32 episodes

A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.

Get the Supply Chain Security Toolkit from Eclypsium here: https://securityweekly.com/eclypsium

Below the Surface (Audio) - The Supply Chain Security Podcast Security Weekly Productions

    • Technology

A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.

Get the Supply Chain Security Toolkit from Eclypsium here: https://securityweekly.com/eclypsium

    Mitre ATT&CK - Adam Pennington - BTS #32

    Mitre ATT&CK - Adam Pennington - BTS #32

    We discuss the various aspects of Mitre Att&ck, including tools, techniques, supply chain aspects, and more!
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
    Show Notes: https://securityweekly.com/bts-32

    • 52 min
    Managing Complex Digital Supply Chains - Cassie Crossley - BTS #31

    Managing Complex Digital Supply Chains - Cassie Crossley - BTS #31

    Cassie has a long history of successfully managing a variety of security programs. Today, she leads supply chain efforts for a very large product company. We will tackle topics such as software supply chain management, SBOMs, third-party supply chain challenges, asset management, and more!
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
    Show Notes: https://securityweekly.com/bts-31

    • 1 hr 3 min
    Systems Of Trust - Robert Martin - BTS #30

    Systems Of Trust - Robert Martin - BTS #30

    Bob Martin comes on the show to discuss systems of trust, supply chain security and more!
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
    Show Notes: https://securityweekly.com/bts-30

    • 55 min
    Supply Chains, Firmware, And Patching - Jason Kikta - BTS #29

    Supply Chains, Firmware, And Patching - Jason Kikta - BTS #29

    Jason joins us to discuss the current enterprise landscape for defending against supply chain attacks, remediating firmware issues, and the current challenges with patch management.
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
    Show Notes: https://securityweekly.com/bts-29

    • 1 hr 6 min
    5G Hackathons - Casey Ellis - BTS #28

    5G Hackathons - Casey Ellis - BTS #28

    Casey recently was involved in an event that brought hackers and 5G technology together, tune-in to learn about the results and how we can use bug bounty programs to improve the security of "things".
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
    Show Notes: https://securityweekly.com/bts-28

    • 56 min
    Governance, Compliance, and The Digital Supply Chain - Josh Marpet - BTS #27

    Governance, Compliance, and The Digital Supply Chain - Josh Marpet - BTS #27

    In this episode, we disccuss digital supply chain governance and compliance, featuring Josh Marpet from Guarded Risk, hosted by Paul Asadorian and Alan Alford. Specifically, we discuss:
    The importance of understanding and complying with regulations affecting digital supply chains, such as Executive Order 14028 and the NIST Cybersecurity Framework. The podcast highlighted the impact of EU regulations, like CRA, GDPR, and DORA, on global businesses, underscoring the shared responsibility model in data security. Vendors' duties in open-source security and software vulnerability management were discussed, with a call for automation in software inventory and security, including the use of SBOMs. The conversation included strategies for effective supply chain risk management, advising regular updates, and understanding the interconnectedness of vulnerabilities. International compliance, particularly with EU data security laws, presents operational challenges and necessitates robust cybersecurity measures. Proactive vendor communication and automated processes are crucial for managing cybersecurity threats efficiently. Continuous risk assessment is preferred over periodic checks, with an emphasis on a nuanced approach to cybersecurity risk management.
    (00:00) - Digital Supply Chain Governance Compliance
    (14:08) - EU Regulations on Data Security
    (21:38) - Responsibility of Vendors in Open Source
    (27:49) - Supply Chain Risk Management Program Advice
    (39:01) - Automating Software Inventory and Security
    This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more!
    Show Notes: https://securityweekly.com/bts-27

    • 49 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Search Engine
PJ Vogt, Audacy, Jigsaw
Darknet Diaries
Jack Rhysider
Hard Fork
The New York Times

You Might Also Like

Security Weekly Podcast Network (Audio)
Security Weekly Productions
Unsupervised Learning
Daniel Miessler
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Risky Business
Patrick Gray
CyberWire Daily
N2K Networks
CISO Tradecraft®
CISO Tradecraft®