
Sign up to save your podcasts
Or
* We are not lawyers or finance people. Go see a professional for specific advice on your situation.
Sponsor: Tandem Cyber Solutions
Your go to penetration testing partner
https://tandemcybersolutions.com/csuitecyber/
In this episode of the C-suite Cyber Podcast, hosts Anthony Jirouschek and Mike discuss the critical aspects of choosing vendors for cybersecurity solutions. They emphasize the importance of having clear requirements, understanding vendor maturity, and the necessity of thorough testing and comparison of products. The conversation also delves into contract negotiation, highlighting the need for clarity on responsibilities and security implications. Finally, they explore best practices for implementation to ensure successful integration of security solutions. Chapters
00:00 Introduction to C-Suite Cyber Podcast
01:28 Choosing the Right Vendors
09:46 Testing and Comparing Security Products
21:46 Understanding Contracts and SLAs
34:15 Implementation Strategies for Security Solutions
56:10 Implementation and Testing of Security Tools
01:02:44 Understanding Adversaries and Security Measures
01:06:00 Vendor Risks and Dangers
01:14:23 Ethics in Security Research and Reporting
01:24:59 Privacy and Trust in Technology
01:37:08 Final Thoughts on Security Practices
Other Links
The Gili Ra'anan model
Petya Ransomware Outbreak Originated in Ukraine via Tainted Accounting Software
Wargames: Analyzing the Act of War Exclusion in Insurance Coverage and Its Implications for Cybersecurity Policy
Darknet Diaries EP77: Olympic DestroyerHacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
* We are not lawyers or finance people. Go see a professional for specific advice on your situation.
Sponsor: Tandem Cyber Solutions
Your go to penetration testing partner
https://tandemcybersolutions.com/csuitecyber/
In this episode of the C-suite Cyber Podcast, hosts Anthony Jirouschek and Mike discuss the critical aspects of choosing vendors for cybersecurity solutions. They emphasize the importance of having clear requirements, understanding vendor maturity, and the necessity of thorough testing and comparison of products. The conversation also delves into contract negotiation, highlighting the need for clarity on responsibilities and security implications. Finally, they explore best practices for implementation to ensure successful integration of security solutions. Chapters
00:00 Introduction to C-Suite Cyber Podcast
01:28 Choosing the Right Vendors
09:46 Testing and Comparing Security Products
21:46 Understanding Contracts and SLAs
34:15 Implementation Strategies for Security Solutions
56:10 Implementation and Testing of Security Tools
01:02:44 Understanding Adversaries and Security Measures
01:06:00 Vendor Risks and Dangers
01:14:23 Ethics in Security Research and Reporting
01:24:59 Privacy and Trust in Technology
01:37:08 Final Thoughts on Security Practices
Other Links
The Gili Ra'anan model
Petya Ransomware Outbreak Originated in Ukraine via Tainted Accounting Software
Wargames: Analyzing the Act of War Exclusion in Insurance Coverage and Its Implications for Cybersecurity Policy
Darknet Diaries EP77: Olympic DestroyerHacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List