Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies
October 9, 2018
Hosted by Rebecca Herold
The terms “vulnerability scanning,” “vulnerability assessments” & “penetration testing” are often used interchangeably. But they are not the same! What are the benefits of each? For what purposes should each be used? Are they required by law? Are there any negative impacts for each type of activity? Listen in as cyber security expert Kevin Beaver discuss these topics, his experiences and advice, and also hear us go through some related case studies for using these tools.
Data Security and Privacy with the Privacy Professor
New shows the first Saturday of each month at 8 AM Pacific Time on VoiceAmerica Business Channel
There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.
Rebecca has 25-plus years of systems engineering, information security, privacy and compliance experience, is CEO of The Privacy Professor(R) consultancy she founded in 2004, and Co-Founder/CEO of Privacy Security Brainiacs online services, where Rebecca engineered the systems and created all the content, including automated risk assessments and training courses. Rebecca has authored 20 books, contributed to dozens of other books, and published hundreds of articles. Rebecca led the NIST Smart Grid Privacy Subgroup for 7 years, a member of the NIST Privacy Framework development team, and is a NIST Cybersecurity for IoT Program team member. Rebecca has provided expert witness services for HIPAA compliance, IoT security, privacy and location tracking, retirement community members’ personal data misuse, and other cases. Rebecca was co-founder and officer of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group, and is on numerous advisory boards. Rebecca was Adjunct Professor for the Norwich University MSISA program for 9 years. Rebecca has received numerous awards, including named as a Top 100 Women Fighting Cybercrime and a Cybersecurity Woman of the Year. Rebecca has provided keynotes on 5 continents and is frequently interviewed on TV and in international publications. Rebecca holds the following certifications: FIP, CDPSE, CISSP, CISA, CISM, CIPT, CIPM, CIPP/US, FLMI. Ponemon Privacy Fellow. Rebecca is based in Des Moines, Iowa, USA.