
39 episodes

Future of Cyber Security Rasool Irfan
-
- Technology
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
-
Episode 39 - GenAI and guidance to cyber security practitioners
Cyber security leaders need to be empowered addressing below GenAI impacts
What if my security team want to leverage GenAI use-cases?
What if my business team want to evaluate, experiment, perform POCs around GenAI apps?
What if my business team continue to consume the GenAI products?
What if my organizations targeted by AI attacker?
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message -
Episode 38 - RSA Conference Innovation Sandbox 2023
The RSA Conference Innovation Sandbox is an annual competition that showcases the latest and most innovative cybersecurity startups and emerging technologies. Cybersecurity professionals can learn a lot from security innovations showcased at events such as the RSA Security Conference.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message -
Episode 37 - Manage effective Container/ K8 Security Assessments
Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). Digital business require lean team with talented expertise to conduct assessment services.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message -
Episode 36 - Vulnerability Management Maturity Assessment Program
Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external professionals to conduct assessments based on defined framework across building blocks and act to mature your vulnerability management program. Listen to this podcast for more details
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message -
Episode 35 - Threat Hunting Capability Development Framework
With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message -
Episode 34 - Cyber security table top exercise (TTX)
Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success.
---
Send in a voice message: https://podcasters.spotify.com/pod/show/future-of-cybersecurity/message