Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

29:38
 
Share
 

Manage episode 471771315 series 59213
Content provided by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From managing influxes of scanner data and asset management tools to prioritizing meaningful security actions, this episode offers valuable insights. Learn about the importance of context, the integration of threat intelligence, the future role of automation, and AI, and how these can transform the cybersecurity landscape. Tune in to stay ahead in your security strategies and practices.

PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity!

** Links mentioned on the show **

Connect with Dahvid Schloss
https://www.linkedin.com/in/dahvidschloss/

Connect with Dan DeCloss
https://www.linkedin.com/in/ddecloss/

Find out more about PlexTrac
https://plextrac.com/sharedsecurity

** Watch this episode on YouTube **

** Become a Shared Security Supporter **

Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity

** Thank you to our sponsors! **

PlexTrac

PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity!

SLNT

Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how gamification of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Subscribe and follow the podcast **

Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast

Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social

Follow us on Mastodon: https://infosec.exchange/@sharedsecurity

Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/

Visit our website: https://sharedsecurity.net

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe

Leave us a rating and review: https://ratethispodcast.com/sharedsecurity

Contact us: https://sharedsecurity.net/contact

The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast.

  continue reading

505 episodes

Artwork
iconShare
 
Manage episode 471771315 series 59213
Content provided by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tom Eston, Scott Wright, Kevin Johnson, Tom Eston, Scott Wright, and Kevin Johnson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today. From managing influxes of scanner data and asset management tools to prioritizing meaningful security actions, this episode offers valuable insights. Learn about the importance of context, the integration of threat intelligence, the future role of automation, and AI, and how these can transform the cybersecurity landscape. Tune in to stay ahead in your security strategies and practices.

PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity!

** Links mentioned on the show **

Connect with Dahvid Schloss
https://www.linkedin.com/in/dahvidschloss/

Connect with Dan DeCloss
https://www.linkedin.com/in/ddecloss/

Find out more about PlexTrac
https://plextrac.com/sharedsecurity

** Watch this episode on YouTube **

** Become a Shared Security Supporter **

Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! https://patreon.com/SharedSecurity

** Thank you to our sponsors! **

PlexTrac

PlexTrac provides practitioners with an automated alternative for the most time-consuming parts of vulnerability management, including consolidating data, surfacing insights, prioritizing findings, and managing hand-offs to and from remediation teams. Find out more by visiting plextrac.com/sharedsecurity!

SLNT

Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.

Click Armor

To find out how gamification of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Subscribe and follow the podcast **

Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast

Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social

Follow us on Mastodon: https://infosec.exchange/@sharedsecurity

Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/

Visit our website: https://sharedsecurity.net

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe

Leave us a rating and review: https://ratethispodcast.com/sharedsecurity

Contact us: https://sharedsecurity.net/contact

The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast.

  continue reading

505 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play