Organisation which responds to computer security incidents
POPULARITY
Terwyl Afrika digitale groei omarm, staar dit toenemende bedreigings in die gesig van KI-aangedrewe losprysware, of sagteware wat aanpas om opsporing te ontduik en hoë waarde-stelsels te teiken. Beduidende aanvalle het reeds sektore soos finansies en gesondheidsorg in vele lande getref. In reaksie hierop wend organisasies hulself tot AI-aangedrewe kuberveiligheidsinstrumente om bedreigings vroeg op te spoor. Kenners vra vir sterker beleid, streeksamewerking en innovasie om die kontinent se digitale toekoms te beskerm. 'n Verteenwoordiger van die Namibië Kuberveiligheid Insident Reaksiespan, of NAM-CSIRT, wat anoniem wou bly, het meer.
ALEF Security TalkShow vol. 1 je první natáčení našeho bezpečnostního formátu před živým publikem.Spolu s Janem Kopřivou jsme probrali klíčová témata, která aktuálně hýbou kybernetickou bezpečností.Pozvání přijali:Petr Jirásek – KYBERCENTRUM, KyberSoutěž, KYBER CENA ROKU nebo KyberpohádkyBarbora Vlachová – právní aspekty kybernetické bezpečnostiAdam Kučínský – nový zákon o kybernetické bezpečnosti a související legislativaDiskutujeme:♦️ dopady nového zákona o kybernetické bezpečnosti a jeho aktuální stav♦️ právo a kyberbezpečnost – jak se prolínají a proč právníci patří do bezpečnostních týmů♦️ mládež a kyberbezpečnost v praxi♦️ novinky a události posledních týdnůNatáčeno 8. 4. 2025 na Střední škole informatiky, poštovnictví a finančnictví v Brně.Kapitoly:00:00 Úvod a přivítání diváků07:25 USA: Únik komunikace přes Signal – jak komunikovat citlivé informace?13:50 Petr Jirásek: KYBERCENTRUM, KyberSoutěž, KYBER CENA ROKU a Kyberpohádky28:38 X (Twitter): DDoS útoky, šíření nenávisti a hrozba miliardové pokuty36:15 Barbora Vlachová: Právo v kyberbezpečnosti – jakou roli hrají právníci?52:43 Mezinárodní zásahy proti kyberzločinu + zpráva CSIRT.CZ 202401:00:18 Adam Kučínský: Nový zákon o kybernetické bezpečnosti – stav a zákulisí01:28:01 Řetězení zranitelností a doporučení pro architekty a manažery kybernetické bezpečnosti
Today we discuss the risks and opportunities of AI with Frank Breedijk. Dominic and Frank discuss the biases of AI, whether AI will pose an imminent threat to jobs or not, whether AI usage can be ethical or not, environmental consequences of AI, the rise of scams with AI usage, and much much more!Tune in now!Frank Breedijk is the Chief Information Security Officer (CISO) at Schuberg Philis. In this role he has three objectives, (1) making Schuberg Philis more secure, (2) making our customers more secure, and (3) developing Schuberg Philis' security business. Building relationships with both C-level and deep technical staff is one of his key instruments. In addition, Frank has been part of the Dutch Institute for Vulnerability Disclosure (DIVD) since day two. At DIVD, he started the Cyber Security Incident Response Team (CSIRT) and is currently the Manager of CSIRT. This team is responsible for responsibly informing companies and consumers of vulnerabilities in their infrastructure.Since 14 February 2022, Frank is a founding board member of "Het Nederlands Security Meldpunt" a non-profit organisation that aims to make the country more (cyber-)secure by promoting and facilitating the exchange of information about vulnerabilities, vulnerable configurations, and threat intelligence between trusted parties.He is an experienced public speaker on (cyber-)security related topics and can frequently be heard and seen on various podcasts and conferences.The International Risk Podcast is a weekly podcast for senior executives, board members, and risk advisors. In these podcasts, we speak with experts in a variety of fields to explore international relations. Our host is Dominic Bowen, Head of Strategic Advisory at one of Europe's leading risk consulting firms. Dominic is a regular public and corporate event speaker, and visiting lecturer at several universities. Having spent the last 20 years successfully establishing large and complex operations in the world's highest-risk areas and conflict zones, Dominic now joins you to speak with exciting guests around the world to discuss international risk.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn for all our great updates.Tell us what you liked!
2024. évi LXIX. törvény Magyarország kiberbiztonságáról: https://njt.hu/jogszabaly/2024-69-00-00418/2024. (XII. 23.) Korm. rendelet Magyarország kiberbiztonságáról szóló törvény végrehajtásáról: https://njt.hu/jogszabaly/2024-418-20-22
En este episodio de Amigos TIC, Diana Celis Mora, consejera TIC de Bogotá, nos cuenta cuáles han sido los retos más grandes de asumir la consejería TIC. Además nos cuenta sobre los avances tecnológicos y de conexión que se han implementado por toda la ciudad y el futuro que se avecina. Descubre cómo avanza Bogotá en este interesante episodio. ¡No te lo pierdas!00:00 Amigos Tic 03:33 Diana Celis Mora, consejera TIC de Bogotá05:37 ¿Qué hace la consejería TIC de Bogotá?07:32 ¿Qué es el CSIRT y el SOC?09:12 ¿Qué entidades están más adelantadas en estos temas?10:41 ¿Qué es una ciudad inteligente?11:55 ¿Qué otros campos, además del de ciberseguridad se están desarrollando?15:51 ¿Qué es el laboratorio de innovación pública y que impactos tiene? 17:47 ¿Cómo va la articulación con otras entidades para la búsqueda de la limpieza del sector público?22:20 ¿Qué se está haciendo para incrementar el ecosistema de emprendimientos de Bogotá?23:25 ¿Se está teniendo un diálogo con los alcaldes de las diferentes localidades de la ciudad?26:45 ¿Se tiene contemplada a la población de la tercera edad en la accesibilidad de estas herramientas? 27:47 ¿Para qué usan los ciudadanos las redes Wi-Fi del distrito? 29:25 ¿Qué le sorprendió a la llegada de la consejería? 33:16 ¿Se busca aumentar los trámites digitales o irlos eliminando poco a poco?36:04 ¿Hay posibilidades que estos modelos sean exportados a otros territorios nacionales incluyendo lo que está fuera del casco urbano?39:56 ¿El Metro de Bogotá hará parte de toda esta conectividad digital?42:17 ¿Qué libros lee y qué pódcast escucha?44:14 ¿Se necesita una secretaría TIC en Bogotá?
[INSTRUKCJA UŻYCIA KODU NA TOK FM PREMIUM - NA DOLE OPISU] To absolutna plaga naszych czasów. Im jesteśmy bogatsi i im starsi, tym częściej trafiamy na celownik publikowanych na Facebooku, Instagramie i TikToku reklam prowadzących do oszustw. To już nie setki, lecz tysiące prób, które są wykrywane każdego roku w Polsce. W 2022 r. KNF zgłosił do swojego CSIRT 17 200 fałszywych platform inwestycyjnych, w 2023 już 30 140, a w 2024… ponad 50 tys.! A to wciąż tylko czubek góry lodowej! Dwie najważniejsze kategorie fałszywych reklam to finanse i zdrowie. Obie wyjątkowo szkodliwe. Mechanizm napędzają wizerunki znanych, lubianych, bogatych i szanowanych osób. CERT szacuje, że tylko w Polsce do wyłudzeń wykorzystano wizerunek 139 osób. I co najgorsze - na każdego z nas można znaleźć haczyk. Każdy ma jakąś bolączkę lub marzenie, które można wykorzystać w perfidnym, piętrowym oszustwie, którego wszystkie warstwy są precyzyjnie przemyślane. W ten sposób pani Barbara, bohaterka odcinka, straciła kilkaset tys. zł. A pewien 56-latek z okolic Bydgoszczy - ponad milion złotych! Dlatego w specjalnym, podwójnym odcinku podcastu "Techstorie" pokażemy, jak wielki zasięg mają fałszywe reklamy, ile pieniędzy tracą na nich Polacy, dlaczego tak trudno jest z nimi walczyć i jaka odpowiedzialność spoczywa na wielkich platformach internetowych. GOŚCIE ODCINKA: - Michał Ołowski z Ośrodka Badań nad Bezpieczeństwem Sztucznej Inteligencji w NASK - Mirosław Wróblewski, prezes Urzędu Ochrony Danych Osobowych - pani Barbara*, która padła ofiarą wyrafinowanego, ale bardzo rozpowszechnionego oszustwa (imię zmienione) NA SKRÓTY: 05:11 Inwestycja pani Barbary 18:10 Skala problemu 38:21 Wizerunki celebrytów 43:45 Oszustwo "na Elona" 50:06 Kto i jak trzyma rękę na pulsie 58:03 Mniej niż doba ŹRÓDŁA: Raport roczny CERT o oszustwach w Polsce https://cert.pl/uploads/docs/Raport_CP_2023.pdf O 56-latku, który stracił