Making vulnerability management and incident response actually work. Also, the News! – Ryan Fried, Beck Norris, José Toledo – ESW #442

Full Show Notes
Segment One

Making vulnerability management and incident response actually work. Also, the News! – Beck Norris, Ryan Fried, José Toledo – ESW #442

Guests
Manager, Vulnerability Management at JetBlue

Beck has seen 15+ years in IT and cyber security and is an enthusiastic, innovative, customer-focused leader with a history of creating, leading and maturing global technology-based teams, processes, and technology.

She has overseen program and platform development from the ground up to production, has a over a decade of experience in multiple compliance arenas, and experience managing technical personnel and consulting services strategies. She is familiar with a variety of business environments as both a client and as a consultant, from corporate to entrepreneurial settings which has provided her with a real-world understanding of the importance of professional services and organizational management to meet business objectives.

She is known for her cheerful pro-action in creating new and inventive solutions to resolve security and process gaps in order to initiate efficiency, progress and growth. She is passionate about supporting diversity and inclusion initiatives, having created and co-chaired several committees dedicated to bringing awareness to Neurodiversity as well as Women in Technology.

Principal Security Consultant at Mandiant

Ryan has 10+ years of experience in IT security ranging from compliance, analyst engineer, CISO and consultant. He also has taught cyber security at the community college level for the last 8 years. Ryan has most recently been leading initiatives such as SOAR, purple teaming, network segmentation, devsecops and cloud security posture management.

Principal Consultant at Google

José has over a decade of experience across the IT and OT landscapes, with a background spanning enterprise network administration, security program development, and complex environmental assessments. He has most recently been leading strategic initiatives focused on bridging the gap between technical cybersecurity and business objectives. His work focuses on building and assessing comprehensive cybersecurity programs for global organizations, performing technical assessments across Active Directory and cloud environments, and conducting tabletop exercises.

Announcements
List of Articles

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds