Podcasts about accenture security

  • 20PODCASTS
  • 40EPISODES
  • 25mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 16, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about accenture security

Latest podcast episodes about accenture security

Accenture InfoSec Beat
InfoSec Beat: The Golden Age of Managed Security Services Reinvention

Accenture InfoSec Beat

Play Episode Listen Later Apr 16, 2025 20:10


Can the way Accenture delivers managed security services be reinvented? Accenture CISO Kris Burkhardt poses this question to guest Rex Thexton, chief technology officer of Accenture Security, who gives a definite yes. Rex shares several exciting opportunities possible in the next 12 to 18 months. Listen to learn more about the prospects of AI-powered automation and intelligence that are poised to bring about a golden age of managed security services. 

Accenture InfoSec Beat
InfoSec Beat: Zero-day Vulnerabilities

Accenture InfoSec Beat

Play Episode Listen Later Jul 26, 2024 19:01


What is a zero-day vulnerability and what can organizations do about them? These two questions kick off an engaging discussion on this type of threat with Accenture Security colleagues Shawn Duffy, Global Lead for Threat Exposure Management, and David Williams, Global Lead of Advanced Threat Services. Discover what they have to say and learn more about strategies, what they see across enterprises, the value of red teaming, the impact of AI, along with a reminder about the importance of layered, in-depth defense and basic technical hygiene.

Off The Wall
How to Protect Your Personal & Business Assets from Cyber Attacks with Cathleen and Bill Phelps

Off The Wall

Play Episode Listen Later Feb 16, 2024 37:07


With the rising prevalence of cyber-attacks on both individuals and small businesses, it's more important than ever to learn how to boost your cybersecurity and protect the wealth you've worked so hard to grow.    In this episode of Off the Wall, you'll meet Cathleen Phelps, a Client Experience Manager at Monument, and Bill Phelps, a Cybersecurity Expert and Strategist with over 26 years of experience. Tune in to learn easy ways to identify and prevent fraud, phishing, and identity theft, including AI-generated fraud, so you can protect your personal and business assets from cyber-attacks.    Over the years, Cathleen has successfully coached clients on how to protect themselves online as well as what to do if their personal information has been compromised. As an expert in the field, Bill has delivered cybersecurity consulting and incident response services to some of the most sophisticated clients in the world.     Together, Bill and Cat offer a treasure trove of knowledge about protecting yourself and your wealth against bad actors.    “The amount of money paid to cyber criminals and ransomware in 2023 passed a billion dollars for the first time… and that is disproportionately hitting small businesses, and for that matter, schools, hospitals, other organizations that have only more recently started to invest in appropriate cyber defense measures.” – Bill Phelps    Episode Timeline/Key Highlights:  [00:51] Introducing today's topic & guests.  [02:40] Are hackers/scammers getting more intelligent with their tactics? + The most prevalent and emerging cyber threats people should look out for.  [05:54] Anyone is Vulnerable: How cyber scams and phishing emails are affecting teens, adults, and the elderly.  [09:00] AI and Identity Theft: How to protect yourself from AI fraud.  [12:26] How people's personal information gets compromised.  [13:54] Phishing red flags to look for in your emails.  [16:20] What to do if your personal information has been compromised or if your identity was stolen.  [19:17] How secure are online password managers? Should I be using one?  [22:32] Cybersecurity for small businesses.  [25:30] Easy ways to protect yourself and your business from cyber-attacks.  [32:46] When should I be using a VPN (Virtual Private Network)?    Please see important podcast disclosure information at https://monumentwealthmanagement.com/disclosures.      Resources Mentioned:  Report Identity Theft: https://www.identitytheft.gov  Article: 9 Steps You Can Take to Protect Yourself from Identity Theft Fraud: bit.ly/3uuURYC  Have feedback on our podcast? Take our survey: https://bit.ly/3RZp77h  Subscribe to our blog: https://bit.ly/MonumentWealthBlog    About Cathleen Phelps:  Cathleen has two big drivers – a challenge and a love of learning. Cathleen has a degree in Commerce from the University of Virginia with concentrations in MIS and Marketing. She started her career as a process and change management consultant at Accenture. Now, she loves working at Monument because it's a small and smart group where she is still using technology to help a business run better. And as before, she feels the best part is working with clients to help them achieve the life they want and ensuring their Monument Client Experience is something they enjoy and want to share with others.    Connect with Cathleen: https://bit.ly/3ux6gaV    About Bill Phelps:  Bill Phelps currently serves on the Board at two cyber security companies, Deepwatch and Nisos. He is an Operating Partner and active investor with Blu Venture Investors and is a frequent advisor and mentor to other cyber and technology companies, their founders and investors.     Bill retired in 2023 from Booz Allen Hamilton where he was Executive Vice President and Senior Partner. Under his leadership, Booz Allen's Global Commercial business, became a recognized market leader, delivering cyber security consulting and incident response services to some of the most sophisticated clients in the world.     Prior to joining Booz Allen, Bill spent 26 years at Accenture, finishing his Accenture career as the Global Managing Director of Accenture Security. Bill also co-founded Virginia-based startup, SevenSpace, a pioneer in the nascent market for remotely delivered IT managed services. SevenSpace was acquired by Sun Microsystems in 2005.    Connect with Bill: https://www.linkedin.com/in/billphelps    Connect with Monument Wealth Management:  Visit our website: https://bit.ly/monumentwealthwebsite   Follow us on Instagram: https://bit.ly/MonumentWealthIG   Follow us on Twitter: https://bit.ly/MonumentWealthTW   Connect with us on LinkedIn: https://bit.ly/MonumentWealthLI   Connect with us on Facebook: https://bit.ly/MonumentWealthFB   Connect with us on YouTube: https://bit.ly/YouTubeMWMFit    About “Off the Wall”:  OFF THE WALL is a podcast for business professionals and high-net-worth investors who want to build wealth with purpose. A little bit Wall Street, a little bit off-the-wall; it's your go-to for straightforward, unfiltered wealth advice on topics that founders, business owners, and executives care about.    Learn more about our hosts, Dave and Jessica on our website at https://monumentwealthmanagement.com.   

Accenture InfoSec Beat
InfoSec Beat: Going Passwordless

Accenture InfoSec Beat

Play Episode Listen Later Oct 19, 2023 22:32


In this episode of the InfoSec Beat podcast, Accenture CISO Kris Burkhardt is joined by Accenture Security guest Damon McDougald, global digital identity lead for a discussion about going passwordless. Hear how passwordless technologies work and the reasons for moving to this new method of authentication to create a more secure digital future.

infosec accenture security
The CyberWire
Adventures of ransomware, and other developments in cybercrime. Cyberespionage and hybrid warfare. A government shutdown averted. Cybersecurity Awareness Month is underway.

The CyberWire

Play Episode Listen Later Oct 2, 2023 28:12


Double-tapping ransomware hits the same victim twice. Exim mail servers are found exposed to attack. Iran's OilRig deploys Menorah malware against Saudi targets. North Korea's Lazarus Group targets a Spanish aerospace firm. Update your ransomware scorecards: LostTrust is a rebrand of MetaEncryptor. Increased domestic surveillance in Russia, done partly so propaganda can be more effectively targeted. Killnet claims to have hit the British Royal family with a DDoS attack. Michael Denning, CEO at SecureG for Blu Ventures, shares developments in zero trust as a part of our Industry Voices segment. Rob Boyce from Accenture Security talks about Dark Web threat actors targeting macOS. And Cybersecurity Awareness Month begins this week. Learn more about the Blu Ventures Conference here: https://www.bluventureinvestors.com/cyber-venture-forum For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/188 Selected reading. Two or More Ransomware Variants Impacting the Same Victims and Data Destruction Trends (FBI)  FBI: Ransomware Actors Launching 'Dual' Attacks (Decipher)  A still unpatched 0-day RCE impacts more than 3.5M Exim servers (Security Affairs)  New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks (The Hacker News) APT34 deploys new Menorah malware in targeted phishing attack (Candid.Technology)  APT34 Deploys Phishing Attack With New Malware (Trend Micro)  Iranian APT Group OilRig Using New Menorah Malware for Covert Operations (The Hacker News)  Alleged Iranian hackers target victims in Saudi Arabia with new spying malware (Record)  North Korean hackers posed as Meta recruiter on LinkedIn (CyberScoop) Lazarus APT Exploiting LinkedIn to Target Spanish Aerospace Firm (Hackread) North Korean Lazarus targeted a Spanish aerospace company (Security Affairs) Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang (BleepingComputer) Ukraine at D+585: Trench fighting in the south. (CyberWire) Royal Family's official website targeted in cyber attack (Sky News) Royal family website hit by cyber attack (The Independent) The country ‘dodged a bullet' after shutdown avoided, but the cyber threat still hovers (Washington Post) US Federal shutdown averted (or postponed): effects on cybersecurity. (CyberWire) Cybersecurity Awareness Month: perspectives from the cyber sector. (CyberWire) Kicking off NIST's Cybersecurity Awareness Month Celebration & Our Cybersecurity Awareness Month 2023 Blog Series (NIST)  Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Microsoft releases results of investigation into cloud email compromise. A buggy booking service. Adversary emulation for OT networks. Identity protection trends. Notes from the hybrid war.

The CyberWire

Play Episode Listen Later Sep 7, 2023 27:08


Microsoft releases results of their investigation into cloud email compromise. A vulnerability affects a resort booking service. Adversary emulation for OT networks. Identity protection and identity attack surfaces. Sanctioning privateers (with a bonus on vacation ideas). Rob Boyce from Accenture Security tracks new trends in ransomware. Our Threat Vector segment features Mastering IR Sniping A Deliberate Approach to Cybersecurity Investigations with Chris Brewer. And Estonia warns of ongoing cyber threats. On this segment of Threat Vector, Chris Brewer, a Director at Unit 42 and expert in digital forensics and incident response, joins host David Moulton discussing Mastering IR Sniping: A Deliberate Approach to Cybersecurity Investigations. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/171 Threat Vector links. Sniper Incident Response from Cactus Con on GitHub Sniper Incident Response presentation by Chris Brewer on YouTube Selected reading. Results of Major Technical Investigations for Storm-0558 Key Acquisition (Microsoft Security Response Center) Check-Out With Extra Charges - Vulnerabilities in Hotel Booking Engine Explained (Bitdefender) Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks (Bitdefender)  MITRE and CISA release Caldera for OT attack emulation (Security Affairs)  MITRE Caldera for OT now available as extension to open-source platform (Help Net Security) Silverfort and Osterman Research Report Exposes Critical Gaps in Identity Threat Protection (Silverfort)  United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang (US Department of the Treasury) Estonian PM: cyberspace is Ukraine war frontline (Euromaidan Press) Cyberwar and Conventional Warfare in Ukraine (19FortyFive) Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
An illicit market in account restoration. Resilience and the cyber workforce: a snapshot. New post-exploitation technique in Amazon Web Services.

