Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/14/fa/fa/14fafa49-99be-17c4-69b1-d5ddb4e6cf38/mza_18080915492885783432.jpg/600x600bb.jpg
CYBR.Signal
CYBR.SEC.Media
53 episodes
3 days ago
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....
Show more...
Technology
RSS
All content for CYBR.Signal is the property of CYBR.SEC.Media and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/14/fa/fa/14fafa49-99be-17c4-69b1-d5ddb4e6cf38/mza_18080915492885783432.jpg/600x600bb.jpg
Cyclical Attack Methods
CYBR.Signal
5 minutes
1 year ago
Cyclical Attack Methods
Attack vectors and methods tend to by cyclical, meaning attackers will come back to see if old tricks will yield new results. I talk about one such attack vector that might be coming back in style... with a slight twist. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC.CON · LinkedIn · Twitter · Facebook · Instagram Check o...
CYBR.Signal
CISOs are typically not the owner of their organization's most critical (or even non-critical) assets and data. There are usually business unit leaders assigned to that, and the CISO's role is to help reduce the risk to those assets. If the CISO does have direct access to those assets, it's a bad architectural design. That's today's #CyberSunday topic. Want to reach out to the host? Email us at podcast@houstonseccon.com Hosted By: Michael Farnum Editing By: Lauren Lynch Keep up with HOU.SEC....