41:56
#Product #Security #Psychology of #risk and #devsecops how to influence stakeholders
Phoenix Security
6:10
#ASPM Application Security Posture and #product #security a #cybersecurity game of chess #appsec
7:14
#ASPM #vulnerability in #Application #Security #Posture #managment #Prioritization #Cybersecurity
1:06:03
Psychology of Security #risk and #devsecops how to influence stakeholders for a positive outcome
56:38
#GRC #Engineering how to drive #risk into action for engineers with Charles Nwatu #appsec
1:08:01
#Risk and Opportunity in #Cyber: A #CISO View to Manage Risk #Vulnerabilities and #AttackSurface
1:03:12
Leveraging #AI to test #CVSS 4 and #epss in #vulnerabilitymanagement with Christope Parisel
47:56
Application #Security from #pipeline to #production demystifying #shiftleft and #devsecops #appsec
1:02:54
From #vulnerability to the #cyber #boardroom #CISO perspective on vulnerability management #appsec
6:45
The Top 10 Vulnerabilities that are Being Exploited at Scale
Open Security Summit
1:01
CVE, CVSS how to prioritize? Unveiling the Critical Security Flaw that Could Jeopardize Your Data!
5:26
Vulnerability at Scale
Application Security - Recheability, Exploitability, Prioritization all explained
1:03
Application Security - Talking to the right audience, how to involve business risk decisions
2:44
Application Seucrity SDLC - Bringing the business on board application security risk objectives
1:05
🚨 NEW ALERT: CVSS version 4 is out! 🚨 - Discover all the details here of CVSS v4 vs 3.1
3:05
Application Security SDLC - Security triage and complexity of sources
2:40
Phoenix Security - Application Security SDLC how to build and manage vulnerabilities in appsec
9:38
48:24
Shift Smart - Risk Based Approach on AppSec
3:24
Shift Everywhere - #ShiftSmart #shiftleft and #shiftright - a risk-based method on #vulnerabilities
57:27
#Measuring #kpi evolving #application #security programs with Josh Grossman #appsec #cyber
1:05:32
#applicationsecurity & #vulnerabilities - Scaling #appsec Programs with #data #cybersecurity
1:02:00
From DEV to Sec #Application #Security - How do we fix #devsecops with Tanya Janca #cyber #appsec
1:19:57
#Data #Driven #Application #Security Programs with Brooks Shoenfield #apsec #cyber #cybersecurity
1:57
Prioritisation Aspects of Vulnerability
Open Security Summit - Highlights
2:08:01
Appsec & Cloudsec Podcast @ Appsec Phoenix BLACK HAT
2:32
The Important Aspects of Reporting
1:42
What is The Objective of Security?
49:54
Application Security vulnerabilities - Measurements, Maturity Magic
32:33
AppSec Phoenix Live Fireside chat @ Black Hat Europe
#Vulnerabilities and #code #smells #cybersecurity #shorts #vulnerabilitymanagement
1:06
Who should be fixing vulnerabilities #ciso #vulnerabilitymanagement with Jim Newman #wipro #capco
1:07
#vulnerability or #CVE that could screw up your entire org voice of a #ciso #vulnerability #shorts
What are the #vulnerabilites that you should fix #ciso #view
LIVE
[Private video]
0:59
#vulnerability from a #ciso perspective which one to fix #business #cybersecurity #shorts
1:00
#devsecops what makes a good practice #ciso #vulnerability #appsec #shorts
#vulnerability is not a #ciso problem is a #business problem #cybersecurity
3:09
The Ultimate guide to #ASPM #Secure #Digital #Supply #Chain demystifying buzzwords #cybersecurity
1:00:27
State of Cyber UK Funding - UK/Europe vs USA
5:34:37
Appsec Unbounded – Revolutionize Application Security with new method on AI
2:11
#AI Meets #aspm and #AppSec: Unveiling the Future at AppSec Unbounded #cybersecurity #aspm #talks
2:00
Mastering #appsec #vulnerabilitymanagment A Guide for Cybersecurity Pros #Cybersecurity #ASPM
22:31
#Appsec #Unbounded LLM Security - Christoph Parisel - Risk and Recommandations #cybersecurity #ai
29:43
#Appsec Unbounded James Bethroty #Genb#AI is way better at #security than I thought it was with #ai
59:27
Reachability Analysis- the future of #applicationsecurity #ASPM is ONE Backlog with James Berthoty
1:00:44
Unlocking the Power of #Security Champion Programs & #ASPM for Application Security with Dustin lehr
4:31
Mastering #Container #Security: Effective #Patching Strategies focusing on version #cybersecurity
6:52
Mastering Vulnerability Management: The Human-Automation Balance
2:12
Transforming Linux Updates: Simplifying Your DevOps Strategy
2:03
Navigating Security: Balancing Risk and #vulnerabilitymanagement #prioritization #cybersecurity
2:33
Unlocking #Reachability: Navigating Software and Network Complexity with #prioritization
2:28
#EPSS #Reachability Analysis & Vulnerability Prioritization and #vulnerabilitymanagement
1:50
Mastering #vulnerabilitymanagement: The Dynamic Approach You Need in #cloudsecurity
4:07
#ASPM and #CNAPP with #Reachability #Analysis: A Deep Dive into #Contextual Vulnerability Management
Mastering #Container #Security: Effective Patching Strategies #containersecurity #cybersecurity
2:50
Understanding #Runtime #Reachability and Its Impact on #Security #cybersecurity #aspm
2:52
Unlocking the Power of #VEX Statements for Tech Innovation #cybersecurity
1:30:13
Mastering Reachability Analysis: Redefining Product Security #AppSec #CyberSecurity
1:18
Unlocking Modern Scanning Secrets for Code Safety!
1:30
Mastering Vulnerability Scans: Insights from Snyk and Trivy
1:38
DevOps FAILED? Bridging Security Communication Gaps
3:41
Container Security: From Reactive to Proactive
2:23
AI Solves Age-Old Security Root Cause Problems
1:36
Reachability Analysis: Less Intrusive, More Flexible
1:21
Prioritize Vulnerabilities: Stop the Security Mess!
1:15
Software Supply Chain Security: Solved?
1:53
Unlocking Network Security: The Evolution of Scanning Techniques
2:16
AI Simplifies #Cybersecurity: focus on #Vulnerabilities leveraging a Threat Centric approach
1:27
Uncovering Vulnerabilities: The Power of Container Scanning!
2:19
Why Are #Software #Vulnerabilities Exploding?
Prioritizing CVEs: Runtime vs Code Vulnerabilities Explained! The power of Reachability Analysis
3:17
Stop Reacting, Start Preventing: Proactive Security
34:59
Patch Fatigue: The Unseen Cyber Crisis in Application Security and Vulnerability Managment !