And There You Have It!
Pillar Two: Threat and Vulnerability Management [Six Pillars of Security]
- Author: Vários
- Narrator: Vários
- Publisher: Podcast
- Duration: 0:11:57
- More information
Informações:
Synopsis
In this episode about threat and vulnerability management, Cherie and Matt discuss How sometimes even the most dangerous cyber threats boil down to the simple principles of an old-fashioned con How the uptick in social engineering has affected threat and vulnerability management The importance of vulnerability assessments and the surprising security gaps they can reveal Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principal consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we’ll explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the series: The Six Pillars of Security: Pillar One, Data Protection. The Six Pillars of Security: Pillar One, Data Protection – The first episode in, “The Six Pillars of Security,” series. In this episode, our expert discusses why shifting to a