5:11
Revolutionizing Vulnerability Management: Francesco Cipollone’s AI Threat-Centric Approach 🔍
Phoenix Security
34:59
Patch Fatigue: The Unseen Cyber Crisis in Application Security and Vulnerability Managment !
9:43
Master #applicationsecurity in #Cloud native #vulnerabilitymanagement - Reachability Analysis ASPM
59:27
Reachability Analysis- the future of #applicationsecurity #ASPM is ONE Backlog with James Berthoty
0:37
Master Container Maintenance The Key Steps to Keeping Your Libraries Updated
50:50
#cybersecurity #Vulnerabilities: Moving away from #CVSS into #riskbasedprioritization for ASPM 2024
1:49
#starwars Use Force Against #Vulnerability #owasp Global Appsec Lisbon Win #Mandalorian #Lightsaber
22:31
#Appsec #Unbounded LLM Security - Christoph Parisel - Risk and Recommandations #cybersecurity #ai
2:11
#AI Meets #aspm and #AppSec: Unveiling the Future at AppSec Unbounded #cybersecurity #aspm #talks
2:27
Mastering #Cybersecurity: MITRE&ATTACK & #EPSS | Top Techniques! #vulnerabilitymanagement #mitre
1:59
#cyberwalk e2 #NCSC #New #uk #cybersecurity Guidelines on #vulnerabilitymanagement #aspm #podcast
0:40
The Key to Effective #Vulnerability #Fixes Providing #Context and Understanding #vulnerability
0:34
Unveiling the Power of Social Media DataAnalysis #epss #kev #cybersecurity #vulnerabilitymanagement
The Secret to Improving in #VulnerabilityManagement Revealed #epss
0:45
Building a #Collaborative #Engineering Culture for Efficient #ProblemSolving #devsecops
0:53
Mastering #Cybersecurity #Automating Information for Maximum Protection #appsec
0:55
Unveiling the Key to Defending Against #Exploitation #epss #priority in Your org #cybersecurity
0:49
The #Microsoft #Security #Revolution From Terrible to Top in Remediation Speed
Mastering #vulnerabilitymanagement Your First Line of Defense
Unleashing Personal Growth through Business Challenges and Learning
0:35
Uncovering #equifax #strut #Vulnerability #Exploit #Exposes #Legacy #Systems #vulnerability
0:29
#Boosting #Network #Security Faster #Remediation and #Painless #Code #fixes
#vulenrability #prioritization in #vulnerabilitymanagement and #applciationsecurity #shocking
0:46
#appsec #Protecting #Business #Operations #Reducing #Impact and Ensuring #businesscontinuity
Gamechanging Strategy to #Eliminate #99.99 #Vulnerabilities #priority #vulnerabilitymanagement
0:39
Hidden Code Execution Threat Beware of Downloading Files #rce #gnu
0:44
Unleashing the #Power of #vulnerability #data to Tackle #Risk reduction #cybersecurity
0:47
The Hidden #VulnerabilityManagement #Pitfall in #Cloud and #Premises #sla #cybersecurity
0:32
Boost Your #Business #Security with Lessons from #breach #cybersecurity
Mastering #Cybersecurity #Automating #prioritization for Maximum Protection
Uncovering the #Hidden #Threats The Gradual Increase of #Exploits in #Cybersecurity #epss
Cybersecurity #Risk from #Vulnerability to #Business #Risk for for Effective Comms #cybersecurity
Cracking the Code Unveiling the #Top #Vulnerabilities in #Cybersecurity #vulnerabilitymanagement
0:48
Unlocking Vulnerabilities The #Power of #SSVC #Decision #Trees for Faster Solutions
0:54
#cybersecurity #exploits #prioritization the Vulnerability Exploit Game Cybersecurity Insights
0:52
Unlocking #Business #Success #Fixing #Broken #Processes for LongTerm Benefits #cyber
1:08:01
#Risk and Opportunity in #Cyber: A #CISO View to Manage Risk #Vulnerabilities and #AttackSurface
1:00:20
PANEL #Vulnerability chaos to #data and #risk #prioritization #appsec #cloud #epss #cybersecurty
41:32
on a #DATA with #Vulnerability #Exploitability, #prioritize #vulnerabilities #cybersecurity #data
Let’s go on a DATA with vulnerabilities
Open Security Summit
DATA Driven approach on vulnerabilities Appsec vs Infra (Panel)
1:05:03
Explore #CVSS, #Appsec #EPSS,how to link them for #product #security with Stephen Shaffer Peloton
From #Engineering to #CISO A Journey of Transformation and Success #cybersecurity
56:38
#GRC #Engineering how to drive #risk into action for engineers with Charles Nwatu #appsec
Unleashing untapped potential in cybersecurity for a safer future
4:48
#Cyber #Awareness #month a data driven approach on #appsec #vulnerability #zeroday #exploits
47:56
Application #Security from #pipeline to #production demystifying #shiftleft and #devsecops #appsec
38:16
#Appsec 2 #cloud to fix or not to fix a #risk and #data #security approach #vulnerability #cyber
12:39
Top 50 #Exploited #Vulnerability 2023 #data #analysis across the whole #github #cybersecurity
10:33
#CISA Top routinely #Exploited #Vulnerability 22 #data #analysis #cybersecurity #appsec
1:05
#Vulnerabilities and #code #smells #cybersecurity #shorts #vulnerabilitymanagement
1:06
Who should be fixing vulnerabilities #ciso #vulnerabilitymanagement with Jim Newman #wipro #capco
1:07
#vulnerability or #CVE that could screw up your entire org voice of a #ciso #vulnerability #shorts
1:03
What are the #vulnerabilites that you should fix #ciso #view
LIVE
[Private video]
0:59
#vulnerability from a #ciso perspective which one to fix #business #cybersecurity #shorts
1:01
CVE, CVSS how to prioritize? Unveiling the Critical Security Flaw that Could Jeopardize Your Data!
1:00
#devsecops what makes a good practice #ciso #vulnerability #appsec #shorts
#vulnerability is not a #ciso problem is a #business problem #cybersecurity
5:34
Phoenix Security turns 2 Origin story and why we created Phoenix
1:02:54
From #vulnerability to the #cyber #boardroom #CISO perspective on vulnerability management #appsec
1:02
Cross site scripting had us at ???
Application Security - How do we fix it with Tanya Janca
🚨 NEW ALERT: CVSS version 4 is out! 🚨 - Discover all the details here of CVSS v4 vs 3.1
9:38
8:55
🚨Movit Transfer - ATTENTION🚨 - What you should pay attention CVE-2023-34362, CVE-2023-35708 2
Application Security - Recheability, Exploitability, Prioritization all explained
Application Security - Talking to the right audience, how to involve business risk decisions
2:44
Application Seucrity SDLC - Bringing the business on board application security risk objectives
3:05
Application Security SDLC - Security triage and complexity of sources
2:40
Phoenix Security - Application Security SDLC how to build and manage vulnerabilities in appsec
48:24
Shift Smart - Risk Based Approach on AppSec
2:51
Open Security Summit - Shift Smart, Shift Everywher fix vulnerabilities in application security
2:47
What is #ASPM, #applicationsecurity Security Posture Management New #gartner Category Explained
3:24
Shift Everywhere - #ShiftSmart #shiftleft and #shiftright - a risk-based method on #vulnerabilities
1:26
Why Do We Need Vulnerability Management
Open Security Summit - Highlights
1:42
What is The Objective of Security?
2:32
The Important Aspects of Reporting
1:57
Prioritisation Aspects of Vulnerability
1:22
Vulnerability Management Process
52:03
Application Security Maturity and Frameworks - Francesco Cipollone - ASW #239
Security Weekly - A CRA Resource
7:43
Vulnerability Management Framework Part 5 - Vulnerability Remediation Action for Appsec & Cloudsec
10:36
Vulnerability Management Framework Part 6 - Measuring Vulnerability in Application & Cloud Security
49:54
Application Security vulnerabilities - Measurements, Maturity Magic
13:14
Vulnerability Management Framework Part 3 - Aggregation
21:59
Vulnerability Management Framework Part 4 - Prioritization on Application and cloud security
12:40
Vulnerability Management Framework Part 2 - Assessment, Discovery
9:02
#Vulnerability #Management #Framework Part 1 - Intro
40:19
Phoenix Security and Sean Turner from Twinstake @black hat, we discuss Web3 Security
22:49
Phoenix Security and Paul Harragane from KKR @black hat, Private Equity, Leadership and Security
15:50
Phoenix Security Cloud chats at the booth with Andrew Panell global appsec lead at Gett
32:37
Phoenix Security and the partner OWSP fireside chat at Black hat boot on the history of OWASP
57:27
#Measuring #kpi evolving #application #security programs with Josh Grossman #appsec #cyber
1:02:00
From DEV to Sec #Application #Security - How do we fix #devsecops with Tanya Janca #cyber #appsec
1:05:32
#applicationsecurity & #vulnerabilities - Scaling #appsec Programs with #data #cybersecurity
1:19:57
#Data #Driven #Application #Security Programs with Brooks Shoenfield #apsec #cyber #cybersecurity
2:08:01
Appsec & Cloudsec Podcast @ Appsec Phoenix BLACK HAT
32:33
AppSec Phoenix Live Fireside chat @ Black Hat Europe
0:15
Application security drives you mad? Don't lose your head like Josh, focus on what's important_short
0:51
Vulnerabilities in Application Security drives you mad? Don't lose your head like Josh fix important
Vulnerability management drives you mad? Don't lose your head like John we take care of the data
1:40
Why we created Phoenix Security Contextual Risk based vulnerability mngm- Cloud Application Security
30:37
We Hack Purple Podcast Episode 65 with Frank Cipollone
We Hack Purple - AKA Semgrep Community!
Phoenix Security Cloud Security 2 #software #security aggregating #prioritize #vulnerabilities #ASPM
58:39
CVSS, CVE, Vulnerabilities and the land of broken dreams
58:53
The Cloud Security Architects aka The Knights of the Cloud Kingdom - Panel Discussion
32:22
AppSec Trending & recommendations: Fixing Security in Cloud & Appsec
4:27
#owasp #security #cybersecurity Partnership with #OWASP #free
27:21
ADDO 2020 - The Security Phoenix Programme - an application security programme based on people
Cybersecurity & Cloud Podcast
CVE CVSS, What they are!
2:12
Why CVE is getting overwhelming problems?
27:37
CSA UK Chapter AGM 2019 - Is the cloud Secure? Francesco Cipollone - CSA Annual Conference 2019
Cloud Security Alliance UK Chapter
2:07
Definitions Clarification
2:22
CWE CWSS, What they are!
58:19
DEVOPS Webinar - The Security Phoenix - A Modern Approach to DEV Sec Ops
23:20
UNICOM Cloud Native: Is the Cloud Secure? it's easy if you do it right by Francesco Cipollone
18:38
Starting in Cyber - Francesco Cipollone & Seidea 19-08-19 - Round table for Woman in Cyber - NSC42
21:25
ECC- Whitehall Media: Is the Cloud Secure? is easy if you do it smart - Francesco Cipollone Keynote
49:02
ISSA Event- Leaders - Grill the panel - July 2019
18:08
ECS - Whitehall Media: Security Architects? Slayer of dragons
36:05
Cyber Sec & Cloud Expo - North America - Panel - Role and Regulation in the Cloud
31:37
The Security Phoenix from the ashes of DEV-OPS - Francesco Cipollone @ Cyber Sec & Clod Expo
18:58
The Security Phoenix from the ashes of DEVOPS - Risk View - Francesco Cipollone - ESRMS - 2019-11-27
44:11
The Security Phoenix from the ashes of DEVOPS - 2020-01-23 - Appsec California - Francesco Cipollone
7:16
Bring it all together CVE CWE CVSS CWSS
1:07:09
Francesco Cipollone for NSC42 at Flat Iron Cybersecurity course launch panel on 20/11/19 London
29:34
EGR London - Casino Cyberheist - Keynote from Francesco Cipollone (slide overlay)
29:51
EGR Data Briefing 26 February 2019 - Keynote from Francesco Cipollone Casino Cyberheist
CSA UK Chapter AGM 2019 - Future Events - Francesco Cipollone
29:05
How to Become a Cloud Security Architect by Francesco Cipollone interviewed by Barclays Sympson
CSAUKAGM19 - Francesco Cipollone - Is the cloud secure?
43:39
The Security Phoenix from the ashes of DevOps - Francesco Cipollone
AppSec California
What is “RISK” and why so many models?
2:19
Vulnerability Sources
34:49
DevSecOps, Compliance GRC, and the Future of Application Security - Francesco Cipollone - ASW 177