Difference between revisions of "ESWEpisode190"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
 
(Added By Paul's Craptastic PPWorks Code)
Line 31: Line 31:
  
  
= 2. Interview - Scott Delong - 01:00 PM  =
+
= 2. Interview - Living through a RANSOMWARE Attack - 01:00 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
Line 39: Line 39:
  
 
=== Description ===
 
=== Description ===
 +
 +
Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott DeLong will describe the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization&#39;s susceptibility to an attack .
  
  

Revision as of 16:29, 7 July 2020

Enterprise Security Weekly Episode #190 - July 08, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. News - Enterprise News - 12:30 PM

Description

Hosts

Paul Asadoorian's Content:

Articles

  1. The Future of Zero Trust: Continuous Authentication - Signal Sciences
  2. Why You Need Recorded Futures Ultimate Security Intelligence Kit
  3. Exabeam and Armis Partner to Extend SIEM Visibility to Unmanaged and IoT Devices, Helping Security Teams Identify Malicious Activity Across All Devices
  4. Securing the Multi-Cloud Environment through CSPM and SSPM - CipherCloud
  5. Priorities in Agile Lead to Software Observability in Annual Agile Report
  6. CyberKnight joins forces with Armis to bring agentless EDR to OT, IoT and ICS environments - Intelligent Tech Channels
  7. Check Point Infinity SOC is launched
  8. Attivo Networks' enhanced EDN solution prevents attackers from seeing or exploiting production data - Help Net Security
  9. Vulcan Cyber now offers customizable vulnerability prioritization for efficient vulnerability remediation - Help Net Security
  10. Cyral ships zero trust data layer GA security platform - Help Net Security
  11. F5 Silverline Shape Defense: Protecting websites from the rising tide of fake internet traffic - Help Net Security


2. Interview - Living through a RANSOMWARE Attack - 01:00 PM

Description

Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott DeLong will describe the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization's susceptibility to an attack .


Hosts

3. Interview - Segment Info Coming Soon! - 01:30 PM

Description

Hosts