Understanding Attack Surface Management and How It Applies to Your Cyber Security Strategy

We’ve spent the last two and a half years with rapidly rising cloud adoption. It was a rocket ship before that, but the COVID-19 pandemic has only accelerated it and caused everybody to scramble.  We’re still trying to play catch up and get equivalent security treatments for people working remotely to the folks working in the office. Every client has concerns about their current exposure, which is why our guest on this episode of Virtual CISO is so important.  Michelangelo Sidagni is the Chief Technology Officer at NopSec, and he was on this episode to talk to us all about:  Why his firm is all in on Attack Surface Management, and how it’s different than your standard vulnerability managementHow ASM fits into current vulnerability & configuration management strategiesAttack Path Analysis, what it is and what it isn’tThe NopSec client customer journey To hear this episode, and many more like it, you can subscribe to The Virtual CISO Podcast here.  If you don’t use Apple Podcasts, you can find all our episodes here.  Listening on a desktop & can’t see the links? Just search for The Virtual CISO Podcast in your favorite podcast player 

Om Podcasten

The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry, chats with industry thought leaders to ensure you have what you need to be confident in your security and compliance. John will keep you informed, and perhaps even mildly entertained, through topics like ISO 27001, breach avoidance, incident response, dealing with pesky security questionnaires, data privacy, and managing vendor risk. Think of it as security… with a smile.