Cybersecurity Insights with Contrast CISO David Lindner | 2/17
Insight #1
”
It’s a great time to go through a tabletop exercise to make sure all your incident response, disaster recovery, and business continuity plans are intact and functioning. When was your last exercise?”
It’s a great time to go through a tabletop exercise to make sure all your incident response, disaster recovery, and business continuity plans are intact and functioning. When was your last exercise?”
Insight #2
”
Third-party attestations are a very important part of the security posture of an organization. If you aren’t doing this today, please consider it in the near future.”
Third-party attestations are a very important part of the security posture of an organization. If you aren’t doing this today, please consider it in the near future.”
Insight #3
”
There are really three ways to create an SBOM; using metadata, using a call tree, and during runtime. The most accurate and real representation of what third-party libraries your application is using is during runtime. How are you generating your SBOMs?”
There are really three ways to create an SBOM; using metadata, using a call tree, and during runtime. The most accurate and real representation of what third-party libraries your application is using is during runtime. How are you generating your SBOMs?”
*** This is a Security Bloggers Network syndicated blog from AppSec Observer authored by David Lindner, Director, Application Security. Read the original post at: https://www.contrastsecurity.com/security-influencers/cybersecurity-insights-with-contrast-ciso-david-lindner-2/17