Gå frakoblet med Player FM -appen!
How to Protect Your Accounting Firm From Cyber Attacks
Manage episode 303483101 series 1056289
Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements
333 episoder
How to Protect Your Accounting Firm From Cyber Attacks
Growing Your Firm | Strategies for Accountants, CPA's, Bookkeepers , and Tax Professionals
Manage episode 303483101 series 1056289
Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements
333 episoder
Alle episoder
×Velkommen til Player FM!
Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.