Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization. Developed by Cisco, Security Stories is an interview-based podcast full of insights from those who are carving a path in this weird and wonderful industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
In this podcast episode, Taz and Raj explore the strategies and tactics that successful businesses can use to drive innovation from within. With real-world examples of companies that have successfully implemented innovative solutions and examine the challenges that these companies faced in the process.We'll delve into current tech trends and predictions for 2024, including but not limited to the rise of artificial intelligence, the growing complexity of security in a multi-cloud world, and the increasing convergence of networking and security. We'll discuss how these trends shape the world of innovation and examine the implications for businesses looking to drive innovation from within.
On today's episode, Hazel is back to chat to Jeremy Maxwell, CISO of Veradigm. Veradigm is a healthcare IT company providing electronic health record systems and other solutions to a variety of medical organizations. These organizations range from small physician practices all the way up to some of the world's largest insurance and pharmaceutical companies. Serving roughly 10,000 customers in a highly regulated industry, security is critical for Veradigm's success. Much is at stake when it comes to the confidentiality, integrity, and availability of patient information. In this chat, Jeremy talks about his personal journey into cybersecurity and his various roles leading up to his current position as CISO. He talks in detail about incident readiness, and how his team is structured to deal with security incidents. Jeremy has been partnered with Cisco Talos Incident Response for over 6 years now, and we've helped the organization put various response plans and scenarios together (and test them rigorously). Jeremy also describes a specific attack attempt that occurred at Veradigm, in which an attacker tried to gain access using spear phishing. This is a fascinating insight into the mentality of dealing with a high stakes, high pressure situation, and how the team came together to oust the attacker before anything was taken.
Cybersecurity attacks continue to rise and become more pervasive and sophisticated. Depending on the size of an organization, there may be millions or even billions of data points and signals that need to be analyzed. AI has emerged as the top defense against threats because it can "keep up with the bad guys", combing through data and providing organizations with predictive analytics to pinpoint malicious activities, calculate risk, and surface threats before they can be exploited. These solutions need the right architecture and engineering to ensure human needs are translated into understandable and trustworthy information. Hear from Shaila Shankar, SVP of SBG Engineering talk about how AI is shaping Cybersecurity and how we are engineering for the future.
Listen to Taz dig into Cisco's Social Responsibility initiatives with Brian Tippens, Chief Social Impact Officer. In this episode, we explore the downstream impact of technology and the role that Cisco plays in creating a better world. We discuss the importance of social impact for Cisco and the responsibility they have to prioritize it in their operations and innovations. Taz and Brian delve into the challenges and opportunities for Cisco to create a positive impact, and the ways in which they can work towards a better future.
Aside from being entertained by friendly banter between the two, listen to Chief Information Security Officer of the NFL, Tomas Maldanado and Taz take on the most common myths about cybersecurity and unpack the realities behind these bloated assumptions.
Taz explores the importance of using simple language in the cybersecurity space and the critical role that departments outside of cybersecurity and engineering with Tom Gillis. Everyday we are shown that communications and marketing play in shaping messaging that reaches the market. They discuss the essential role of translators in the cybersecurity industry and how they serve as a bridge between technical experts and non-technical stakeholders. Listen in to learn how simplifying cybersecurity language, collaborating across departments, and utilizing translators can improve your organization's cybersecurity efforts and keep you and your data safe.
Technology has transformed our world in ways we couldn't have imagined just a few decades ago. But as we continue to rely on technology to connect, learn, and innovate, we must also consider the impact it has on our society. Taz and guest TK Keanini explore the intersection of digital sociology, responsible tech, ethics, and cybersecurity and how they shape the way we live, work, and interact with one another. From examining the social and ethical implications of new technological developments to discussing how we can create a more equitable, just, and sustainable digital future, this podcast will inspire you to think critically about the role technology plays in our lives and how we can use it to create a better world.
As Artificial Intelligence (AI) continues to advance and become more prevalent in various industries, the importance of ensuring responsible AI practices has become increasingly apparent. One crucial aspect of responsible AI is cybersecurity. Article mentioned at 23:26: https://futurism.com/delphi-ai-ethics-racistBackground topics/articles and notes: "Google's New AI Language Model Achieves Record-Breaking Performance on Language Tasks" - In this article, it's reported that Google has developed a new AI language model called Switch Transformer that has achieved record-breaking performance on a range of language tasks. The model is said to be more efficient and require less compute power than previous models, making it more accessible to researchers and developers. Some key takeaways from this news include:· AI language models are becoming more advanced and efficient.· Switch Transformer could help make AI language processing more accessible to researchers and developers.· Improved language models could lead to more accurate and efficient natural language processing in a variety of applications."Microsoft acquires AI company Cognitivescale to bolster Azure cloud offering" - This news article reports that Microsoft has acquired AI company Cognitivescale to help improve its Azure cloud offering. Cognitivescale specializes in developing AI-powered solutions for enterprise customers, which could help Microsoft expand its reach in this market. Some key takeaways from this news include:· Tech giants like Microsoft are investing heavily in AI to improve their products and services.· AI is increasingly being used to develop enterprise solutions that can help businesses become more efficient and effective.· The acquisition of Cognitivescale could help Microsoft compete with other cloud providers like Amazon and Google."AI System Detects Heart Failure from One Breath with 100% Accuracy" - In this news article, it's reported that researchers have developed an AI system that can detect heart failure from a single breath with 100% accuracy. The system uses a technique called gas chromatography-mass spectrometry to analyze the chemicals in a person's breath and identify biomarkers that are associated with heart failure. Some key takeaways from this news include:· AI is being used to develop more accurate and efficient diagnostic tools for medical conditions.· The use of AI in healthcare could help improve patient outcomes and reduce costs.· This new AI system could provide a non-invasive and accurate way to detect heart failure.
In this episode, Taz interviews Alex Wolf. Alex is a business & tech thought-leader, investor and author; recognized as Fast Company's Top 100 Most Creative People In Business. Alex's effort to make big companies think critically about technology has been recognized by Apple, Snapchat, Stanford University, Fordham University, NYU and more. Her thought-leadership has been profiled in Forbes, Inc. Entrepreneur and in AfroTech as “The Woman Silicon Valley Is Too Afraid To Call A Genius”. She sold a multi-million dollar internet company she built from scratch before the age of 25. Wolf now speaks and writes to an audience of over 34,000+ entrepreneurs & investors who trust her opinion on the future of business & acquisitions.In this episode, Taz and Alex chat about Alex's path into the M&A space, what it's like to be an investor and how security plays a valuable role in her work and industry. Enjoy! Links from discussion:How to reach Alex: https://www.alexwolf.co/Alex's book, Resonate : https://www.amazon.com/Resonate-Anyone-Wants-Build-Audience/dp/198090443XJason Button episode on SS podcast: https://www.buzzsprout.com/926089/11802795Security Outcomes Report: https://www.cisco.com/c/en/us/products/security/security-outcomes-report.htmlGet the report to learn:Ways to set your cybersecurity strategy up for success by striking the right balance between risk and resilience What CISOs and other experts are considering when building up their own security resilience How the most resilient organizations prepare for inevitable disruption and recover quickly to emerge stronger
Trigger warning - {child abuse} content filtration is a sensitive topic that covers some of the harsh realities of our world that folks on trust and security teams have to deal with on a daily basis.In this episode, Taz speaks with Yasmin Abdi, CEO and Founder of NoHack and Security engineering manager at Snap. They cover a wide range of topics from Yasmin's career trajectory, her experience on a content filtration team and her transition into entrepreneurship as a new founder.Yasmin Abdi is an experienced technical advisor on security, privacy, and data protection. She has over 5 years of experience as a software engineer and has built and managed in-house software and security solutions at Snap, Meta, and Google. Yasmin was also a founding member of Meemo, an AI-powered social finance app, which was recently acquired by Coinbase. The technologies she has built are currently being used by 100+ million daily active users worldwide.Ms. Abdi has several years of experience leading organizations, providing thought leadership, and assisting private sector clients in the areas of software engineering, security infrastructure and best practices, IT solutions, and corporate strategy consulting. Given her unrelenting entrepreneurial spirit and keen interest for information security, Yasmin founded noHack, a government contracting company focused on cyber security services and solutions. As the CEO of noHack, Ms. Abdi takes a hands-on approach to delivering high-impact solutions. Her goal is to protect her clients by providing an extra layer of all-around protection. Outside of tech, Ms. Abdi's passion is to help bridge the gap between minority students and tech companies. Yasmin has mentored and helped over 50 students land jobs within tech.Ms. Abdi also holds a Bachelor of Science in Computer Science with a focus in cyber security engineering from the University of Maryland. Here's Yasmin, hope you enjoy.Links:https://www.nohackllc.com/https://www.linkedin.com/in/yasminyabdi/
In today's episode you'll hear from Joe Toscano. Joe is an award winning designer, published author, and international keynote speaker who left his role consulting for Google because he felt the industry was misusing data and that the issues needed to be addressed through innovation rather than strict regulation. Since leaving, Joe has written a book, called Automating Humanity, and has started DataGrade, both focused on increasing technology literacy and purpose-driven innovation. You may have seen Joe featured in The Social Dilemma or his TEDx Talk, “Want to work for Google? You already do,”. Joe and Taz have been running in the same data ethics advocacy circles for some time but officially met in 2021 during their joint keynote speech alongside Brittany Kaiser at Eurpol's annual EDEN conference. In our chat, you'll hear about Joe's origin story – mathmetician, turned psychology buff turned data scientist. Through his changing career one factor remained strong – data ethics. We cover his journey into data ethics advocacy, what he's doing with his new start up DataGrade and most importantly – you'll learn what resilience means to him. Here's Joe – hope you enjoy.
In this episode, Taz interviews Jason Button, Information Security Director who manages our Mergers & Acquisitions Cybersecurity efforts. This conversation is full of compassion, leadership insights, and brilliant gems that anyone can apply in their lives. In addition to chatting about imposter syndrome and Jason's career journey, you'll hear details about the M&A process and how to successfully go about it, no matter the size of your organization.Jason came to Cisco through the Duo acquisition, and the work that he and his team have been doing is quite interesting as they are now working with Corporate Development to assess the security threats of companies we're looking to acquire. More from Jason:Blog on trust and transparency in M&Ahttps://blogs.cisco.com/security/demonstrating-trust-and-transparency-in-mergers-and-acquisitionsUC Berkley study that was funded by Cisco. https://cltc.berkeley.edu/2022/10/13/moving-left-and-right-cybersecurity-processes-and-outcomes-in-ma-due-diligence%ef%bf%bc/
I'm interviewing Lena Olympio. Lena hosted a fantastic conversation about Women in Leadership. You all know how important that is to us here at Cisco and on this podcast so I wanted to share it with all of you. Lena interviewed 3 incredible leaders here at Cisco Dana, Alex and Allison (a part of our Partners Organization) - they were rightfully recognized as this year's Women of the Channel among many other incredible humans. I was inspired by their story and inevitably became more curious about Lena's. In this episode you can expect to hear more about Lena, her career journey and how her interview with Dana, Alex and Allison truly inspired her. You'll also hear about the different paths non-technical people can take to get into a technical role – especially women. And lastly, the biggest take away from this conversation ... you don't have to be in a position of quote "leadership" to. lead. I've included their full conversation at 32 minutes and 30 seconds at the end of my interview with Lena. I hope you are inspired and can take this energy with you into the holiday season! More on Lena:Lena Olympio is currently a Technical Solutions Architect at Cisco. She joined Cisco in November 2012 as contractor, auditing customer service phone calls and cases, and worked her way into a Global Process Manager role in March of 2015 to drive process improvement within the Cisco Commerce Workspace (CCW) customer service teams.With Cisco's latest focus on security, Lena is excited to be working in an area that is helping drive the company's priorities. She is perpetually learning and sharing her knowledge with others to help them achieve their personal and professional goals.More on the Women of the Channel 2022:https://unifiedguru.com/record-38-cisco-leaders-make-crns-2022-women-of-the-channel-list/Alexandra Della Serahttps://www.linkedin.com/in/alexandra-della-sera/?dtid=oblgzzz000659https://www.crn.com/rankings-and-lists/wotc2022-details.htm?w=299Dana Millerhttps://www.linkedin.com/in/dana-coop-miller/?dtid=oblgzzz000659https://www.crn.com/rankings-and-lists/wotc2022-details.htm?w=822Alison Stahlhttps://www.linkedin.com/in/alisonstahl/?dtid=oblgzzz000659https://www.crn.com/rankings-and-lists/wotc2022-details.htm?w=1153
National Cybersecurity Awareness Month continues and in honor of it we interview global and industry recognized thought leader, Confidence Staveley. To name a few of her incredible accomplishments, Confidence has been recognized as Cybersecurity Woman of the Year in 2021 and 2022, she is a part of the U.S. State Department's International Visitors Leadership Program. Not to mention she has single handedly changed the future of so many young girls as it relates to their access to technology, education and security awareness. To learn more about Confidence, you can find her on all social media platforms: Linkedin, Twitter, InstagramTo learn more about her organization, Cybersafe Foundation and to donate to their incredible cause you can visit: https://cybersafefoundation.org/donate/Additional resources:CISA Security ResourcesCisco Secure's Cyberecurity Awareness Month PageIf you're inclined to share this episode with your community, please tag us!@Ciscosecure @techwithtaz @hazeburton #seeyourselfincyber #Ciscosecure #NCSAM
Happy National Cyber Security Awareness Month! Today's guest is Cathy Pedrayes: Author, television host and bilingual social media influencer, Cathy Pedrayes is best known as TikTok's 'Mom Friend.' She developed the reputation after sharing safety content that ranges from items she keeps in her first aid kit to how to maintain your security and privacy online.With millions of followers on TikTok, Cathy is on a mission to help her audience see themselves in cyber. Our chat covers Cathy's unique way in the security industry, her origin industry and insights into her book, The Mom Friend Guide to Everyday Safety and Security.This episode is a reminder that no matter where you are, what you do - you are entitled to feel safe online and better yet, you can get involved! We can't thank you enough for your continued support, especially during this glorious month of National Cybersecurity Awareness!If you are inclined to share this episode with your friends, please tag us and use the hashtags below:#Seeyourselfincyber #thinkbeforeyouclick #NCSAM #Ciscosecure
On today's show our guest is one of our very own - Ashlee Benge, Strategic Intelligence Lead on the Cisco Talos team. After a very informative presentation at Blackhat on "Opsec in a Post-Roe World' we wanted to dive deeper with her to learn about the impact and implications on the security industry, practitioners and the world at large. The episode covers a vast range of discussion, with the fundamental hope to inspire people to take charge of their privacy and develop agency around big decisions made by regulators. Join us for a raw, rich and very real conversation. Oh, and some exciting news underway for the podcast!To read more about this topic, take a look at Ashlee's in depth article: Our current world, health care apps and your personal data
Today's episode features a recording from a live event that we hosted on 24 August, aka Independence Day for Ukraine. Six months since Russia's invasion of Ukraine, Dmytro Korzhevin, a senior threat intelligence researcher, JJ Cummings, Talos' national intelligence principal, and Ashlee Benge, a strategic intelligence lead, provided insights into their past few months of work in the region.The discussion primarily focused on the resiliency of Ukrainians, who have worked tirelessly over the years to transform their cybersecurity capabilities. Ukrainian infrastructure has largely stayed operational and, in most cases, exceeded expectations. It seems to have baffled most pundits, but for those that have spent years working in Ukraine, it's no surprise about the levels of dedication and commitment to protecting their critical infrastructure from those that would do it harm. The team also covered how groundwork laid years ago is paying dividends now during the war, as well as an update on the types of cyber threats we're observing, including the deployment of the GoMet backdoor. You can watch the video version of this event on the Talos blog which is also where you can access relevant resources and articles.
Security Stories faces off, once again, against the Beers with Talos crew, to see if we can regain some dignity after our close defeat in the first game of "Would I lie to you?" This second round contains stories of betrayal, donkeys, embarrassing situations, and antics so dangerous, Hazel feels compelled to issue a "Don't try this at home kids" warning at the start.Speaking of Hazel, where is she, and why does she suddenly have a much deeper, more Americanized voice?This episode also contains a preview of what we've got going on at Black Hat. Be sure to stop by booth 1932 to see lightening talks, and chat with our crew of experts. More details can be found at https://www.cisco.com/c/en/us/products/security/black-hat-usa.htmlWe hope to see you there!
Martin Lee, who leads Strategic Planning and Communications for Cisco Talos in EMEA, joins Hazel for a quick chat about the current status of hiring in cybersecurity. We discuss the industry needs are in terms of bringing more threat analysts in, what is getting in the way of hiring, and the potential solutions that we as an industry should consider.We also talk about the skills need to be nurtured within the security workforce, and how we can improve knowledge transfer.For more stories on the various paths people have taken to join the cybersecurity industry, take a look at our ebook: Diversity in cybersecurity: A mosaic of career opportunities
Today's episode, recorded live at RSA 2022, features a great conversation with Tomás Maldonado, NFL Chief Information Security Officer, and Brad Garnett, Director of Cisco Talos Incident Response. The dialogue is led by none other than the brilliant Tazin Khan.Taz talks to Tomás about his early life and career (“I didn't want to be another statistic”) and how he approaches new opportunities. He talks about how he communicates his vision for a cybersecurity strategy, as well as how he ‘blends the tracks' between a technical and managerial style of leadership. Tomás then goes into details about how he builds steering committees across the NFL so that people have a voting stake in technology and security decisions. Together with Brad, they discuss how Cisco and the NFL worked together to secure the most recent Super Bowl (“This sounds like a movie script”), and how they created a playbook based on learned threat intelligence, to proactively secure future major events.For more details about the work Cisco has been doing to help secure the NFL, visit this blog https://blogs.cisco.com/security/nfl-teams-up-with-cisco-to-secure-super-bowl-lvi
All rise, all rise, for the inaugural episode of Infosec Court, brought to you live from RSA Conference. Judge Wendy Nather presides, and three infosec experts (Helen Patton, Dave Lewis and Dennis Fisher) all have a ‘hot take' that they want to be more widely accepted in the infosec industry.Their task as plaintiffs is to try to persuade Judge Wendy and a jury of their peers that their hot take deserves to become infosec canon. Come for the chance to hear Wendy in her element. Stay for the outrageous objections ("What even is Non Zero Trust?) and the unexpected turn of events when Wendy introduces an Amicus Curiae, handed to her shortly before proceedings began...
