Artwork

Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Attributive Security

Share
 

Manage series 2831064
Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
  continue reading

14 episodes

Artwork

Attributive Security

updated

iconShare
 
Manage series 2831064
Content provided by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Martin Hopkins, Maurice Smit, Martin Hopkins, and Maurice Smit or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
There is often a lot happening in the world of cyber security: new threats, new exploits and new products. Don’t get us wrong, there is a lot of cool technology, and we appreciate that. But, at least on the surface, a lot of the defensive advances look to be very bottom up and technology focused. It is easy to lose sight of the context, what matters to us that we want to protect, and yes even enable. Join us as we get together for unscripted conversations about a broad range of topics and relate them to cyber security. We’ll draw on various disciplines, and our own experiences, as we discuss ideas and practical approaches to tailored information security. We won’t be afraid to challenge one size fits all and best practice norms, or the misapprehension that bespoke security frameworks are infeasible for all but the biggest of enterprises. Be prepared to reimagine what an effective cyber security program can look like when it is engaged with and aligned to the business.
  continue reading

14 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide