The Confluence of Two Patricks
Recently I have been working with experts in both the #SAPSecurity and the #Cybersecurity specialties. When those two worlds combine, I call it #SAPCyberSecurity.
One of the top voices in #SAPSecurity is Patrick Boch . When Patrick is not working his primary assignments for #SAP, he is also the editor of the Cyber Protection Magazine
One of the top voices in #CyberSecurity is Patrick Garrity ?????? . He is a Cybersecurity Research and the VP of Marketing at Nucleus Security a leading Vulnerability Management Aggregator in the IT industry.
I will tell you right up front that Patrick Garrity is an expert researcher and thought leader on all things related to #CVSS, #CVE, & #KEV. So, after you read my basic introductory information be sure to follow Patrick Garrity to understand all the latest on these "buzzword" acronyms.
Patrick Boch invited me to write an article for the Cyber Protection Magazine and I am happy to say that is is published and ready for you to check it out.
Thank you to BOTH Patricks for helping me to come up with the ideas that are now in an article.
I will put a link to the article in the comments below. Please give it a read and give me your feedback!
Enjoy! -- Barry Snow Freelance Contractor with SecurityBridge
Cybersecurity/Vulnerability Researcher/Skateboarder
1 年This is great to hear my content has been helpful!
1.8M+ YrlyViews ?? SAP Vulnerability & Threat Mgmt
1 年Feel free to share with your own network.
Cyber Dad | Learner | Cyber Security Leader | Author | Global Speaker ?? | Sr. SAP Security Manager @ Under Armour | Senior Member @ IEEE | Fellow IETE | Mentor | Industry Advisor | CISSP | CCSP
1 年Hey Barry Snow: Loved the Venn Diagram of your article. We together have to move towards the intersection...which is #SAPCyberSecurity...and as you highlighted for that we would need both SAP Security and Cyber Security to come together......Thanks for sharing !!
1.8M+ YrlyViews ?? SAP Vulnerability & Threat Mgmt
1 年Link to my article Cyber Protection Magazine --> https://cyberprotection-magazine.com/a-guide-to-understanding-vulnerability-reporting-and-scoring