Subscribe
Sign in
Home
Podcast
Notes
Chat
Archive
About
Latest
Top
Discussions
Data-Centric Security: Protect Your Cloud Data with Microsoft Defender
Leverage Defender for Cloud and Microsoft Purview to discover sensitive data, analyze attack paths, and focus your remediation efforts on the risks that…
15 hrs ago
•
Christophe Foulon
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Data-Centric Security: Protect Your Cloud Data with Microsoft Defender
Copy link
Facebook
Email
Notes
More
The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration
🚀 Transform Your Cybersecurity Approach! 🚀Join me on a journey through "The Phantom Workforce," where I delve into combating state-sponsored IT…
Aug 13
•
Christophe Foulon
2
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration
Copy link
Facebook
Email
Notes
More
Develop and Enforce Robust Remediation Policies and SLAs
Strengthen your organization's security response with robust Remediation Policies and SLAs! Discover how to transform your vulnerability management…
Aug 11
•
Christophe Foulon
2
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Develop and Enforce Robust Remediation Policies and SLAs
Copy link
Facebook
Email
Notes
More
From Psychology to Cybersecurity: Craig Taylor's Impact
In this episode of Breaking into Cybersecurity, host Chris welcomes Craig Taylor, CEO of Cyber Hoot, as he shares his inspiring journey into the…
Aug 8
•
Christophe Foulon
2
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
From Psychology to Cybersecurity: Craig Taylor's Impact
Copy link
Facebook
Email
Notes
More
35:08
Navigating the Cybersecurity Career Path: Insights from CISO Tradecraft with Guest Christophe Foulon
In a recent episode of CISO Tradecraft, host G Mark Hardy sat down with cybersecurity expert Christophe Foulon to explore the intricacies of entering…
Aug 5
•
Christophe Foulon
and
CISO Tradecraft
2
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Navigating the Cybersecurity Career Path: Insights from CISO Tradecraft with Guest Christophe Foulon
Copy link
Facebook
Email
Notes
More
44:34
Embed Security into the DevOps Lifecycle (DevSecOps)
Learn to "shift left" with DevSecOps. Discover how to integrate security into your development lifecycle, from Infrastructure as Code (IaC) scanning to…
Aug 5
•
Christophe Foulon
1
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Embed Security into the DevOps Lifecycle (DevSecOps)
Copy link
Facebook
Email
Notes
More
CISO Trade Craft Podcast with Guest Christophe Foulon
From Help Dek to CISO: Insights with Christophe Foulon. In this episode of CISO Tradecraft, host G Mar welcomes Christophe Foulon, founder of CPF…
Aug 4
•
Christophe Foulon
1
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
CISO Trade Craft Podcast with Guest Christophe Foulon
Copy link
Facebook
Email
Notes
More
July 2025
TRaViS: See Your Company Through an Attacker’s Eyes—Before They Do
Let’s dive into an engaging scenario! Imagine you’re a threat actor on a mission to uncover vulnerabilities in your environment. Your goal is to break…
Jul 31
•
Christophe Foulon
2
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
TRaViS: See Your Company Through an Attacker’s Eyes—Before They Do
Copy link
Facebook
Email
Notes
More
Automate Remediation and Response with Security Orchestration
Ditch slow manual processes. Discover how security automation and SOAR reduce human error, accelerate threat containment, and free up your security…
Jul 28
•
Christophe Foulon
1
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Automate Remediation and Response with Security Orchestration
Copy link
Facebook
Email
Notes
More
Cloud Security: Identity as the New Perimeter | JIT & Adaptive Access
Discover how a robust Identity and Access Management (IAM) strategy, with JIT access and adaptive controls, can transform your cloud security and…
Jul 18
•
Christophe Foulon
1
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Cloud Security: Identity as the New Perimeter | JIT & Adaptive Access
Copy link
Facebook
Email
Notes
More
Overwhelmed by Alerts? A Guide to Risk-Based Prioritization Over CVS
Discover how to mature your vulnerability management from a reactive chore to a continuous, risk-based program. This guide helps leaders protect their…
Jul 11
•
Christophe Foulon
3
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
Overwhelmed by Alerts? A Guide to Risk-Based Prioritization Over CVS
Copy link
Facebook
Email
Notes
More
10 Best Practices for the Modern Enterprise: Achieve Complete Attack Surface Visibility
Discover how to mature your vulnerability management from a reactive chore to a continuous, risk-based program. This guide helps leaders protect their…
Jul 7
•
Christophe Foulon
Share this post
SMB Tech & Cybersecurity Leadership Newsletter
10 Best Practices for the Modern Enterprise: Achieve Complete Attack Surface Visibility
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts