For Morey Haber, the Chief Security Officer at BeyondTrust, (episode #9), risk priorities are dialed into vulnerability management and privileges: “What resonates most today are the two primary attack vectors — vulnerability and exploits of privileged accounts. It doesn’t matter where the software is running; you still have to be able to identify a mistake, flaw, or vulnerability, if it is exploitable, and how you are going to correct it. Secondly, any type of privileges that can allow authentication — how those are being managed, governed, and monitored are the biggest disciplines.”

Read the full story here:

Prefers reduced motion setting detected. Animations will now be reduced as a result.