by vulnwise
Welcome to VulnWise – your guide to conquering the chaos of vulnerability management. Hosted by two tech startup co-founders in the cybersecurity space, our bi-weekly podcast features best in class cybersecurity experts from top organizations to discuss strategies, insights, and trends in vulnerability management and cybersecurity. From managing risks to staying ahead of emerging threats, we tackle the topics that matter most. Whether you're a seasoned professional or just starting out, join us every other week for actionable advice and inspiring conversations.
Language
🇺🇲
Publishing Since
1/27/2025
Email Addresses
1 available
Phone Numbers
0 available
April 24, 2025
<p>In this episode of the VulnWise Show, hosts Steve Carter and Scott Kuffer engage with cybersecurity expert and semi-retired analyst Jon Oltsik to discuss the evolving landscape of vulnerability and exposure management. They explore best practices derived from conversations with CISOs, the role of AI in vulnerability management, and the persistent challenges of prioritization. The discussion also delves into incident response processes, the significance of threat modeling, and the implications of SLAs in managing vulnerabilities. Jon shares insights on the analyst perspective in cybersecurity and the relevance of frameworks like CTEM, emphasizing the need for continuous education in the field.</p>
April 2, 2025
<p>In this episode of the VulnWise Show, hosts Steve Carter and Scott Kuffer engage with Johnny Shaieb, Chief Architect of Exposure Management at IBM. The conversation delves into the evolution of vulnerability management, the shift towards exposure management, and the importance of asset management in cybersecurity. Johnny shares insights from his extensive experience in the field, discusses the concept of a Risk Operations Center, and highlights the significance of normalizing data for effective vulnerability management. Additionally, he reflects on his academic journey and ongoing research into the history of vulnerability databases and scoring systems.</p>
March 10, 2025
<p>In this episode of the VulnWise Podcast, Scott Kuffer and Steve Carter talk to Rishika Hooda, a senior technical program manager at Google, who shares her extensive experience in cybersecurity, particularly in managing Android's patching and bug bounty programs. The conversation delves into the complexities of vulnerability management at scale, the importance of prioritization, and the challenges faced by large organizations in maintaining security. Rishika emphasizes the need for transparency, context, and effective communication within teams to enhance vulnerability management processes.<strong>Key Moments</strong>00:00 Introduction to Cybersecurity and Vulnerability Management02:23 Understanding Android's Patching and Bug Bounty Programs08:14 Challenges in Scaling Security Programs14:27 Best Practices in Vulnerability Prioritization19:32 The Complexity of Patching in a Global Ecosystem20:03 The Process of CVE Publication and Transparency22:42 Measuring Effectiveness of Vulnerability Management Programs#patching #securityprogram #bugbounty #podcast</p>
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.