milion złotych https://policja.pl/pol/aktualnosci/237746,Uwaga-na-oszustwa-internetowe-56-latek-stracil-ponad-milion-zlotych.html O oszustwie w Hiszpanii https://cadenaser.com/aragon/2024/10/10/defraudan-en-zaragoza-mas-de-400000-euros-en-estafas-con-falsos-anuncios-de-famosos-radio-zaragoza/? O oszustwach w Kanadzie https://www.rcmp-grc.gc.ca/en/news/2024/saskatchewan-rcmp-report-34-million-cryptocurrency-fraud-loss-start-year O bolączkach reklam w serwisach społecznościowych https://cert.pl/posts/2024/11/Oszustwa-reklamowe-na-duzych-platformach/ MAMY DLA WAS PREZENT! Koniecznie wysłuchajcie do końca, bo w tym odcinku mamy dla Was kod do TOK FM Premium na aż trzy miesiące! Jak użyć kodu? 1.Zarejestruj konto na tokfm.pl tutaj: tokfm.pl/rejestracja lub zaloguj się jeśli posiadasz konto: tokfm.pl/zaloguj. 2.Aktywuj kod na stronie tokfm.pl/aktywuj 3.Pobierz aplikację mobilną TOK FM z Google Play, AppStore lub AppGallery (tokfm.pl/aplikacja) 4. Zaloguj się w aplikacji TOK FM za pomocą wybranego loginu i hasła.
In questo episodio ho commentato riga per riga un documento di ACN e CSIRT che ripercorre con molta cura tutti gli aspetti più interessanti relativi al ransomware. Sul mio canale YouTube è presente anche il video, per chi volesse seguire il testo del documento.
Guest: Allan Liska, CSIRT at Recorded Future, now part of Mastercard Topics: Ransomware has become a pervasive threat. Could you provide us with a brief overview of the current ransomware landscape? It's often said that ransomware is driven by pure profit. Can you remind us of the business model of ransomware gangs, including how they operate, their organizational structures, and their financial motivations? Ransomware gangs are becoming increasingly aggressive in their extortion tactics. Can you shed some light on these new tactics, such as data leaks, DDoS attacks, and threats to contact victims' customers or partners? What specific challenges and considerations arise when dealing with ransomware in cloud environments, and how can organizations adapt their security strategies to mitigate these risks? What are the key factors to consider when deciding whether or not to pay the ransom? What is the single most important piece of advice you would give to organizations looking to bolster their defenses against ransomware? Resources: Video (LinkedIn, YouTube) 2024 Data Breach Investigations Report EP89 Can We Escape Ransomware by Migrating to the Cloud? EP45 VirusTotal Insights on Ransomware Business and Technology EP29 Future of EDR: Is It Reason-able to Suggest XDR? EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators
¿Cómo proteger tus credenciales de acceso? ¿Cómo se realiza el robo de credenciales y qué son los mercados negros? Estas y otras preguntas las responden Graciela Martínez, Líder del CSIRT de LACNIC y Alfredo Verderosa, Gerente de servicios, en este nuevo episodio de LACNIC Podcast
JPCERT/CCは、サイバーセキュリティ対策活動に特に顕著に貢献した人物や組織に感謝の意を表し、感謝状を贈呈したと発表した。
Deuxième vidéo de cette série... hors-série en collaboration avec l'Ecole de l'Air et de l'Espace ! Cette fois-ci, on se penche sur les initiatives cyber lancées par les régions francaises avec un zoom sur le Campus Cyber et un CSIRT.Les émissions sont enregistrées en live sur Twitch et redifusée sur Youtube avant de devenir des Podcast. Venez assister à l'enregistrement en live ! Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
CSIRT 構築や BCP 策定を進める主体とはあくまで参加企業自身である。だから支援のために訪問してくれる専門家は、おんぶして目的地に連れて行ってくれる人などではなく、体制構築や計画策定のゴールまで「並走してくれる相棒」と考えるのが、この事業の正しいイメージであろう。
Cybersecurity risks aren't just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division's Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI's work developing Computer Security Incident Response Teams (CSIRTs) across the globe.
Negen politieke partijen gingen gisteravond met elkaar in debat voor de Europese verkiezingen. De VVD en de PVV stonden direct lijnrecht tegenover elkaar. Geert Wilders liet zich ondertussen op X fel uit over GL-PvdA. Politiek verslaggever Leendert Beekman duidt de dag. De software die de Rijksoverheid gebruikt voor videovergaderingen kon worden gehackt, meldt demissionair staatssecretaris Van Huffelen van Digitalisering. Door de hack konden verschillende gegevens van bewindslieden worden achterhaald. Volgens Van Huffelen is het 'niet waarschijnlijk' dat dit is gebeurd. Volgens de NOS gaat het om het systeem Webex. Eward Driehuis, voorzitter van CSIRT.global, legt het uit. Het lijkt vooral een diplomatiek onderonsje aan de Franse kust te worden, terwijl wereldleiders in eerste instantie langskomen voor de herdenking van 80 jaar D-Day. President Macron ontvangt Biden, Rutte en ook Zelensky in Normandië, maar de Russen zijn niet welkom bij de plechtigheden. Frankrijk-correspondent Eva Rammeloo rapporteert. Over deze podcast In Ochtendnieuws hoor je in 20 minuten het belangrijkste nieuws van de dag. Abonneer je op de podcast via bnr.nl/ochtendnieuws, de BNR-app, Spotify en Apple Podcasts. Of luister elke werkdag vanaf 06.00 uur live via bnr.nl/live. See omnystudio.com/listener for privacy information.
東京電機大学は5月31日、同学のコンピューターセキュリティインシデント対応チーム「東京電機大学シーサート(TDU- CSIRT)」のFIRSTへの加盟を発表した。
一般社団法人日本シーサート協議会(NCA)は4月17日、ワークショップ「CSIRTのはじめ方 ー そして続けられるように」を5月16日に開催すると発表した。
Em uma empresa, protegendo a segurança da informação, você vai se deparar com diversos problemas além dos hackers. Para ser honesto, é mais provável que você tenha problemas físicos com seus computadores que te levem à uma perda de informações, do que um ataque via rede Internet. Mas nestes casos, você pode contar com um time de "brigadistas" da segurança da informação. Conheça o CSIRT. #FabioSobiecki #BlueTeamAcademy #SegurançadaInformação __________________ Siga minhas redes https://www.youtube.com/@fabiosobiecki https://www.instagram.com/fabiosobiecki https://www.facebook.com/fabiosobieckioficial https://www.tiktok.com/@fabiosobiecki
Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he went through. Breakmaster Cylinder's new album: https://breakmastercylinder.bandcamp.com/album/the-moon-all-that. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit https://flare.io to learn more. Sources https://www.wired.com/story/costa-rica-ransomware-conti/ https://malpedia.caad.fkie.fraunhofer.de/details/win.bandook https://www.youtube.com/watch?v=QHYH0U66K5Q https://www.youtube.com/live/prCr7Z94078 https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/ https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/ Attribution Darknet Diaries is created by Jack Rhysider. Assembled by Tristan Ledger. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify. Learn more about your ad choices. Visit podcastchoices.com/adchoices
One of the most important activities a CISO must perform is presenting high quality presentations to the Board of Directors. Listen and learn from Demetrios Lazarikos (Laz) and G Mark Hardy as they discuss what CISOs are putting in their decks and how best to answer the board's questions. Special thanks to our sponsor Risk3Sixty for supporting this episode. Risk3sixty has created a presentation template that helps you structure your thoughts while telling a compelling story about where you want your security program to go. Download it today for free at: https://risk3sixty.com/whitepaper/security-program-maturity-presentation-template-for-cisos/?utm_source=cisotradecraft&utm_medium=podcast&utm_campaign=2023-ct&utm_term=1week&utm_content=ebook References RSAC ESAF Download: https://www.rsaconference.com/rsac-programs/executive-security-action-forum NACD 2023 Directors Handbook: https://www.nacdonline.org/insights/publications.cfm?ItemNumber=74777 Blue Lava: https://bluelava.io/cybersecurity-board-reporting/ Transcripts: https://docs.google.com/document/d/1juM8MQUEtAZEDp1HpzkPdNw-D11O3ofq Chapters 00:00 Introduction 05:17 The Importance of External Audits in Managing Risk 06:48 How to Help Your Business of Revenue Protection Reduce Risk 11:15 How to be a Successful CISO 12:52 How to Measure the Threat to Your Environment 15:04 How to Prepare for Cyber Threats and Incidents 18:49 The Importance of Understanding the Business's Critical Assets 22:28 OSINT and CSIRT.global Tools and Technologies 25:14 Building a Matrix of Good Intention, Bad Behavior, and Access Management 28:10 How to Create an Incident Response Plan 30:20 How to Keep Your Board of Directors Informed of Cybersecurity Incidents 31:50 How to Keep Track of the Latest Cyber Threats Coming Around the Corner 34:11 How to Achieve Cyber Insurance Coverage 37:06 Cyber Liability Insurance: A Necessary Component of Running Your Business in 2023 39:22 How to Measure the Effectiveness of a Company's Cybersecurity Program 40:54 The Importance of Business Alignment
In this episode, Jack chats with Christopher Witter (aka Witter), Engineering Manager, Detection & Response at Spotify and a founding member and former lead for Crowdstrike's Falcon OverWatch managed hunting service. Witter has nearly two decades of experience in incident response and information security, holding leadership roles on computer security and incident response teams (CSIRT) with both a top five global bank and a top ten defense contractor. During this episode, Witter shares his behind the scenes experiences helping build the Falcon Overwatch Team at Crowdstrike, why it's critical to measure queries in seconds, not minutes, his tips on running highly effective D&R teams at scale, and more! Topics discussed: Witter's experience as one of the first 100 people on the Falcon Overwatch Team at Crowdstrike Why the Overwatch team didn't follow traditional SOC mentalities The various data sources Witter uses to improve accuracy and gather context How D&R is like going to court – telling the story around Who, What, Where, Why, How, to prove beyond a reasonable doubt that this incident happened Why Witter measures in seconds, not minutes and why timescale is critical Why it could be a mistake to choose cybersecurity tools based on financial capability and budget and what criteria should be considered instead Why Witter still believes in custom systems Witter's rule of thumb that if a human does the same thing 10x manually, it should be automated Managing a remote D&R team and building psychological safety Witter's advice for how others can get involved in the D&R community His 3 pieces of advice to build a high-performing D&R team at scale, including a focus on ‘Jack of all trades' people, avoiding distractions, and why it's critical to capture everything to improve search.
Zapraszamy Was dzisiaj na odcinek serii procesowej podkastu Cyber, Cyber…, w którym usłyszycie dyskusję Cypriana Gutkowskiego, Kamila Gapińskiego i Macieja Pyznara na temat projektu dokumentu FIRST o rolach i kompetencjach w zespołach CSIRT. Jest to o tyle wyjątkowe, że do tej pory nie było wielu takich dokumentów, które definiowałaby kompetencje i role dla każdego obszaru. More
Alejandro Bosch nos explica lo que son los Seguros Cyber pero también mucho del entendimiento de por qué es importante para las organizaciones. Una charla que permite entender hacia dónde van estos productos que permiten transferir ciertos riesgos.
¿Te has preguntado por qué no recibes el presupuesto que necesitas para ciberseguridad? ¿Has tenido que presentar ante la alta administración y no te hacen preguntas? Esto y más lo conversamos con Rafael Ramírez de Alba: Los consejeros como los técnicos tienen todavía mucho qué aprender al respecto.
Abogados y especialistas en ciberseguridad somos complementarios, pero pocas veces hablamos del derecho a la ciberseguridad. Anahiby nos comparte desde una pregunta clave: ¿derecho a la ciberseguridad o derecho de la ciberseguridad?
In our latest episode of the Future of Security Operations, Thomas speaks to Corey Hill, Director of Security Operations and Incident Response at Citrix. After working at organizations such as Mandiant and Cisco, in 2020 Corey joined the Citrix team when there were just a small handful of people on the SOC team. Today, the teams Corey leads spread across four countries and are responsible for Detection Engineering, Threat Intelligence, Threat Monitoring, SOAR Automation, and Incident Response (both CSIRT) services at Citrix. Topics in this episode include: Corey's journey that eventually led to his current role at Citrix. How Corey's perspective on security has evolved throughout his career and why there's no security strategy that fits all. Lessons from building multiple SOC teams from scratch. How security operations have evolved. How Corey leverages automation to make his team more efficient and effective. How Citrix prioritizes mental health for everyone who works at the company. Why burnout is inevitable and how to tackle it. Taking away the stigma of being breached and how to respond when it happens. The role mentors have played in Corey's professional success. #1 piece of advice for those who are leading security operations teams. What the future of security operations will look like.
W dzisiejszym odcinku podkastu Cyber, Cyber… gościem specjalnym Mirosława Maja jest Jeffrey Carpenter. Rozmowa odbyła się przy okazji konferencji FIRST w lipcu w Dublinie. O przeszłości, ale i przyszłości cyberbezpieczeństwa. Jak wyglądały początki CSIRT-ów? Usłyszycie o budowaniu zdolności do reagowania na incydenty, ale także o tym, od jakich profesji powinni się uczyć eksperci od cyberbezpieczeństwa. Zapraszamy! More
La estrategia del Engaño o Deception inició hace algunos años con las honeypots, pero ahora ha evolucionado a unos niveles muy interesantes. Juan Carlos Vázquez nos comparte esta estrategia y cómo implementarla dentro de las organizaciones.
Es impresionante como en cada país se dice que es donde más se cometen delitos informáticos, pero en el caso de Brasil es un tema diferente. Con esta charla vemos una perspectiva que tiene que ver con una historia tecnológica y cómo ha afectado o beneficiado a este país. Un gusto tener a Domingo con nosotros en el pódcast.
¿Te has preguntado si todavía puedes cambiar de especialización en Ciberseguridad? ¿Realmente falta talento? Todo esto lo platicamos con Federico Pacheco y lo que deberíamos hacer tanto los profesionales como las empresas.
Carlos Seisdedos es un especialista que viene de Inteligencia y que se ha especializado en OSINT. Conversamos con él de hacia dónde va esta disciplina y lo importante que es el generar una inteligencia colectiva.
Conversamos con Pilar Ramírez de ICMEC sobre esta gran problemática y lo que podemos hacer desde la perspectiva de los especialistas de ciberseguridad e investigaciones digitales.El abuso, la revictimización y los derechos humanos requieren de un trabajo interdisciplinario como nunca antes.
Vulnerabilities are discovered every day. Once found, they make their way into any number of databases that can be used to help organizations take action to put a patch in place... if one is available. But what about the case where the weakness is actively exposed or being exploited? This is where CSIRT.global comes in.Born from the work being done at the Dutch International for Vulnerability Disclosure (DIVD), a team of volunteers have decided to take things to the next level, helping organizations take action when action matters most ... when a vulnerability exists, when that vulnerability is being exploited in the wild, and when an organization is prone to (or is under) attack. That's when the email is sent from CSITR.global to the affected organization, letting them know what the team uncovered."We don't send marketing emails. We don't send emails promoting conferences. When a company gets an email from us, it really means something.” ~EwardThere's a lot going on in this process, from scanning the entire global Internet for every system exposed, identifying vulnerabilities on those systems, and mapping the proof of concept to those two results to determine whether or not an organization is vulnerable or is showing signs of having been compromised. The next piece of the puzzle is figuring out who or what is behind the IP address that was scanned and flagged. This isn't always easy given how IP addresses are assigned and looked up. The next piece of the puzzle is even harder, in that CSIRT.global needs to find a way to contact the affected entity that lives behind the IP address ... which department or person should receive the info and what is their email address? Good luck finding that in a pinch. And, to top it all off, the receiving party needs to trust that the email they received from CSIRT.gloal is both legitimate and must be taken seriously. The process is rooted in information and built on trust - which is one of the main reasons they sought and receive support from the Dutch government.It's this full circle scenario that delivers the real value provided by this group. It can scale to a global nature, but requires the help of the global community. Listen in to hear more about how this works, how to get involved, and how this non-profit organization is redefining cybersecurity.____________________________GuestsEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huisLennaert OudshoornCSIRT Coordinator And Webmaster at Dutch Institute for Vulnerability Disclosure (DIVD) [@DIVDnl]On Twitter | https://twitter.com/lennaert89On LinkedIn | https://www.linkedin.com/in/lennaertoudshoorn/____________________________This Episode's SponsorsAsgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vcHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesCSIRT.global: https://csirt.global/ & https://www.divd.nl/DIVD: https://www.divd.nl/ and on LinkedIn: https://www.linkedin.com/company/divd-nl/May Contain Hackers (MCH2022) Hacker Conference: https://mch2022.org/#/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?