For our 50th episode, we invited our friends from Cisco Talos to join us for an authentic, truthful conversation about mental health and burnout. Amy Henderson, Ashlee Benge, Matt Olney, and Mitch Neff, joined Hazel and Taz to share some experiences. We start by talking about the work that Talos has been doing in Ukraine and the mental health effects of that work. That also includes that weird, disconnected feeling that can develop when we're doing as much as we can to help, but we also go home to a warm and comfortable bed, i.e not in a war zone. This takes us to conversations about other global events, and how hard it can be to prioritize self care when everything feels...a lot....We also share our own practices and techniques that have helped us manage our mental health, and how we can give ourselves permission to be kind to ourselves. Further resources:Creating safe spaces in cybersecurity ebookRyan K. Louie's presentation at RSA: The mental health impact of cyberattacksBlack Hat community: A place to engage with Black Hat attendees on topics specific to the InfoSec community, including health and well-being.Cisco Gateway: A global online community where Cisco customers share their professional and personal challenges and stories.CALM (Campaign Against Living Miserably):Leading a movement against suicide.
Today's episode features a chat between Hazel and three security leaders - Accidental CISO (yes, the anonymity intrigues us too!), Liz Waddell, Incident Response Practice Lead for Cisco Talos, and Christos Syngelakis, CISO and Data Privacy Officer at Motor Oil Group. They talk about their experiences of building security resilience – so we got into the key elements of an Incident Response plan, how to achieve company wide buy in, the best ways to go about training your people and trying to avoid burnout, how to use threat intelligence and all the things that go into running a SOC, what to do in the case of a Zero Day attack, how to build a security design program...and so much more.For more stories on how to build security resilience, check out our new ebook here.This episode was originally recorded as a live Cisco Chat event. You can watch the original video here
Today we're going full steam into the metaverse and Web 3.0. Joining us to discuss his research on this topic is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group. Taz and Hazel have a great conversation with Jason about the evolution of the metaverse, as well as the security implications, such as rising numbers of scams going after people's cryptowallets, and the ethical concerns that are potentially popping up.For more on this topic, have a read of Jason's in depth research on the metaverse and Web 3.0 here.Jason has over 20 years specialising in thwarting abuse of security protocols like SMTP, HTTP/S, and DNS. He's a former manager of the SpamCop DNSBL which has been taking the fight to the spammers for over a decade.He's also assisted in design and development of the Cisco IronPort Anti-Spam content scanner and he's also developed some of the architecture & content detection for Cisco's Web Security Appliance, Cloud Web Security, and Next Generation Firewall products. Most recently as Technical Leader for Talos, he conducts security research, speaks at conferences, and authors blogs and whitepaper publications.
Today's guest is Shannon Lietz, VP of Vulnerability Labs at Adobe. Shannon joined Hazel to talk about how she first got into offensive security and the lessons she's learned along the way, as well as the kind of work she and her team undertake at Adobe to test defenses. We also talk about measurement, and how security was never set up to be measured properly, which is something Shannon is trying to change. She also has some thoughts on risk management and tackling that in a different way. And at one of the most poignant parts of the interview, Shannon talks about the moment she decided to change her leadership style.If you're interested in the book Shannon mentioned, "Humanocracy" here's a link to the website www.humanocracy.comFinally, if you're free at 10am PT on April 26th, be sure to join Hazel plus special guests Accidental CISO, Liz Waddell and Christos Syngelakis, to discuss stories of how to build security resilience. Sign up to be reminded here - CiscoChat Live: Detect, Respond, Recover
Today we welcome two guests to the Security Stories pod. Firstly Martin Lee from Talos drops by to give us an update on wiper malware, and how it's been playing a part in cyber attacks on Ukrainian organizations and infrastructure.We talk about the history of wiper malware, where it's cropped up before, it's role in the kill chain and possible threat actor motivations, as well as what organizations can be doing to prevent this type of attack.Secondly, we welcome Jerry Gamblin, Director of Security Research at Kenna Security to join us for an in depth chat about his career. Jerry's story is a really interesting one, from starting out on the IT helpdesk, to working on security networks at the Misouri House of Representatives, and onto his role at Kenna where he has built several tools to help people understand the different types of vulnerabilities and how to mitigate them.We discuss Jerry's approach – how he inspires his team to think differently, and how personally he's driven a sense of thinking outside of the job description. We also discuss how organizations can deal with the ever growing list of new vulnerabilities, and how you can prirotise them. Head here for Kenna's Prioritization to Prediction reportHead here for Jerry's vulnerability analysis and graphing CVE.ICU
A short bonus episode for your feeds today, as Hazel got the opportunity to sit down with Cisco Talos' Head of Outreach, Nick Biasini, and chat all things hybrid work. Nick recently published the research, "Time to secure hybrid work for 2022, not 2002" and in this episode, we explore some of the malicious activities from state-sponsored actors and criminal organizations, which have made being a defender an increasingly difficult task in recent months.
Join Hazel for a threat alert event for guidance on current cyberattacks and insight into internet activity in Ukraine. This event was originally broadcast live, featuring members of the Cisco Talos threat intelligence team, and Cisco ThousandEyes. Both teams are actively monitoring the digital landscape and openly sharing essential findings to contribute to the safety of our customers globally.Speakers:JJ Cummings, Principal, Threat Intelligence & Interdiction, Cisco TalosAmy Henderson - Leader, Strategic Planning and Communications, Cisco TalosAngelique Medina, Head of Internet Intelligence, Cisco ThousandEyes For the latest information on Talos' research into the current situation in Ukraine, check here for continual updates: cs.co/TalosUA
In today's Security Stories episode we meet Goher Mohammad, Head of Infosec at L & Q Group, one of the UK's largest charitable housing associations which houses over a quarter of a million people.Goher's is a story of resilience, geeking out over technology, and the challenges and rewards of building a brand new security team from scratch. We also talk about the power of community and how Goher is bringing together fellow non-profit security professionals. Before that, Taz and Ben are back to join Hazel in the pod booth for a really interesting discussion on data privacy - more specifically online tracking, and some recent developments made there. You can also check out Cisco's new Data Privacy Report: Privacy becomes mission critical.Please note that this episode was recorded before the events in Ukraine. For analysis on what Cisco Talos is observing, which includes a variety of cyber attacks targeting Ukraine, including disinformation, defacements, DDoS, and wiper malware please check out the Talos threat advisory blog.Cisco stands guard with our customers in Ukraine. You can read here about Talos' efforts to-date in information gathering, threat hunting and the assigning of dedicated Cisco engineers to Ukrainian organizations seeking to secure their operations, and how we have taken the extraordinary step of directly operating security products 24/7 for critical customers in Ukraine while over 500 employees at Cisco have joined them to assist in collecting open-source intelligence.
Since there's been a lot of discussion and debate about Extended Detection and Response (XDR) at the moment, we thought we would bring on two experts to talk about it. Enric Cuixeres is a Cisco Secure customer who has implemented an XDR strategy within his organization Leng D'Or. Our other expert is former US army CID special agent and computer forensic examiner Jessica Bair. Jessica is the Director of Technical Alliances at Cisco, who has been helping many of our customers with their XDR strategies.We discuss the practical implications of implementing XDR, as told by people who have been there and done it – and also what benefits will it really bring, including how it can help overburdened security staff.For more on this topic, take a look at our ebook "Extended Detection and Response for Dummies."Learn more about the Cisco Gateway community as mentioned in the episode. Before that, Lindsey O'Donnell Welch, executive editor of Decipher, is back with us for the second week in a row. Lindsey discusses the just-announced Cyber Safety Review Board and its role in assessing “significant cybersecurity events”. For more information about this check out Decipher's report.And finally, you can view the on-demand broadcast "Defending Against Critical Threats" in which six experts from across Cisco Secure came together to analyze what's been happening in the realms of ransomware, supply chain attacks, vulnerabilities, log4J, Emotet and the rise in Mac OS malware.
Today's guest is Jane Frankland, owner and CEO of Knewstart, and founder of the IN Security movement. Jane has been in the cybersecurity industry for 24 years and is an award winning entrepreneur and best selling author of "IN Security: How a failure to attract and retain more women in cybersecurity is making is all less safe'. She was also named as the third most influential person in cybersecurity in the UK.We discuss Jane's start in cybersecurity and her entrepreneurial career, including how she built a seven-figure business within two years. She has held senior executive roles and been actively involved in OWASP, CREST and Cyber Essentials. We discuss her activism around attracting and retaining women in the industry, and why we need more right brain thinkers.Plus, Jane talks about her latest venture, "The Source", a platform for women in cybersecurity and businesses who value them. Find out more.Before that, for our opening topic we are delighted to welcome Decipher's Executive Editor Lindsey O-Donnell Welch, and Editor-in-Chief Dennis Fisher to discuss what we know about the cybersecurity situation currently in Ukraine (note we recorded this on 20th January and it's a very fluid situation). Decipher is an independent editorial website covering security news, exploring the impact of the latest risks and providing informative and educational material for readers intent on understanding how security affects our world. Episode timings:0.00 - 13.46: Opening topic with Decipher13.47 - 69.24: Interview with Jane Frankland69.25 - 70.16: Closing thoughts
Today's guest is the brilliant Jarell Oshodi, currently Deputy Chief Privacy Officer for the Centre for Disease Prevention and Control. So she's had an interesting few years....Hazel and fellow data privacy advocate Tazin both interview Jarell, in what turned out to be a really fun chat. Jarell has spent 12 years honing her expertise in data compliance and privacy at various federal agencies, including the Department of Justice, and her current role at the CDC. Jarell has such an interesting story as to how she's got where she is, and how her life experiences have affected her whole approach, which she shares with us.We talk about the issues around data privacy today and what she's witnessed in her work, and we also talk about the importance of giving people a voice when they may not feel like they have one. And, just as we were about to end the interview, we stayed on another 10 minutes to chat about a really celebratory moment for Jarell – stay tuned to find out what that was.Links mentioned in this episode:Cisco Networking Academy: https://www.netacad.com/courses/cybersecurity Afro Tech: https://www.experience.afrotech.com
Today's guest is Gary Hibberd, AKA "The Professor of Communicating Cyber" for the Cyberfort Group. Gary has worked in cybersecurity for over 35 years, spending much of that time in highly regulated industries. We get into some areas that we've not covered all that much on the podcast before, such as the impact of branding and marketing on cybersecurity, and how organizations might be missing a trick if they're not talking to their marketing teams about how they're keeping their customers' data safe. We also talk about the work that Gary does for his charity, Gamers Beat Cancer. Plus, if you haven't seen it already, he shared his experiences for our recent e-book on mental health and burnout.The wonderful Tazin Khan is also back, and she opens the show with a thoughtful discussion on how experts aren't always the best teachers, and how we can best create community and representatives that can help our mission as an industry.
On today's show our guest is Brad Arkin, Cisco's Chief Security and Trust Officer. Before joining Cisco (the very same day Cisco issued a work-from-home mandate in March 2020!), Brad was Adobe's first Chief Security Officer. He grew the security function from just a few employees, to over 600 globally. Early in Brad's career, he co-founded the Software Security Group at Cigital and led the Application Security practice for AtStake. He was a pioneer in software security, helping code writers in commercial settings adopt a “built-in security” approach throughout the development process rather than treating security as an afterthought.Since joining Cisco, he has led the company's rapid global Zero Trust architecture deployment to over 100,000 users across 120,000 devices in just five months. He is focused on evolving the Cisco Secure Development Lifecycle and security governance models to help accelerate Cisco's transition to software and services.Also on today's show, we invite Mitch Neff from the Beers with Talos podcast to join us, to see if we can settle the score from our 'Would I lie to you?' episode which ended in a heart breaking tie. As Ben tells his security career story, can Mitch win the title for his team? Or will he lose it all? Will anyone's dignity remain intact? Plus, Ben has been visiting the database vaults and has some excellent research on the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used to control and inspect the traffic on the network.To see Ben's research in full, visit https://blogs.cisco.com/security/threat-trends-firewall
We're delighted to be joined today by members of the Cisco Talos Threat Detection & Response Group, a group we haven't chatted to on the podcast before, but hopefully this goes some way to making up for that error.Joining Hazel for a brilliant discussion, are Christopher Marshall (far better known as Marshall), Director of Talos threat detection and response, Diana Brown, Security Research Engineer, Doaa Osman, Security Analyst, and Lilith Wyatt, Security Research Engineer. The Threat Detection and Response team are Cisco customers' first responders. They're hunting for the hardest-to-find threats, and for one team, they come into work every day and try and do something that's never been done before.We have a chat about the team's day to roles, and how they each got into the security industry. Each path is fascinating, and unique. We also learn about the supportive culture within Talos, and how each team member is given the freedom and encouragement to do their best work.This conversation is for anyone who wants to get into the threat detection and response aspect of the security industry, or who may have kids or mentees who would like to do so.To see current Talos job openings, visit https://talosintelligence.com/careers
Welcome to a very special edition of Security Stories, as we go head to head with the Beers with Talos podcast team. Using a live game show format based on the British show 'Would I lie to you?' we present "facts" about significant moments in our security careers—but can the teams work out who is telling the truth, and who is bluffing?This episode features Mitch Neff, Joel Esler and Matt Olney on the BWT team. Joining Hazel on the Security Stories team are Dennis Fisher of Decipher, and Pam Lindemoen, CISO Advisor for Cisco Secure.To learn if we can sort fact from fiction, don't miss this special edition: "Would I lie to you? Security Stories versus Beers with Talos."To learn more about Talos careers, head to https://talosintelligence.com/careers
Today's guest is Dr Kelley Misata. Having survived years of cyber stalking, Dr Kelley completed a PhD in information security, where she did her dissertation on the cybersecurity preparedness of nonprofits working with victims of violence. She later set up her own non profit company, Sightline Security. This is her story. In the pod booth, we're excited to be joined by a brand new cohost! Tazin Khan, whom you might remember joined us as a guest in episode 25, joins Ben and Hazel to talk about the findings of a new Cisco consumer data privacy study. We each then relate it to our own experiences of taking action to protect our personal data.For more information about Sightline and to get involved with the community, visit https://sightlinesecurity.orgFor the Cisco consumer data privacy report, head to https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-cybersecurity-series-2021-cps.pdfEpisode time stamps:00.00 - 5.15: Intro and getting to know Taz5.16 - 30.23: Interview with Dr Kelley Misata part 130.24 - 50.28: Discussions on new consumer data privacy findings50.29 - 68.05: Interview with Dr Kelley Misata part 268.06 - 72.12: Closing thoughts and outro
Today we're delighted to be joined by Pam Lindemoen, Advisory CISO at Cisco Secure and former Deputy CISO at Anthem Inc. In this thoughtful interview, learn about Pam's passion for championing women in IT, her approach to learning from mistakes and failure, as well as her top tips to ensure that security and risk can be understood across the entire business. Pam has gained a well deserved reputation as a bold and strategic thinker, and being an exceptional leader - she shares many of her lessons learned from 25 years in the IT industry in this chat.Before that, host Hazel shares a tribute to Mick Jenkins MBE, the first ever guest on Security Stories, who recently passed away. She shares her memories of first meeting him, the impact he had, and continues to have, on her work, and she remembers some of his most inspiring stories."Never let fear get in the way of your dreams." Mick Jenkins, MBEFor the full Mick interview, listen to episode 1 of the podcast at https://securitystories.buzzsprout.com/926089/2985046-1-from-the-battlefield-to-the-boardroom-with-mick-jenkins-mbeTo learn more about our CISO connections community, visit https://www.cisco.com/c/en/us/products/security/ciso-connection.html
Today's guest is Stuart Coulson, director at Hidden Text Ltd, where he uses the skill sets and knowledge borne of many years in the security industry to help others. It's probably fair to say that Stuart's journey in cybersecurity hasn't been the most traditional He's been in sales, recruitment, engineering, working on UK government cybersecurity contracts, to being a deputy CISO. He is now the cybersecurity director of an online gaming company, in addition to managing Hidden Text.In addition to discussing Stuart's career path in cybersecurity, we chat about managing social media as an infosec professional, and how to deal with imposter syndrome (it's an interesting take - stay with it!). We also discuss how improv comedy relates to cybersecurity, and Stuart has some great advice for anyone who wants to get into mentoring.In the studio, Ben and Hazel discuss the rise of proxyware abuse, and why organizations and individuals need to be aware of this growing threat. This is based on some excellent research conducted by our Talos team, which you can read more about on this blog.Also take a look at our brand new ebook, "Creating safe spaces in cybersecurity". This focusses on the topic of mental health and cybersecurity burnout. We've captured the stories of 20 people (both leaders and practitioners) from across the cybersecurity industry, and hope that by sharing their experiences, we'll inspire anyone who is struggling to know they are not alone. Finally, check out a few of Stuart's Hidden Text articles which we found particularly interesting:Imposter syndrome does not existDear infosec hiring managersEpisode time stamps:0.00 - 18.28: Intro and discussing the rise of proxyware abuse18:29 - 68.45: Interview with Stuart Coulson68.46 - 79.18: Closing thoughts and outro
It's a warm welcome today to our guest Ian Thornton-Trump, CISO at Cyjax Limited, also known as @phat_hobbit on Twitter.Ian talks about his career journey, from joining the Military Intelligence Branch of the Canadian Forces, to managing IT projects at the Canadian Museum of Human Rights, to being a CISO. He also shares his top lessons learned from 30 years in the cybersecurity industry, from his paper '8 Leadership Principles' (or, as Ian refers to it "8 of my biggest mistakes").In the studio, Geraldo, currently studying Film and Television at college, disucsses how cybersecurity is represented in the media. We discuss Mr Robot, Silicon Valley, The Matrix, and how Hollywood has led some accurate (and very inaccurate) portrayals of the industry.In Threat Corner, Ben takes us through the storied history of the REVil ransomware family, and how the attackers operate under a ransomware-as-a-service model. Follow along at https://blogs.cisco.com/security/threat-protection-the-revil-ransomwareEpisode time stamps:03:20 - 25:23: Cybersecurity in the media25:24 - 40:53: Ian Thornton Trump interview, Part 140:54 - 50:54: Threat Corner: REVil ransomware family50:55 - 65:47: Ian Thornton Trump interview, Part 265:48: Closing thoughts and outro
Jenny Radcliffe, AKA 'The People Hacker' joins us as our guest today. Jenny is a world renowned Social Engineer, hired to bypass security systems through a mixture of psychology, con-artistry, cunning and guile.We learn about incidents in Jenny's childhood which led her to become a 'burglar for hire', including getting locked in the lion's enclosure at Liverpool Zoo! She has spent a lifetime talking her way into secure locations, protecting clients from scammers, and leading educational simulated criminal attacks on organisations of all sizes in order to help secure money, data and information from those with genuine malicious intent.We also talk about how Jenny copes mentally with being in some of these situations, and how she works with organizations and helping them with their security culture. There's a great deal of advice here too about how to protect yourself and your friends and your families from social engineering attacks. Before that, it's Sana's last episode with us for a while (sob!) but she goes out on a high by telling the story of three military terms that have shaped the cybersecurity narrative in the last couple of decades. If you are like a movie buff, or geek out on military terminologies, or simply say ‘Roger that' in response to everything, then you'll love this segment.If that wasn't enough, we also have Nirav Shah join us in the pod booth. Nirav is new to Cisco, having joined us directly from Solar Winds. He was working then when the massive breach that was heard around the world happened. We hear the inside story, and learn how this was a catalyst in the threat landscape. Learn more in Nirav's blog here.Episode time stamps:0:00 - 15:31 - Intro topic with Sana - Three military terms that have shaped the cybersecurity narrative15:32 - 42:29 - Interview with Jenny Radcliffe, Part 1 42:50 - 55:26 - Nirav Shah on the Solar Winds breach55:38 - 73:24 - Interview with Jenny Radcliffe, Part 273:25 - 83:30 - Closing thoughts and outro
Our guest today is Stuart Peck, director of cybersecurity strategy for Zero Day Lab. Stuart talks to Hazel about his various career roles within threat intelligence, social engineering and incident response. We also talk about how he went from a non technical background to a technical one, and overcoming imposter syndrome in the process. Stuart then talks about how preparing your mentality for a data breach is an incredibly important part of your plan, and how you can do that. We also talk about the Many Hats Club community that Stuart set up, providing a network for infosec professionals as well as raising incredible funds for vulnerable children's charities. You can see more details about this at https://themanyhats.clubPlus, there's some great advice in this interview for anyone who might be on the verge of burnout, or needs any tips on how to manage stress, as Stuart talks about his experience in these areas.In the studio, we have a new cohost joining the ranks for a few epsiodes - Geraldo De La Cruz who is interning with us this summer and has his own podcast. We get to know him a little.Plus, we tell the story of one of the most notorious data breaches of all time – the Enigma code. It's striking how many of the tactics used still tie in to current thinking when it comes to protecting one's data.Time stamps:0.00 Intro and getting to know Geraldo10:16 The story of breaking the Enigma code24:19: Stuart Peck interview72:40: Closing thoughts and outro
The past week has been a lot for people in the security industry. Last Friday in the US, people were just about to clock off for what would hopefully be a relaxing Fourth of July long weekend. Only for cybercriminals to have other plans.This episode contains the audio from a recent live stream, where Hazel sat down with Cisco Talos' US Outreach Team lead Nick Biasini. We talked about the unfolding events surrounding the REvil ransomware campaign and Kaseya VSA supply chain attack. Nick broke down the complicated scenario, and talked about how the two attacks worked together. We also spoke about the impact for organizations around the world, as well as what we're seeing with ransomware on a general level at the moment. The audio includes questions that we received during the live stream from our audience, and Nick's answers.To stay up to date on this attack, please take a look at the Talos response post which is being continually updated.
Joining today's episode are not one, but two distinguished guests. First of all, we have Dug Song, Cisco's Chief Security Strategy Officer. Dug is the founder of Duo Security which was acquired by Cisco in 2018, and he is one of the industry's most passionate and outspoken voices about building inclusive cultures. We're also joined by Gene Hall, Vice President of Security Marketing at Cisco. Gene is a veteran of Cisco for over 20 years and is someone who is a great advocate for nurturing the next generation, and driving down barriers across the security industry. Both Gene and Dug meet up with Hazel to discuss how they both got into the security industry and what issues they're passionate about. We also chat about how Duo was born, and the values that Dug led with which have stood the test of time.We discuss the greatest security challenges that our customers are going through and how Cisco Secure is helping them through those. We also talk about what we can all do as a collective industry to build more inclusive cultures, and address the security skills shortage. Plus, we learn how Dug got his motto of ‘Dig and be Dug in return'.To learn more about Cisco's recruitment drive and to check out current openings, head to https://www.linkedin.com/company/cisco/jobs/
Today's guest is Tanya Janca (@shehackspurple), founder and CEO of We Hack Purple, an online learning academy, community and weekly podcast that revolves around teaching everyone to create secure software. She's also the best selling author of 'Alice and Bob Learn Application Security'.We chat about Tanya's career journey and the various hats she's collected (there are many!) - as well as being a founder and CEO, she's been a pentester, a CISO, an AppSec Engineer, and software developer. She's worked in startups to public service, including being the CISO for the Canadian elections when Justin Trudeau was elected, to working in tech giants.Tanya has a really interesting perspective on many issues in cybersecurity, as you'll see in this chat. From why application security needs to be given more of a spotlight, to the issue of representation, working closely with devs, and seeking a fundamental change in the way we educate people in the industry.Before that, Ben leads our intro topic. He discusses the influence his father had on him and his security career, which prompts Hazel and Sana to look back at their own lives and talk about their greatest influencers.Plus, we discuss the new proposal from Talos and the Cyber Threat Alliance to truly tackle the global ransomware threat. If you can, please take a few minutes to read Neil Jenkins and Matt Olney's op ed piece on this, which is available on the Talos blog.Time stamps:01:46 - 15:33 Intro topic - Influencing figures, led by Ben15:34 - 32:51 Tanya Janca interview, part 132:52 - 38:49 Ransomware recommendations discussion38:50 - 60:00 Tanya Janca interview, part 260:01 - 66:56 Closing thoughts and outro
Our guest today is Al Huger, Vice President of Cisco's security platform and response. Al is a well known figure in the vulnerability space, and has developed several patents for cloud managed threat products which hunt down malware. He is also a three time veteran of building security companies, and successfully selling them to large organizations, including Cisco. In this interview there is a huge amount of useful advice for anyone who is thinking of selling a company, or perhaps building your own security company is an ambition of yours. We also explore the hottest security trends, taking a particular look at the future of end user security and SASE. And we lift the lid on Al's creative process, as he talks about how he comes up with new ideas. We also talk about culture, the power of his team, and Al's advice for security leaders heading into the next 6 months. In the studio, Sana leads our intro topic by recapping the best of RSAC 2021. And in Threat Corner, Ben and Hazel have a discussion on a new threat actor category posed by Talos: the privateers, whereby Hazel finally learns the difference between privateers and pirates.Resources mentioned in the episode:Cisco Secure Insights Summit with Al Huger: https://www.linkedin.com/video/live/urn:li:ugcPost:6806262317710491648/Talos blog post on the proposal for a new category of threat actor: https://blog.talosintelligence.com/2021/05/privateer-groups.htmlTime stamps:02:10: Intro topic by Sana - RSAC 2021 highlights11:06: Interview with Al Huger, part 123:27: Threat corner: The new potential threat actor category - the privateers 28:39: Interview with Al Huger, part 248:49: Final thoughts and outro
On today’s show our guest is Helen Patton, CISO Advisor for Cisco Duo. Previously, Helen was an Executive Director at JP Morgan Chase, and CISO for Ohio State University.Helen talks candidly about these two wildly different experiences—as well as how to know when it's time to leave a company, resilience in the age of Covid and killer hornets, and how the CISO role is likely to develop over the next three years.In the virtual studio, we chat about the new executive order signed by President Biden aimed at improving the United States’ cybersecurity, and Ben runs down his latest threat research on supply chain attacks. More resources:Helen's RSA talk: https://www.rsaconference.com/Library/presentation/USA/2021/a-year-of-living-dangerously-resilience-after-covid-killer-hornetsHelen's blog response to the new Executive Order on cybersecurity issued by President Biden: https://duo.com/blog/cybersecurity-executive-order-observationsBen's supply chain attacks blog: https://blogs.cisco.com/security/threat-explainer-supply-chain-attacks Time stamps:0.00 - 14.54 Intro and recapping President Biden's executive order on improving the nation's cybersecurity14.55 Interview with Helen Patton part 135.49 Supply chain attacks46.02 Interview with Helen Patton part 201.01 Closing thoughts and outro
Today's episode is a little different from our usual format. In conjunction with Mental Health Awareness month, we welcome three leaders from Cisco Talos to join Hazel, Ben and Sana for a discussion on mental health, stress and burnout - specifically in the security and threat intelligence industry, although there are things that we discuss that could be relevant beyond that. Joining us are Matt Watchinski, Vice President of Talos who has been a guest before when we talked about the power of diverse teams. We also have Matt Olney, Talos’ Head of Threat Intelligence and Interdiction who our listeners will know from our episodes of election security. And we have Mitch Neff, who leads Talos' communication strategy and hosts the Beers with Talos podcast.Together, we share our own experiences about dealing with stress and burnout, both during the pandemic and beyond. We share these experiences from an individual level, and also our experience managing people within teams, and also helping managers who are managers too. Of course, there are many areas within mental health and people's experiences in threat hunting that we don't cover, so please don't consider this a full resource on the topic.We hope that by sharing our experiences, we’re helping to destablise any stigmas that are out there when it comes to talking about these topics, and if you or anyone close to you is struggling at the moment, we hope this inspires you to talk to someone.Some further resources: Adjusting to extraordinary times ebook https://www.cisco.com/c/en/us/products/security/extraordinary-times-ebook.htmlCreating safe spaces, with Chloe Messdaghi https://www.buzzsprout.com/926089/6457849-20-creating-safe-spaces-and-the-troubling-nature-of-attribution-in-threat-research-with-chloe-messdaghi-and-warren-mercer
We welcome back Talos guests Nick Biasini and Edmund Brumaghin discuss their latest research on the rising cases of collaboration app abuse, and how cyber criminals have come up with new ways of using them as an entry point into organizations. They also share lots of advice on how people can protect themselves from this increasing trend. You can read more about their research on the Talos blog.In the studio, Ben shares the origin stories behind some cyber threats—and how they got their unusual names. For more on this, check out Ben's twitter thread.You can also check out more information about the Ryuk ransomware in this run down by Talos Plus, Sana chats about the evolution of threats over the past year, how people can protect their home environments, and how the industry is fighting back.Episode time stamps:02:14 - The origin stories of prominent malware14:23 - Interview with Nick and Edmund on collaboration app abuse33:33 - Threats in the home environment, and how the industry is fighting back43:58 - Closing thoughts
We're delighted to have Tazin Khan as our guest this week. Tazin is a data privacy advocate and founder of the Cyber Collective, a community-centered organization that seeks to help people understand the ways data and privacy impact them, and empower them to learn more about their data privacy rights. Cyber Collective is the first and only women of color-owned data ethics, privacy, and cybersecurity research organization. In what Hazel describes as one of the most moving interviews she's ever conducted, Tazin isn’t afraid to tap into the power of her vulnerability, and talk about incidents that greatly affected her and shaped who she is today. From growing up as a Bengali immigrant, making a life for herself and her family in New York, finding her cybersecurity "sweet spot" and taking a stance on key issues, it's a fascinating story.In the studio, Sana leads our intro topic. She takes us through a journey of discovery with some 2021 security trends, as decided by over 1650 security experts. This includes how companies are working on their rapid response capabilities, and what are the top causes of burnout. Access the full data here cisco.com/c/m/en_us/products/security/securex/polls-ebook.htmlAnd finally Ben brings you the latest threat intelligence research, with some fascinating insights into the top threat categories certain industries face, and the threats that they’re more likely to encounter. Read the full blog at blogs.cisco.com/security/threat-trends-dns-security-part-2Episode time stamps:01:35: Sana discusses 2021 security trends11:30: Interview with Tazin Khan part 138:07: Industry specific threat trends with Ben45:21: Interview with Tazin Khan part 264:08: Closing thoughts
After a bit of a break, Security Stories is back! And we're back with a brand new lineup. Joining Hazel and Ben in the virtual pod booth is Sana Yousuf, a Cisco security marketing leader and storyteller, responsible for a diverse set of threat-focused products and solutions that bring our security platform to life. She is a diversity and inclusion evangelist and author of research reports. In this episode, we'll get to know Sana, as well as kick off a brand new opening feature. For each episode we’re going choose a topic that’s on our mind, and lead a discussion on it. There are no rules! This week it's Hazel's turn, and she leads a discussion on influential women in cybersecurity history, whose work may have gone under the radar. For more on this topic, check out this Time Magazine article: time.com/4974299/hacker-history-code-girls/Also check out our brand new ebook, "Lifting each other up: A celebration of women in cybersecurity and their advocates" cisco.com/go/boostincybersecurity Our guest this week is Dr Christine Izuakor. Christine is the founder of Cyber Pop up which helps small businesses with their cybersecurity needs and strategies. She’s had a really varied career, going from the corporate world to start up land, becoming an author, CEO and hacker along the way, and she is someone very motivated by injustice. In this interview we hear about her life, why some people told her not to pursue a career in cybersecurity, and we chat about the opportunity divide and how we can make the field more accessible to more people.Plus, we reveal the latest threat trends in DNS Security to help inform you on where to dedicate resources or training. For more of those great looking charts Ben talks about, head to https://blogs.cisco.com/security/threat-trends-dns-security-part-1Episode time stamps:02:40 Getting to know Sana07:50 Influential women in cybersecurity history19:12 Interview with Dr Christine Izuakor part 146:05 Threat trends: What DNS Security told us about the past year59:38 Interview with Dr Christine Izuakor part 276:18 Outro