Podcasts about csirt

Organisation which responds to computer security incidents

  • 54PODCASTS
  • 140EPISODES
  • 32mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Apr 15, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about csirt

Latest podcast episodes about csirt

Nuus
Afrika moet regmaak vir KI-losprysware: NAM-CSIRT

Nuus

Play Episode Listen Later Apr 15, 2025 0:40


Terwyl Afrika digitale groei omarm, staar dit toenemende bedreigings in die gesig van KI-aangedrewe losprysware, of sagteware wat aanpas om opsporing te ontduik en hoë waarde-stelsels te teiken. Beduidende aanvalle het reeds sektore soos finansies en gesondheidsorg in vele lande getref. In reaksie hierop wend organisasies hulself tot AI-aangedrewe kuberveiligheidsinstrumente om bedreigings vroeg op te spoor. Kenners vra vir sterker beleid, streeksamewerking en innovasie om die kontinent se digitale toekoms te beskerm. 'n Verteenwoordiger van die Namibië Kuberveiligheid Insident Reaksiespan, of NAM-CSIRT, wat anoniem wou bly, het meer.

ALEF SecurityCast
ALEF SECURITY TALKSHOW VOL.1

ALEF SecurityCast

Play Episode Listen Later Apr 13, 2025 95:35


ALEF Security TalkShow vol. 1 je první natáčení našeho bezpečnostního formátu před živým publikem.Spolu s Janem Kopřivou jsme probrali klíčová témata, která aktuálně hýbou kybernetickou bezpečností.Pozvání přijali:Petr Jirásek – KYBERCENTRUM, KyberSoutěž, KYBER CENA ROKU nebo KyberpohádkyBarbora Vlachová – právní aspekty kybernetické bezpečnostiAdam Kučínský – nový zákon o kybernetické bezpečnosti a související legislativaDiskutujeme:♦️ dopady nového zákona o kybernetické bezpečnosti a jeho aktuální stav♦️ právo a kyberbezpečnost – jak se prolínají a proč právníci patří do bezpečnostních týmů♦️ mládež a kyberbezpečnost v praxi♦️ novinky a události posledních týdnůNatáčeno 8. 4. 2025 na Střední škole informatiky, poštovnictví a finančnictví v Brně.Kapitoly:00:00 Úvod a přivítání diváků07:25 USA: Únik komunikace přes Signal – jak komunikovat citlivé informace?13:50 Petr Jirásek: KYBERCENTRUM, KyberSoutěž, KYBER CENA ROKU a Kyberpohádky28:38 X (Twitter): DDoS útoky, šíření nenávisti a hrozba miliardové pokuty36:15 Barbora Vlachová: Právo v kyberbezpečnosti – jakou roli hrají právníci?52:43 Mezinárodní zásahy proti kyberzločinu + zpráva CSIRT.CZ 202401:00:18 Adam Kučínský: Nový zákon o kybernetické bezpečnosti – stav a zákulisí01:28:01 Řetězení zranitelností a doporučení pro architekty a manažery kybernetické bezpečnosti

The International Risk Podcast
Episode 217: The Risks and Opportunities of AI with Frank Breedijk

The International Risk Podcast

Play Episode Listen Later Mar 24, 2025 35:16


Today we discuss the risks and opportunities of AI with Frank Breedijk. Dominic and Frank discuss the biases of AI, whether AI will pose an imminent threat to jobs or not, whether AI usage can be ethical or not, environmental consequences of AI, the rise of scams with AI usage, and much much more!Tune in now!Frank Breedijk is the Chief Information Security Officer (CISO) at Schuberg Philis. In this role he has three objectives, (1) making Schuberg Philis more secure, (2) making our customers more secure, and (3) developing Schuberg Philis' security business. Building relationships with both C-level and deep technical staff is one of his key instruments. In addition, Frank has been part of the Dutch Institute for Vulnerability Disclosure (DIVD) since day two. At DIVD, he started the Cyber Security Incident Response Team (CSIRT) and is currently the Manager of CSIRT. This team is responsible for responsibly informing companies and consumers of vulnerabilities in their infrastructure.Since 14 February 2022, Frank is a founding board member of "Het Nederlands Security Meldpunt" a non-profit organisation that aims to make the country more (cyber-)secure by promoting and facilitating the exchange of information about vulnerabilities, vulnerable configurations, and threat intelligence between trusted parties.He is an experienced public speaker on (cyber-)security related topics and can frequently be heard and seen on various podcasts and conferences.The International Risk Podcast is a weekly podcast for senior executives, board members, and risk advisors. In these podcasts, we speak with experts in a variety of fields to explore international relations. Our host is Dominic Bowen, Head of Strategic Advisory at one of Europe's leading risk consulting firms. Dominic is a regular public and corporate event speaker, and visiting lecturer at several universities. Having spent the last 20 years successfully establishing large and complex operations in the world's highest-risk areas and conflict zones, Dominic now joins you to speak with exciting guests around the world to discuss international risk.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn for all our great updates.Tell us what you liked!

Kibertámadás!
Miként csillog a CSIRT az új törvény fényében? [házunk tája]

Kibertámadás!

