***************************************************************************************************
Additional Resources
👇👇👇
youtube.com/watch?v=M_hrt01qUM0
youtube.com/watch?v=W_Msimyhkns
Request a Quote for a PCI Audit ► securitymetrics.com/pci-audit
Request a Quote for a Penetration Test ► securitymetrics.com/penetration-testing
Get the Guide to PCI DSS compliance ► securitymetrics.com/lp/pci/pci-guide
Get FREE security and compliance training ► academy.securitymetrics.com/
Get in touch with SecurityMetrics' Sales Team ► securitymetrics.com/contact/lets-get-you-to-the-right-place
⬆️⬆️⬆️
Additional Resources
***************************************************************************************************
Tune in this week as Jen Stone (MCIS, CISSP, CISA, QSA) and David Monnier (Chief Evangelist and Team Cymru Fellow at Team Cymru) discuss attack surface management.
Listen to learn:
-What is an attack surface?
-Attack surface management VS vulnerability management VS endpoint security management.
-How can teams gain contextual awareness of their environments?
Subscribe to the SecurityMetrics Podcast Email! - info.securitymetrics.com/podcast-subscribe
[Disclaimer] Before implementing any policies or procedures you hear about on this or any other episodes, make sure to talk to your legal department, IT department, and any other department assisting with your data security and compliance efforts.
- Attack Surface Management | SecurityMetrics Podcast 58 ( Download)
- Privacy vs Security - Finding Balance in Compliance | SecurityMetrics Podcast 59 ( Download)
- Privacy vs Security | SecurityMetrics Podcast #shorts ( Download)
- Is the Cloud Secure | SecurityMetrics Podcast ( Download)
- Security Exposure Management ( Download)
- Improving Security Maturity in the Age of AI ( Download)
- The CISO that does it all! ( Download)
- Cloud Security Baseline For Scale ( Download)
- Death of DevSecOps at Netflix and beyond ( Download)
- Data Driven Security Strategy With Caroline Wong | Ep. 8 ( Download)
- #S02EP03 DevSecOps for teams building on Steroids | Akash Mahajan ( Download)
- Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits ( Download)
- How I Learned to Stop Worrying and Love SLAs ( Download)
- Genius Cybersecurity Advice for 40 Minutes Straight | #CyberStories EP 13 ( Download)
- Cyber Security Series - Part One ( Download)