028 – Is Data Science the Key to a Mature Security Program?
Board Member at Supply Wisdom, GrammaTech, Acceptto, and ZeroNorth
In this episode of Agent of Influence, Nabil speaks with Jim Routh, a well-known security leader and current board member at various innovative early-stage cybersecurity startups. Listen to Jim’s insights on how to define and encourage innovation, build a mature security program using data science, why risk frameworks alone are not enough, security past versus security present, how the pandemic has challenged the human factor, and last but not least, his pickleball hobby.
A podcast hosted by:
NetSPI Managing Director
Agent of Influence is a podcast hosted by NetSPI Managing Director Nabil Hannan, as a place to share best practices and trends in the world of cyber security and vulnerability management.
PTaaS is NetSPI’s delivery model for penetration testing. It enables customers to simplify the scoping of new engagements, view their testing results in real time, orchestrate faster remediation, perform always-on continuous testing, and more - all through the Resolve™ vulnerability management and orchestration platform.
We help organizations defend against adversaries by being the best at simulating real-world, sophisticated adversaries with the products, services, and training we provide. We know how attackers think and operate, allowing us to help our customers better defend against the threats they face daily.
At NetSPI, we believe that there is simply no replacement for human-led manual deep dive testing. Our Resolve platform delivers automation to ensure our people spend time looking for the critical vulnerabilities that tools miss. We provide automated and manual testing of all aspects of an organization’s entire attack surface, including external and internal network, application, cloud, and physical security.
Our proven methodology ensures that the client experience and our findings aren’t only as good as the latest tester assigned to your project. That consistency gives our customers assurance that if vulnerabilities exist, we will find them.
Is your organization prepared for a ransomware attack? Explore our Ransomware Attack Simulation service.