Artwork

Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Attributive Security

Distribuie
 

Manage series 2831064
Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
  continue reading

14 episoade

Artwork

Attributive Security

updated

iconDistribuie
 
Manage series 2831064
Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
  continue reading

14 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință