30 Min On
Vulnerability Management
With
James Berthoty
Episode
9
I
July 15, 2024
|
31

Building Seamless Security Ecosystems

In this episode of "30 Min on: Vulnerability Management", host James Berthoty is joined by Yuval Shchory, an influential figure at AWS with extensive background in product development and partnerships, ranging from Cisco to Checkpoint. Yuval shares insights from his extensive career trajectory, exploring how his technical beginnings and leadership roles have shaped his current focus on enhancing cloud security through strategic partnerships.

Episode
8
I
July 8, 2024
|
31

Mastering AI Vulnerabilities

In this episode of "30 Min on: Vulnerability Management," host James Berthoty is joined by Adir, CTO of AIM Security, a leading company in generative AI security. Celebrating their recent funding round, Adir shares insights into the intersection of AI and vulnerability management.

Follow us on your preferred platform

Episode
7
I
June 25, 2024
|
31

Vulnerability Management in the Age of ADR

In this episode of "30 Minutes on Vulnerability Management", host James Berthoty welcomes Daniel Shechter, CEO and co-founder of Miggo Security. Daniel introduces the innovative concept of Application Detection and Response (ADR), a pioneering approach in application security that promises to enhance the alignment between security practices and application development.

Episode
6
I
May 27, 2024
|
32

The CISO Perspective on the Market

In this informative episode of "30 Min on: Vulnerability Management," host James Berthoty sits down with Frank Kim to explore the evolving landscape where software development and security intersect. Frank, with a rich background transitioning from software engineering to cybersecurity, shares his insights on the challenges and strategies of integrating robust security practices within development workflows.

Episode
5
I
May 13, 2024
|
30

Convergence of Scanning Tools

On this episode of "30 Minutes on: Vulnerability Management" host James Berthoty interviews Aviv Mussinger, CEO and Co-Founder of Kodem, whose extensive background spans Israeli intelligence as well as cybersecurity roles at NSO Group. Aviv shares his journey, highlighting how his deep-rooted interest in technology led to a career in application security that revolutionized the field.

Episode
4
I
May 1, 2024
|
39

Financial Value in Security Remediation

In this informative episode of "30 Min on: Vulnerability Management" host James Berthoty welcomes Justin Somaini, a seasoned CISO with a notable career spanning companies like Unity, SAP, and Yahoo. Justin shares insights from his experience navigating security practices from startups to large enterprises.

Episode
3
I
April 24, 2024
|
32

Working with Engineering on Security

This episode brings Shaun Blackburn into the spotlight, currently the CISO at Gemini, with a rich background in incident response, vulnerability management at Airbnb, cloud infrastructure security at Netflix, and a stint as a SOC manager at AWS. James and Shaun discuss the intricate weave of vulnerability management, security engineering, and operations, emphasizing the transformative approach to vulnerability management through automation and collaborative engineering efforts.

Episode
2
I
April 9, 2024
|
36

Overhead in Security Remediation: The Path to Efficiency

In our second episode of the 30 Min on: Vulnerability Management, James Berthoty sits down with Andy Ellis, a visionary in the field of cybersecurity with a journey from security engineer to CISO. They unravel the complexities of vulnerability management and the evolving responsibilities within security teams, underscored by the advent of Cloud Security Posture Management (CSPM) tools.

Episode
1
I
April 7, 2024
|
34 min

Configuration and CVE Issues: The Overwhelming Challenge

In this opening episode of “30 Min on: Vulnerability Management” host James Berthoty and Opus’s Co-founder and CEO Meny Har discuss the burgeoning challenges of Configuration and CVE Issues in the modern digital landscape. This conversation, which was recorded in the hustle of Manhattan, goes beyond traditional boundaries and highlights the rise in vulnerabilities and the dire implications for organizations.