
DATA SECURITY DECODED
SECURING THE SOFTWARE SUPPLY CHAIN
WITH ALLISON WIKOFF
In this episode of Data Security Decoded, Allison Wikoff, a 20-year veteran in information security and threat intelligence, explores current cybersecurity challenges, emerging threats, and practical defensive strategies for organizations of all sizes.
What You'll Learn:
How to prioritize vulnerability management by focusing on critical edge devices and access points
Why understanding your network architecture is crucial for effective threat defense
The reality of AI in cyber attacks: current uses, limitations, and practical defense strategies
How to build supply chain resilience through vendor assessment and backup supplier planning
Why older vulnerabilities remain a primary attack vector and how to address them effectively
The framework for developing an actionable threat profile tailored to your organization's needs
Key Insights:
Threat actors increasingly target known vulnerabilities over sophisticated zero-day exploits
Supply chain security requires understanding vendor access levels and maintaining secondary suppliers
AI adoption in cyber attacks remains focused on basic tasks like improving phishing emails and code generation
Organizations should prioritize patching vulnerabilities in edge devices like VPNs and WAFs
Building an effective security strategy starts with understanding your organization's specific threat profile
Partnering with vendors and suppliers can help smaller organizations enhance their security capabilities
Episode Resources:
SERIES
Explore other episodes
NEWSLETTER
Get insights straight to your inbox