Vulnerabilities are discovered every day. Once found, they make their way into any number of databases that can be used to help organizations take action to put a patch in place... if one is available. But what about the case where the weakness is actively exposed or being exploited? This is where CSIRT.global comes in.Born from the work being done at the Dutch International for Vulnerability Disclosure (DIVD), a team of volunteers have decided to take things to the next level, helping organizations take action when action matters most ... when a vulnerability exists, when that vulnerability is being exploited in the wild, and when an organization is prone to (or is under) attack. That's when the email is sent from CSITR.global to the affected organization, letting them know what the team uncovered."We don't send marketing emails. We don't send emails promoting conferences. When a company gets an email from us, it really means something.” ~EwardThere's a lot going on in this process, from scanning the entire global Internet for every system exposed, identifying vulnerabilities on those systems, and mapping the proof of concept to those two results to determine whether or not an organization is vulnerable or is showing signs of having been compromised. The next piece of the puzzle is figuring out who or what is behind the IP address that was scanned and flagged. This isn't always easy given how IP addresses are assigned and looked up. The next piece of the puzzle is even harder, in that CSIRT.global needs to find a way to contact the affected entity that lives behind the IP address ... which department or person should receive the info and what is their email address? Good luck finding that in a pinch. And, to top it all off, the receiving party needs to trust that the email they received from CSIRT.gloal is both legitimate and must be taken seriously. The process is rooted in information and built on trust - which is one of the main reasons they sought and receive support from the Dutch government.It's this full circle scenario that delivers the real value provided by this group. It can scale to a global nature, but requires the help of the global community. Listen in to hear more about how this works, how to get involved, and how this non-profit organization is redefining cybersecurity.____________________________GuestsEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huisLennaert OudshoornCSIRT Coordinator And Webmaster at Dutch Institute for Vulnerability Disclosure (DIVD) [@DIVDnl]On Twitter | https://twitter.com/lennaert89On LinkedIn | https://www.linkedin.com/in/lennaertoudshoorn/____________________________This Episode's SponsorsAsgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vcHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesCSIRT.global: https://csirt.global/ & https://www.divd.nl/DIVD: https://www.divd.nl/ and on LinkedIn: https://www.linkedin.com/company/divd-nl/May Contain Hackers (MCH2022) Hacker Conference: https://mch2022.org/#/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?
En este episodio platicamos con Martín Vigo sobre el Blue Teaming y las diferencias entre los diferentes servicios de "hackeo". Busquen el pódcast de noticias de ciberseguridad Tierra de Hackers en sus plataformas.
Aké škody kybernetickí zločinci napáchali na Slovensku a stalo sa Rusko ihriskom pre hackerov z celého sveta? Dokážu dezinformácie ovplyvniť vojnu a ako Facebook odhaľuje hoaxy? O týchto aj ďalších aktuálnych témach na festivale Pohoda 2022 diskutovali bývalý šéf vládnej jednotky CSIRT.SK pre riešenie kybernetických bezpečnostných incidentov Lukáš Hlavička, poradca ministra obrany pre oblasť hybridných hrozieb Victor Breiner a fact-checker hľadajúci nepravdy na Facebooku Robert Barca. Moderátorom diskusie bol zástupca šéfredaktora Živé.sk Ján Trangel.
We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.*Threat intelligence**Development processes**Cyber security M&A market**Sales**Marketing messaging**Cyber law**Standards*Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.____________________________GuestEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huis____________________________This Episode's SponsorsHITRUST:
We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.*Threat intelligence**Development processes**Cyber security M&A market**Sales**Marketing messaging**Cyber law**Standards*Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.____________________________GuestEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huis____________________________This Episode's SponsorsHITRUST:
Constantino es una persona especialista en blockchain / cadena de bloques. Conversamos sobre la ciberseguridad de la cadena de bloques, de si realmente las operaciones en la cadena son anónimas.
La experiencia de Katherina en el CSIRT de Gobierno de Chile permite identificar muchas áreas de oportunidad así como la relación que debemos tener entre el sector privado y los CERTs o CSIRTs de gobierno. Tenemos mucho por qué trabajar de la mano.
Pocas veces pensamos en la interacción entre Prevención de Fraudes y Ciberseguridad; y menos de la posibilidad de tener un área de Prevención de Fraudes en organizaciones que no son del sector financiero. Platicamos con el especialista Gabriel Díaz al respecto.
¿Te has preguntado si lo que conoces de ciberseguridad se puede aplicar directamente a IoT y OT? Inclusive, ¿qué es OT? Platicamos con el master Claudio Caracciolo al respecto.
