Artwork
iconShare
 
Manage episode 407384525 series 3561094
Content provided by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office, UNC Chapel Hill's, and UNC Fayetteville State's Information Security Offices or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.

Contact us:

[email protected]

Musical credit:

Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/

  continue reading

45 episodes