Artwork

Innehåll tillhandahållet av ink8r. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av ink8r eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Episode #24 - Unifying Security Technology and Human Intelligence with Synack

29:51
 
Dela
 

Manage episode 357472983 series 3298179
Innehåll tillhandahållet av ink8r. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av ink8r eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Disrupting traditional security testing approaches is where Synack specializes. They have long recognized that to thwart attacks in modern adversarial campaigns requires a maximal combined talent of human and AI-powered intelligence. Through the gamification and use of crowdsourced expertise across verifiable exercises, Synack leverages its Synack Red Team (SRT), a global network of ethical hackers, to identify and address vulnerabilities across an ever-evolving attack surface.
This crowdsourced team of highly skilled and heavily vetted ethical hackers represents one of Synack's key differentiators. Traditional security assessments and audits provide point-in-time insights into an enterprise's security posture which does little to illuminate an organization's cyber defense capabilities, processes, or controls. Synack instead opts to use an incentive-driven model that allows their security practitioners to employ any Tactics, Techniques, and Procedures (TTPs) they deem appropriate, encouraging behavior that more readily models exploitation hunting as an adversary would. Sessions are recorded and exploits are verified via other members, providing a capture into how the vulnerabilities are found, along with how long it took, what the relative effort was to identify, and what remediation steps are recommended. Re-test is part of the service for closed-loop verification.

Join us in this episode as we speak with Tim Lawrence, Solution Architect as we go into greater depth into how Synack can provide resilience to any organization. In a market where security practitioners are hard to come by, this is a firm to engage with.
Please reach out to us to discover how we develop closed-loop resilience patterns in a modern SSDLC!

  continue reading

41 episoder

Artwork
iconDela
 
Manage episode 357472983 series 3298179
Innehåll tillhandahållet av ink8r. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av ink8r eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.

Disrupting traditional security testing approaches is where Synack specializes. They have long recognized that to thwart attacks in modern adversarial campaigns requires a maximal combined talent of human and AI-powered intelligence. Through the gamification and use of crowdsourced expertise across verifiable exercises, Synack leverages its Synack Red Team (SRT), a global network of ethical hackers, to identify and address vulnerabilities across an ever-evolving attack surface.
This crowdsourced team of highly skilled and heavily vetted ethical hackers represents one of Synack's key differentiators. Traditional security assessments and audits provide point-in-time insights into an enterprise's security posture which does little to illuminate an organization's cyber defense capabilities, processes, or controls. Synack instead opts to use an incentive-driven model that allows their security practitioners to employ any Tactics, Techniques, and Procedures (TTPs) they deem appropriate, encouraging behavior that more readily models exploitation hunting as an adversary would. Sessions are recorded and exploits are verified via other members, providing a capture into how the vulnerabilities are found, along with how long it took, what the relative effort was to identify, and what remediation steps are recommended. Re-test is part of the service for closed-loop verification.

Join us in this episode as we speak with Tim Lawrence, Solution Architect as we go into greater depth into how Synack can provide resilience to any organization. In a market where security practitioners are hard to come by, this is a firm to engage with.
Please reach out to us to discover how we develop closed-loop resilience patterns in a modern SSDLC!

  continue reading

41 episoder

Alla avsnitt

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide