Artwork

المحتوى المقدم من Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

CCT 207: Practice CISSP Questions - Assess Security Impact of Acquired Software (Domain 8.4)

23:34
 
مشاركة
 

Manage episode 458950752 series 3464644
المحتوى المقدم من Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Send us a text

This episode underscores the rising threat of cross-domain attacks and the critical importance of identity management in cybersecurity. We discuss evaluating software risks, the nuances of open-source versus COTS solutions, and the necessity of robust SLAs in managed services.
• Importance of understanding cross-domain attacks and their implications
• Role of identity and access management in mitigating vulnerabilities
• Evaluating open-source software based on community engagement
• Challenges of commercial off-the-shelf software in security assessments
• Importance of managed services SLAs in establishing expectations
• Distinction between pen testing and static code analysis in evaluations
• Shared responsibility model clarifying security task divisions
• Ongoing reassessments as a response to evolving risks and threats

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every month for the next 12 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

  continue reading

فصول

1. CISSP Cyber Training & Cross-Domain Attacks (00:00:00)

2. Software Evaluation and Security Analysis (00:07:30)

3. Cyber Security Services and Solutions (00:22:11)

209 حلقات

Artwork
iconمشاركة
 
Manage episode 458950752 series 3464644
المحتوى المقدم من Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Send us a text

This episode underscores the rising threat of cross-domain attacks and the critical importance of identity management in cybersecurity. We discuss evaluating software risks, the nuances of open-source versus COTS solutions, and the necessity of robust SLAs in managed services.
• Importance of understanding cross-domain attacks and their implications
• Role of identity and access management in mitigating vulnerabilities
• Evaluating open-source software based on community engagement
• Challenges of commercial off-the-shelf software in security assessments
• Importance of managed services SLAs in establishing expectations
• Distinction between pen testing and static code analysis in evaluations
• Shared responsibility model clarifying security task divisions
• Ongoing reassessments as a response to evolving risks and threats

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every month for the next 12 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

  continue reading

فصول

1. CISSP Cyber Training & Cross-Domain Attacks (00:00:00)

2. Software Evaluation and Security Analysis (00:07:30)

3. Cyber Security Services and Solutions (00:22:11)

209 حلقات

Tất cả các tập

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع

استمع إلى هذا العرض أثناء الاستكشاف
تشغيل