Snipd home pageGet the app
public
CISO Perspectives (public) chevron_right

Incident response: around the Hash Table.

Sep 27, 2021
29:59
forum Ask episode
view_agenda Chapters
auto_awesome Transcript
info_circle Episode notes
1
Introduction
00:00 • 4min
chevron_right
2
Getting Ready for Incident Response
03:52 • 2min
chevron_right
3
In the Real World, Incident Response Is a Team Sport
06:18 • 2min
chevron_right
4
Using the Experts in the Security Team
08:16 • 2min
chevron_right
5
Getting the Technical Team to Ease the Situation
10:01 • 2min
chevron_right
6
What's the Next Step?
11:32 • 2min
chevron_right
7
The Daisy Model
13:36 • 2min
chevron_right
8
The Covel Agreement With Vendors
16:00 • 2min
chevron_right
9
Do You Have a DCR Racy Model?
17:46 • 2min
chevron_right
10
Akint Instant Response Capabilities
19:17 • 4min
chevron_right
11
The People Are Important
23:15 • 2min
chevron_right
12
What Is the Primary Purpose of Incident Response?
25:15 • 2min
chevron_right
13
The Last Two Episodes on Incident Response
27:06 • 3min
chevron_right

Four members of the CyberWire’s hash table of experts: Jerry Archer - Sallie Mae CSO Ted Wagner - SAP National Security Services CISO Steve Winterfeld - Akamai Advisory CISO Rick Doten - Centene CISO discuss the things they worry about when it comes to incident response.

Learn more about your ad choices. Visit megaphone.fm/adchoices

HomeTop podcastsPopular guestsTop books