Third Party Threat Hunters Gregory Rasner
-
- Technology
A dialogue with leaders in Cybersecurity and Third-Party Risk Management led a leader in the field: Gregory Rasner (author, "Cybersecurity & Third-Party Risk: Third-Party Threat Hunting" and "Zero Trust and Third-Party Risk: Reduce the Blast Radius")
-
Third Party Threat Hunters: S2:E1 Julie Gaiaschi and TPRA
SummaryThe conversation covers the Third Party Risk Association's training and certification programs, upcoming events, and the development of new certificate programs. It also delves into the importance of third-party risk management, compliance, and resilience. The discussion highlights the need for specialized training and tools in the field of third-party risk management.KeywordsThird Party Risk Association, certification programs, training, compliance, resilience, third-party risk manage...
-
Third Party Threat Hunters Podcast: Guest Jay Bobo
SummaryIn this episode, Gregory interviews Jay Bobo, the creator and CEO of Breach Siren, about third-party risk management. They discuss the challenges of using crappy and expensive tools in the space, the need for accountability from regulators and ISACs, and the financial impact of third-party risk. They also explore how cybersecurity breaches can affect other risk domains and the importance of risk identification and event notification. The conversation concludes with a plan to continue d...
-
TPTHunters Quick Clip: LLM Use in Threat Modeling
Guest Adam Shostack helps us understand how Large Language Model is useful (and maybe not so) in threat modeling.
-
TPTHunters Quick Clip: Danger of Deepfakes in Politics with Dr. Zero Trust #deepfake
-
Third Party Threat Hunters Quick Clip: Threat Modeling for Third-Party Risk with Adam Shostack
-
Third Party Threat Hunters: Guest Adam Shostack
On this episode we talk to Threat Modeling guru Adam Shostack (check out his website https://shostack.org/about/adam) and discuss some great topics:1. Cyber Public Health Initiative - how do we measure progress in cyber?2. Language Learning Models in Threat Modeling3. How to use Threat Modeling in Third-Party Risk