SIGN-UP NOW! Click to become a The VoiceAmerica Talk Member for Free!
voiceamerica-business radio logo
Apple logo Google Play Store Kindle store
Data Security and Privacy with the Privacy Professor

Data Security and Privacy with the Privacy Professor

New shows the first Saturday of each month at 8 AM Pacific

October 9th 2018: Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies

The terms “vulnerability scanning,” “vulnerability assessments” & “penetration testing” are often used interchangeably. But they are not the same! What are the benefits of each? For what purposes should each be used? Are they required by law? Are there any negative impacts for each type of activity? Listen in as cyber security expert Kevin Beaver discuss these topics, his experiences and advice, and also hear us go through some related case studies for using these tools.

Share Email SHARE
Download PDF DOWNLOAD PDF
Get Code GET CODE

Tune in

New shows the first Saturday of each month at 8 AM Pacific Time on VoiceAmerica Business Channel
LISTEN LIVE
EPISODE ON DEMAND
VIEW HOST PAGE
Questions? Comments?
Call In Live!
Toll Free: 1-866-472-5790
Intl: 001-480-398-3352

Featured Guest

Guest Image

Kevin Beaver

Kevin Beaver is an independent information security consultant with Atlanta-based Principle Logic, LLC. With over 29 years of experience, Kevin performs security assessments & virtual CISO consulting to help his clients manage their business risks & uncheck the boxes that keep creating a false sense of security.
Read more

Share This Episode

facebook Share On Facebook
twitter Share On Twitter
Linkedin Share On LinkedIn
Share Email Share this E-mail
https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor 01/10/2021 03:00 01/10/2021 04:00 Data Security and Privacy with the Privacy Professor https://www.voiceamerica.com/show/2733/data-security-and-privacy-with-the-privacy-professor The terms “vulnerability scanning,” “vulnerability assessments” & “penetration testing” are often used interchangeably. But they are not the same! What are the benefits of each? For what purposes should each be used? Are they required by law? Are there any negative impacts for each type of activity? Listen in as cyber security expert Kevin Beaver discuss these topics, his experiences and advice, and also hear us go through some related case studies for using these tools. VoiceAmerica | Talk Radio | Online Talk Radio studio@voiceamerica.com false DD/MM/YYYY Add to Calendar
Email Host Email the Host

Connect with VoiceAmerica

Download our mobile apps
App store Google play Blackberry store
Facebook Twitter Linkedin Social Media
presspass-banner