www.scworld.com
Open in
urlscan Pro
2606:4700:20::ac43:473c
Public Scan
Submitted URL: https://go.cyberriskalliance.com/dc/YGRCM_UB2YEs5cWbXsEsXS27yA25Tvck7_V6eiMMjFiRBF0WkBm2vyrJ92Ix2St6ZHLk7YWB6z2HX-lC5auaWvFHY1PWU...
Effective URL: https://www.scworld.com/podcast-segment/13183-transforming-the-defenders-dilemma-into-the-defenders-advantage-lenny-zelt...
Submission: On October 31 via api from US — Scanned from DE
Effective URL: https://www.scworld.com/podcast-segment/13183-transforming-the-defenders-dilemma-into-the-defenders-advantage-lenny-zelt...
Submission: On October 31 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Log inRegister CISO Stories Topics Topic Hubs Events Podcasts Research Recognition About Open Search Bar ADVERTISEMENT Enterprise Security WeeklySubscribe Breach, Security Strategy, Plan, Budget, Security Operations TRANSFORMING THE DEFENDER’S DILEMMA INTO THE DEFENDER’S ADVANTAGE – LENNY ZELTSER – ESW #381 October 24, 2024 Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alone' effect. Or the Goonies effect? Die Hard? So many movie metaphors work here! The conversation isn't just about setting traps for attackers, however, there's also a conversation to have about fundamentals and ensuring practitioners are prepared for whatever attackers might throw at them. This segment is inspired by the essay from Lenny by the same name: Transform the Defender’s Dilemma into the Defender’s Advantage Full episode and show notes ANNOUNCEMENTS * Dive into cybersecurity with CyberRisk Alliance for exclusive insights from RSA Conference 2024. Explore executive interviews with industry leaders, uncovering visionary perspectives on threats and strategies. Delve into curated articles on trends and innovations, equipping yourself with essential knowledge for today's cyber landscape. Visit securityweekly.com/RSAC for expert guidance and inspiration in navigating cybersecurity challenges confidently. GUEST Lenny Zeltser Chief Information Security Officer at Axonius Lenny Zeltser designs security solutions and shepherds them to a sustainable state. As the CISO of Axonius, he leads the security program to earn customers’ trust and fuel the company’s growth. In his prior roles, he built security products and services at companies such as NCR. Lenny helps shape cybersecurity practices by teaching at SANS Institute and sharing knowledge through writing, speaking, and community projects. He used to be hands-on in many areas of cybersecurity and IT. Now he focuses on strategy and leadership, treating security as an enabler that helps companies achieve their goals. Outside of work, Lenny loves cooking for his family and friends. HOSTS Adrian Sanabria Principal Researcher at The Defenders Initiative @sawaba https://adriansanabria.com Ayman Elsawah Fractional CISO | Author | Educator | Coffee Nerd at Cloud Security Labs https://coffeewithayman.com/ Katie Teitler-Santullo Product Marketer and Content Strategist at OX Security RELATED Vulnerability Management HALLOWEEN, TIKTOK, TELCOS, WIN 11, FIVE EYES, AWS, FRANCE, CHATGPT, AND MORE… – SWN #426 October 29, 2024 Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Leadership ALTERNATIVE CISO CAREER PATHS, BUDGET PLANNING, AND ONE EASY TRICK TO BYPASS EDR! – ESW #380 October 17, 2024 Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor booths don’t have to suck (for vendors or conference attendees!) Budget planning guidance for 2025 CISOs might not be that great at predicting their own future needs Use this one easy trick to bypass EDR... Breach CYBERSECURITY: IS THE TALENT GAP A MYTH? IS THE INDUSTRY DELUSIONAL? – ESW #376 September 19, 2024 This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industr... ADVERTISEMENT ADVERTISEMENT -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms of Use. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies