Feb. 23, 2023, 10:26 p.m. | Sean Martin, ITSPmagazine, Marco Ciappelli, Peter Klimek

Redefining CyberSecurity redefining-cybersecurity.simplecast.com

In this second episode, we take a closer look at Log4j and what business/operations impacts it had on organizations faced with the attacks against the vulnerability. We also get to hear about some successful mitigation measures Imperva customers used to mitigate the impact of Log4j and take that to the next level for some actionable steps companies can take to prepare for other supply chain vulnerabilities.

artificial intelligence attacks banking business businesses business of security ccpa chief information security officer cio ciso cloud security cto customers cybersecurity cyberwarfare data breaches data integrity data protection data security ddos digital security digital transformation disclosure engineering gdpr government hackers hacking healthcare impact imperva infosec infosec jobs innovation internet law legislation log4j mitigation musuem networking operations organizations pentesting peter peter klimek policy privacy program management regulation risk management security security operations software software supply chain software supply chain security story supply supply chain supply chain security technology threat intelligence vulnerability

More from redefining-cybersecurity.simplecast.com / Redefining CyberSecurity

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer (SPLUNK) | Remote US

@ Coalfire | United States

Cyber - AppSec - Web PT2

@ KPMG India | Bengaluru, Karnataka, India

Ingénieur consultant expérimenté en Risques Industriels - Etude de dangers, QRA (F-H-X)

@ Bureau Veritas Group | COURBEVOIE, Ile-de-France, FR

Malware Intern

@ SentinelOne | Bengaluru, Karnataka, India