Play Episode Listen Later Mar 21, 2025 31:38


2024. évi LXIX. törvény Magyarország kiberbiztonságáról: https://njt.hu/jogszabaly/2024-69-00-00418/2024. (XII. 23.) Korm. rendelet Magyarország kiberbiztonságáról szóló törvény végrehajtásáról: https://njt.hu/jogszabaly/2024-418-20-22

Amigos TIC
Bogotá, más digital

Amigos TIC

Play Episode Listen Later Jan 31, 2025 47:06


En este episodio de Amigos TIC, Diana Celis Mora, consejera TIC de Bogotá, nos cuenta cuáles han sido los retos más grandes de asumir la consejería TIC. Además nos cuenta sobre los avances tecnológicos y de conexión que se han implementado por toda la ciudad y el futuro que se avecina. Descubre cómo avanza Bogotá en este interesante episodio. ¡No te lo pierdas!00:00     Amigos Tic 03:33     Diana Celis Mora, consejera TIC de Bogotá05:37     ¿Qué hace la consejería TIC de Bogotá?07:32     ¿Qué es el CSIRT y el SOC?09:12     ¿Qué entidades están más adelantadas en estos temas?10:41     ¿Qué es una ciudad inteligente?11:55     ¿Qué otros campos, además del de ciberseguridad se están desarrollando?15:51     ¿Qué es el laboratorio de innovación pública y que impactos tiene? 17:47     ¿Cómo va la articulación con otras entidades para la búsqueda de la limpieza del sector público?22:20     ¿Qué se está haciendo para incrementar el ecosistema de emprendimientos de Bogotá?23:25     ¿Se está teniendo un diálogo con los alcaldes de las diferentes localidades de la ciudad?26:45     ¿Se tiene contemplada a la población de la tercera edad en la accesibilidad de estas herramientas? 27:47     ¿Para qué usan los ciudadanos las redes Wi-Fi del distrito? 29:25     ¿Qué le sorprendió a la llegada de la consejería? 33:16     ¿Se busca aumentar los trámites digitales o irlos eliminando poco a poco?36:04     ¿Hay posibilidades que estos modelos sean exportados a otros territorios nacionales incluyendo lo que está fuera del casco urbano?39:56     ¿El Metro de Bogotá hará parte de toda esta conectividad digital?42:17     ¿Qué libros lee y qué pódcast escucha?44:14     ¿Se necesita una secretaría TIC en Bogotá?

Techstorie - rozmowy o technologiach
109# Oni kradną, Meta patrzy. Tak działają "oszustwa na celebrytów" [część 1]

Techstorie - rozmowy o technologiach

Play Episode Listen Later Jan 28, 2025 73:49


[INSTRUKCJA UŻYCIA KODU NA TOK FM PREMIUM - NA DOLE OPISU] To absolutna plaga naszych czasów. Im jesteśmy bogatsi i im starsi, tym częściej trafiamy na celownik publikowanych na Facebooku, Instagramie i TikToku reklam prowadzących do oszustw. To już nie setki, lecz tysiące prób, które są wykrywane każdego roku w Polsce. W 2022 r. KNF zgłosił do swojego CSIRT 17 200 fałszywych platform inwestycyjnych, w 2023 już 30 140, a w 2024… ponad 50 tys.! A to wciąż tylko czubek góry lodowej! Dwie najważniejsze kategorie fałszywych reklam to finanse i zdrowie. Obie wyjątkowo szkodliwe. Mechanizm napędzają wizerunki znanych, lubianych, bogatych i szanowanych osób. CERT szacuje, że tylko w Polsce do wyłudzeń wykorzystano wizerunek 139 osób. I co najgorsze - na każdego z nas można znaleźć haczyk. Każdy ma jakąś bolączkę lub marzenie, które można wykorzystać w perfidnym, piętrowym oszustwie, którego wszystkie warstwy są precyzyjnie przemyślane. W ten sposób pani Barbara, bohaterka odcinka, straciła kilkaset tys. zł. A pewien 56-latek z okolic Bydgoszczy - ponad milion złotych! Dlatego w specjalnym, podwójnym odcinku podcastu "Techstorie" pokażemy, jak wielki zasięg mają fałszywe reklamy, ile pieniędzy tracą na nich Polacy, dlaczego tak trudno jest z nimi walczyć i jaka odpowiedzialność spoczywa na wielkich platformach internetowych. GOŚCIE ODCINKA: - Michał Ołowski z Ośrodka Badań nad Bezpieczeństwem Sztucznej Inteligencji w NASK - Mirosław Wróblewski, prezes Urzędu Ochrony Danych Osobowych - pani Barbara*, która padła ofiarą wyrafinowanego, ale bardzo rozpowszechnionego oszustwa (imię zmienione) NA SKRÓTY: 05:11 Inwestycja pani Barbary 18:10 Skala problemu 38:21 Wizerunki celebrytów 43:45 Oszustwo "na Elona" 50:06 Kto i jak trzyma rękę na pulsie 58:03 Mniej niż doba ŹRÓDŁA: Raport roczny CERT o oszustwach w Polsce https://cert.pl/uploads/docs/Raport_CP_2023.pdf O 56-latku, który stracił milion złotych https://policja.pl/pol/aktualnosci/237746,Uwaga-na-oszustwa-internetowe-56-latek-stracil-ponad-milion-zlotych.html O oszustwie w Hiszpanii https://cadenaser.com/aragon/2024/10/10/defraudan-en-zaragoza-mas-de-400000-euros-en-estafas-con-falsos-anuncios-de-famosos-radio-zaragoza/? O oszustwach w Kanadzie https://www.rcmp-grc.gc.ca/en/news/2024/saskatchewan-rcmp-report-34-million-cryptocurrency-fraud-loss-start-year O bolączkach reklam w serwisach społecznościowych https://cert.pl/posts/2024/11/Oszustwa-reklamowe-na-duzych-platformach/ MAMY DLA WAS PREZENT! Koniecznie wysłuchajcie do końca, bo w tym odcinku mamy dla Was kod do TOK FM Premium na aż trzy miesiące! Jak użyć kodu? 1.Zarejestruj konto na tokfm.pl tutaj: tokfm.pl/rejestracja lub zaloguj się jeśli posiadasz konto: tokfm.pl/zaloguj. 2.Aktywuj kod na stronie tokfm.pl/aktywuj 3.Pobierz aplikację mobilną TOK FM z Google Play, AppStore lub AppGallery (tokfm.pl/aplikacja) 4. Zaloguj się w aplikacji TOK FM za pomocą wybranego loginu i hasła.

Zero Days
Tutto sul ransomware: il commento riga per riga del documento ACN/CSIRT (solo audio)

Zero Days

Play Episode Listen Later Jan 19, 2025 74:11


In questo episodio ho commentato riga per riga un documento di ACN e CSIRT che ripercorre con molta cura tutti gli aspetti più interessanti relativi al ransomware. Sul mio canale YouTube è presente anche il video, per chi volesse seguire il testo del documento.

Cloud Security Podcast by Google
EP206 Paying the Price: Ransomware's Rising Stakes in the Cloud

Cloud Security Podcast by Google

Play Episode Listen Later Jan 13, 2025 33:01


Guest: Allan Liska, CSIRT at Recorded Future, now part of Mastercard  Topics: Ransomware has become a pervasive threat. Could you provide us with a brief overview of the current ransomware landscape? It's often said that ransomware is driven by pure profit. Can you remind us of  the business model of ransomware gangs, including how they operate, their organizational structures, and their financial motivations? Ransomware gangs are becoming increasingly aggressive in their extortion tactics. Can you shed some light on these new tactics, such as data leaks, DDoS attacks, and threats to contact victims' customers or partners? What specific challenges and considerations arise when dealing with ransomware in cloud environments, and how can organizations adapt their security strategies to mitigate these risks? What are the key factors to consider when deciding whether or not to pay the ransom? What is the single most important piece of advice you would give to organizations looking to bolster their defenses against ransomware?  Resources: Video (LinkedIn, YouTube) 2024 Data Breach Investigations Report EP89 Can We Escape Ransomware by Migrating to the Cloud? EP45 VirusTotal Insights on Ransomware Business and Technology EP29 Future of EDR: Is It Reason-able to Suggest XDR? EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators

LACNIC Podcast
La importancia de proteger tus credenciales de acceso

LACNIC Podcast

Play Episode Listen Later Nov 5, 2024 16:25


¿Cómo proteger tus credenciales de acceso? ¿Cómo se realiza el robo de credenciales y qué son los mercados negros? Estas y otras preguntas las responden Graciela Martínez, Líder del CSIRT de LACNIC y Alfredo Verderosa, Gerente de servicios, en este nuevo episodio de LACNIC Podcast

ScanNetSecurity 最新セキュリティ情報
JPCERT/CC が朝日新聞CSIRT、ノースグリッド、参天製薬の正木氏に2024年度の感謝状

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Jul 28, 2024 0:12


JPCERT/CCは、サイバーセキュリティ対策活動に特に顕著に貢献した人物や組織に感謝の意を表し、感謝状を贈呈したと発表した。

CyberTalk
HS#04.P2 - Les INITIATIVES CYBER des régions (avec le Campus Cyber et le CSIRT PACA)

CyberTalk

Play Episode Listen Later Jul 19, 2024 28:49


Deuxième vidéo de cette série... hors-série en collaboration avec l'Ecole de l'Air et de l'Espace ! Cette fois-ci, on se penche sur les initiatives cyber lancées par les régions francaises avec un zoom sur le Campus Cyber et un CSIRT.Les émissions sont enregistrées en live sur Twitch et redifusée sur Youtube avant de devenir des Podcast. Venez assister à l'enregistrement en live !       Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.

ScanNetSecurity 最新セキュリティ情報
応募〆切 来週 7月3日(水)|参加費無料|東京都の CSIRT 構築と IT-BCP 策定支援事業 誌上説明会

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Jun 24, 2024 0:21


 CSIRT 構築や BCP 策定を進める主体とはあくまで参加企業自身である。だから支援のために訪問してくれる専門家は、おんぶして目的地に連れて行ってくれる人などではなく、体制構築や計画策定のゴールまで「並走してくれる相棒」と考えるのが、この事業の正しいイメージであろう。

Software Engineering Institute (SEI) Podcast Series
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Jun 21, 2024 30:51


Cybersecurity risks aren't just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division's Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI's work developing Computer Security Incident Response Teams (CSIRTs) across the globe.

Ochtendnieuws | BNR
Ook in Europese campagne kan niemand om Wilders en Timmermans heen

Ochtendnieuws | BNR

Play Episode Listen Later Jun 6, 2024 25:37


Negen politieke partijen gingen gisteravond met elkaar in debat voor de Europese verkiezingen. De VVD en de PVV stonden direct lijnrecht tegenover elkaar. Geert Wilders liet zich ondertussen op X fel uit over GL-PvdA. Politiek verslaggever Leendert Beekman duidt de dag.  De software die de Rijksoverheid gebruikt voor videovergaderingen kon worden gehackt, meldt demissionair staatssecretaris Van Huffelen van Digitalisering. Door de hack konden verschillende gegevens van bewindslieden worden achterhaald. Volgens Van Huffelen is het 'niet waarschijnlijk' dat dit is gebeurd. Volgens de NOS gaat het om het systeem Webex. Eward Driehuis, voorzitter van CSIRT.global, legt het uit.  Het lijkt vooral een diplomatiek onderonsje aan de Franse kust te worden, terwijl wereldleiders in eerste instantie langskomen voor de herdenking van 80 jaar D-Day. President Macron ontvangt Biden, Rutte en ook Zelensky in Normandië, maar de Russen zijn niet welkom bij de plechtigheden. Frankrijk-correspondent Eva Rammeloo rapporteert.  Over deze podcast           In Ochtendnieuws hoor je in 20 minuten het belangrijkste nieuws van de dag. Abonneer je op de podcast via bnr.nl/ochtendnieuws, de BNR-app, Spotify en Apple Podcasts. Of luister elke werkdag vanaf 06.00 uur live via bnr.nl/live. See omnystudio.com/listener for privacy information.

ScanNetSecurity 最新セキュリティ情報
東京電機大学シーサート(TDU- CSIRT)が FIRST に加盟

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Jun 6, 2024 0:12


 東京電機大学は5月31日、同学のコンピューターセキュリティインシデント対応チーム「東京電機大学シーサート(TDU- CSIRT)」のFIRSTへの加盟を発表した。

ScanNetSecurity 最新セキュリティ情報
札幌でワークショップ「CSIRTのはじめ方 ー そして続けられるように」5/16 開催

ScanNetSecurity 最新セキュリティ情報

Play Episode Listen Later Apr 24, 2024 0:13


 一般社団法人日本シーサート協議会(NCA)は4月17日、ワークショップ「CSIRTのはじめ方 ー そして続けられるように」を5月16日に開催すると発表した。

Fique Seguro
Prepare-se para o pior com CSIRT

Fique Seguro

Play Episode Listen Later Aug 1, 2023 42:38


Em uma empresa, protegendo a segurança da informação, você vai se deparar com diversos problemas além dos hackers. Para ser honesto, é mais provável que você tenha problemas físicos com seus computadores que te levem à uma perda de informações, do que um ataque via rede Internet. Mas nestes casos, você pode contar com um time de "brigadistas" da segurança da informação. Conheça o CSIRT. #FabioSobiecki #BlueTeamAcademy #SegurançadaInformação __________________ Siga minhas redes https://www.youtube.com/@fabiosobiecki https://www.instagram.com/fabiosobiecki https://www.facebook.com/fabiosobieckioficial https://www.tiktok.com/@fabiosobiecki

Darknet Diaries
135: The D.R. Incident

Darknet Diaries

Play Episode Listen Later Jul 4, 2023 44:38


Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he went through. Breakmaster Cylinder's new album: https://breakmastercylinder.bandcamp.com/album/the-moon-all-that. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit https://flare.io to learn more. Sources https://www.wired.com/story/costa-rica-ransomware-conti/ https://malpedia.caad.fkie.fraunhofer.de/details/win.bandook https://www.youtube.com/watch?v=QHYH0U66K5Q https://www.youtube.com/live/prCr7Z94078 https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/ https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/ Attribution Darknet Diaries is created by Jack Rhysider. Assembled by Tristan Ledger. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify. Learn more about your ad choices. Visit podcastchoices.com/adchoices

CISO Tradecraft
#135 - Board Decks (with Demetrios Lazarikos)

CISO Tradecraft

Play Episode Listen Later Jun 26, 2023 43:33


One of the most important activities a CISO must perform is presenting high quality presentations to the Board of Directors.  Listen and learn from Demetrios Lazarikos (Laz) and G Mark Hardy as they discuss what CISOs are putting in their decks and how best to answer the board's questions.  Special thanks to our sponsor Risk3Sixty for supporting this episode. Risk3sixty has created a presentation template that helps you structure your thoughts while telling a compelling story about where you want your security program to go. Download it today for free at: https://risk3sixty.com/whitepaper/security-program-maturity-presentation-template-for-cisos/?utm_source=cisotradecraft&utm_medium=podcast&utm_campaign=2023-ct&utm_term=1week&utm_content=ebook References RSAC ESAF Download: https://www.rsaconference.com/rsac-programs/executive-security-action-forum NACD 2023 Directors Handbook: https://www.nacdonline.org/insights/publications.cfm?ItemNumber=74777 Blue Lava: https://bluelava.io/cybersecurity-board-reporting/ Transcripts: https://docs.google.com/document/d/1juM8MQUEtAZEDp1HpzkPdNw-D11O3ofq Chapters 00:00 Introduction 05:17 The Importance of External Audits in Managing Risk 06:48 How to Help Your Business of Revenue Protection Reduce Risk 11:15 How to be a Successful CISO 12:52 How to Measure the Threat to Your Environment 15:04 How to Prepare for Cyber Threats and Incidents 18:49 The Importance of Understanding the Business's Critical Assets 22:28 OSINT and CSIRT.global Tools and Technologies 25:14 Building a Matrix of Good Intention, Bad Behavior, and Access Management 28:10 How to Create an Incident Response Plan 30:20 How to Keep Your Board of Directors Informed of Cybersecurity Incidents 31:50 How to Keep Track of the Latest Cyber Threats Coming Around the Corner 34:11 How to Achieve Cyber Insurance Coverage 37:06 Cyber Liability Insurance: A Necessary Component of Running Your Business in 2023 39:22 How to Measure the Effectiveness of a Company's Cybersecurity Program 40:54 The Importance of Business Alignment

Detection at Scale
EP 29: Chris Witter on Leading D&R Teams for Both Cloud and Enterprise at Spotify

