Sitemap - 2023 - Resilient Cyber
Resilient Cyber w/ Kevin Greene
Sitting On a Haystack of Digital Needles
S5E8: Jake Meloche of Aqua Security - Cloud Native Security
Managing Open Source and SBOM's
CISA and NCSC's Take on Secure AI Development
Securing your Software Supply Chain
Resilient Cyber w/ Kelly Shortridge & Ryan Petrich - OSS Security & the Federal Government
Resilient Cyber S5E7: Darwin Salazar - Data, Detections & the Cybersecurity Market
Not all BOM's are Created Equal
S5E6: Allie Mellen - SecOps, Detection and AI
S5E5: Greg Rasner - Zero Trust and Third Party Risk Management
Top 10 Cybersecurity Misconfigurations
S5E4: Jonathan Rau - The Modern Security Data Landscape
Software Supply Chain Security in DevSecOps & CI/CD
Resilient Cyber Season 5 E3 - Patrick Garrity: Vulnerability Research, Management and Visualizations
S5E2: Scott Piper - Modern Cloud Security and Resilience
S5E1: Resilient Cyber w Amit Elazari - Convergence of Technology & Digital Policy
What vulnerabilities were malicious actors focused on in 2022?
S4E24: Michael McLaughlin & Bill Holstein - Battlefield Cyber
A look at the Exploit Prediction Scoring System (EPSS) 3.0
False Dichotomies and Overemphasizing Open Source Security
Striving Towards Implementing the National Cybersecurity Strategy (NCS)
Defending CI/CD Environments - The NSA/CISA Way
S4E22: Omkhar Arasaratnam - OSS and OpenSSF
S4E22 - Jerry Gambling: The Evolving Vulnerability Lanscape
The Secure Software Self-Attestation Saga Continues
S4E21: Kelly Shortridge - Security Chaos Engineering & Resilience
Cloud Compliance - At the Speed of Government
S4E20: Luke Hinds & Craig McLuckie - The Founders Journey & Software Supply Chain Security
S4E19: Mark Montgomery - Securing the Digital Democracy
Risk Tolerance & Raising the Technical Debt Ceiling
S4E18: Joseph Lewis - Cybersecurity & Servant Leadership
S4E17: Yotam Perkal - Vulnerability Management and Modernization
The Illusion of Security and Safety
Security Throwing Toil Over the Fence
S4E16: Alfredo Hickman - SaaS Security & Third-Party Risk Management
Cybersecurity First Principles & Shouting Into the Void
S4E15: Tom Pace - Firmware, IoT and Cyber Physical Systems (CPS
S4E14: Josh Reiter - U.S. Navy Workforce and Cyber Superiority
The Elusive Built-in not Bolted-on
S4E13: Chris Kulakowski - Threat Hunting & Detection Engineering
Breaking Down the DoD Software Modernization Strategy
Building a Compliance and AppSec Program for a Federal Platform-as-a-Service (PaaS)
You're Vulnerable - And Malicious Actors Know It
S4E12: Kristin Saling - U.S. Army Workforce Modernization & Analytics
April Event Round-Up and Public Speaking
Vulnerability Management and Developer Toil
S4E10: Lily Zeleke - DoD Cloud & Software Modernization
Cloud Shared Responsibility Model: Time for an (R)Evolution?
Resilient Cyber Show w/ Day Johnson
S4E8: Jim Dempsey - Cyber Policy & Regulation
S4E7:Jeff Williams - DevSecOps and Application Security (AppSec)
The Combined Power of SAST and Threat Modeling
2023 National Cybersecurity Strategy
Software Supply Chain Attack Types
Resilient Cyber Show w/ Matt Cronin - Cyber Law & National Cyber Strategy
A look at the Open Software Supply Chain Attack Reference (OSC&R)
Resilient Cyber S4E5: Robert Wood - The Soft Side of Cyber
The why and how of SaaS Governance
Resilient Cyber Show - S4E4: Derek Fisher - AppSec Handbook
What do you mean there isn't a patch?
S4E1: Stephen Carter - State of the Vulnerability Management Landscape