Artwork

Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

D@R 06x01 - Security Vendors & You

40:09
 
Share
 

Manage episode 407384525 series 3561094
Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.

Contact us:

dataatrest@unc.edu

Musical credit:

Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/

  continue reading

45 episodes

Artwork
iconShare
 
Manage episode 407384525 series 3561094
Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.

Contact us:

dataatrest@unc.edu

Musical credit:

Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/

  continue reading

45 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide