POPULARITY
Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Career Notes. Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week James sits down with Michael Daniel, former Cybersecurity Coordinator at the White House and current President and CEO of the Cyber Threat Alliance. With over 20 years of cybersecurity experience, Michael shares insider insights into some of the most significant cyber incidents in recent history, including the notorious OPM breach. From budgeting to policy-making, he offers a candid look at the challenges and triumphs of securing the nation's digital frontiers.
Guest: Rick Howard, Chief Security Officer for N2K, Chief Analyst and Senior Fellow for The CyberwireOn LinkedIn | https://www.linkedin.com/in/rickhoward/Website | https://thecyberwire.com/YouTube | https://www.youtube.com/channel/UCIC1L2vbbyotqEF0ZLhaOdwHost: Dr. Rebecca WynnOn ITSPmagazine
In this episode of the Retail & Hospitality ISAC podcast, we continue the RH-ISAC 10th anniversary interview series with RH-ISAC President Suzie Squier and Michael Daniel, who helped to found the organization back in 2014. In the past decade since then, Michael served in the Obama White House as an advisor on cybersecurity matters and he is now President & CEO of the Cyber Threat Alliance. Then, Lee Clark, cyber threat intelligence analyst & writer at RH-ISAC, provides the latest intel briefing, including information about recent vulnerabilities in GitLab and GitHub.
Michael Daniel, President & CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations as well as the challenges faced when establishing effective partnerships in the security industry.
J. Michael Daniel is the President & CEO of Cyber Threat Alliance. In this episode, he joins host Steve Morgan to discuss cybersecurity metrics and KPIs, as well as how companies can determine security posture and reduce risk, and more. SecurityScorecard is the leading security rating company, used by more than 2,500 top companies. To learn more about our sponsor, visit https://securityscorecard.com
President and CEO of the Cyber Threat Alliance, Michael Daniel, joins Ann on this week's episode of Afternoon Cyber Tea. Cyber Threat Alliance is an organization focused on cyber intelligence sharing across the digital ecosystem. Michael has been the President and CEO of the Alliance since early 2017 and also served as the U. S. Cybersecurity Coordinator under the Obama administration. He is a leading expert on ransomware and the disruption of cybercrime and is a leader in the World Economic Forum Partnership Against Cybercrime. Michael and Ann discuss the sophistication of hackers today, persistent threats that have remained over the last several years, and what impact ransomware is having on organizations across the globe. Resources: View Michael Daniel on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Listen to: Uncovering Hidden Risks Listen to: Security Unlocked Listen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.
Les cybercriminels font parfois preuve d'une grande créativité pour piéger leurs victimes, mais il leur arrive également d'être pris à leur propre piège. Les entreprises spécialisées dans la lutte contre le cyberespionnage et le cybersabotage développent progressivement des outils de plus en plus performants, comme Tethris, une entreprise française qui a récemment annoncé le déploiement d'un réseau mondial de leurres informatiques nomades, appelés honeypots (ou AMTD pour l'acronyme en anglais). Ces pièges visent à attirer les activités malveillantes sur le web afin de les identifier et de les neutraliser.Les honeypots, que l'on peut traduire par "pots de miel", sont historiquement de faux ordinateurs intégrés à un réseau, contenant des données sensibles fictives. Ces leurres permettent ainsi aux acteurs du renseignement de suivre l'évolution des attaques informatiques. Tethris a récemment déployé un vaste réseau de 1 300 honeypots nomades de nouvelle génération répartis dans une cinquantaine de pays, permettant de cartographier en temps réel le paysage de la cybermenace.Jusqu'à présent, les honeypots étaient statiques, ce qui les rendait moins efficaces. Les hackers et certains groupes de cybercriminels avaient pris l'habitude de partager des informations sur ces leurres, limitant ainsi leur pertinence une fois repérés. Ainsi, ces honeypots nouvelle génération utilisés pour traquer les activités frauduleuses, sont désormais nomades, leurs adresses IP étant désactivées à certains moments puis reprogrammées à d'autres endroits du réseau, brouillant ainsi les pistes et plongeant les pirates dans l'incertitude. Ces leurres ont ainsi une durée de vie plus longue, ce qui leur permet de recueillir plus d'informations qu'auparavant, facilitant ainsi la détection rapide de certaines campagnes de cybercriminalité.Cette technologie est en constante évolution. On estime qu'à l'horizon 2025, un quart des applications cloud dans le monde exploiteront des fonctionnalités d'Automated Moving Target Defense, un concept émergent dont les honeypots sont l'une des premières applications concrètes. Tethris publie déjà un bulletin météo du cyberespace, qui présente les tendances des activités cybercriminelles détectées et analysées grâce à son réseau de leurres nomades. Ce bulletin est ensuite partagé avec l'ANSSI et la Cyber Threat Alliance pour une meilleure coopération mondiale afin de lutter contre les hackers. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
Les cybercriminels font parfois preuve d'une grande créativité pour piéger leurs victimes, mais il leur arrive également d'être pris à leur propre piège. Les entreprises spécialisées dans la lutte contre le cyberespionnage et le cybersabotage développent progressivement des outils de plus en plus performants, comme Tethris, une entreprise française qui a récemment annoncé le déploiement d'un réseau mondial de leurres informatiques nomades, appelés honeypots (ou AMTD pour l'acronyme en anglais). Ces pièges visent à attirer les activités malveillantes sur le web afin de les identifier et de les neutraliser. Les honeypots, que l'on peut traduire par "pots de miel", sont historiquement de faux ordinateurs intégrés à un réseau, contenant des données sensibles fictives. Ces leurres permettent ainsi aux acteurs du renseignement de suivre l'évolution des attaques informatiques. Tethris a récemment déployé un vaste réseau de 1 300 honeypots nomades de nouvelle génération répartis dans une cinquantaine de pays, permettant de cartographier en temps réel le paysage de la cybermenace. Jusqu'à présent, les honeypots étaient statiques, ce qui les rendait moins efficaces. Les hackers et certains groupes de cybercriminels avaient pris l'habitude de partager des informations sur ces leurres, limitant ainsi leur pertinence une fois repérés. Ainsi, ces honeypots nouvelle génération utilisés pour traquer les activités frauduleuses, sont désormais nomades, leurs adresses IP étant désactivées à certains moments puis reprogrammées à d'autres endroits du réseau, brouillant ainsi les pistes et plongeant les pirates dans l'incertitude. Ces leurres ont ainsi une durée de vie plus longue, ce qui leur permet de recueillir plus d'informations qu'auparavant, facilitant ainsi la détection rapide de certaines campagnes de cybercriminalité. Cette technologie est en constante évolution. On estime qu'à l'horizon 2025, un quart des applications cloud dans le monde exploiteront des fonctionnalités d'Automated Moving Target Defense, un concept émergent dont les honeypots sont l'une des premières applications concrètes. Tethris publie déjà un bulletin météo du cyberespace, qui présente les tendances des activités cybercriminelles détectées et analysées grâce à son réseau de leurres nomades. Ce bulletin est ensuite partagé avec l'ANSSI et la Cyber Threat Alliance pour une meilleure coopération mondiale afin de lutter contre les hackers. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week's episode is Cowbell partner, President & CEO of Cyber Threat Alliance, Michael Daniel. Michael discusses how important cyber information sharing is for the small to medium sized enterprise markets. His amazing cyber background which includes working within the US Intelligence community and the National Security Council staff with past US President's, which really helped shape his career for his current role at Cyber Threat Aliance. He also discusses the Atlas project, along with the biggest cyber threats to look out for and so much more. To learn more about the great work that CTA is doing visit cyberthreatalliance.org
On this episode of the IoT: The Internet of Threats podcast, Michael Daniel, President and CEO of Cyber Threat Alliance, joins podcast host Eric Greenwald to discuss the shifting sands of the regulatory landscape in cybersecurity today and the growing prospect of government regulation affecting private-sector cybersecurity practices. Interview with Michael Daniel: Prior to his role as President and CEO of Cyber Threat Alliance, Michael served as the Cybersecurity Coordinator to President Obama's National Security Council (NSC). His work at the NSC followed a 17-year tenure a Program Examiner and later a Branch Chief for national security programs with the U.S. Government's Office of Management and Budget. The Cyber Threat Alliance is a non-profit organization that enables cybersecurity providers to share threat intelligence with each other and improve cybersecurity across the digital ecosystem. In this interview, Eric and Michael discuss: The government's evolving role in cybersecurity regulation, from the Cybersecurity Maturity Model Certification (CMMC) to Executive Order 14028 How to measure the efficacy of cybersecurity products and practices and the pros and cons of first- and third-party certifications The government's contribution to improving cybersecurity practices by encouraging the adoption and implementation of the Software Bill of Materials (SBOM) How SBOMs help us see inside the software we use and address a key weakness in cybersecurity right now Find Michael on LinkedIn: https://www.linkedin.com/in/j-michael-daniel-7b71a95/. Learn more about Cyber Threat Alliance by visiting CyberThreatAlliance.org. Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems. If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast. To learn more about building a robust product security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/.
For our second Chats On The Road to RSA Conference 2022, we talk about a critical cybersecurity initiative led by the World Economic Forum and the Cyber Threat Alliance. It is about mapping the cybercrime ecosystem and its corresponding panel during this year's conference.Sean and Marco are honored to introduce and tease this important upcoming session on their traditional "Chats On The Road to RSA Conference 2022" with guests: Michael Daniel & Tal Goldstein.About the session:“Although cybercrime is now a national security threat, our understanding of the cybercriminal ecosystem remains limited. The industry needs a holistic map to conduct effective disruption, allocate resources efficiently, and impose meaningful costs on criminal actors. The WEF has initiated a project to develop this map. This panel will discuss the mapping project's results to date and where it is going.”RSAC 2022 Panel WithMichael DanielModerator | President and Chief Executive Officer, Cyber Threat AllianceTal GoldsteinPanelist | Head of Strategy, Centre for Cybersecurity, World Economic Forum Centre for CybersecurityAmy Hogan-BurneyPanelist | Associate Counsel and General Manager, Digital Crimes Unit, MicrosoftDerek MankyPanelist | Chief of Security Insights & Global Threat Alliances, FortinetTune in and be sure to join us for more from RSA Conference USA 2022!____________________________GuestsMichael DanielPresident and Chief Executive Officer, Cyber Threat Alliance [@CyberAlliance]On LinkedIn | https://www.linkedin.com/in/j-michael-daniel-7b71a95/On Twitter | https://twitter.com/CyAlliancePrezTal GoldsteinHead of Strategy, Centre for Cybersecurity, World Economic Forum Centre [@wef] for Cybersecurity [@WEFCybersec]On LinkedIn | https://www.linkedin.com/in/tal-goldstein-a7191296/____________________________This Episode's SponsorsHITRUST:
For our second Chats On The Road to RSA Conference 2022, we talk about a critical cybersecurity initiative led by the World Economic Forum and the Cyber Threat Alliance. It is about mapping the cybercrime ecosystem and its corresponding panel during this year's conference.Sean and Marco are honored to introduce and tease this important upcoming session on their traditional "Chats On The Road to RSA Conference 2022" with guests: Michael Daniel & Tal Goldstein.About the session:“Although cybercrime is now a national security threat, our understanding of the cybercriminal ecosystem remains limited. The industry needs a holistic map to conduct effective disruption, allocate resources efficiently, and impose meaningful costs on criminal actors. The WEF has initiated a project to develop this map. This panel will discuss the mapping project's results to date and where it is going.”RSAC 2022 Panel WithMichael DanielModerator | President and Chief Executive Officer, Cyber Threat AllianceTal GoldsteinPanelist | Head of Strategy, Centre for Cybersecurity, World Economic Forum Centre for CybersecurityAmy Hogan-BurneyPanelist | Associate Counsel and General Manager, Digital Crimes Unit, MicrosoftDerek MankyPanelist | Chief of Security Insights & Global Threat Alliances, FortinetTune in and be sure to join us for more from RSA Conference USA 2022!____________________________GuestsMichael DanielPresident and Chief Executive Officer, Cyber Threat Alliance [@CyberAlliance]On LinkedIn | https://www.linkedin.com/in/j-michael-daniel-7b71a95/On Twitter | https://twitter.com/CyAlliancePrezTal GoldsteinHead of Strategy, Centre for Cybersecurity, World Economic Forum Centre [@wef] for Cybersecurity [@WEFCybersec]On LinkedIn | https://www.linkedin.com/in/tal-goldstein-a7191296/____________________________This Episode's SponsorsHITRUST:
In this episode of the RH-ISAC Podcast, former Cybersecurity Coordinator for President Obama, and current CEO of the Cyber Threat Alliance, Michael Daniel, shares the work CTA is doing to help CISA implement new cyber incident reporting legislation. Then, Justin Huff, security managing director at Accenture, provides tips for lowering your cyber insurance premium. Thank you to Fortinet for their sponsorship of the RH-ISAC Podcast.
