In our latest episode, join me, James Rees, for a chat with Nick Palmer from Censys about the critical importance of attack surface management. With 25 years of experience in the industry, Nick explains how today's threat landscape has evolved dramatically, with attackers now discovering vulnerabilities within hours rather than weeks.
We explore the challenges of maintaining visibility across expanding digital footprints, particularly with cloud adoption creating new blind spots for security teams. Nick shares eye-opening real-world examples that illustrate the hidden vulnerabilities present in even seemingly secure environments.
We cover how organisations can gain continuous visibility of their assets, extend security monitoring to third party suppliers and build a security culture that protects customer data effectively.
A must-listen for security professionals seeking practical advice on protecting against modern cyber threats.
Key Talking Points:
Gain practical insights that will help you better defend your organisation. This conversation goes beyond theoretical concepts to deliver actionable security wisdom you can implement immediately.
"If you are looking at your external attack surface any less than daily, you're missing a trick. It has to be scanned at least daily, preferably in real time."
-Nick Palmer, Censys
● Attack Surface Management: Learn how to identify and manage your organisation's vulnerabilities to prevent cyber attacks.
● Evolution of IT and Security: Gain historical perspective on how security challenges have evolved to better prepare for future threats.
● Supply Chain Security: Discover techniques to protect your business from vulnerabilities introduced by third-party suppliers.
● Legislation and Compliance: Understand how to navigate new regulations like DORA to avoid penalties and legal consequences.
● Phishing Defence: Master strategies to protect your organisation from increasingly sophisticated social engineering attacks.
● Rapid Response: Learn why and how to accelerate your security monitoring to match attackers' discovery capabilities.
● Cloud Security: Acquire practical approaches to securing cloud and virtual environments against emerging threats.
● Building Security Culture: Develop effective methods to embed security awareness throughout your organisation.
● Continuous Monitoring: Implement cost-effective techniques for ongoing attack surface visibility to catch vulnerabilities before attackers do.
● Security Tooling:...