Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420 Image

Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420

5 November - 49 mins
Podcast Series Security Weekly Podcast Network (Audio)

What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together. So why is it so hard to properly configure your systems?

Rob Allen, Chief Product Officer at ThreatLocker, joins Business Security Weekly to discuss Defense Against Configurations and how ThreatLocker can automatically identify misconfigurations and map them to your environment’s compliance and security requirements. Rob will discuss how ThreatL...

49 mins

Series Episodes

Recommended

Show name

Title

Sub title

Now Playing

The Pat Kenny Show

Live Now: 9AM - 12PM

Presenter logo
Brand

9AM

12AM

Now Playing

The Pat Kenny Show

The Pat Kenny Show

Of The Ball

1 hour left

Today Finished


Next Up

Default

Default

default

0 mins

No Account

Subscriptions to podcast series are only available to users with an account. Sign in or register to subscribe and access your subscriptions.

Register Sign in

Woops!

Error text.