En este episodio Jonathan Garzón nos habla de qué es realmente Open Banking y cómo puede ser un tema la ciberseguridad.
Siempre hablamos de qué tiene que hacer un CISO para ahora hablar de qué es y qué no es un CISO.
This month, Chris Hadnagy and Ryan MacDougall are joined by Patrick Laverty. Patrick is the Senior Team Lead at Social Engineer, LLC, working with an incredible team of professional social engineers. He was previously a senior penetration tester at Rapid7 and a member of the CSIRT at Akamai. He is a co-organizer of the Layer 8 Conference and is the host of the Layer 8 Podcast on social engineering and OSINT. He lives in Rhode Island with his daughter, dog and two cats. [April 18, 2022] 00:00 – Intro 00:50 – Patrick Laverty intro https://layer8conference.com 02:19 – Intro Links Social-Engineer.com Managed Voice Phishing Managed Email Phishing Adversarial Simulations Social-Engineer channel on SLACK CLUTCH innocentlivesfoundation.org 04:38 – Security Awareness in the world today 05:25 – Malicious Domain Registrations 06:58 – Protecting yourself from false domains 11:24 – CISA Alert / Shields Up 12:36 – Lowering Reporting Thresholds 13:33 – Empowering Security Information Officers 16:50 – Tabletop Exercises 19:20 – Planning for Continuity 21:09 – Beyond the Financial Effects of Ransomware 24:29 – Trying to protect the Healthcare Sector 25:27 – Backup & Recovery Process 28:38 – The source of Ransomware 30:03 – Planning for a Ransomware attack 31:51 – Why your site will be attacked 33:41 – 3 Actionable Tips 35:30 – Book Recommendations Thinking, Fast and Slow– Daniel Kahneman How to Win Friends & Influence People– Dale Carnegie Delivered from Distraction – John Ratey Fixed – Amy Herman Going Pro – Dr Tony Kern 38:20 – Wrap Up 39:18 – Outro www.social-engineer.com www.innocentlivesfoundation.org
Conversamos con la abogada Dafne Méndez @DaFneMendez para analizar los casos de Estafa del CEO y sus implicaciones legales. La tesis que nos comentó se encuentra aquí: https://sjf2.scjn.gob.mx/detalle/tesis/2023157
The REvil ransomware gang's attack against the US software company Kaseya in 2021 is not only amongst the largest ransomware attacks of all time, but it's also one of the most intriguing. It involves the use of zero-day software vulnerabilities known only to a handful of people, a race between attackers trying to snare ransom payments and defenders developing a patch, and a secret operation that hacked back against the REvil hackers. And in the end, a rare action happened: Someone was actually arrested. This episode of The Ransomware Files also coincides with the release of new technical information from the Dutch Institute for Vulnerability Disclosure about the software vulnerabilities that were exploited by the ransomware gang. The information, which describes the vulnerabilities in Kaseya's Virtual Systems Administrator software, can be found on DIVD's website. Speakers: Robert Cioffe, Founder, Progressive Computing; Frank Breedijk, Manager, CSIRT, DIVD; Victor Gevers, Chairman, DIVD; Jason Manar, Chief Information Security Officer, Kaseya; Jon DiMaggio, Chief Security Strategist, Analyst1; John Hammond, Senior Security Researcher, Huntress; Espen Johansen, Security Director, Visma Group; Adrian Stanila, Senior Information Security Researcher, Visma Group; George Zamfir, Security Analyst, Visma Group; Jeremy Kirk, Executive Editor, Information Security Media Group. Sources and the transcript for this episode are here. Production Coordinator: Rashmi Ramesh The Ransomware Files theme song by Chris Gilbert/© Ordinary Weirdos Music Music by Uppbeat and Podcastmusic.com Follow The Ransomware Files on Twitter: @ransomwarefiles Follow The Ransomware Files on Instagram: @theransomwarefiles
Alonso se ha dedicado a evangelizar en temas de hacking y forense desde hace muchos años, con él platicamos sobre cómo han cambiado y algunas recomendaciones que tiene para los que quieren iniciarse en estos temas.
On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion. Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://anchor.fm/amplifiedandintensified/support
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.Allan Liskahttps://www.linkedin.com/in/allan2/https://twitter.com/uuallanhttps://recordedfuture.comEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://anchor.fm/amplifiedandintensified/support