Sitemap - 2022 - Resilient Cyber
Software Supply Chain Attack Types
Vulnerability Disclosure Programs (VDP) and PSIRT's
Resilient Cyber Show S3E28 w/ Chris Hetner - Cyber, the Board and Regulations
S3E27: Varun Badhwar - OSS Governance and Vulnerability Management
Dissecting the FedRAMP Authorization Act
A look at the DoD's Zero Trust Strategy
CISA’s Take on Vulnerability Prioritization and Management
Securing the Software Supply Chain
An Incomplete Look at Vulnerability Databases & Scoring Methodologies
Breaking Down the DoD Software Modernization Strategy
Microsoft’s Secure Supply Chain Consumption Framework (S2C2F)
S3E25: Richard Stiennon - Cyber Industry Research and Analysis
S3E26: Mark Curphey - Challenges in SCA/SBOM and Modernizing OWASP
S3E24: Chinmayi Sharma - Tragedy of the Digital Commons
S3E23: Richard Bird - Digital Identity & API Security
S3E22: Steve Springett - Navigating the Digital Supply Chain
S3E21: Josh Bressers - Securing Open Source Software
S3E19: Andres Vega & Andrew Clay Shafer - GRC in the Age of DevOps
S3E20: Ken Myers - Federal ICAM & Zero Trust
S3E18: Jacques Chester - Vulnerability Scoring and Software Supply Chain
S3E17: Anil Karmel - Compliance Innovation & RegOps
S3E16: Greg Thomas - Secure Service Mesh & Cloud-native Networking
S3E13: Jimmy Mesta - Kubernetes Security & Compliance
S3E14: Jon Meadows - The Secure Software Factory
S3E15: Aaron Rinehart - Chaos Engineering
S3E12: Daniel Krivelevich of Cider Security - CI/CD Pipeline Security
S3E11: Larry Clinton w/ Internet Security Alliance: Cybersecurity as a Business Risk
S3E9: Rob Black - vCISO and Story Telling
S3E10: Magno Logan - Container & Kubernetes Security
S3E8: Maril Vernon - Purple Teaming & Personal Branding
S3E5: Kelsei Young - Cybersecurity M&A & Doctoral Studies
S3E6: Walter Haydock - Software Supply Chain & Vulnerability Management
S3E7: Robert Hurlbut - All Things Threat Modeling
S3E2: Jacob Horne - Security vs. Compliance
S3E3: Dan Lorenc - Software Supply Chain, Sigstore and OSS
S3E4: Dr. Butler - Cybersecurity & Academia
S3E1: Bob Zukis - Cybersecurity in the Boardroom
S2E24: Breaking Down the DoD Continuous ATO (cATO) Memo w/ Paul Puckett & Tyler Gesling
S2E23: Greg Touhill - Security/Boardroom Leadership & Zero Trust
S2E22: HackerOne - Bug Bounty, Vulnerability Disclosure and Ethics
S2E21: Jerich Beason Emotional Intelligence, Cyber Leadership and SaaS Security
S2E20: Tidelift - Open Source Software (OSS) & Software Supply Chain
S2E19: Renee Wynn - Organizational Leadership, FISMA Reform and Soft Skills
S2E18: John Guckian - EDR, XDR and Modern Endpoint Protection
S2E17: Ron Ross (NIST) - DevSecOps, Resilience and Compliance Innovation
S2E16: Dr. Nagi Mei - Drone Security, Forensics and Regulation
S2E15: Shubhi Mishra - Government Innovation & Women in Tech
S2E14: Jacquelyn Schneider - U.S. Cybersecurity Policy & Cyber Deterrence
S2E13: Omar Marrero - Chaos Engineering and Building a Resilient DoD