Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 How To Pitch Yourself (And Get A Yes) | 300 27:52
From Shadow IT to Full Asset Visibility with Wes Wright
Manage episode 449761071 series 2675076
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr
Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
374 episodes
Manage episode 449761071 series 2675076
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr
Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
374 episodes
All episodes
×
1 Protecting People, Not Just Perimeters with Andrey Suzdaltsev 45:21

1 Digital Clutter and the Death of Passwords with Collin Sweeney & Chase Cunningham 43:26

1 What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen 0:36

1 Hackers Have HR Now? featuring Christopher Budd 36:59

1 Staying Ahead in the Age of AI Agents with Marco Figueroa 40:57

1 I Built an AI Version of Myself – Here’s Why with Marcus J. Carey 39:48

1 Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole 41:45

1 The AI Shift You Can’t Ignore with Marco Figueroa 37:35

1 Superhuman Productivity and AI Mastery with Pedram Amini 36:17

1 Cybersecurity Meets AI: The Good, The Bad & The Janky 22:38

1 A Human-Centric Approach to Cybersecurity with Edna Conway 35:40

1 Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam 38:03

1 How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi 35:35

1 Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright 44:49

1 The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa 41:39

1 Understanding the Psychology of Cyber Risk with David Shipley 44:24

1 From Landscaping to Cyber Leadership with Cole Lisko 34:44

1 Think Like a Hacker, Solve Like a Leader featuring Ted Harrington 41:06

1 Hacking Trust with AI and Deepfakes featuring Iain Jackson 25:04

1 Championing the Human in Cybersecurity with Julie Haney 2:31

1 Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss 40:21

1 Transforming SOC Operations with AI featuring Roy Halevi 49:04

1 From Shadow IT to Full Asset Visibility with Wes Wright 37:24

1 Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews 41:49

1 Rethinking Cybersecurity Hiring with Naomi Buckwalter 43:40

1 AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter 33:54

1 How to Become a True Security Leader with Nathan Case 36:17

1 AI and the Future of Cyber Defense with John Hubbard 34:12

1 How Adversaries Are Living Off The Dark Web with Jason Haddix 44:55

1 AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan 18:20
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.