The CyberWire

Play Episode Listen Later Aug 2, 2023 24:34


An illicit market in account restoration. Resilience and the cyber workforce. New post-exploitation techniques in Amazon Web Services. Incursions into Norwegian government networks went on for four months. Rob Boyce from Accenture Security describes a “Perfect Storm” in the Dark Web threat landscape. Carole Theriault shares mental health social media warnings for teens. And the Russian legislation seeks to reduce or eliminate online privacy. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/146 Selected reading. Amazon employees leak secret info that marketplace sellers can buy on Telegram (CNBC) Cyber Workforce Benchmark Report (Immersive Labs) Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan (Mitiga) Cado Security Labs 2023 Threat Findings Report (Cado Security) Cyberattack on Norway Ministries Lasted at Least Four Months (Bloomberg) CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities (Cybersecurity and Infrastructure Security Agency) Putin Outlaws Anonymity: Identity Verification For Online Services, VPN Bypass Advice a Crime (TorrentFreak) Russia Is Returning to Its Totalitarian Past (Foreign Policy)

The CyberWire
Two-step supply-chain attack. Plugging leaks, in both Mother Russia and the Land of the Free and the Home of the Brave. Belarus remains a player in the cyber war.

The CyberWire

Play Episode Listen Later Apr 20, 2023 28:06


The 3CX compromise involved a two-stage supply-chain attack. Impersonating ChatGPT. Russia's security organs say they're cracking down on leaks. Updates on the Discord Papers case. Belarus arrests a pro-Russian hacktivist. Rob Boyce from Accenture Security on Dark Web cyber criminals targeting CRM systems. Our guest is Mike Loewy from the Tide Foundation, with an innovative approach to distributed key security. And, is Minsk going wobbly on Moscow? For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/76 Selected reading. 3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible (Mandiant) ChatGPT-Themed Scam Attacks Are on the Rise (Palo Alto Networks Unit 42) Russian Offensive Campaign Assessment, April 19, 2023 (Institute for the Study of War) Belarus-linked hacking group targets Poland with new disinformation campaign (Record) Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama (Flashpoint) Belarus-linked hacking group targets Poland with new disinformation campaign (Record)

The CyberWire
A glimpse into Mr. Putin's cyber war room. 3CXDesktopAppsupply chain risk. XSS flaw in Azure SFX can lead to remote code execution. AlienFox targets misconfigured servers.

The CyberWire

Play Episode Listen Later Mar 31, 2023 29:21


The Vulkan papers offer a glimpse into Mr. Putin's cyber war room. The 3CXDesktopApp vulnerability and supply chain risk. A cross site scripting flaw in Azure Service Fabric Explorer can lead to remote code execution. Rob Boyce from Accenture Security on threats toEV charging stations. Our guest is Steve Benton from Anomali Threat Research, sharing a ‘less is more' approach to cybersecurity. And AlienFox targets misconfigured servers. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/62 Selected reading. A Look Inside Putin's Secret Plans for Cyber-Warfare (Spiegel) Secret trove offers rare look into Russian cyberwar ambitions (Washington Post)  7 takeaways from the Vulkan Files investigation (Washington Post) ‘Vulkan files' leak reveals Putin's global and domestic cyberwarfare tactics (the Guardian) Contracts Identify Cyber Operations Projects from Russian Company NTC Vulkan (Mandiant) 3CX DesktopApp Security Alert - Mandiant Appointed to Investigate (3CX) Information on Attacks Involving 3CX Desktop App (Trend Micro) 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component  (SecurityWeek) There's a new supply chain attack targeting customers of a phone system with 12 million users (TechCrunch) Super FabriXss: From XSS to an RCE in Azure Service Fabric Explorer by Abusing an Event Tab Cluster Toggle (CVE-2023-23383) (Orca Security) Dissecting AlienFox | The Cloud Spammer's Swiss Army Knife (SentinelOne)

NextWave P.I.E. (Perspectives, Insights, & Experiences)
Accenture: Enabling Cybersecurity Transformation

NextWave P.I.E. (Perspectives, Insights, & Experiences)

Play Episode Listen Later Jul 21, 2022 16:50


About Today's Guests Ryan Lasalle - Senior Managing Director, Accenture Security, North-America Lead Ryan leads the North America practice for Accenture Security. He is responsible for nurturing talented teams that bring transformative solutions to better defend and protect our clients. He is also accountable for delivering on our commitment to clients for high-quality, innovative delivery to address their most critical issues. Currently, Ryan is focusing on solutions at the intersection of analytics, knowledge discovery, and cyber security, with the goal of improving threat assessment methodologies and enhancing knowledge of successful responses. His deep experience in security solutions, innovation-led approaches, and market expertise have made him a sought-after security innovator with clients. Over the course of nearly two decades with Accenture, Ryan has worked with clients across commercial, non-profit, and public sector organizations, helping them identify and implement emerging technology solutions to meet their business needs. Ryan is a Ponemon Institute Fellow and is active with the Greater Washington Board of Trade. He sits on security innovation advisory councils for several clients. A seasoned innovator, Ryan holds patents in human resource management, knowledge discovery, security analytics, threat intelligence, and establishing trust between entities online. Ryan is a Bachelor of Science in Electrical Engineering (BSEE) from Princeton University. Mark Jenkins - GM, Accenture Partnership, Palo Alto Networks Mark Jenkins serves as General Manager of the Palo Alto Networks partnership with Accenture. Mark has over a decade of strategic partnership experience, including leading the Global Systems Integrator businesses for FireEye and Skyhigh Networks, before joining Palo Alto Networks almost six years ago. Mark also has industry experience in his background, with senior IT roles at KPMG and Websense. Mark holds a Bachelor's Degree in Computer Science from Sheffield Hallam University in England About the Partner Accenture is a global professional services company with leading capabilities in digital, cloud, and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology, and Operations services—all powered by the world's largest network of Advanced Technology and Intelligent Operations centers. Our people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners, and communities. Visit us at www.accenture.com. About Us: Palo Alto Networks A global cybersecurity company, Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across cloud, network, and mobile devices. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. With steady enhancements to our award-winning NextWave partner program, we are investing in, growing with, and optimizing the build the part

The CyberWire
Hertzbleed, a troublesome feature of processors. Cyberespionage and hybrid war. Patch Tuesday notes. Software bills of materials. Wannabe cybercrooks and criminal publicity stunts.

The CyberWire

Play Episode Listen Later Jun 15, 2022 29:50 Very Popular


The Hertzbleed side-channel issue affects Intel and AMD processors. An Iranian spearphishing campaign prospected former Israeli officials. Patch Tuesday notes. A look at software bills of materials. Russia routes occupied Ukraine's Internet traffic through Russia. Intercepts in the hybrid war: the odd and the ugly. Deepen Desai from ZScaler joins us with the latest numbers on ransomware. Rob Boyce from Accenture Security looks at cyber invisibility. And, finally, criminal wannabes and criminal publicity stunts. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/115 Selected reading. A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys (Ars Technica)  Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials (Check Point Research) Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws (BleepingComputer)  Microsoft Releases June 2022 Security Updates (CISA)  Windows Updates Patch Actively Exploited 'Follina' Vulnerability (SecurityWeek)  Adobe Plugs 46 Security Flaws on Patch Tuesday (SecurityWeek) Citrix Releases Security Updates for Application Delivery Management (CISA) SAP Releases June 2022 Security Updates (CISA)  So long, Internet Explorer. The browser retires today (AP NEWS) SBOM in Action: finding vulnerabilities with a Software Bill of Materials (Google Online Security Blog) Russia Is Taking Over Ukraine's Internet (Wired) Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy (CyberScoop)  Intercepted call: Russian plan to send PoWs out into minefields (The Telegraph)  Hacker Advertises ‘Crappy' Ransomware on Instagram (Vice)  LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang (CPO Magazine)

Healthcare Strategies
Addressing EMR Security Risks, Role of Cloud-Based Solutions in Cybersecurity

Healthcare Strategies

Play Episode Listen Later Apr 18, 2022 20:23


Electronic medical records (EMRs) and electronic health records (EHRs) are essential tools that allow the storage and maintenance of protected health information (PHI). Unfortunately, PHI is also extremely valuable to threat actors. Salwa Rafee, global managing director for healthcare security at Accenture Security, discusses EMR security risk factors and the pros and cons of in-house and cloud-based EMR systems.

Shot of Cyber
Salwa Rafee

Shot of Cyber

Play Episode Listen Later Jan 22, 2022 37:59


In this new Shot of Cyber episode, Gilad and Simon meet Salwa Rafee, Global MD for Accenture Security and VP of Health ISAC. Salwa's career path is truly inspiring, from a biomedical engineer to a Cybersecurity leader. We discuss the shared responsibility of public and private sector in defending healthcare, the value of information sharing, how STEM teaches critical thinking and the importance of crisis preparedness in mitigating the impact of attacks.

Research Saturday
The rise of Karakurt Hacking Team.

Research Saturday

Play Episode Listen Later Jan 8, 2022 14:10


Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group's extortion approach includes steps to avoid, as much as possible, drawing attention to its activities. The research can be found here: Karakurt rises from its lair

The CyberWire
The rise of Karakurt Hacking Team.

The CyberWire

Play Episode Listen Later Jan 8, 2022 14:10


Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group's extortion approach includes steps to avoid, as much as possible, drawing attention to its activities. The research can be found here: Karakurt rises from its lair

The CyberWire
CISA and its partners warn of Iranian cyber ops. Cyberespionage in the Middle East with Candiru tools. Belarus connected to Ghostwriter. Facebook boots SideCopy. RAMP recruits members.

The CyberWire

Play Episode Listen Later Nov 17, 2021 23:30


CISA, the FBI, the ACSC, and the NCSC issue a joint advisory warning of an Iranian cyber campaign exploiting known vulnerabilities in Fortinet and Microsoft Exchange. A Belarusian connection to Ghostwriter. Candiru tools reported in watering holes. SideCopy's interest in Afghanistan. RAMP shows an interest in attracting Chinese operators. Josh Ray from Accenture Security digs into the CONTI playbook leak. Our guest is Matt Keeley from Bishop Fox on fuzzing. And Pompompurin wants to sell you leaked Robinhood data. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/221

The CyberWire
Cyberespionage from Tehran. Clopp ransomware operators exploit vulnerable SolarWinds instances. Mercenaries and lawful intercept vendors. Patch Tuesday.

The CyberWire

Play Episode Listen Later Nov 10, 2021 23:46


Tehran's Lyceum group expands its activities against ISPs and telcos in Israel, Morocco, Tunisia, and Saudi Arabia. Clopp is going after unpatched instances of SolarWinds. Cyber mercenaries are quietly competing with lawful intercept vendors. NSO Group receives a setback from the US 9th Circuit. Mexico makes an arrest in its Pegasus investigation. Carole Theriault shares her thoughts on the supply chain. Josh Ray from Accenture Security on Moving Left of the Ransomware Boom. And notes on Patch Tuesday.  For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/217

The CyberWire
Ransomware gangs talk about retiring, and about deception. High-level Russo-American talks. US sanctions four spyware vendors. CISA tells US agencies to patch known, exploited vulnerbalities.

The CyberWire

Play Episode Listen Later Nov 3, 2021 23:15


The BlackMatter ransomware gang says that it's retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn't exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/212

The CyberWire
Watch out for cybercrime over holidays (like Labor Day). Ransomware warning for the food and agriculture sector. Gift card and loyalty program fraud. NIST draft IoT guidelines out for comment.

The CyberWire

Play Episode Listen Later Sep 3, 2021 23:49


Uncle Sam recommends cyber vigilance during your kinetic relaxation this Labor Day weekend. The ransomware threat to food and agriculture. “Low and slow” fraud from compromised email in-boxes. Israel promises an investigation of cyber export controls. Josh Ray from Accenture Security on giving back to the community and the Jenkins Attack Framework for red teaming. Our guest is Andy Ellis on the transparency in cybersecurity initiative. And NIST has draft consumer IoT guidelines out for comment. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/171

The CyberWire
Data breaches and ransomware. Another gang says it's retiring. New warrants against cybercrime in Australia. Roles and missions in the US. Hoosier data?

The CyberWire

Play Episode Listen Later Aug 30, 2021 21:51


Data breach and ransomware affect an airline's customers. The Phorpiex botnet operators say they're going out of business, and everything must go. New warrants for the Australian Federal Police in cybercrime cases. US Federal cybersecurity roles and responsibilities. Rick Howard takes on adversary playbooks. Josh Ray from Accenture Security on The Biden Administration's cybersecurity executive order, what it means for product security. And Indiana warns of a COVID-19 contact tracking database exposure. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/167

The CyberWire
Taliban seizes HIIDE devices. T-Mobile customer data compromised. Ransomware attack against Brazil's Treasury. Social engineering espionage. Ransomware vs. sewers. IoT bug disclosed.

The CyberWire

Play Episode Listen Later Aug 18, 2021 24:08


The Taliban now has, among other things, a lot of biometric devices. T-Mobile concludes that some customer data were compromised in last week's incident. InkySquid's in the watering hole. Brazil's Treasury sustained, and says it contained, a ransomware attack. Siamese Kitten's social engineering on behalf of Tehran. Sewage systems hacked in rural Maine. Josh Ray from Accenture Security on what nation state adversaries may have learned from observing the events surrounding Colonial pipeline. Our guest Manish Gupta from ShiftLeft looks at issues with the Software Bill of Materials. And an IoT vulnerability is disclosed, and mitigations are recommended. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/159

The CyberWire
Public Wi-Fi advice from NSA. South African ports recover from ransomware. Iranian rail incident was a wiper attack. Developments in the criminal-to-criminal market. Intercept vendors under scrutiny.

The CyberWire

Play Episode Listen Later Jul 29, 2021 27:06


Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Our guest is Duncan Godfrey from Auth0 with insights on managing digital identities. And a bad password is revealed on an open mic during an Olympic broadcast. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/145

The CyberWire
Investigating VPN exploits, and the crooks and spies who use them. BadAlloc afflicts OT. Notes on cyberespionage. The criminal market for deepfakes.

The CyberWire

Play Episode Listen Later Apr 30, 2021 25:05


The US Government expands its investigation into Pulse Secure VPN compromises. Microsoft discloses its discovery of BadAlloc IoT and OT vulnerabilities. Someone’s distributing Purple Lambert spyware. Chinese intelligence services seem to be backdooring the Russian defense sector. Financially motivated criminals are exploiting SonicWall VPN vulnerabilities. A look at the emerging criminal market for deepfakes. Josh Ray from Accenture Security on Why Cybersecurity Community Service Matters. Our guest Manish Gupta of ShiftLeft looks at cyber attacks on the CI/CD pipeline. And the World Health Organization attracted impersonators early this month. Again. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/10/83

RVA Tech Talks
Ryan LaSalle - Managing Director, North America Lead, Security at Accenture

RVA Tech Talks

Play Episode Listen Later Apr 19, 2021 48:14


Ryan leads the North America practice for Accenture Security. He is responsible for nurturing the talented teams that bring transformative solutions to better defend and protect our clients. He is also accountable for delivering on our commitment to clients for high-quality, innovative delivery to address their most critical issues.Throughout his entrepreneurial career at Accenture, he has excelled at identifying new areas of opportunity, growth and under-penetrated markets and then driving technology innovation and brand awareness to help our business and our clients reap the benefits. His outcomes have been a result of being able to contribute to and collaborate with many discrete parts of the business – from orchestrating complex sales and framing marketing campaigns to identifying early high value partners and driving joint value propositions to building and leading a high caliber team to outsized results.Innovative: Since 2010, Ryan has been responsible for Accenture's research and development efforts in Security. He has led the Lab to outsized results including opening new doors in banking, energy and defense & intelligence, partnering with our most strategic clients to substantially grow our account penetration while harvesting critical intellectual property and building strategic relationships with vendor partners.Results Driven: Since 2006, Ryan has consistently contributed knowledge, skills, capabilities and credentials to key wins at strategic clients – with a 5 year track record of over $5M/year in personal sales and over $20M in supported sales.Market Relevant: The thought leadership and research results Ryan has managed drive the core messaging that Accenture's global security practice, CTO and CEO take to market when weighing in on where we are placing our bets in security. Ryan also works closely with Accenture's marketing, media relations and analyst relations teams to increase and improve Accenture's role as a security innovator. 

State Secrets
A Cyber Conversation with Kelly Bissell, Global Managing Director Accenture Security

State Secrets

Play Episode Listen Later Mar 29, 2021 28:27


Kelly Bissell leads Accenture Security, where he oversees the full spectrum of security services including strategic consulting, cyber defense, digital identity, response and remediation services, and managed security services. He is a member of Accenture’s Global Management Committee.

Lawyers Weekly Podcast Network
The Corporate Counsel Show: Cyber attacks the ‘number one consideration' for law departments

Lawyers Weekly Podcast Network

Play Episode Listen Later Mar 9, 2021 28:51


If you aren't trusted by the market because you've had a cyber attack, you might as well not be in business. As such, Annie Haggar says, corporate counsel must upskill in cyber security as an urgent priority. On this episode of The Corporate Counsel Show, host Jerome Doraisamy is joined by Accenture Security legal lead (global managed security and growth markets) Annie Haggar to discuss how GCs and CLOs are currently lagging in their efforts to ensure their businesses and organisations are effectively protected, the prominent danger of supply chain attacks and meeting regulatory obligations around cyber security. The pair also talk about the need for breach response planning, proactively briefing executives about risks and incident response planning, attaching legal professional privilege in cyber-security measures, hiring outside counsel breach coaches, and other needed practical steps. If you like this episode, show your support by rating us or leaving a review on Apple Podcasts (The Lawyers Weekly Show) and by following Lawyers Weekly on social media: Facebook, Twitter and LinkedIn. If you have any questions about what you heard today, any topics of interest you have in mind, or if you'd like to lend your voice to the show, email editor@lawyersweekly.com.au for more insights!

The OT and IoT Security Podcast
From Oil Rig to Boardroom – Drilling Into the Importance of Cybersecurity

The OT and IoT Security Podcast

Play Episode Listen Later Dec 4, 2020 50:01


Cybersecurity in the oil & gas industry has become a boardroom issue, as high-profile attacks and targeted threats like TRITON raise awareness about risks to energy sector safety and productivity. Learn how real-world energy leaders manage cyber risks, minimize disruptions and ensure safety. Special guest Jim Guinn, Global Managing Director with Accenture Security, joins the discussion to share his experiences that span time on the rig to board-level cybersecurity planning.Here are links to the security resources mentioned during the session: Accenture Security: ICS Cyber RangeWhitepaper: Midstream Oil and Gas Industry - Improving ICS Visibility Boosts Operations and Cyber SecurityWebpage: Securing OT & IoT in Oil & GasCase Study: Oil & Gas Producer Deploys Global ICS Security ProgramCase Study: National Gas Distributor Achieves Pipeline VisibilityExecutive Brief: The Cost of OT Cybersecurity Incidents and How to Reduce RiskWebpage: Preventing Unplanned Downtime Due to Equipment FailureBlog: Massive IoT Disruption Coming to an OT Network Near You

Innovation Station
Driving Innovations - Living in the world of Future Systems - Philip V. Varughese

Innovation Station

Play Episode Listen Later Jun 16, 2020 54:03


We pleased to introduce our guest speaker and Innovator, Mr Philip Varughese, Vice President & Global Lead - Applied Intelligence, Analytics & Innovation, Accenture Security.   Philip is an Industry recognized Analytics veteran, entrepreneur, thought leader and a visionary digital transformation & innovation executive.   Prior to his current role, he was the Co-founder & CEO of Datum Informatics Pvt. Ltd, a BigData Analytics & AI firm, with deep focus into Contextual Intelligence using Artificial Intelligence & Machine learning on unstructured data.   He brings around 17+ Years of rich and extensive cross-functional experience and expertise in the fields of Artificial Intelligence, Cyber Intelligence, Future Systems, NextGen Cyber Defense, Digital Transformation, Disruptive Innovation and Cognitive Decision Systems.   Philip has handled key business management roles with IBM, CSS Corporation, Chimera Technologies, Seventhsense Technologies and Socratic Learning Inc. at Domestic and International level.   A Post Graduate in Mathematics, Master of Philosophy in Mathematics and Diploma in Computer Applications, he is an invited Key-Note Speaker in more than 200 National & International Conferences and Leading Academia.

The New Stack Podcast
What Cloud Native Security Means for You and Your Peers Today by Palo Alto Networks and Prisma Cloud

The New Stack Podcast

Play Episode Listen Later May 27, 2020 31:15


In this edition of The New Stack Makers podcast hosted by Alex Williams, founder, and editor-in-chief of The New Stack, Keith Mokris, head of product marketing, Prisma Cloud, Palo Alto Networks, and Mark Rauchwarter, cloud and infrastructure security for Accenture Security, discuss the key talking points of the Prisma Cloud Native Security Summit and what the results of the survey mean for the DevOps community. Join Prisma Cloud by Palo Alto Networks June 24 at 9:00 AM PDT at The State of Cloud Native Security virtual summit for a full discussion of the “The State of Cloud Native Security” report and other topics relevant to your organization's digital journey. The summit will feature a panel session hosted by The New Stack's Founder and Editor-in-Chief Alex Williams, with security thought leaders from AWS, Accenture, and Prisma Cloud by Palo Alto Networks.

Cyber Security Weekly Podcast
Episode 195 - Accenture Podcast Series: Why threat intelligence is your best defence - Accenture’s new Cyber Fusion Centre, Sydney

Cyber Security Weekly Podcast

Play Episode Listen Later Mar 9, 2020


Accenture Podcast Series: Building cyber resilience to grow and innovate with confidence Recorded at Accenture’s new Cyber Fusion Centre in Sydney, we interview Joseph Failla, ANZ Security Lead and Managing Director of the Accenture Security practice for Australia and New Zealand and Mark Sayer, APAC Cyber Defence Lead for Accenture. Joseph was a co-founder and owner of Redcore, a specialised cyber security firm that was acquired by Accenture in 2016, and he has 26+ years’ experience in IT with a core focus on information security and risk management strategies. His areas of expertise are cyber security, public key infrastructure (PKI) and security strategy. LinkedIn Mark is a respected IT security professional with over 20 years of experience across a diverse range of roles, organisations and industries. As the AAPAC lead for Cyber Defence, Mark has led the development of local technical cyber capability across the region. LinkedIn Following a tour of the fusion centre, we discuss why threat intelligence is the best defence and how intelligence insights can be tailored for different audiences and client requirements. We also discuss the 2019 Cyber Threatscape Report and Mark Sayer’s blog “Know Your Enemy”. Recorded on 4 March, 2020 in Sydney courtesy of Accenture. Series #2 - Episode 204 - Accenture Podcast Series: The IT-OT attack surface and developing Australia's cybersecurity posture  

On the Platform
Can you trust your smart speaker?

On the Platform

Play Episode Listen Later Mar 12, 2019 13:52


Smart speakers are listening to 40 million Americans each day. But they don’t always understand what they hear. That can open the door to cybercrime. Listen as Mark Egner, Senior Manager, Accenture Security, and Malek Ben Salam, Accenture’s Cybersecurity R&D lead, examine some of the unexpected security issues that smart speakers can create. Voice-controlled devices are making our lives much easier – with the range of tasks they can address expanding all the time. But, depending how they’re trained to recognize speech, they can misinterpret commands and generate the wrong outcomes. Different regional accents and patterns of speech, as well as skills that have very similar names, can lead to bad outcomes. Cyber criminals can often predict these and by “skill squatting” insert themselves in a conversation to access users’ credentials. Platforms providing voice-related services must take a number of key steps to keep users secure and maintain that most precious commodity of all: trust. Read more about our capabilities here: https://www.accenture.com/us-en/software-and-platform-essentials

On the Platform
Can you trust your smart speaker?

On the Platform

Play Episode Listen Later Mar 12, 2019 13:52


Smart speakers are listening to 40 million Americans each day. But they don’t always understand what they hear. That can open the door to cybercrime. Listen as Mark Egner, Senior Manager, Accenture Security, and Malek Ben Salam, Accenture’s Cybersecurity R&D lead, examine some of the unexpected security issues that smart speakers can create. Voice-controlled devices are making our lives much easier – with the range of tasks they can address expanding all the time. But, depending how they’re trained to recognize speech, they can misinterpret commands and generate the wrong outcomes. Different regional accents and patterns of speech, as well as skills that have very similar names, can lead to bad outcomes. Cyber criminals can often predict these and by “skill squatting” insert themselves in a conversation to access users’ credentials. Platforms providing voice-related services must take a number of key steps to keep users secure and maintain that most precious commodity of all: trust. Read more about our capabilities here: https://www.accenture.com/us-en/software-and-platform-essentials

On the Platform
Privacy matters: Why it's time for a new conversation

On the Platform

Play Episode Listen Later Mar 12, 2019 10:20


Consumers love the convenience of connected lifestyles. But they value their privacy just as much. Platform companies need to get the balance right. Those that do, earn the biggest prize of all: trust. Listen as Mark Egner, Senior Manager, Accenture Security, and David Cooper, Accenture's North America Privacy Lead, examine some of the key privacy issues that companies must bear in mind as they develop new digital products, services and experiences. Privacy is often viewed primarily as a compliance issue. But its implications go far deeper. Software and platform companies need to shift the conversations they have about privacy. The focus needs to be on the wider impacts that protecting consumers' privacy has on product design and the wider business. Enabling consumers to manage and control their data is critical. That will gain their trust. And in the digital world, that's a must. Learn more: accntu.re/2rcahwW

On the Platform
Privacy matters: Why it's time for a new conversation

On the Platform

Play Episode Listen Later Mar 12, 2019 10:20


Consumers love the convenience of connected lifestyles. But they value their privacy just as much. Platform companies need to get the balance right. Those that do, earn the biggest prize of all: trust. Listen as Mark Egner, Senior Manager, Accenture Security, and David Cooper, Accenture's North America Privacy Lead, examine some of the key privacy issues that companies must bear in mind as they develop new digital products, services and experiences. Privacy is often viewed primarily as a compliance issue. But its implications go far deeper. Software and platform companies need to shift the conversations they have about privacy. The focus needs to be on the wider impacts that protecting consumers' privacy has on product design and the wider business. Enabling consumers to manage and control their data is critical. That will gain their trust. And in the digital world, that's a must. Learn more: accntu.re/2rcahwW

Latest Hacking News
Latest Hacking News Podcast #180 – Interview with Valentino De Sousa

Latest Hacking News

Play Episode Listen Later Dec 10, 2018 5:46


Interview with Valentino De Sousa, cyberdefense lead for the UK and Ireland with Accenture Security, about SNAKEMACKERAL aka Fancybear, APT28, and Sofacy.

Paul's Security Weekly TV
Vik Desai, Accenture - Business Security Weekly #72

Paul's Security Weekly TV

Play Episode Listen Later Feb 7, 2018 26:24


Vik leads Accenture Security's global Products Operating Group, with responsibility for the creation and delivery of comprehensive strategies and solutions for Retail, Industrial, Travel, Consumer Goods & Services, and Life Sciences clients. He joins Matt Alderman, Michael, & Paul for an interview! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode72 Visit http://securityweekly.com/category/ssw for all the latest episodes!

travel retail industrial accenture life sciences desai vik paul asadoorian accenture security matt alderman business security weekly
Business Security Weekly (Video)
Vik Desai, Accenture - Business Security Weekly #72

Business Security Weekly (Video)

Play Episode Listen Later Feb 6, 2018 26:24


Vik leads Accenture Security's global Products Operating Group, with responsibility for the creation and delivery of comprehensive strategies and solutions for Retail, Industrial, Travel, Consumer Goods & Services, and Life Sciences clients. He joins Matt Alderman, Michael, & Paul for an interview! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode72 Visit http://securityweekly.com/category/ssw for all the latest episodes!

travel retail industrial accenture life sciences desai vik paul asadoorian accenture security matt alderman business security weekly
Paul's Security Weekly TV
Tom Parker, Accenture - Enterprise Security Weekly #61

Paul's Security Weekly TV

Play Episode Listen Later Sep 15, 2017 36:25


Tom Parker is the Group Technology Officer of Accenture Security and a recognized thought leader in the security industry. He’s known for his research in adversary and threat profiling and software vulnerability. Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!

accenture tom parker paul asadoorian accenture security matt alderman enterprise security weekly es episode61 visit
Enterprise Security Weekly (Video)
Tom Parker, Accenture - Enterprise Security Weekly #61

Enterprise Security Weekly (Video)

Play Episode Listen Later Sep 14, 2017 36:25


Tom Parker is the Group Technology Officer of Accenture Security and a recognized thought leader in the security industry. He’s known for his research in adversary and threat profiling and software vulnerability. Full Show Notes: https://wiki.securityweekly.com/ES_Episode61 Visit http://securityweekly.com/esw for all the latest episodes!

accenture tom parker paul asadoorian accenture security matt alderman enterprise security weekly es episode61 visit
The CyberWire
Influence ops, third-party apps with an appetite for permissions, and criminal competition. Google purges malicious apps from the Play Store. Advice for whistleblowers. Farewell to Becky Bace.

The CyberWire

Play Episode Listen Later Mar 15, 2017 14:19


In today's podcast, we look as influence operations in the UK and in Europe: the former emanate from Russia, the latter from Turkey. Third-party social media apps increase your attack surface. Petya ransomware is stolen and improved by rival crooks. Google purges bad apps from the Play Store. Patch Tuesday notes. A convicted leaker offers some unexpected wisdom for prospective whistleblowers. Lawyers can't figure out the GDPR. US said ready to indict four for the Yahoo! breaches. Emily Wilson from Terbium Labs discusses the effects of high profile breaches on Dark Web markets. Justin Harvey from Accenture Security wonder if private sector attribution is dead. And we bid a respectful farewell to Becky Bace, one of our industry's thought leaders.