Testing Your Cybersecurity

Penetration tests, assessments, audits, red teams, and bug bounties

Teri Radichel
Cloud Security

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🔒 Related Stories: Cybersecurity for Executives | Penetration Testing

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Leveraging pentesting, assessments, audits, and bug bounties is my next of 20 questions to ask your security team in my series of posts on Cybersecurity for Executives. Perfect timing as I’m speaking on the topic of cloud pentesting at AWS re:Invent in session DVC01 in just over a week. The next few blog posts talk about this topic.

Validating security controls are in place — and working

Organizations should periodically validate that their efforts to implement cybersecurity are working. Although your teams may be working diligently to implement secure solutions, gaps may exist due to lack of training, knowledge about new cybersecurity threats, or because someone made a mistake. The other risk is that an insider may be intentionally misconfiguring systems. Having an internal or outside team or third party test your systems can help you find gaps and misconfigurations you might…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award