Aug. 16, 2023, 11 a.m. | Wild West Hackin' Fest

Wild West Hackin' Fest www.youtube.com

Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

It is hard to protect what you cannot see. So many times organizations are not aware of all their assets including APIs. They prepare to have their Internet-exposed application assessed during pentests, but have to go through the drill of taking inventory of all the applications. This is a similar task for all external assets, companies do not always know …

apis application applications assets aware companies drill exposed external hard internet inventory organizations pentests prepare protect task

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Engineer

@ Core10 | Nashville, Tennessee, United States - Remote

Security Operations Engineer I

@ Jamf | US Remote

IT Security ISSO Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Compliance Officer

@ Aspire Software | Canada - Remote

Security Operations Center (SOC) - AVP

@ Paytm | Noida, Uttar Pradesh