Podcasts about bsides nashville

  • 4PODCASTS
  • 11EPISODES
  • 29mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 16, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about bsides nashville

Latest podcast episodes about bsides nashville

The Virtual CISO Moment
S6E29 - Special - Challenges and Opportunities in Small and Midsized Business Information Security - BSides Nashville 2024

The Virtual CISO Moment

Play Episode Listen Later May 16, 2024 47:28


Challenges and Opportunities in Small and Midsized Business Information Security - a special episode, recorded at BSides Nashville May 11, 2024. --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message

The Virtual CISO Moment
Cybersecurity Quick Strike - April 17, 2023

The Virtual CISO Moment

Play Episode Listen Later Apr 17, 2023 18:11


LockBit targets MacOS,China exploits Android bug, urgent Chrome update, LinkedIn ID verification, and Juice Jacking back in the news,but why. Plus today's lists – we have two – top 5 cybersecurity risks every business should know and 4 things you should never do while chatting with ChatGPT, an extended version of the “So you want to be an infosec consultant” presentation at BSides Nashville and SE cyber summit dropping this afternoon, the 2023 recipient of the vCISO Services scholarship, and today's shout out. https://securityaffairs.com/144879/cyber-crime/lockbit-encryptor-targets-macos.html https://www.bleepingcomputer.com/news/security/cisa-warns-of-android-bug-exploited-by-chinese-app-to-spy-on-users/ https://thehackernews.com/2023/04/google-releases-urgent-chrome-update-to.html https://www.scmagazine.com/news/identity-and-access/linkedin-deploys-new-secure-identity-verification-for-all-members https://krebsonsecurity.com/2023/04/why-is-juice-jacking-suddenly-back-in-the-news/ https://physicochemics.com/what-are-cybersecurity-risks-their-management/ https://bgr.com/tech/4-things-you-should-never-do-while-chatting-with-chatgpt/ https://www.linkedin.com/in/ereny-nagib-07a3a01b7/ https://youtube.com/@vciso https://www.linkedin.com/in/markwdebry/ --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message

Brakeing Down Security Podcast
2019-015-Kevin_johnson-incident_response_aftermath

Brakeing Down Security Podcast

Play Episode Listen Later Apr 21, 2019 84:27


Announcements: https://www.workshopcon.com/     SpecterOps (red Team operations) and Tim Tomes (PWAPT)   Bsides Nashville   https://blog.secureideas.com/2019/04/we-take-security-seriously-and-other-trite-statements.html   “We take security seriously and other trite statements“   Wordpress infrastructure (supply chain failure)     WordPress plugin called Woocommerce was at fault.     Vuln late last year: https://www.bleepingcomputer.com/news/security/wordpress-design-flaw-woocommerce-vulnerability-leads-to-site-takeover/     “According to new research by Simon Scannell, a researcher for PHP Security firm RIPS Tech, when WooCommerce is installed it will create a Shop Manager role that has the "edit_users" WordPress capability/permission. This capability allows users to edit ANY WordPress user, including the Administrator account.”   “https://blog.ripstech.com/2018/wordpress-design-flaw-leads-to-woocommerce-rce/”   You (Kevin) discovered the admin accounts, but could not remove them. Was that when you considered this an ‘incident’?   Timeline:“[2019-03-22 09:03 EST] Kevin assigns members of the Secure Ideas team with reconnaissance and mapping of the AoM system. Kevin reminds these members that Secure Ideas doesn’t have permission to test AoM. They are advised not to do anything that could harm the AoM’s production environment.”     What is the line they should not cross in this case?   You did not have access to logs, you asked that an audit plugin be installed to be able to view logs. Is that permanent, and why did they not allow access to logs prior to?   [2019-03-22 13:11 EST] AoM Support fixes the audit log plugin access. AoM Support has found that a purchase of a course through a Woocommerce plugin resulted in users being granted admin access. AoM Support provides specific order numbers. They have also done an analysis of the database backups from the last 60 days and believe that the attackers did not do anything after they got access. AoM Support announces that the Secure Ideas training site will be set up on a separate server and Secure Ideas will be granted a new level of access.   Seems like working with AoM wasn’t difficult. Was giving you access to your own instance, and allowing you to administer it a big deal for them?   Lessons Learned? Anything you’d do differently next time?     Update IR plan?     Did they reach out for additional testing?     Did the people who got admin get removed?     Consult with AoM on better security implementation? Your env wasn’t damaged, but did they suffer issues with other customers? *answered*   https://www.wordfence.com/   https://en.wikipedia.org/wiki/Gremlins   Gas Station skimmer video - https://www.facebook.com/michellepedraza.journalist/videos/2135141863465247/   https://www.helpnetsecurity.com/2019/04/12/cybersecurity-incident-response-plan/ https://www.guardicore.com/2018/11/security-incident-response-plan/   https://www.zdnet.com/article/security-risks-of-multi-tenancy/   Upcoming SI events IANS forum (Wash DC) ShowmeCon Webcasts ISC2 security Congress (Wash DC)   Patreon Slack Twitter handles iTunes Google   Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel:  http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site:  https://brakesec.com/bdswebsite #iHeartRadio App:  https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec  

