I-4 2022 Talk: How do I get started? Easing your company into a quantitative cyber risk program

I-4 2022 Talk: How do I get started? Easing your company into a quantitative cyber risk program

| | Presentations
This is a companion post for my talk titled, “Baby Steps: Easing your company into a quantitative cyber risk program.” This blog post contains links and resources to many of the items ...
Slide1.jpeg

SIRAcon 2021 Talk | Baby Steps: Easing your company into a quantitative cyber risk program

| | Presentations
This is a companion post for my talk titled, “Baby Steps: Easing your company into a quantitative cyber risk program.” This blog post contains links and resources to many of the items ...
SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

Overlooked: “The Biggest Risk of All”

Global cybersecurity spending totals more than $100 billion p.a., with little effect. The Business Security Weekly podcast asked: Why? ...
Extending the Zero Trust Framework to Unmanaged Devices

“Remote Work Requires Security Strategy Adjustment”

Remote work requires adjustments to ITsec strategies, says Forrester's Chase Cunningham. How to expand the Zero Trust framework to unmanaged devices? ...
The Silo Sessions # 19: Monsters, Middleboxes, and the Browser

Interview: HTTPS Interception, TLS Fingerprinting, and the Browser

In episode # 19 of Authentic8's Silo Sessions podcast, Luke Valenta and Gabriele Fisher (both Cloudflare) discuss detecting HTTPS interception with their MITMEngine tool and the MALCOLM dashboard ...
Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Cloud-based Research Platform for Threat Hunters

Webinar: Authentic8 and Recorded Future are presenting a cloud-based research platform for threat hunters ...

Secure Guardrails