Below the Surface (Video) - The Supply Chain Security Podcast
Stewart and Trey join us to talk about driving cybersecurity policies for the nation, what makes a good policy, what makes a bad policy, supply chain research and policies, and overall how we shape policies that benefit cybersecurity. Segment Resources: This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - BTS #35Below the Surface (Video) - The Supply Chain Security Podcast
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit to learn more about them! Resource: Show Notes:
info_outline EPSS - The Exploit Prediction Scoring System - Jay Jacobs, Wade Baker - BTS #34Below the Surface (Video) - The Supply Chain Security Podcast
Jay Jacobs Co-Founder and Data Scientist and Wade Baker Co-Founder; Data Storyteller from The Cyentia Institute come on the show to talk about The Exploit Prediction Scoring System (EPSS). This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Securing OT Environments - Dr. Ed Harris - BTS #33Below the Surface (Video) - The Supply Chain Security Podcast
Ed Harris joins us to discuss how to secure OT environments, implement effective air gaps, and more! This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Mitre ATT&CK - Adam Pennington - BTS #32Below the Surface (Video) - The Supply Chain Security Podcast
We discuss the various aspects of Mitre Att&ck, including tools, techniques, supply chain aspects, and more! This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Managing Complex Digital Supply Chains - Cassie Crossley - BTS #31Below the Surface (Video) - The Supply Chain Security Podcast
Cassie has a long history of successfully managing a variety of security programs. Today, she leads supply chain efforts for a very large product company. We will tackle topics such as software supply chain management, SBOMs, third-party supply chain challenges, asset management, and more! This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Systems Of Trust - Robert Martin - BTS #30Below the Surface (Video) - The Supply Chain Security Podcast
Bob Martin comes on the show to discuss systems of trust, supply chain security and more! This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Supply Chains, Firmware, And Patching - Jason Kikta - BTS #29Below the Surface (Video) - The Supply Chain Security Podcast
Jason joins us to discuss the current enterprise landscape for defending against supply chain attacks, remediating firmware issues, and the current challenges with patch management. This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline 5G Hackathons - Casey Ellis - BTS #28Below the Surface (Video) - The Supply Chain Security Podcast
Casey recently was involved in an event that brought hackers and 5G technology together, tune-in to learn about the results and how we can use bug bounty programs to improve the security of "things". This segment is sponsored by Eclypsium. Visit to learn more about them! Show Notes:
info_outline Governance, Compliance, and The Digital Supply Chain - Josh Marpet - BTS #27Below the Surface (Video) - The Supply Chain Security Podcast
In this episode, we discuss digital supply chain governance and compliance, featuring Josh Marpet from Guarded Risk, hosted by Paul Asadoorian and Allan Alford. Specifically, we discuss: The importance of understanding and complying with regulations affecting digital supply chains, such as Executive Order 14028 and the NIST Cybersecurity Framework. The podcast highlighted the impact of EU regulations, like CRA, GDPR, and DORA, on global businesses, underscoring the shared responsibility model in data security. Vendors' duties in open-source security and software vulnerability management were...
info_outlineLearn about the evolution of UEFI, various aspects of supply chain security surrounding UEFI, and the interactions between links in the supply chain that ultimately end up delivering you a computer or server.
Segment Resources:
This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them!
Show Notes: https://securityweekly.com/bts-16