Exploring Information Security - Timothy De Block

This isn’t the easiest thing to do. Now that I’m writing the podcast post after recording and editing the podcast, I have a sense of relief. For the last month plus, I’ve tried to decide whether or not to shut down the podcast. The fact that it took this long to record a final episode tells me that it was time. I wrote about my reasoning in a blog post on the main page. This may or may not be the end. That largely depends on if someone would like to pick up the podcast and produce it themselves. I’d love to guide and mentor someone on the journey. The podcast has been beneficial to me and the many people who have reached out providing appreciative feedback. I’d love to see it continue. I’m also content that this is the end of the podcast. I will be at BSides Nashville shooting pictures and very likely be at DEFCON manning the Social Engineering door. Come see high or reach out to me on social media (@TimothyDeBlock) or email (timothy[.]deblock[@]gmail[.]com).

Exploring Information Security - Timothy De Block
Why social skills are important - part 3

Exploring Information Security - Timothy De Block

Play Episode Listen Later Jun 11, 2017 21:19


Johnny (@J0hnnyXm4s) has presented talks and performed training on the topic of social skills at various conferences. He told me it's the topic he gets the most feedback on from people in attendance. I was first introduced to one of Johnny's talks at BSides Nashville 2015. He was presenting on networking with people at conferences. Which I immediately identified with. I was there shooting pictures, because it was an easy way to meet people at conferences. Social skills are important in organizations, because it allows us to build better relationships with people to improve security. It's a topic that Johnny can talk about for hours (as evident by this three-part series).

social social skills bsides nashville johnny j0hnnyxm4s
Exploring Information Security - Timothy De Block
Why social skills are important - part 2

Exploring Information Security - Timothy De Block

Play Episode Listen Later Jun 4, 2017 19:55


Johnny (@J0hnnyXm4s) has presented talks and performed training on the topic of social skills at various conferences. He told me it's the topic he gets the most feedback on from people in attendance. I was first introduced to one of Johnny's talks at BSides Nashville 2015. He was presenting on networking with people at conferences. Which I immediately identified with. I was there shooting pictures, because it was an easy way to meet people at conferences. Social skills are important in organizations, because it allows us to build better relationships with people to improve security. It's a topic that Johnny can talk about for hours (as evident by this three-part series).

social social skills bsides nashville johnny j0hnnyxm4s
Exploring Information Security - Timothy De Block
Why social skills are important - part 1

Exploring Information Security - Timothy De Block

Play Episode Listen Later May 28, 2017 25:31


Johnny (@J0hnnyXm4s) has presented talks and performed training on the topic of social skills at various conferences. He told me it's the topic he gets the most feedback on from people in attendance. I was first introduced to one of Johnny's talks at BSides Nashville 2015. He was presenting on networking with people at conferences. Which I immediately identified with. I was there shooting pictures, because it was an easy way to meet people at conferences. Social skills are important in organizations, because it allows us to build better relationships with people to improve security. It's a topic that Johnny can talk about for hours (as evident by this three-part series).

social social skills bsides nashville johnny j0hnnyxm4s
Exploring Information Security - Timothy De Block

BSides Nashville (@bsidesnash) is the second BSides I attended and the only one I've attend each year since it's inception. It's a really well put together conference. They have three tracks. They have the usual side areas with lock picking, hardware hacking, and a kids area. The best part though is the lunch. They cater lunch from Martin's BBQ. One of Nashville's best BBQ places. I would put the food up against any conference. I join Jen (@jsmardak) and Finn (@FinnBreland) to talk about all that and much more.

nashville bbq b sides bsides nashville
Exploring Information Security Archive 1
How to network in information security - part 2

Exploring Information Security Archive 1

Play Episode Listen Later Nov 16, 2015 14:51


Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One of Johnny's more recent talks is titled "That's not my RJ45 Jack" which covers, among other topics, how to interact with people. I saw this talk in April when I went to BSides Nashville and it has a lot of good information that can be applied to networking with people in general. In part two we discuss resources for getting better at networking.

united states network iceland information security bsides nashville johnny j0hnnyxm4s
Exploring Information Security Archive 1
How to network in information security - part 1

Exploring Information Security Archive 1

Play Episode Listen Later Nov 9, 2015 17:11


Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One of Johnny's more recent talks is titled "That's not my RJ45 Jack" which covers, among other topics, how to interact with people. I saw this talk in April when I went to BSides Nashville and it has a lot of good information that can be applied to networking with people in general.

united states network iceland information security bsides nashville johnny j0hnnyxm4s
Exploring Information Security Archive 1
How to organize an information security conference

Exploring Information Security Archive 1

Play Episode Listen Later Aug 3, 2015 32:21


Ed Rojas is a Master Consultant for HP Enterprise Security and the creator of Security Zone information security conference in Columbia and the organizer of the BSides Nashville security conference. I had the pleasure of attending BSides Nashville this year and got the opportunity to snap a few pictures. Ed was a very accommodating and passionate host for the event. In this interview Ed talks about: the first step to organizing a security conference; time and effort it requires; picking the right date; challenges; mistakes and more.

columbia organize information security security conference bsides nashville hp enterprise security