Artwork

Content provided by The EPAM Continuum Podcast Network and EPAM Continuum. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The EPAM Continuum Podcast Network and EPAM Continuum or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

Silo Busting 46: M&A and Cybersecurity with Sam Rehman, Sobhith Grandhi, and Adam Bishop

22:39
 
Distribuie
 

Manage episode 342701765 series 3215634
Content provided by The EPAM Continuum Podcast Network and EPAM Continuum. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The EPAM Continuum Podcast Network and EPAM Continuum or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
When you think of the term “mergers” what comes next? “Acquisitions,” of course! But what follows after that? How about… “cybersecurity”? Does that concept immediately pop to mind when thinking about M&A? According to the latest #CybersecurityByDesign episode of Silo Busting, it should—but perhaps this isn’t always the case. Listen as Sam Rehman, EPAM’s Chief Information Security Officer and SVP, interrogates Sobhith Grandhi, our Head of Technology for M&A, and Adam Bishop, our Head of Security Advisory, about cyber in the M&A era. The conversation centers on explaining to organizations that, as Rehman says, “cyber should be a first-class citizen during your deal flow.” Grandhi notes how much risk and uncertainty are involved in M&A situations, and how this creates opportunities for cybercriminals. “You get an e-mail that says, ‘Hey, revised org chart, please review ASAP.’ You're gonna open that attachment,” says Bishop. This is the kind of situation that attackers “prey on and count on.” They use the uncertainty of M&A to “prey on the human as the weakest link in the chain.” If you and your organization want an expert view on M&A risk factors, what the cybersecurity process looks like, the challenges of integration and evaluation, and more—this is an episode you’ll want to download. The risk, it turns out, is not listening. Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

166 episoade

Artwork
iconDistribuie
 
Manage episode 342701765 series 3215634
Content provided by The EPAM Continuum Podcast Network and EPAM Continuum. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by The EPAM Continuum Podcast Network and EPAM Continuum or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
When you think of the term “mergers” what comes next? “Acquisitions,” of course! But what follows after that? How about… “cybersecurity”? Does that concept immediately pop to mind when thinking about M&A? According to the latest #CybersecurityByDesign episode of Silo Busting, it should—but perhaps this isn’t always the case. Listen as Sam Rehman, EPAM’s Chief Information Security Officer and SVP, interrogates Sobhith Grandhi, our Head of Technology for M&A, and Adam Bishop, our Head of Security Advisory, about cyber in the M&A era. The conversation centers on explaining to organizations that, as Rehman says, “cyber should be a first-class citizen during your deal flow.” Grandhi notes how much risk and uncertainty are involved in M&A situations, and how this creates opportunities for cybercriminals. “You get an e-mail that says, ‘Hey, revised org chart, please review ASAP.’ You're gonna open that attachment,” says Bishop. This is the kind of situation that attackers “prey on and count on.” They use the uncertainty of M&A to “prey on the human as the weakest link in the chain.” If you and your organization want an expert view on M&A risk factors, what the cybersecurity process looks like, the challenges of integration and evaluation, and more—this is an episode you’ll want to download. The risk, it turns out, is not listening. Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

166 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință

Listen to this show while you explore
Play