Ready to dive deeper?Register or log in to unlock exclusive Right of Boom content:

The CyberCall

Special guest: Beau Bullock

05/06/2024
In this video, cybersecurity experts discuss the vulnerabilities and challenges facing organizations in implementing effective security measures, focusing heavily on MFA and cloud security. They explore real-world scenarios, such as the change Healthcare compromise, to illustrate how threat actors exploit weak security controls and offer practical advice on improving detection, segmentation, and response strategies. Additionally, the conversation highlights the importance of strong contractual agreements and clear communication with clients to ensure comprehensive security practices are maintained.
  • The 2024 Verizon Data Breach Investigations Report (DBIR) highlights an increase in supply chain attacks by 68% year over year, indicating growing vulnerabilities in this area.
  • Despite the prevalence of Multi-Factor Authentication (MFA), many organizations still face challenges in deploying it effectively, leaving critical systems vulnerable to attacks.
  • Detection and response strategies are crucial as attackers often exploit gaps in security configurations, with threats evolving to target cloud infrastructures and leverage techniques like phishing and device code logins.
Andrew Morgan
Beau Bullock