image

DATA SECURITY DECODED

SECURING THE SOFTWARE SUPPLY CHAIN

WITH ALLISON WIKOFF


In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.



What You'll Learn:

  • How to prioritize vulnerability management by focusing on critical edge devices and access points

  • Why understanding your network architecture is crucial for effective threat defense

  • The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies

  • How to build supply chain resilience through vendor assessment and backup supplier planning

  • Why older vulnerabilities remain a primary attack vector and how to address them effectively

  • The framework for developing an actionable threat profile tailored to your organization's needs

     

Key Insights:

  • Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits

  • Supply chain security requires understanding vendor access levels and maintaining secondary suppliers

  • AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation

  • Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs

  • Building an effective security strategy starts with understanding your organization's specific threat profile

  • Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities

     

Episode Resources: 

NEWSLETTER

 

Get insights straight to your inbox

Please wait for the form to load..
Not you?

By submitting this form, I understand that my personal information will be processed in accordance with Rubrik's Privacy Policy