Sitemap - 2023 - Resilient Cyber

Resilient Cyber w/ Kevin Greene

Sitting On a Haystack of Digital Needles

SBOM Management

S5E8: Jake Meloche of Aqua Security - Cloud Native Security

Managing Open Source and SBOM's

What's in a name?

CISA and NCSC's Take on Secure AI Development

Securing your Software Supply Chain

Resilient Cyber w/ Kelly Shortridge & Ryan Petrich - OSS Security & the Federal Government

Resilient Cyber S5E7: Darwin Salazar - Data, Detections & the Cybersecurity Market

Not all BOM's are Created Equal

Modernizing FedRAMP

Secure-by-Design (and Demand)

S5E6: Allie Mellen - SecOps, Detection and AI

S5E5: Greg Rasner - Zero Trust and Third Party Risk Management

Top 10 Cybersecurity Misconfigurations

S5E4: Jonathan Rau - The Modern Security Data Landscape

Software Supply Chain Security in DevSecOps & CI/CD

Resilient Cyber Season 5 E3 - Patrick Garrity: Vulnerability Research, Management and Visualizations

S5E2: Scott Piper - Modern Cloud Security and Resilience

S5E1: Resilient Cyber w Amit Elazari - Convergence of Technology & Digital Policy

What vulnerabilities were malicious actors focused on in 2022?

S4E24: Michael McLaughlin & Bill Holstein - Battlefield Cyber

A look at the Exploit Prediction Scoring System (EPSS) 3.0

False Dichotomies and Overemphasizing Open Source Security

Striving Towards Implementing the National Cybersecurity Strategy (NCS)

Defending CI/CD Environments - The NSA/CISA Way

S4E22: Omkhar Arasaratnam - OSS and OpenSSF

S4E22 - Jerry Gambling: The Evolving Vulnerability Lanscape

The Secure Software Self-Attestation Saga Continues

S4E21: Kelly Shortridge - Security Chaos Engineering & Resilience

Cloud Compliance - At the Speed of Government

S4E20: Luke Hinds & Craig McLuckie - The Founders Journey & Software Supply Chain Security

Going Down With the Ship

Software Transparency

S4E19: Mark Montgomery - Securing the Digital Democracy

Risk Tolerance & Raising the Technical Debt Ceiling

S4E18: Joseph Lewis - Cybersecurity & Servant Leadership

S4E17: Yotam Perkal - Vulnerability Management and Modernization

The Illusion of Security and Safety

Security Throwing Toil Over the Fence

S4E16: Alfredo Hickman - SaaS Security & Third-Party Risk Management

Sign Here on the Dotted Line

Cybersecurity First Principles & Shouting Into the Void

S4E15: Tom Pace - Firmware, IoT and Cyber Physical Systems (CPS

S4E14: Josh Reiter - U.S. Navy Workforce and Cyber Superiority

The Elusive Built-in not Bolted-on

S4E13: Chris Kulakowski - Threat Hunting & Detection Engineering

Breaking Down the DoD Software Modernization Strategy

Building a Compliance and AppSec Program for a Federal Platform-as-a-Service (PaaS)

You're Vulnerable - And Malicious Actors Know It

S4E12: Kristin Saling - U.S. Army Workforce Modernization & Analytics

April Event Round-Up and Public Speaking

Vulnerability Management and Developer Toil

S4E10: Lily Zeleke - DoD Cloud & Software Modernization

Cloud Shared Responsibility Model: Time for an (R)Evolution?

Resilient Cyber Show w/ Day Johnson

Top 10 OSS Risks

S4E8: Jim Dempsey - Cyber Policy & Regulation

S4E7:Jeff Williams - DevSecOps and Application Security (AppSec)

The Combined Power of SAST and Threat Modeling

2023 National Cybersecurity Strategy

Software Supply Chain Attack Types

Resilient Cyber Show w/ Matt Cronin - Cyber Law & National Cyber Strategy

A look at the Open Software Supply Chain Attack Reference (OSC&R)

Enter the Matrix

Resilient Cyber S4E5: Robert Wood - The Soft Side of Cyber

The why and how of SaaS Governance

Resilient Cyber Show - S4E4: Derek Fisher - AppSec Handbook

Supplier Misnomer

Trust Through Transparency

Troublesome Tenants

What do you mean there isn't a patch?

S4E1: Stephen Carter - State of the Vulnerability Management Landscape

Application Security Maturity Models