Pentest reporting and the remediation cycle: Why aren’t we making progress? [CyberWire-X]

Pentest reporting and the remediation cycle: Why aren’t we making progress? [CyberWire-X]

0 Umsagnir
0
Episode
2193 of 3509
Lengd
36Mín.
Tungumál
enska
Gerð
Flokkur
Óskáldað efni

The age-old battle between offensive and defensive security practitioners is most often played out in the penetration testing cycle. Pentesters ask, “Is it our fault if they don’t fix things?” While defenders drown in a sea of unprioritized findings and legacy issues wondering where to even start. But the real battle shouldn’t be between the teams; it should be against the real adversaries. So why do pentesters routinely come back and find the same things they reported a year ago? Do the defenders just not care or does the onus fall on the report? Everyone really wants the same thing: better security. To get there, the primary communication tool between consultant and client, offensive and defensive teams — the pentest report — must be consumable and actionable and tailored to the audience who receives it. In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table members Amanda Fennell, the CIO and CSO of Relativity, and William MacMillan, the SVP of Security Product and Program Management at Salesforce. In the second half of the episode, Dan DeCloss, the Founder and CEO of episode sponsor PlexTrac, joins Dave Bittner discuss the politics around pentest reporting and how better reports can support real progress. Learn more about your ad choices. Visit megaphone.fm/adchoices


Hlustaðu og lestu

Stígðu inn í heim af óteljandi sögum

  • Lestu og hlustaðu eins mikið og þú vilt
  • Þúsundir titla
  • Getur sagt upp hvenær sem er
  • Engin skuldbinding
Prófa frítt
is Device Banner Block 894x1036
Cover for Pentest reporting and the remediation cycle: Why aren’t we making progress? [CyberWire-X]

Other podcasts you might like ...