Difference between revisions of "Scw51"

From Security Weekly Wiki
Jump to navigationJump to search
(Created page with " <!-- ************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! *************************** --> = Security and Compli...")
 
 
(13 intermediate revisions by the same user not shown)
Line 10: Line 10:
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
-->
 
-->
= 1. Liam Downward, CYRISMA - 12:00 PM  =
+
= 1. Data, Data, Data - Part 1 - 12:00 PM-12:30 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
-->
 
-->
  
 +
<center>{{#ev:youtube|0gxSXVZCO9A }}</center>
  
 +
 +
=== Sponsored By ===
 +
<gallery mode="packed" widths=150px heights=150px>
 +
Image:CyrismaShield-1.png
 +
</gallery>
 +
<center><strong>Visit https://securityweekly.com/cyrisma for more information!</strong></center>
 +
 +
 +
=== Announcements ===
 +
<ul style="margin-left: 50px;">
 +
 +
<li> <p>Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul&#8217;s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!</p></li>
 +
 +
<li> <p>In our upcoming webcasts &amp; technical trainings, you will learn how to thwart attackers using deception &amp; how to build a risk-based vulnerability management program! Visit https://securityweekly.com/webcasts to see what we have coming up, or visit securityweekly.com/ondemand to view our previously recorded webcasts!</p></li>
 +
 +
</ul>
  
 
=== Description ===
 
=== Description ===
  
 +
You've scanned your data to uncover risks and vulnerabilities and assigned accountability through mitigation plans to meet compliance mandates. Now you must classify, rank, prioritize and score your data to track efforts and stay organized.
 +
 +
This segment is sponsored by CYRISMA.
 +
 +
Visit https://securityweekly.com/cyrisma to learn more about them!
 +
 +
 +
 +
 +
==Guest(s)==
 +
 +
 +
===Liam Downward===
 +
<gallery mode="nolines" widths=175px heights=175px>
 +
 +
Image:LiamDownward-0.png|'''Liam Downward''' is CEO at CYRISMA<br>
 +
 +
</gallery>
 +
Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.<br>
  
  
Line 26: Line 62:
  
 
Image:Jeff_Man_2-0.jpg|<center>[https://twitter.com/@MrJeffMan Jeff Man]  - Sr. InfoSec Consultant at Online Business Systems</center>
 
Image:Jeff_Man_2-0.jpg|<center>[https://twitter.com/@MrJeffMan Jeff Man]  - Sr. InfoSec Consultant at Online Business Systems</center>
 +
 +
Image:JohnSnyder-0.png|<center>[https://twitter.com/@agneschief John Snyder]  - CEO at AGNES Intelligence</center>
 +
 +
Image:Josh_Marpet-0.jpg|<center>[https://twitter.com/@quadling Josh Marpet]  - COO at Red Lion</center>
 +
 +
Image:Scott_Lyons-0.jpg|<center>[https://twitter.com/@Csp3r Scott Lyons]  - CEO at Red Lion</center>
  
 
</gallery>
 
</gallery>
  
= 2. TBD - 12:30 PM  =
+
= 2. Data, Data, Data - Part 2 - 12:30 PM-01:00 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
-->
 
-->
 +
 +
<center>{{#ev:youtube|i9TKZ6DB7M0 }}</center>
 +
 +
 +
=== Sponsored By ===
 +
<gallery mode="packed" widths=150px heights=150px>
 +
Image:CyrismaShield-1.png
 +
</gallery>
 +
<center><strong>Visit https://securityweekly.com/cyrisma for more information!</strong></center>
  
  
 +
=== Announcements ===
 +
<ul style="margin-left: 50px;">
 +
 +
<li> <p>Join Amit Bareket, Co-founder &amp; <span class="caps">CEO</span> of Perimeter 81 &amp; Paul Asadoorian for a technical deep-dive into the problems inherent in legacy <span class="caps">VPN</span> technology. Together they will explore solutions for the modern workforce &amp; how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity. Register Now by visiting https://securityweekly.com/perimeter81</p></li>
 +
 +
<li> <p>Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam &amp; Andrea when we have upcoming webcasts &amp; technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could &#8220;hang&#8221; out with the Security Weekly crew &amp; community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe</p></li>
 +
 +
</ul>
  
 
=== Description ===
 
=== Description ===
  
 +
The conversation continues about data classification!
 +
 +
This segment is sponsored by CYRISMA.
 +
 +
Visit https://securityweekly.com/cyrisma to learn more about them!
 +
 +
 +
 +
 +
==Guest(s)==
 +
 +
 +
===Liam Downward===
 +
<gallery mode="nolines" widths=175px heights=175px>
 +
 +
Image:LiamDownward-0.png|'''Liam Downward''' is CEO at CYRISMA<br>
 +
 +
</gallery>
 +
Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.<br>
  
  
Line 45: Line 123:
  
 
Image:Jeff_Man_2-0.jpg|<center>[https://twitter.com/@MrJeffMan Jeff Man]  - Sr. InfoSec Consultant at Online Business Systems</center>
 
Image:Jeff_Man_2-0.jpg|<center>[https://twitter.com/@MrJeffMan Jeff Man]  - Sr. InfoSec Consultant at Online Business Systems</center>
 +
 +
Image:JohnSnyder-0.png|<center>[https://twitter.com/@agneschief John Snyder]  - CEO at AGNES Intelligence</center>
 +
 +
Image:Josh_Marpet-0.jpg|<center>[https://twitter.com/@quadling Josh Marpet]  - COO at Red Lion</center>
 +
 +
Image:Scott_Lyons-0.jpg|<center>[https://twitter.com/@Csp3r Scott Lyons]  - CEO at Red Lion</center>
  
 
</gallery>
 
</gallery>

Latest revision as of 00:44, 13 November 2020

Security and Compliance Weekly Episode #51 - November 10, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. Data, Data, Data - Part 1 - 12:00 PM-12:30 PM


Visit https://securityweekly.com/cyrisma for more information!


Announcements

  • Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!

  • In our upcoming webcasts & technical trainings, you will learn how to thwart attackers using deception & how to build a risk-based vulnerability management program! Visit https://securityweekly.com/webcasts to see what we have coming up, or visit securityweekly.com/ondemand to view our previously recorded webcasts!

Description

You've scanned your data to uncover risks and vulnerabilities and assigned accountability through mitigation plans to meet compliance mandates. Now you must classify, rank, prioritize and score your data to track efforts and stay organized.

This segment is sponsored by CYRISMA.

Visit https://securityweekly.com/cyrisma to learn more about them!



Guest(s)

Liam Downward

Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.


Hosts

2. Data, Data, Data - Part 2 - 12:30 PM-01:00 PM


Visit https://securityweekly.com/cyrisma for more information!


Announcements

  • Join Amit Bareket, Co-founder & CEO of Perimeter 81 & Paul Asadoorian for a technical deep-dive into the problems inherent in legacy VPN technology. Together they will explore solutions for the modern workforce & how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity. Register Now by visiting https://securityweekly.com/perimeter81

  • Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit: https://securityweekly.com/subscribe

Description

The conversation continues about data classification!

This segment is sponsored by CYRISMA.

Visit https://securityweekly.com/cyrisma to learn more about them!



Guest(s)

Liam Downward

Liam started his career in 1998 in Dublin, Ireland and each year brought new challenges and with this where my passion of Information Security grew. In 2018, he saw that Cyber Security was becoming more complex and organizations would rather ignore risks as their budgets could not afford solutions to protect their data and CYRISMA was born.


Hosts