Difference between revisions of "Enterprise Security Weekly Show Notes"

From Security Weekly Wiki
Jump to navigationJump to search
Line 4: Line 4:
 
[[ES_Episode72|Episode #72]] - Marci McCarthy, T.E.N. & ISE  
 
[[ES_Episode72|Episode #72]] - Marci McCarthy, T.E.N. & ISE  
  
[[ES_Episode71|Episode #71]] - James Wilkinson, Wells Fargo
+
[[ES_Episode71|Episode #71]] - James Wilkinson
  
 
= Previously Recorded =
 
= Previously Recorded =

Revision as of 17:53, 29 November 2017

Coming Soon

Episode #72 - Marci McCarthy, T.E.N. & ISE

Episode #71 - James Wilkinson

Previously Recorded

Episode #70 - Ismael Valenzuela, SANS Institute

Episode #69 - Tony Kirtley, SecureWorks

Episode #68 - Logan Harris, SpotterRF

Episode #67 - Bryan Patton, Quest Software

Episode #66 - Richard Moulds, Whitewood Security

Episode #65 - Cloud Security (SaaS)

Episode #64 - Mary Chaney, ICMCP

Episode #63 - Network Security Architecture

Episode #62 - Equifax Breach Insights

Episode #61 - Tom Parker, Accenture

Episode #60 - Don Pezet, ITProTV

Episode #59 - Matt Alderman and Michael Santarcangelo

Episode #58 - Vulnerability Tracking & Reporting

Episode #57 - Mike Nichols, Endgame

Episode #56 - Security Policies and Procedures

Episode #55 - Ping Look, Optiv

Episode #54 - Thomas Fischer, Digital Guardian

Episode #53 - Ferruh Mavituna, Netsparker

Episode #52 - Hardening Your Network Using Egress Filtering with Doug White

Episode #51 - Docker Security, AWS Management with Apollo Clark

Episode #50 - Brian Ventura and Ted Gary

Episode #49 - Malware: Endpoint Defense

Episode #48 - Building an Internal Penetration Testing Team

Episode #47 - Corey Bodzin, Tenable

Episode #46 - Atif Ghauri, Herjavec Group

Episode #45 - April Wright and Matt Ploessel

Episode #44 - Ryan Hays, TBG Security

Episode #43 - Don Pezet, ITPro.TV

Episode #42 - Building a Bug Bounty Program

Episode #41 - Rami Essaid, Distil Networks

Episode #40 - Gabriel Gumbs, STEALTHbits

Episode #39 - How to handle a breach: public disclosure

Episode #38 - Configuration Management

Episode #37 - Michael Dalgleish, LogRhythm

Episode #36 - Don Pezet, ITPro.TV

Episode #35 - Chris Clymer, Jack Nichelson, and Jason Middaugh, InfoSec World

Episode #34 - Jim Routh, Aetna

Episode #33 - Rules for Security Vendors

Episode #32 - Lior Frenkel, Waterfall Security

Episode #31 - Matt Alderman, Tenable Security

Episode #30 - Jayne Groll & Alan Shimel, InfoSec World

Episode #29 - Zane Lackey, Signal Sciences

Episode #28 - Michael Santarcangelo, Cyber Insurance

Episode Guide Archive

2016

2016

ES_Episode27 - "John Strand, Black Hills Infosec"

ES_Episode26 - "Don Pezet, ITPro.TV"

ES_Episode25 - "Interview with Don Pezet, ITPro.TV"

ES_Episode24 - "Top 5 Defenses Against Penetration Testers (and attackers)"

ES_Episode23 - "An Open Source Enterprise Security Program?"

ES_Episode22 - "Incident Response In The Enterprise"

ES_Episode21 - "Using Bro In The Enterprise"

ES_Episode20 - "Multi-Factor Authentication"

ES_Episode19 - "Defending IoT Devices"

ES_Episode18 - "Darkweb Monitoring"

ES_Episode17 - "Security Training For Enterprises"

ES_Episode16 - "Privileged Alphabet Soup"

ES_Episode15 - "Documentation"

ES_Episode14 - Enterprise Security User Awareness Training

ES_Episode13 - To MSSP or not to MSSP, this is the question

ES_Episode12 - Guest: Paul Paget, CEO Pwnie Express - Detecting Rogue Devices In The Enterprise

ES_Episode11 - User Behavior Analytics

ES_Episode10 - Penetration Testing

ES_Episode9 - Securing the SDLC

ES_Episode8 - Securing "Air Gapped" Networks

ES_Episode7 - Web Application Scanning

ES_Episode6 - IDS/IPS

ES_Episode5 - "SEIM"

ES_Episode4 - Patch Management

ES_Episode3 - Vulnerability Management

ES_Episode2 - Threat Intelligence

ES_Episode1 - Threat Hunting