Detection at Scale

Play Episode Listen Later Feb 7, 2023 35:55


In this episode, Jack chats with Christopher Witter (aka Witter), Engineering Manager, Detection & Response at Spotify and a founding member and former lead for Crowdstrike's Falcon OverWatch managed hunting service.  Witter has nearly two decades of experience in incident response and information security, holding leadership roles on computer security and incident response teams (CSIRT) with both a top five global bank and a top ten defense contractor.  During this episode, Witter shares his behind the scenes experiences helping build the Falcon Overwatch Team at Crowdstrike, why it's critical to measure queries in seconds, not minutes, his tips on running highly effective D&R teams at scale, and more!  Topics discussed: Witter's experience as one of the first 100 people on the Falcon Overwatch Team at Crowdstrike  Why the Overwatch team didn't follow traditional SOC mentalities  The various data sources Witter uses to improve accuracy and gather context  How D&R is like going to court – telling the story around Who, What, Where, Why, How, to prove beyond a reasonable doubt that this incident happened Why Witter measures in seconds, not minutes and why timescale is critical  Why it could be a mistake to choose cybersecurity tools based on financial capability and budget and what criteria should be considered instead Why Witter still believes in custom systems  Witter's rule of thumb that if a human does the same thing 10x manually, it should be automated   Managing a remote D&R team and building psychological safety Witter's advice for how others can get involved in the D&R community  His 3 pieces of advice to build a high-performing D&R team at scale, including a focus on ‘Jack of all trades' people, avoiding distractions, and why it's critical to capture everything to improve search. 

Cyber, cyber...
Cyber, Cyber… – 318 – Role i kompetencje w zespole CSIRT

Cyber, cyber...

Play Episode Listen Later Dec 22, 2022 38:08


Zapraszamy Was dzisiaj na odcinek serii procesowej podkastu Cyber, Cyber…, w którym usłyszycie dyskusję Cypriana Gutkowskiego, Kamila Gapińskiego i Macieja Pyznara na temat projektu dokumentu FIRST o rolach i kompetencjach w zespołach CSIRT. Jest to o tyle wyjątkowe, że do tej pory nie było wielu takich dokumentów, które definiowałaby kompetencje i role dla każdego obszaru. More

Crimen Digital
#160 Seguros Cyber y su futuro con Alejandro Bosch - Crimen Digital

Crimen Digital

Play Episode Listen Later Nov 16, 2022 35:29


Alejandro Bosch nos explica lo que son los Seguros Cyber pero también mucho del entendimiento de por qué es importante para las organizaciones. Una charla que permite entender hacia dónde van estos productos que permiten transferir ciertos riesgos. 

Crimen Digital
#159 El Consejo de Administración y Ciberseguridad con Rafael Ramírez de Alba @RRamirezdeAlba - Crimen Digital

Crimen Digital

Play Episode Listen Later Nov 2, 2022 28:39


¿Te has preguntado por qué no recibes el presupuesto que necesitas para ciberseguridad? ¿Has tenido que presentar ante la alta administración y no te hacen preguntas? Esto y más lo conversamos con Rafael Ramírez de Alba: Los consejeros como los técnicos tienen todavía mucho qué aprender al respecto. 

Crimen Digital
#158 ¿Ciberseguridad es un derecho humano? con Anahiby Becerril @anahiby - Crimen Digital

Crimen Digital

Play Episode Listen Later Oct 19, 2022 42:35


Abogados y especialistas en ciberseguridad somos complementarios, pero pocas veces hablamos del derecho a la ciberseguridad. Anahiby nos comparte desde una pregunta clave: ¿derecho a la ciberseguridad o derecho de la ciberseguridad?

The Future of Security Operations
Citrix's Corey Hill: How to Make Mental Health a Priority For Your Security Operations Team

The Future of Security Operations

Play Episode Listen Later Oct 14, 2022 31:06


In our latest episode of the Future of Security Operations, Thomas speaks to Corey Hill, Director of Security Operations and Incident Response at Citrix. After working at organizations such as Mandiant and Cisco, in 2020 Corey joined the Citrix team when there were just a small handful of people on the SOC team. Today, the teams Corey leads spread across four countries and are responsible for Detection Engineering, Threat Intelligence, Threat Monitoring, SOAR Automation, and Incident Response (both CSIRT) services at Citrix.  Topics in this episode include:  Corey's journey that eventually led to his current role at Citrix.  How Corey's perspective on security has evolved throughout his career and why there's no security strategy that fits all.  Lessons from building multiple SOC teams from scratch.   How security operations have evolved. How Corey leverages automation to make his team more efficient and effective.  How Citrix prioritizes mental health for everyone who works at the company.  Why burnout is inevitable and how to tackle it.  Taking away the stigma of being breached and how to respond when it happens.   The role mentors have played in Corey's professional success.  #1 piece of advice for those who are leading security operations teams.  What the future of security operations will look like.

Cyber, cyber...
Cyber, Cyber… – 260 – What can we learn from firefighters?

Cyber, cyber...

Play Episode Listen Later Oct 7, 2022 17:06


W dzisiejszym odcinku podkastu Cyber, Cyber…  gościem specjalnym Mirosława Maja jest Jeffrey Carpenter. Rozmowa odbyła się przy okazji konferencji FIRST w lipcu w Dublinie. O przeszłości, ale i przyszłości cyberbezpieczeństwa. Jak wyglądały początki CSIRT-ów? Usłyszycie o budowaniu zdolności do reagowania na incydenty, ale także o tym, od jakich profesji powinni się uczyć eksperci od cyberbezpieczeństwa. Zapraszamy! More

Crimen Digital
#157 Estrategia de Deception, ¿realmente qué es? con Juan Carlos Vázquez @jc_vazquez - Crimen Digital

Crimen Digital

Play Episode Listen Later Oct 5, 2022 49:19


La estrategia del Engaño o Deception inició hace algunos años con las honeypots, pero ahora ha evolucionado a unos niveles muy interesantes. Juan Carlos Vázquez nos comparte esta estrategia y cómo implementarla dentro de las organizaciones. 

Crimen Digital
#156 Entre Brasil y otros países... existen diferencias culturales en ciberseguridad? Con Domingo Montanaro - Crimen Digital

Crimen Digital

Play Episode Listen Later Sep 21, 2022 39:43


Es impresionante como en cada país se dice que es donde más se cometen delitos informáticos, pero en el caso de Brasil es un tema diferente. Con esta charla vemos una perspectiva que tiene que ver con una historia tecnológica y cómo ha afectado o beneficiado a este país. Un gusto tener a Domingo con nosotros en el pódcast.

Crimen Digital
#155 La carrera profesional de ciberseguridad no era lo que se pensaba con Federico Pacheco @fedequark - Crimen Digital

Crimen Digital

Play Episode Listen Later Sep 7, 2022 41:27


¿Te has preguntado si todavía puedes cambiar de especialización en Ciberseguridad? ¿Realmente falta talento? Todo esto lo platicamos con Federico Pacheco y lo que deberíamos hacer tanto los profesionales como las empresas. 

Crimen Digital
#154 Hablemos si realmente OSINT es OSINT con Carlos Seisdedos @carloseisdedos - Crimen Digital

Crimen Digital

Play Episode Listen Later Aug 24, 2022 38:58


Carlos Seisdedos es un especialista que viene de Inteligencia y que se ha especializado en OSINT. Conversamos con él de hacia dónde va esta disciplina y lo importante que es el generar una inteligencia colectiva.

Crimen Digital
#153 Cómo puedo ayudar en contra del abuso contra niñas, niños y adolescentes con Pilar Ramírez - Crimen Digital

Crimen Digital

Play Episode Listen Later Aug 10, 2022 35:10


Conversamos con Pilar Ramírez de ICMEC sobre esta gran problemática y lo que podemos hacer desde la perspectiva de los especialistas de ciberseguridad e investigaciones digitales.El abuso, la revictimización y los derechos humanos requieren de un trabajo interdisciplinario como nunca antes.

ITSPmagazine | Technology. Cybersecurity. Society
Why The World Needs A Global CSIRT: Introducing CSIRT.global | A Conversation With Eward Driehuis And Lennaert Oudshoorn | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 21, 2022 42:01


Vulnerabilities are discovered every day. Once found, they make their way into any number of databases that can be used to help organizations take action to put a patch in place... if one is available. But what about the case where the weakness is actively exposed or being exploited? This is where CSIRT.global comes in.Born from the work being done at the Dutch International for Vulnerability Disclosure (DIVD), a team of volunteers have decided to take things to the next level, helping organizations take action when action matters most ... when a vulnerability exists, when that vulnerability is being exploited in the wild, and when an organization is prone to (or is under) attack. That's when the email is sent from CSITR.global to the affected organization, letting them know what the team uncovered."We don't send marketing emails. We don't send emails promoting conferences. When a company gets an email from us, it really means something.” ~EwardThere's a lot going on in this process, from scanning the entire global Internet for every system exposed, identifying vulnerabilities on those systems, and mapping the proof of concept to those two results to determine whether or not an organization is vulnerable or is showing signs of having been compromised. The next piece of the puzzle is figuring out who or what is behind the IP address that was scanned and flagged. This isn't always easy given how IP addresses are assigned and looked up. The next piece of the puzzle is even harder, in that CSIRT.global needs to find a way to contact the affected entity that lives behind the IP address ... which department or person should receive the info and what is their email address? Good luck finding that in a pinch. And, to top it all off, the receiving party needs to trust that the email they received from CSIRT.gloal is both legitimate and must be taken seriously. The process is rooted in information and built on trust - which is one of the main reasons they sought and receive support from the Dutch government.It's this full circle scenario that delivers the real value provided by this group. It can scale to a global nature, but requires the help of the global community. Listen in to hear more about how this works, how to get involved, and how this non-profit organization is redefining cybersecurity.____________________________GuestsEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huisLennaert OudshoornCSIRT Coordinator And Webmaster at Dutch Institute for Vulnerability Disclosure (DIVD) [@DIVDnl]On Twitter | https://twitter.com/lennaert89On LinkedIn | https://www.linkedin.com/in/lennaertoudshoorn/____________________________This Episode's SponsorsAsgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vcHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesCSIRT.global: https://csirt.global/ & https://www.divd.nl/DIVD: https://www.divd.nl/ and on LinkedIn: https://www.linkedin.com/company/divd-nl/May Contain Hackers (MCH2022) Hacker Conference: https://mch2022.org/#/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?

Redefining CyberSecurity
Why The World Needs A Global CSIRT: Introducing CSIRT.global | A Conversation With Eward Driehuis And Lennaert Oudshoorn | Redefining CyberSecurity Podcast With Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Jul 21, 2022 42:01


