Episode Thumbnail
Episode 69  |  21:43 min

Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill

Episode 69  |  21:43 min  |  11.25.2019

Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill

00:00
00:00
This is a podcast episode titled, Episode 69: Bug Bounties, Penetration Testing and Keeping Your Business Safe with Christie Terrill. The summary for this episode is: How does your company think about security? Have you adopted basic security hygiene practices like running off-the-shelf software to scan your code for vulnerabilities, or have you moved beyond that and begun to explore bug bounties and penetration testing? In this episode, Jon Prial talks with Christie Terrill, a partner the security consulting firm Bishop Fox and a widely recognized expert on cyber security. Get expert advice on how your company should approach security so that it doesn’t wind up making headlines for getting breached. You’ll hear about: - The two approaches to security - Security hygiene best practices - The evolution of bug bounties and penetration testing and their respective pros and cons - Social engineering as an attack service - How to attract and retain women in cyber security Show notes: http://bit.ly/IP-Episode69 More episodes | Subscribe: http://bit.ly/TheImpactPodcast
How does your company think about security? Have you adopted basic security hygiene practices like running off-the-shelf software to scan your code for vulnerabilities, or have you moved beyond that and begun to explore bug bounties and penetration testing? In this episode, Jon Prial talks with Christie Terrill, a partner the security consulting firm Bishop Fox and a widely recognized expert on cyber security. Get expert advice on how your company should approach security so that it doesn’t wind up making headlines for getting breached. You’ll hear about: - The two approaches to security - Security hygiene best practices - The evolution of bug bounties and penetration testing and their respective pros and cons - Social engineering as an attack service - How to attract and retain women in cyber security Show notes: http://bit.ly/IP-Episode69 More episodes | Subscribe: http://bit.ly/TheImpactPodcast

More Episodes

Rewind CEO Mike Potter On Backing up the Cloud, the Risk 3rd Party Applications Pose & Building a Time Machine for SaaS Apps

The Future of Digital Advertising with Beam.city DNA

Learning using AI and Conversational Data with Chorus.ai

Driving Digital Transformation using IoT and AI with Rob Rastovich

Data and Digital Ethics in ESG

ML Ops with Demetrios Brinkmann and David Aponte