In the dynamic realm of cybersecurity, collaboration and innovation are paramount for addressing evolving threats and driving progress. Matthew Rosenquist offers invaluable insights into the challenges and opportunities encountered in fostering co
In the dynamic realm of cybersecurity, collaboration and innovation are paramount for addressing evolving threats and driving progress. Matthew Rosenquist offers invaluable insights into the challenges and opportunities encountered in fostering co
In the ever-evolving landscape of cybersecurity, Matthew Rosenquist sheds light on emerging trends and persistent challenges. From the prevalence of misconfigurations to the dichotomy between complex and simplistic breaches, Rosenquist's observati
In the ever-evolving landscape of cybersecurity, few voices carry the weight of experience and insight as Matthew Rosenquist and Bkash Parai. With over three decades in the field, their journey reflects the transformation of security from a niche
Embark on a journey through the fascinating career trajectory of Matthew Rosenquist, where a passion for mathematics and a chance encounter with a white hat hacker laid the foundation for groundbreaking advancements in cybersecurity. From his form
In this segment, we explore essential strategies for strengthening cybersecurity defenses, focusing on the importance of patching, device visibility, and continuous testing. By addressing vulnerabilities and maintaining up-to-date systems, organiz
In this segment, we explore a strategic approach to enhancing cyber resilience within organizations, emphasizing the "crawl, walk, run" methodology. By starting small and gradually advancing security measures, organizations can effectively improve
In this segment, we delve into the evolving cybersecurity landscape, where nation-state actors and ransomware groups continuously exploit small windows of opportunity to compromise systems. We explore the changing attacker landscape and the signif
Brad LaPorte provides valuable insights into the current state of cybersecurity practices, emphasizing the need for organizations to embrace continuous security testing and proactive approaches to breach mitigation. He identifies five levels of ma
The speaker, a former army officer, reflects on their experience encountering nation-state cyber attacks early in their career. They describe the evolution of cybersecurity tactics, from traditional forensic methods to modern cloud-based and autom
The life of a cybersecurity professional is characterized by a constant battle against evolving threats and vulnerabilities. In today's complex and sophisticated landscape, there's no silver bullet solution to fix all our problems. Instead, we mus
In the realm of IT risk management, tagging applications in a consistent and standardized manner serves as a crucial foundation for effective asset classification. However, this process poses challenges, especially in terms of understanding the va
In an era marked by Shadow IT, hybrid working models, and rapid digitization, the landscape of cybersecurity is constantly evolving. With countless potential attack surfaces and vulnerabilities, organizations must prioritize understanding the unkn
As organizations grapple with escalating risks in the digital realm, the imperative for robust risk management has never been more pressing. In this era of increased scrutiny from regulators and stakeholders, businesses are compelled to demonstrat
In today's interconnected digital landscape, organizations face heightened risks that demand robust risk management strategies. With the proliferation of data breaches and regulatory scrutiny, the role of Chief Risk Officers, Privacy Officers, and
In the realm of risk communication, simplicity and clarity are paramount when conveying complex information to management or board members. While traditional models like the 5x5 matrix are widely used, some organizations opt for a more intuitive app
Effective communication of risks to management or board members is crucial for informed decision-making within organizations. One commonly used model for this purpose is the 5x5 matrix, which assesses risk based on likelihood and impact. While thi
Come join the ZeroTrust meet & expo on June 20th-21st in Stamford CT and listen to 35 renown speakers (well, 34 plus myself) across 8 business and technical tracks! Luminaries like Vishal Amin, Ron Lear, Chase Cunningham (Dr. ZeroTrust himself!), Ge