Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Introduction
00:00 • 2min
Is There a Threat Landscape in Product Development?
01:50 • 3min
Ransomware
04:26 • 2min
The Cyber Crime Financial Ecosystem
06:45 • 5min
The Cyber Crime Ecosystem
11:36 • 6min
Law Enforcement
17:34 • 2min
Attribution Is Hard
19:43 • 2min
Attack Surface Management
21:24 • 5min
How Does Your Service Collection Work?
26:20 • 3min
Do You Provide Managed Services for Threats and Incident Response?
29:03 • 4min
What's the Sweet Spot for Vulnerability Intelligence?
32:53 • 4min
Kailaw - What Kind of Customer Are You Targeting?
36:39 • 5min
Are You a Startup or a B2B or B2C Company?
41:13 • 3min
Why Should a CISO Choose Kella?
44:17 • 5min
Kayla
49:18 • 2min


