26 min

Federal Vulnerability Scanning Mandates 2022 The Digital Decode

    • Technology

The United States’ Cybersecurity & Infrastructure Security Agency is implementing a series of regulations regarding asset vulnerability and scanning to advance their leadership within the cybersecurity landscape. In this episode, Andy Richter and Dan Lohrmann close out Cyber Security Awareness month by discussing how this will affect actors in the private sector, local and state governments. 
Once you’re done listening to the episode, you can follow these links to learn more specifics about the mandates and their implementation:  
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/three-cybersecurity-surprises-from-state-security-chiefs 
https://www.cisa.gov/binding-operational-directive-23-01 
https://www.cybersecuritydive.com/news/cisa-mandates-agencies-software-vulnerabilities/633274/ 
https://www.theregister.com/2022/10/04/cisa_software_vulnerability_directive/ 
https://www.gsa.gov/cdnstatic/Vulnerability-Management-Process-%5BCIO-IT-Security-17-80-Rev-2%5D-12-30-2021docx.pdf 
https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf 

The United States’ Cybersecurity & Infrastructure Security Agency is implementing a series of regulations regarding asset vulnerability and scanning to advance their leadership within the cybersecurity landscape. In this episode, Andy Richter and Dan Lohrmann close out Cyber Security Awareness month by discussing how this will affect actors in the private sector, local and state governments. 
Once you’re done listening to the episode, you can follow these links to learn more specifics about the mandates and their implementation:  
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/three-cybersecurity-surprises-from-state-security-chiefs 
https://www.cisa.gov/binding-operational-directive-23-01 
https://www.cybersecuritydive.com/news/cisa-mandates-agencies-software-vulnerabilities/633274/ 
https://www.theregister.com/2022/10/04/cisa_software_vulnerability_directive/ 
https://www.gsa.gov/cdnstatic/Vulnerability-Management-Process-%5BCIO-IT-Security-17-80-Rev-2%5D-12-30-2021docx.pdf 
https://www.fedramp.gov/assets/resources/documents/CSP_Vulnerability_Scanning_Requirements.pdf 

26 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider