Videos

Attack Surface Management – Part 2

In this conversation, Sujit Christy and Imesh Liyanage discuss attack surface management (ASM) and its importance in security strategy. They delve into the identification and mapping of the attack surface, the risks associated with vulnerabilities, and the use of modern tools and technologies like artificial intelligence in ASM.

Attack Surface Management – Part 1

In this conversation, Sujit Christy and Imesh Liyanage discuss attack surface management (ASM) and its importance in maintaining a secure and resilient IT environment. They explore the concept of ASM, the monitoring of internal and external attack surfaces, the significance of inventorying assets, and the continuous discovery and monitoring process.…

Designing a Robust autonomous penetration Testing

In this conversation, Sujit and Jeffrey discuss the steps organizations should take to design a robust implementation of autonomous penetration testing. They emphasize the importance of identifying and securing the crown jewels, visualizing the various attack vectors, and implementing a pen testing platform. They also discuss the need for governance,…

Strategies for CISOs in Risk-Based Decision Making

This conversation explores cyber resilience strategies for CISOs in risk-based decision making. The discussion emphasizes the importance of integrating cyber resilience into organizations and the challenges and best practices in safeguarding digital ecosystems. The guest, Gokulavan Jayaraman, shares insights on defining cyber resilience within the context of risk-based decision making…

Key Aspects of Autonomous Penetration Testing

In this conversation, Sujit and Jeff discuss autonomous penetration testing and its benefits for organizations. They compare manual pen testing to autonomous pen testing, highlighting the time-consuming nature of manual testing and the efficiency and scalability of autonomous testing. They also discuss the importance of continuous monitoring, the value of…

Exploring Key drivers of Modern Penetration Testing Approaches

In this conversation, Sujit Christy and Isaac Prince Jeffrey talk about modern testing approaches, specifically focusing on penetration testing. They discuss the drivers and challenges of implementing controls, the importance of visibility and validation in cybersecurity, and the role of pen testing in prioritizing security investments. They also touch on…

The Role of Boards in AI Conversations

In this conversation, Sujit Christy and Sithira Wanniarachchi discuss the adoption of zero trust in the organizations. They discuss the importance of continuously authenticating and verifying access to various information assets applying the principles of least privilege and need to do. The adoption of zero trust in Sri Lanka requires…

Using AI to Enhance Cybersecurity | Fireside Chat

In this conversation, Sujit Christy and Sithira Wanniarachchi discuss the adoption of zero trust in the organizations. They discuss the importance of continuously authenticating and verifying access to various information assets applying the principles of least privilege and need to do. The adoption of zero trust in Sri Lanka requires…

Does Zero Trust implementation require a cultural shift? | Fireside Chat

In this conversation, Sujit Christy and Sithira Wanniarachchi discuss the adoption of zero trust in the organizations. They discuss the importance of continuously authenticating and verifying access to various information assets applying the principles of least privilege and need to do. The adoption of zero trust in Sri Lanka requires…

Adoption of Responsible Gen-AI | Fireside Chat

In this conversation, Sujit Christy and Priya Muku Gora discuss the importance of responsible AI and the need for organizations to navigate the ethical, societal, and technical implications of AI. They emphasize the need for a governance framework and the involvement of key stakeholders in decision-making. They also highlight the…