What asset management (ITAM) looks like outside cybersecurity – Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin – ESW #374

This episode is sponsored by
Full Show Notes
Segment One

What asset management (ITAM) looks like outside cybersecurity – Jeremy Boerger – ESW #374

Guest

Jeremy Boerger has been leading and managing information technology asset management (ITAM) teams for over twenty years in sectors as varied as healthcare, manufacturing, and finance. In 2017, he founded Boerger Consulting, LLC to reach more medium and large organizations to maximize their IT total cost optimization (TCO) efforts across their hardware and software expenditures. In 2021, he published Rethinking Information Technology Asset Management (Business Expert Press) to guide and coach more individuals on the finer points of hardware and software asset management (SAM). He currently tours the North America, speaking to like-minded IT Directors, CIOs, CFOs, and CEOs to encourage faster adoption of “the best of the best” practices in the industry: the Pragmatic ITAM Method.

Segment Two

Interview with ThreatLocker: Is Application Allowlisting Making a Comeback? – Danny Jenkins – ESW #374

Guest

Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust.

Segment Three

SaaS Security Beyond Just Misconfiguration & Expert Insights on Cybersecurity Ethics – Ed Skoudis, Maor Bin – ESW #374

Guests

Ed Skoudis is a Faculty member at IANS Research and the founder of Counter Hack, a company focused on conducting ultra high-quality penetration tests and red team engagements to help organizations better manage their cyber risks. Ed is a SANS Fellow, author, and instructor who has trained over 20,000 cyber security professionals in the art of penetration testing and incident response. Ed is an expert witness who is often called in to analyze large-scale breaches.

A former cybersecurity intelligence officer in the IDF, Maor has over 17 years in cybersecurity leadership. In his career, he led SaaS Threat Detection Research at Proofpoint and won the operational excellence award during his IDI service. Maor got his BSc in Computer Science and is CEO and co-founder of Adaptive Shield, the SaaS Security company that helps security teams continuously manage and control their entire SaaS stack, from threat prevention to detection and response.

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds