Harlan and host Jeremy also explore the claim that there's a lack of cybersecurity talents and whether organizations should have an organic incident response, outsource the function to managed service providers, or adopt an approach that combines both choices.
👉 What is threat hunting?
👉 How to tell the difference between legitimate vs illegitimate access?
👉 Differences between Digital Forensics, Threat Hunting, and Incident Response
👉 The Threat Hunting and Incident Response process
👉 Is Windows still the most targeted system by threat actors?
👉 Is there really a shortage of cybersecurity talent?
👉 Should your organization have an organic security team or employ managed services for Threat Hunting and DFIR?
In this episode of the Ask a CISO podcast, we talk about application security with guest Tanya Janca.
After a brief hiatus, we are back with Season 3 of the Ask A CISO podcast. There are quite a few things we are doing differently this season (details below), but first, let's welcome our first guest for the new season: Fausto Lendeborg, Co-Founder and Chief Customer Officer of Secberus, and learn more about his start in cybersecurity, DDoS attacks, dealing with alert fatigue, and understanding what IaC, SaC, and PaC are.
Join us on this episode of the Ask A CISO podcast as we discuss AI and ML in cybersecurity with Diana Kelley, CISO and co-founder of Cyberize. With International Women's Day in a week, we also look at the challenges of recruiting women and diversity in the tech sphere.