www.scworld.com Open in urlscan Pro
2606:4700:20::ac43:473c  Public Scan

Submitted URL: https://go.cyberriskalliance.com/dc/YGRCM_UB2YEs5cWbXsEsXS27yA25Tvck7_V6eiMMjFiRBF0WkBm2vyrJ92Ix2St6ZHLk7YWB6z2HX-lC5auaWvFHY1PWU...
Effective URL: https://www.scworld.com/podcast-segment/13183-transforming-the-defenders-dilemma-into-the-defenders-advantage-lenny-zelt...
Submission: On October 31 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Log inRegister
CISO Stories
Topics
Topic Hubs
Events
Podcasts
Research
Recognition
About
Open Search Bar

ADVERTISEMENT



Enterprise Security WeeklySubscribe
Breach, Security Strategy, Plan, Budget, Security Operations


TRANSFORMING THE DEFENDER’S DILEMMA INTO THE DEFENDER’S ADVANTAGE – LENNY
ZELTSER – ESW #381

October 24, 2024


Ever heard someone say, "the attacker only has to be right once, but the
defender has to get it right every time"? On this episode, we'll dispel that
myth. There is some truth to the saying, but only with regards to initial access
to the target's environment. Once on the inside, the attacker's advantage flips
to the defender. Call it the 'Home Alone' effect. Or the Goonies effect? Die
Hard? So many movie metaphors work here!

The conversation isn't just about setting traps for attackers, however, there's
also a conversation to have about fundamentals and ensuring practitioners are
prepared for whatever attackers might throw at them. This segment is inspired by
the essay from Lenny by the same name: Transform the Defender’s Dilemma into the
Defender’s Advantage


Full episode and show notes

ANNOUNCEMENTS

 * Dive into cybersecurity with CyberRisk Alliance for exclusive insights from
   RSA Conference 2024. Explore executive interviews with industry leaders,
   uncovering visionary perspectives on threats and strategies. Delve into
   curated articles on trends and innovations, equipping yourself with essential
   knowledge for today's cyber landscape. Visit securityweekly.com/RSAC for
   expert guidance and inspiration in navigating cybersecurity challenges
   confidently.

GUEST

Lenny Zeltser
Chief Information Security Officer at Axonius


Lenny Zeltser designs security solutions and shepherds them to a sustainable
state. As the CISO of Axonius, he leads the security program to earn customers’
trust and fuel the company’s growth. In his prior roles, he built security
products and services at companies such as NCR. Lenny helps shape cybersecurity
practices by teaching at SANS Institute and sharing knowledge through writing,
speaking, and community projects. He used to be hands-on in many areas of
cybersecurity and IT. Now he focuses on strategy and leadership, treating
security as an enabler that helps companies achieve their goals. Outside of
work, Lenny loves cooking for his family and friends.

HOSTS

Adrian Sanabria
Principal Researcher at The Defenders Initiative
@sawaba
https://adriansanabria.com
Ayman Elsawah
Fractional CISO | Author | Educator | Coffee Nerd at Cloud Security Labs
https://coffeewithayman.com/
Katie Teitler-Santullo
Product Marketer and Content Strategist at OX Security



RELATED

Vulnerability Management

HALLOWEEN, TIKTOK, TELCOS, WIN 11, FIVE EYES, AWS, FRANCE, CHATGPT, AND MORE… –
SWN #426

October 29, 2024

Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and
more on the Security Weekly News.
Leadership

ALTERNATIVE CISO CAREER PATHS, BUDGET PLANNING, AND ONE EASY TRICK TO BYPASS
EDR! – ESW #380

October 17, 2024

Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr
raise funding this week Alternative paths to becoming a CISO Vendor booths don’t
have to suck (for vendors or conference attendees!) Budget planning guidance for
2025 CISOs might not be that great at predicting their own future needs Use this
one easy trick to bypass EDR...
Breach

CYBERSECURITY: IS THE TALENT GAP A MYTH? IS THE INDUSTRY DELUSIONAL? – ESW #376

September 19, 2024

This week, the cybersecurity industry's most basic assumptions under scrutiny.
Following up our conversation with Wolfgang Goerlich, where he questions the
value of phishing simulations, we discuss essays that call into question: the
maturity of the industry the supposed "talent gap" with millions of open jobs
despite complaints that this industr...


ADVERTISEMENT



ADVERTISEMENT






--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms of Use.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies