DiscoverCISO Series PodcastHow About This? Only Attack the Endpoints We Configured
How About This? Only Attack the Endpoints We Configured

How About This? Only Attack the Endpoints We Configured

Update: 2024-06-25
Share

Description

All links and images for this episode can be found on CISO Series.

This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest and winner of Season 2 of Capture the CISO, Russell Spitler, CEO and co-founder, Nudge Security.

In this episode:

  • The Gordian knot of EDR
  • Can we keep up with patching?
  • Making AI practical
  • Standardization or granularity?

Thanks to our podcast sponsor, ThreatLocker!

ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How About This? Only Attack the Endpoints We Configured

How About This? Only Attack the Endpoints We Configured