Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Venture Investing in Mobility + Tech with University of Michigan’s Early-Stage Zell Lurie Commercialization Fund 39:30
From Shadow IT to Full Asset Visibility with Wes Wright
Manage episode 449761071 series 2675076
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr
Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
383 episodes
Manage episode 449761071 series 2675076
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr
Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
383 episodes
All episodes
×
1 Confidence, Coaching, and the S-Word with Mel Reyes 32:50

1 Purple Teaming Is the New Job Security with Maril Vernon 43:26

1 The AI Gold Rush in Cybersecurity with Chris Cochran 30:44

1 The AI That Tried to Escape with Ron Eddings 23:43

1 Zero Trust Isn’t a Tool — It’s Everything with George Finney 40:15

1 Your Two-Year Edge Starts Now with Marco Figueroa 36:34

1 Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg Hatcher & John Stigerwalt 37:31

1 Building Cyber Resilience Through Culture with David Shipley 44:30

1 Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman 29:48

1 Protecting People, Not Just Perimeters with Andrey Suzdaltsev 45:21

1 Digital Clutter and the Death of Passwords with Collin Sweeney & Chase Cunningham 43:26

1 What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen 0:36

1 Hackers Have HR Now? featuring Christopher Budd 36:59

1 Staying Ahead in the Age of AI Agents with Marco Figueroa 40:57

1 I Built an AI Version of Myself – Here’s Why with Marcus J. Carey 39:48

1 Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole 41:45

1 The AI Shift You Can’t Ignore with Marco Figueroa 37:35

1 Superhuman Productivity and AI Mastery with Pedram Amini 36:17

1 Cybersecurity Meets AI: The Good, The Bad & The Janky 22:38

1 A Human-Centric Approach to Cybersecurity with Edna Conway 35:40

1 Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam 38:03

1 How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi 35:35

1 Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright 44:49

1 The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa 41:39

1 Understanding the Psychology of Cyber Risk with David Shipley 44:24

1 From Landscaping to Cyber Leadership with Cole Lisko 34:44

1 Think Like a Hacker, Solve Like a Leader featuring Ted Harrington 41:06

1 Hacking Trust with AI and Deepfakes featuring Iain Jackson 25:04

1 Championing the Human in Cybersecurity with Julie Haney 2:31

1 Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss 40:21

1 Transforming SOC Operations with AI featuring Roy Halevi 49:04

1 From Shadow IT to Full Asset Visibility with Wes Wright 37:24

1 Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews 41:49

1 Rethinking Cybersecurity Hiring with Naomi Buckwalter 43:40

1 AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter 33:54

1 How to Become a True Security Leader with Nathan Case 36:17

1 AI and the Future of Cyber Defense with John Hubbard 34:12

1 How Adversaries Are Living Off The Dark Web with Jason Haddix 44:55

1 AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan 18:20

1 Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam 31:29

1 Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix 46:02

1 I Failed Over 300 Times Trying To Get Into Security ft. Joe South 40:12

1 Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams 24:39

1 Offensive Security: Unlocking Hidden ROI with Seemant Sehgal 15:15



1 Leaving an Impression: Strategies for Captivating a Massive Audience 32:29


1 What We All Should Be Talking About When It Comes to AI and Security 33:15

1 Navigating AI as a CISO with Whitney Palacios 22:43

1 The Power of AppSec, Cyber Education, and Friendship with Tanya Janca 35:21

1 Networking 2.0: The Future of Decentralized Networking & Access Management 32:18

1 How AI is the Key Turning Point in TPRM with Paul Valente 25:47

1 A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini 40:05

1 Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell 39:41

1 Enterprise Browsers: Work’s Natural Next Step 34:00

1 Building Tech and Adding Value in the Era of AI with Josh Danielson 24:28

1 Building Fast and Not Breaking Things with Shlomi Matichin 32:26

1 Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley 35:45

1 How to Hack your Career: Building a vCISO Business with Ayman Elsawah 31:42
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.