many organizations to embrace Managed Detection and Response (MDR) as a way to combat cyber threats. With this demand, dozens of MDR companies have emerged over the past two years. Critical Start’s CTO, Randy Watkins, will discus...
Consumer Trends Causing Enterprise-Wide Problems – Brian Kenyon – RSA23 #1
The browser is the most used application, but was never built with the needs of the enterprise in mind. The Enterprise Browser delivers a whole new level of visibility, security and governance. This conversation will explore the benefits of the Enterprise Browser and the gaps it is filling for enter...