התחל במצב לא מקוון עם האפליקציה Player FM !
How to Protect Your Accounting Firm From Cyber Attacks
Manage episode 303483101 series 1056289
Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements
333 פרקים
How to Protect Your Accounting Firm From Cyber Attacks
Growing Your Firm | Strategies for Accountants, CPA's, Bookkeepers , and Tax Professionals
Manage episode 303483101 series 1056289
Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements
333 פרקים
すべてのエピソード
×ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.