Sitemap - 2022 - Resilient Cyber

Software Supply Chain Attack Types

Vulnerability Disclosure Programs (VDP) and PSIRT's

Resilient Cyber Show S3E28 w/ Chris Hetner - Cyber, the Board and Regulations

OMB 22-18 and NIST's SSDF

S3E27: Varun Badhwar - OSS Governance and Vulnerability Management

Dissecting the FedRAMP Authorization Act

A look at the DoD's Zero Trust Strategy

CISA’s Take on Vulnerability Prioritization and Management

Securing the Software Supply Chain

An Incomplete Look at Vulnerability Databases & Scoring Methodologies

Breaking Down the DoD Software Modernization Strategy

Microsoft’s Secure Supply Chain Consumption Framework (S2C2F)

S3E25: Richard Stiennon - Cyber Industry Research and Analysis

S3E26: Mark Curphey - Challenges in SCA/SBOM and Modernizing OWASP

S3E24: Chinmayi Sharma - Tragedy of the Digital Commons

Coming soon

S3E23: Richard Bird - Digital Identity & API Security

S3E22: Steve Springett - Navigating the Digital Supply Chain

S3E21: Josh Bressers - Securing Open Source Software

S3E19: Andres Vega & Andrew Clay Shafer - GRC in the Age of DevOps

S3E20: Ken Myers - Federal ICAM & Zero Trust

S3E18: Jacques Chester - Vulnerability Scoring and Software Supply Chain

S3E17: Anil Karmel - Compliance Innovation & RegOps

S3E16: Greg Thomas - Secure Service Mesh & Cloud-native Networking

S3E13: Jimmy Mesta - Kubernetes Security & Compliance

S3E14: Jon Meadows - The Secure Software Factory

S3E15: Aaron Rinehart - Chaos Engineering

S3E12: Daniel Krivelevich of Cider Security - CI/CD Pipeline Security

S3E11: Larry Clinton w/ Internet Security Alliance: Cybersecurity as a Business Risk

S3E9: Rob Black - vCISO and Story Telling

S3E10: Magno Logan - Container & Kubernetes Security

S3E8: Maril Vernon - Purple Teaming & Personal Branding

S3E5: Kelsei Young - Cybersecurity M&A & Doctoral Studies

S3E6: Walter Haydock - Software Supply Chain & Vulnerability Management

S3E7: Robert Hurlbut - All Things Threat Modeling

S3E2: Jacob Horne - Security vs. Compliance

S3E3: Dan Lorenc - Software Supply Chain, Sigstore and OSS

S3E4: Dr. Butler - Cybersecurity & Academia

S3E1: Bob Zukis - Cybersecurity in the Boardroom

S2E24: Breaking Down the DoD Continuous ATO (cATO) Memo w/ Paul Puckett & Tyler Gesling

S2E23: Greg Touhill - Security/Boardroom Leadership & Zero Trust

S2E22: HackerOne - Bug Bounty, Vulnerability Disclosure and Ethics

S2E21: Jerich Beason Emotional Intelligence, Cyber Leadership and SaaS Security

S2E20: Tidelift - Open Source Software (OSS) & Software Supply Chain

S2E19: Renee Wynn - Organizational Leadership, FISMA Reform and Soft Skills

S2E18: John Guckian - EDR, XDR and Modern Endpoint Protection

S2E17: Ron Ross (NIST) - DevSecOps, Resilience and Compliance Innovation

S2E16: Dr. Nagi Mei - Drone Security, Forensics and Regulation

S2E15: Shubhi Mishra - Government Innovation & Women in Tech

S2E14: Jacquelyn Schneider - U.S. Cybersecurity Policy & Cyber Deterrence

S2E13: Omar Marrero - Chaos Engineering and Building a Resilient DoD

S2E12: Dr. Nikki Robinson - Vulnerability Chaining