Artwork

Контент предоставлен The EPAM Continuum Podcast Network and EPAM Continuum. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией The EPAM Continuum Podcast Network and EPAM Continuum или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.
Player FM - приложение для подкастов
Работайте офлайн с приложением Player FM !

Silo Busting 46: M&A and Cybersecurity with Sam Rehman, Sobhith Grandhi, and Adam Bishop

22:39
 
Поделиться
 

Manage episode 342701765 series 3215634
Контент предоставлен The EPAM Continuum Podcast Network and EPAM Continuum. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией The EPAM Continuum Podcast Network and EPAM Continuum или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.
When you think of the term “mergers” what comes next? “Acquisitions,” of course! But what follows after that? How about… “cybersecurity”? Does that concept immediately pop to mind when thinking about M&A? According to the latest #CybersecurityByDesign episode of Silo Busting, it should—but perhaps this isn’t always the case. Listen as Sam Rehman, EPAM’s Chief Information Security Officer and SVP, interrogates Sobhith Grandhi, our Head of Technology for M&A, and Adam Bishop, our Head of Security Advisory, about cyber in the M&A era. The conversation centers on explaining to organizations that, as Rehman says, “cyber should be a first-class citizen during your deal flow.” Grandhi notes how much risk and uncertainty are involved in M&A situations, and how this creates opportunities for cybercriminals. “You get an e-mail that says, ‘Hey, revised org chart, please review ASAP.’ You're gonna open that attachment,” says Bishop. This is the kind of situation that attackers “prey on and count on.” They use the uncertainty of M&A to “prey on the human as the weakest link in the chain.” If you and your organization want an expert view on M&A risk factors, what the cybersecurity process looks like, the challenges of integration and evaluation, and more—this is an episode you’ll want to download. The risk, it turns out, is not listening. Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

164 эпизодов

Artwork
iconПоделиться
 
Manage episode 342701765 series 3215634
Контент предоставлен The EPAM Continuum Podcast Network and EPAM Continuum. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией The EPAM Continuum Podcast Network and EPAM Continuum или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.
When you think of the term “mergers” what comes next? “Acquisitions,” of course! But what follows after that? How about… “cybersecurity”? Does that concept immediately pop to mind when thinking about M&A? According to the latest #CybersecurityByDesign episode of Silo Busting, it should—but perhaps this isn’t always the case. Listen as Sam Rehman, EPAM’s Chief Information Security Officer and SVP, interrogates Sobhith Grandhi, our Head of Technology for M&A, and Adam Bishop, our Head of Security Advisory, about cyber in the M&A era. The conversation centers on explaining to organizations that, as Rehman says, “cyber should be a first-class citizen during your deal flow.” Grandhi notes how much risk and uncertainty are involved in M&A situations, and how this creates opportunities for cybercriminals. “You get an e-mail that says, ‘Hey, revised org chart, please review ASAP.’ You're gonna open that attachment,” says Bishop. This is the kind of situation that attackers “prey on and count on.” They use the uncertainty of M&A to “prey on the human as the weakest link in the chain.” If you and your organization want an expert view on M&A risk factors, what the cybersecurity process looks like, the challenges of integration and evaluation, and more—this is an episode you’ll want to download. The risk, it turns out, is not listening. Host: Alison Kotin Engineer: Kyp Pilalas Producer: Ken Gordon
  continue reading

164 эпизодов

Все серии

×
 
Loading …

Добро пожаловать в Player FM!

Player FM сканирует Интернет в поисках высококачественных подкастов, чтобы вы могли наслаждаться ими прямо сейчас. Это лучшее приложение для подкастов, которое работает на Android, iPhone и веб-странице. Зарегистрируйтесь, чтобы синхронизировать подписки на разных устройствах.

 

Краткое руководство