Vulnerabilities are discovered every day. Once found, they make their way into any number of databases that can be used to help organizations take action to put a patch in place... if one is available. But what about the case where the weakness is actively exposed or being exploited? This is where CSIRT.global comes in.Born from the work being done at the Dutch International for Vulnerability Disclosure (DIVD), a team of volunteers have decided to take things to the next level, helping organizations take action when action matters most ... when a vulnerability exists, when that vulnerability is being exploited in the wild, and when an organization is prone to (or is under) attack. That's when the email is sent from CSITR.global to the affected organization, letting them know what the team uncovered."We don't send marketing emails. We don't send emails promoting conferences. When a company gets an email from us, it really means something.” ~EwardThere's a lot going on in this process, from scanning the entire global Internet for every system exposed, identifying vulnerabilities on those systems, and mapping the proof of concept to those two results to determine whether or not an organization is vulnerable or is showing signs of having been compromised. The next piece of the puzzle is figuring out who or what is behind the IP address that was scanned and flagged. This isn't always easy given how IP addresses are assigned and looked up. The next piece of the puzzle is even harder, in that CSIRT.global needs to find a way to contact the affected entity that lives behind the IP address ... which department or person should receive the info and what is their email address? Good luck finding that in a pinch. And, to top it all off, the receiving party needs to trust that the email they received from CSIRT.gloal is both legitimate and must be taken seriously. The process is rooted in information and built on trust - which is one of the main reasons they sought and receive support from the Dutch government.It's this full circle scenario that delivers the real value provided by this group. It can scale to a global nature, but requires the help of the global community. Listen in to hear more about how this works, how to get involved, and how this non-profit organization is redefining cybersecurity.____________________________GuestsEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huisLennaert OudshoornCSIRT Coordinator And Webmaster at Dutch Institute for Vulnerability Disclosure (DIVD) [@DIVDnl]On Twitter | https://twitter.com/lennaert89On LinkedIn | https://www.linkedin.com/in/lennaertoudshoorn/____________________________This Episode's SponsorsAsgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vcHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesCSIRT.global: https://csirt.global/ & https://www.divd.nl/DIVD: https://www.divd.nl/ and on LinkedIn: https://www.linkedin.com/company/divd-nl/May Contain Hackers (MCH2022) Hacker Conference: https://mch2022.org/#/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?

Crimen Digital
#152 Pentest, Blue Teaming y otros ¿Sabes la diferencia? con Martín Vigo @martin_vigo · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Jul 13, 2022 28:06


En este episodio platicamos con Martín Vigo sobre el Blue Teaming y las diferencias entre los diferentes servicios de "hackeo". Busquen el pódcast de noticias de ciberseguridad Tierra de Hackers en sus plataformas.

Podcasty Aktuality.sk
Dezinfo, hoaxy a kyberpezpečnosť

Podcasty Aktuality.sk

Play Episode Listen Later Jul 13, 2022 54:42


Aké škody kybernetickí zločinci napáchali na Slovensku a stalo sa Rusko ihriskom pre hackerov z celého sveta? Dokážu dezinformácie ovplyvniť vojnu a ako Facebook odhaľuje hoaxy? O týchto aj ďalších aktuálnych témach na festivale Pohoda 2022 diskutovali bývalý šéf vládnej jednotky CSIRT.SK pre riešenie kybernetických bezpečnostných incidentov Lukáš Hlavička, poradca ministra obrany pre oblasť hybridných hrozieb Victor Breiner a fact-checker hľadajúci nepravdy na Facebooku Robert Barca. Moderátorom diskusie bol zástupca šéfredaktora Živé.sk Ján Trangel.

ITSPmagazine | Technology. Cybersecurity. Society
From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 30, 2022 48:29


We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.*Threat intelligence**Development processes**Cyber security M&A market**Sales**Marketing messaging**Cyber law**Standards*Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.____________________________GuestEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huis____________________________This Episode's SponsorsHITRUST:

Redefining CyberSecurity
From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis

Redefining CyberSecurity

Play Episode Listen Later Jun 30, 2022 48:29


We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.*Threat intelligence**Development processes**Cyber security M&A market**Sales**Marketing messaging**Cyber law**Standards*Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.____________________________GuestEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huis____________________________This Episode's SponsorsHITRUST:

Crimen Digital
#151 ¿Blockchain es hackeable? con Constantino Mora @constacrypto · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Jun 29, 2022 41:29


Constantino es una persona especialista en blockchain / cadena de bloques. Conversamos sobre la ciberseguridad de la cadena de bloques, de si realmente las operaciones en la cadena son anónimas. 

Crimen Digital
#150 Hablando de cómo apoyar desde el mundo privado a los CERT y CSIRT con Katherina Canales @KatheCanales · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Jun 15, 2022 38:08


La experiencia de Katherina en el CSIRT de Gobierno de Chile permite identificar muchas áreas de oportunidad así como la relación que debemos tener entre el sector privado y los CERTs o CSIRTs de gobierno. Tenemos mucho por qué trabajar de la mano.

Crimen Digital
#149 Prevención de Fraudes y Ciberseguridad con Gabriel Díaz @Gabriel_dr27 · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Jun 1, 2022 44:47


Pocas veces pensamos en la interacción entre Prevención de Fraudes y Ciberseguridad; y menos de la posibilidad de tener un área de Prevención de Fraudes en organizaciones que no son del sector financiero. Platicamos con el especialista Gabriel Díaz al respecto.

Crimen Digital
#148 Ciberseguridad en IoT y OT con el gran Claudio Caracciolo @holesec · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later May 18, 2022 33:46


¿Te has preguntado si lo que conoces de ciberseguridad se puede aplicar directamente a IoT y OT? Inclusive, ¿qué es OT? Platicamos con el master Claudio Caracciolo al respecto.

Crimen Digital
#147 Hablemos de OpenBanking y Ciberseguridad con Jonathan Garzón @Garzon_TICs · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later May 4, 2022 39:37


En este episodio Jonathan Garzón nos habla de qué es realmente Open Banking y cómo puede ser un tema la ciberseguridad.

Crimen Digital
#146 ¿Qué es un CISO? con Andrés Almanza @andresr_almanza · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Apr 20, 2022 45:07


Siempre hablamos de qué tiene que hacer un CISO para ahora hablar de qué es y qué no es un CISO.

The Social-Engineer Podcast
Ep. 168 - Security Awareness Series - Lessons Learned From the Attacks on Ukraine with Patrick Laverty

The Social-Engineer Podcast

Play Episode Listen Later Apr 18, 2022 39:53


This month, Chris Hadnagy and Ryan MacDougall are joined by Patrick Laverty. Patrick is the Senior Team Lead at Social Engineer, LLC, working with an incredible team of professional social engineers. He was previously a senior penetration tester at Rapid7 and a member of the CSIRT at Akamai. He is a co-organizer of the Layer 8 Conference and is the host of the Layer 8 Podcast on social engineering and OSINT. He lives in Rhode Island with his daughter, dog and two cats. [April 18, 2022]  00:00 – Intro  00:50 – Patrick Laverty intro  https://layer8conference.com  02:19 – Intro Links  Social-Engineer.com Managed Voice Phishing  Managed Email Phishing Adversarial Simulations  Social-Engineer channel on SLACK  CLUTCH  innocentlivesfoundation.org  04:38 – Security Awareness in the world today  05:25 – Malicious Domain Registrations  06:58 – Protecting yourself from false domains  11:24 – CISA Alert / Shields Up  12:36 – Lowering Reporting Thresholds  13:33 – Empowering Security Information Officers  16:50 – Tabletop Exercises  19:20 – Planning for Continuity  21:09 – Beyond the Financial Effects of Ransomware  24:29 – Trying to protect the Healthcare Sector  25:27 – Backup & Recovery Process  28:38 – The source of Ransomware  30:03 – Planning for a Ransomware attack  31:51 – Why your site will be attacked  33:41 – 3 Actionable Tips  35:30 – Book Recommendations  Thinking, Fast and Slow– Daniel Kahneman How to Win Friends & Influence People– Dale Carnegie Delivered from Distraction – John Ratey Fixed – Amy Herman Going Pro – Dr Tony Kern 38:20 – Wrap Up   39:18 – Outro  www.social-engineer.com  www.innocentlivesfoundation.org 

Crimen Digital
#145 La Estafa del CEO desde la visión del abogado con Dafne Méndez @DaFneMendez · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Apr 6, 2022 32:22


Conversamos con la abogada Dafne Méndez @DaFneMendez para analizar los casos de Estafa del CEO y sus implicaciones legales. La tesis que nos comentó se encuentra aquí: https://sjf2.scjn.gob.mx/detalle/tesis/2023157

The Ransomware Files
Kaseya and REvil

The Ransomware Files

Play Episode Listen Later Apr 4, 2022 46:08


The REvil ransomware gang's attack against the US software company Kaseya in 2021 is not only amongst the largest ransomware attacks of all time, but it's also one of the most intriguing. It involves the use of zero-day software vulnerabilities known only to a handful of people, a race between attackers trying to snare ransom payments and defenders developing a patch, and a secret operation that hacked back against the REvil hackers. And in the end, a rare action happened: Someone was actually arrested. This episode of The Ransomware Files also coincides with the release of new technical information from the Dutch Institute for Vulnerability Disclosure about the software vulnerabilities that were exploited by the ransomware gang. The information, which describes the vulnerabilities in Kaseya's Virtual Systems Administrator software, can be found on DIVD's website. Speakers: Robert Cioffe, Founder, Progressive Computing; Frank Breedijk, Manager, CSIRT, DIVD; Victor Gevers, Chairman, DIVD; Jason Manar, Chief Information Security Officer, Kaseya; Jon DiMaggio, Chief Security Strategist, Analyst1; John Hammond, Senior Security Researcher, Huntress; Espen Johansen, Security Director, Visma Group; Adrian Stanila, Senior Information Security Researcher, Visma Group; George Zamfir, Security Analyst, Visma Group; Jeremy Kirk, Executive Editor, Information Security Media Group. Sources and the transcript for this episode are here. Production Coordinator: Rashmi Ramesh The Ransomware Files theme song by Chris Gilbert/© Ordinary Weirdos Music Music by Uppbeat and Podcastmusic.com Follow The Ransomware Files on Twitter: @ransomwarefiles Follow The Ransomware Files on Instagram: @theransomwarefiles

Crimen Digital
#144 La educación en ciberseguridad hoy vs hace algunos años con Alonso Caballero @Alonso_ReYDeS · Crimen Digital · Dixo

Crimen Digital

Play Episode Listen Later Mar 23, 2022 41:16


Alonso se ha dedicado a evangelizar en temas de hacking y forense desde hace muchos años, con él platicamos sobre cómo han cambiado y algunas recomendaciones que tiene para los que quieren iniciarse en estos temas. 

Cybersecurity: Amplified And Intensified
Khonsari Ransomware exploiting Log4J/Log4Shell with Allan Liska, CSIRT at Recorded Future - Escalate, Exfiltrate & Encrypt - Round 15

Cybersecurity: Amplified And Intensified

Play Episode Listen Later Dec 17, 2021 15:52


On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion. Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://anchor.fm/amplifiedandintensified/support

Cybersecurity: Amplified And Intensified
Episode 36 - Allan Liska, CSIRT at Recorded Future - Ransomware & Incident Response

Cybersecurity: Amplified And Intensified

Play Episode Listen Later Nov 8, 2021 49:54


Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.Allan Liskahttps://www.linkedin.com/in/allan2/https://twitter.com/uuallanhttps://recordedfuture.comEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://anchor.fm/amplifiedandintensified/support