התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


Outsourcing Teaming, Testing, and Trust with Third Parties
Manage episode 377492500 series 2683101
A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”.
Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
78 פרקים
Manage episode 377492500 series 2683101
A few months back, ThreatTalk guest Amit Singh helped us consider some of the reasons a recent SANS 2022 SOC Survey showed so many organizations turning to ‘outsourcing’ to bolster their SOC capabilities. His Australian/New Zealand cybersecurity company, 3columns, has loaned him to us again to help us drill down into the pros and cons of outsourced Pen Testing, Red Teaming, and Purple Teaming which the SANS report showed to be the top 3 most outsourced SOC functions. Unless your security team is well-funded to do everything internally, this episode is a “must-listen”.
Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, PocketCasts or your favorite podcast app.
78 פרקים
Todos los episodios
×
1 The Good, the Bad, and the Cybersecurity AI to Sort It All Out 30:30

1 Meet the Authors: Abusing DNS as Transport 28:53

1 Breaking Down Domain Takedown Services 34:19

1 Meet the Authors: Countering Redirection and Misdirection with DNS 30:33

1 Outsourcing Teaming, Testing, and Trust with Third Parties 22:49

1 Meet the Authors: DNS Insecurity, or DNS in Security? 29:01

1 Overkill or ‘Just Right’? The Cybersecurity Role of Service Providers 29:20

1 The Care and Feeding of an Effective Threat Intelligence System 30:48

1 Security Outsourcing: Why, When and How to Make it Work 23:34

1 The community has spoken: Top Topics of Q2’ 23 29:41

1 Center Stage: Persistent Infrastructure Threat Actors 29:47

1 Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study 30:09

1 Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage 28:09

1 Show Me the Value: Understanding the Security Channel Landscape 21:37

1 Are There Smarter Ways to Gather and Apply Threat Intelligence? 33:25

1 A SANS Author Interview: A DNS Security Architecture as a SecOps Force Multiplier 32:24

1 Part 2 | Eliminating Blind Spots: A Forrester Report on 20-20 Visibility 32:18

1 Eliminating Blind Spots: A Forrester Report on 20-20 Visibility 30:38

1 Bringing Shadow IT into the Light 29:55

1 Re:Bots in Disguise-Detecting Cyberthreat Camouflage 31:04

1 Losing Sleep over Security: A Halloween Review 31:54

1 Managing Risk While Getting Closer to the Network Edge 27:45

1 Paying for Protection: What is the Performance Cost of Security? 30:21

1 A Researchers Story: Uncovering the Omnatour Malvertising Network 31:48

1 Putting Threat Intelligence Labs Under the Microscope 29:56

1 Decisions, Decisions: Vulnerable, Exploitable, Patchable or Possibly Ignorable? 30:04

1 Summer Revival: Sharing Responsibility Between IT and End Users 31:45

1 Solving Hidden SecOps Vulnerabilities with Network Discovery 31:14

1 On Top of Everything Else - Why DNS for Security 30:00
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.