Episode Thumbnail
Episode 69  |  21:43 min

Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill

Episode 69  |  21:43 min  |  11.25.2019

Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill

00:00
00:00
This is a podcast episode titled, Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill. The summary for this episode is: How does your company think about security? Have you adopted basic security hygiene practices like running off-the-shelf software to scan your code for vulnerabilities, or have you moved beyond that and begun to explore bug bounties and penetration testing? In this episode, Jon Prial talks with Christie Terrill, a partner the security consulting firm Bishop Fox and a widely recognized expert on cyber security. Get expert advice on how your company should approach security so that it doesn’t wind up making headlines for getting breached. You’ll hear about: - The two approaches to security - Security hygiene best practices - The evolution of bug bounties and penetration testing and their respective pros and cons - Social engineering as an attack service - How to attract and retain women in cyber security Show notes: http://bit.ly/IP-Episode69 More episodes | Subscribe: http://bit.ly/TheImpactPodcast
How does your company think about security? Have you adopted basic security hygiene practices like running off-the-shelf software to scan your code for vulnerabilities, or have you moved beyond that and begun to explore bug bounties and penetration testing? In this episode, Jon Prial talks with Christie Terrill, a partner the security consulting firm Bishop Fox and a widely recognized expert on cyber security. Get expert advice on how your company should approach security so that it doesn’t wind up making headlines for getting breached. You’ll hear about: - The two approaches to security - Security hygiene best practices - The evolution of bug bounties and penetration testing and their respective pros and cons - Social engineering as an attack service - How to attract and retain women in cyber security Show notes: http://bit.ly/IP-Episode69 More episodes | Subscribe: http://bit.ly/TheImpactPodcast

More Episodes

An Introduction to Self-Sovereign Identity with Northern Block CEO Mathieu Glaude

An Introduction to Self-Sovereign Identity with Northern Block CEO Mathieu Glaude

Building  Effective Cybersecurity Defenses with eSentire's CTO Dustin Hillard

Building Effective Cybersecurity Defenses with eSentire's CTO Dustin Hillard

Detecting Cybersecurity Threats with Devo's CEO Marc van Zadelhoff

Detecting Cybersecurity Threats with Devo's CEO Marc van Zadelhoff

What's Identity Authentication and How Does It Work? ft. Trusona's CTO John Summers

What's Identity Authentication and How Does It Work? ft. Trusona's CTO John Summers

Navigating the Cybersecurity Landscape with CISO Alex Manea

Navigating the Cybersecurity Landscape with CISO Alex Manea

Rewind CEO Mike Potter On Backing up the Cloud, the Risk 3rd Party Applications Pose & Building a Time Machine for SaaS Apps

Rewind CEO Mike Potter On Backing up the Cloud, the Risk 3rd Party Applications Pose & Building a Time Machine for SaaS Apps