Effective Operational Outcomes – Ken Dunham – PSW #847
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve.
Segment Resources: https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
Guest
Ken Dunham has over 30 years of global cyber leadership, including executive leadership in a leading Americas security company, and key involvement in two top-rated startups. He was one of the pioneers of the responsible disclosure process used by Microsoft and others for vulnerability management today, as well as modern day cyber threat intelligence (CTI), and responsible for extensive incident response and counterintelligence within F100 and other organizations around the world. Mr. Dunham also innovated groundbreaking training programs integrating new forms of technology and training for the USAF for the U2 spy plane, warthog, and creation of the Predator drone program. Mr. Dunham is the author of eight books, a top-rated website, and the top downloaded antivirus program. His eighth book will be published in Q4 2024 for Cyber CISO leaders. He is a recognized global leader within ISSA as an International Distinguished Fellow, authoring multiple books and the ISSA international article of the year, “Troubling Trends of Espionage,” 2015.