Michael Daniel, President and CEO of Cyber Threat Alliance joins the podcast this week and dives right into the latest developing cyber implications resulting from the Ukraine conflict, as well as longer term considerations on Russian cyber companies impacted by sanctions. He also shares perspective on the differing views of cyber as a nuisance vs public/safety problem, the opportunity to combat cyber collectively, CISA's Shields Up program and organizations sustaining a high level of vigilance, and the STIX information sharing platform. Michael Daniel, CEO of Cyber Threat Alliance Michael leads the CTA team and oversees the organization's operations. Prior to joining the CTA in February 2017, Michael served from June 2012 to January 2017 as Special Assistant to President Obama and Cybersecurity Coordinator on the National Security Council Staff. In this role, Michael led the development of national cybersecurity strategy and policy, and ensured that the US government effectively partnered with the private sector, non-governmental organizations, and other nations. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e177
Welcome back to the Salty Wisdom Wealth Strategies podcast. I have a special guest, John Felker, who is a subject matter expert in today's topic: cyber security. John and I talk about different kinds of cyber security going over events that have happened in the world as real examples. We talk about how you should always understand the company and make sure you do your own research. We share what you need to know about cybersecurity, different details to look at and possible concerns that may arise. We also go over different types of cyber security; looking at cyber security as more than software but also as intel. This is to help you get a good understanding of cyber security, by looking at the different elements and scenarios. Please keep in mind that none of the companies we talk about are a recommendation, and you should always speak with a professional advisor before making any decisions. In This Episode [01:54] - Welcome to Salty Wisdom Wealth Strategies! [02:08] - I have a special guest on today's episode, John Felker. [03:40] - John shares his background and career experience. [09:30] - I talk a little about my tactical approach from my 4-tier plan. [10:22] - We have concerns about cyber security, and John and I talk about a few examples. [13:11] - We talk about a computer protection program. [15:30] - John tells us the key thing to remember is that a human is always involved. [17:45] - John explains the difference between government contracts and corporate companies. [19:35] - Yes, these companies make money, but do they ever share the information they gather? [21:08] - John mentions the Cyber Threat Alliance. [23:32] - There is plenty of intelligence out there that is unclassified that could be shared, and an example is the international organization called FIRST. [25:35] - How does the U.S. government decide which company they are going to give a contract to? [28:05] - John shares what you need to look at when conducting your own research. [31:29] - The capital, the human portion, and the culture are areas within cyber security to review. [33:49] - We understand that there are a lot of moving parts. [35:00] - Thank you and closing remarks. Contact Mark Melrose Wealth Manager Unity Wealth Management 980-262-4118 Link & Resources John Felker LinkedIn | Twitter
This week, we start the show off with an interview featuring Michael Daniel, President & CEO, Cyber Threat Alliance! Next up, A tech segment walking through Running Windows Inside Containers On Linux! In the Security News for this week: To steal or collect a bug bounty, print bombing an NFL team, Webkit strikes again, hackers be framing, TIPC Linux kernels, is that an Airtag in your pocket, It was Russia unless it wasn't Russia, Cassandra and Magento, and how not to redact! Show Notes: https://securityweekly.com/psw728 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we start the show off with an interview featuring Michael Daniel, President & CEO, Cyber Threat Alliance! Next up, A tech segment walking through Running Windows Inside Containers On Linux! In the Security News for this week: To steal or collect a bug bounty, print bombing an NFL team, Webkit strikes again, hackers be framing, TIPC Linux kernels, is that an Airtag in your pocket, It was Russia unless it wasn't Russia, Cassandra and Magento, and how not to redact! Show Notes: https://securityweekly.com/psw728 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
We speak with Michael Daniel, President & CEO, Cyber Threat Alliance, a nonprofit that coordinates information sharing between leading cybersecurity companies, including Cisco, McAfee, Palo Alto Networks, Symantec, Verizon and more. Prior to joining the CTA in February 2017, Michael served from June 2012 to January 2017 as Special Assistant to President Obama and Cybersecurity Coordinator on the National Security Council Staff. In this role, Michael led the development of national cybersecurity strategy and policy, and ensured that the US government effectively partnered with the private sector, non-governmental organizations, and other nations. Michael provides the outcomes from the Institute for Security and Technology (IST) Ransomware Task Force (RTF). Conducted in partnership with a broad coalition of experts in industry, government, law enforcement, civil society, and international organizations, the RTF released a comprehensive framework to combat ransomware. We also hear Michael's outlook for the industry and the CTA in 2022, as well as his thoughts on Australia's Ransomware Plan. Recorded 18 November 2021 - MySec.TV version available https://mysecuritymarketplace.com/av-media/cyber-threat-alliance-president-ceo-speaks-on-the-ransomware-task-force/ We last spoke to Michael in Sydney in 2017 - here is that interview https://australiancybersecuritymagazine.com.au/episode-9-cyber-threat-alliance-cta-president-michael-daniel-in-sydney-aisacon17/
On this week's Cyber Report, sponsored by Northrop Grumman, Rear Adm. