From Paul's Security Weekly
Recorded August 14, 2019 at G-Unit Studios in Rhode Island!
- We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Stephen Smith and Jeff Braucher of LogRhythm by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand
- So many of the big East Coast cybersecurity tradeshows take place in crowded cities like Boston and New York, where parking is a nightmare and will cost you an arm and a leg. However, this year's Compass Cybersecurity Symposium is being held at Twin River Casino in Lincoln, RI, just 15 minutes outside of Providence! The venue has plenty of free and easy parking. Speakers include social engineering expert Chris Hadnagy and Security Weekly podcast founder Paul Asadoorian. Use the discount code "SW2019" to save $20 on registration!
- Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man's talk as well!
- We need your help in a survey we are running for research purposes for an upcoming webcast. How mature is your process automation for your various security capabilities? Please visit securityweekly.com/fivestagesofautomationmaturity to submit your responses to our 5 Stages of Automation Maturity Survey! We'll share the results in a webcast in November!
Interview: John Smith, ExtraHopand http://edgesightunderthehood.com http://wiredata.net and http://edgesightunderthehood.com.
I have extensive training and mentoring experience including two years as an adjunct instructor and over a dozen years of mentoring younger engineers. I have also functioned in a supervisory role either as a technical manager or team lead for over ten years including handling HR related issues, writing evaluations and assisting with career planning.
Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.
Interview: Joe Gillespie, Netsparker
Managing Vulnerabilities in the Enterprise
Managing verbalities sin the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover.
- Usability – Software that is easy to use even for non - security personnel
- Easy to use tool
- Fast deployment, quickly operational
- intuitive UI and workflow.
- What assets do I have that I need to secure?
- Accuracy – Accuracy ensures acceptance and reduces manual checking
- accuracy of the scanner
- lack of false positives
- Integration – Integrating with other tools as part of the process (Issue tracking, CI )
- Integration with other tools such as issue tracking, CI, risk management, , SSO, messaging
- API - open and documented, allows for easy integration
- SDLC Process workflow
- Automation – Automation enables the management of large numbers of vulnerabilities
- Workflows that simplify and automate processes
- Synchronization with Issue tracking (updating both sides of the process)
- Automate notifications of activities
- Automated retesting of vulnerabilities
- Resolution – Tracking results and remediation progress
- Data insights
- Data management
Interview: Brandon Edwards, Capsule8