Cyber Kumite Security Risk Advisors
-
- Technology
-
Cyber Kumite is a discussion of today's cybersecurity challenges. Our hosts are seasoned cybersecurity executives with hands-on, technical backgrounds. They aren't afraid to question "best practices" or emerging trends that may be overrated fads. Gain insights from guest CISOs and other experts.
Cyber Kumite is presented by Security Risk Advisors, a cybersecurity consulting firm.
Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.
-
Dredd feat. Evan Perotti
Evan Perotti has created Dredd to help automate the process of analyzing detection rules. This is a free tool downloadable from Github. Chris and Evan discuss its inspiration and many use cases.
-
Cloud Security feat. Owen Zacharias
Owen Zacharias discusses the benefits and challenges of cloud security. There are many tools and applications available to help secure your cloud environment but it is still up to you to configure and maintain the controls properly.
-
SIEM vs. UBA feat. Nick Ascoli
Nick Ascoli discusses differences between SIEM and UBA platforms, and debunks common misconceptions about UBA tools.
-
Table Top Exercises
Tim and Chris discuss the usefulness of cybersecurity TTX and how to keep the exercises fresh. Find out how to make the most of these simulations, who should be there, and how frequenly they should be performed.
-
Election Security feat. Mick Baccio
Mick Baccio, former CISO for Pete Buttigieg, talks about how he became the first Presidential Election Campaign CISO and what security challenges will be faced in the upcoming 2020 election.
Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company. -
Security Operations Metrics
Blue Teams specialist John Fung joins us to discuss Security Operations Metrics. Are they useful for measuring the security program? Which metrics are actually good? Learn how to avoid hyperbole and instead focus on manageable metrics that you can control.
Disclaimer: The views and opinions expressed in this production are those of the participants and do not necessarily reflect the official policies or positions of any other agency, organization, employer, or company.