How About This? Only Attack the Endpoints We Configured

Описание к видео How About This? Only Attack the Endpoints We Configured

All links and images for this episode can be found on CISO Series (https://cisoseries.com/how-about-this...) .


This week’s episode is hosted by me, David Spark (  / davidspark  ) (@dspark (  / dspark  ) ), producer of CISO Series and Andy Ellis (  / csoandy  ) (@csoandy (  / csoandy  ) ), operating partner, YL Ventures (http://ylventures.com/) . Joining us is our guest and winner of Season 2 of Capture the CISO (https://cisoseries.com/capture-the-ciso/) , Russell Spitler (  / russell-spitler  ) , CEO and co-founder, Nudge Security (https://www.nudgesecurity.com/) .


In this episode:


• The Gordian knot of EDR

• Can we keep up with patching?

• Making AI practical

• Standardization or granularity?


Thanks to our podcast sponsor, ThreatLocker!


(https://www.threatlocker.com/pages/so...)


ThreatLocker® is a global leader in Zero Trust endpoint security offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com (https://www.threatlocker.com/pages/so...) .

Комментарии

Информация по комментариям в разработке