In this episode, I sit down with a friend and ex-CIA Officer turned Cybersecurity leader, Ross Young over at CISO Tradecraft. We will be unpacking the topic of mastering the cybersecurity budget. This includes examining whether most cyber budgets are wasted, determining where and how to make investments, justifying spending, and more. Don’t miss this chance to delve into an often-overlooked subject that many Cybersecurity leaders struggle with.
All content for Resilient Cyber is the property of Chris Hughes and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode, I sit down with a friend and ex-CIA Officer turned Cybersecurity leader, Ross Young over at CISO Tradecraft. We will be unpacking the topic of mastering the cybersecurity budget. This includes examining whether most cyber budgets are wasted, determining where and how to make investments, justifying spending, and more. Don’t miss this chance to delve into an often-overlooked subject that many Cybersecurity leaders struggle with.
Resilient Cyber w/ Cory Michal (AppOmni) - Unpacking the SaaS Security Supply Chain Landscape
Resilient Cyber
24 minutes
1 month ago
Resilient Cyber w/ Cory Michal (AppOmni) - Unpacking the SaaS Security Supply Chain Landscape
- One of the biggest SaaS security incidents recently of course is the Salesloft Drive/Salesforce incident, which impacted hundreds of organizations and involved compromised OAuth tokens. Can you tell us a bit about the incident and the fallout? - In an AppOmni blog on the incident, you all discuss attackers taking advantage of persistent OAuth access, over-permissive access, limited monitoring, and unsecured secrets. Why do these problems continue to plague organizations despite incidents li...
Resilient Cyber
In this episode, I sit down with a friend and ex-CIA Officer turned Cybersecurity leader, Ross Young over at CISO Tradecraft. We will be unpacking the topic of mastering the cybersecurity budget. This includes examining whether most cyber budgets are wasted, determining where and how to make investments, justifying spending, and more. Don’t miss this chance to delve into an often-overlooked subject that many Cybersecurity leaders struggle with.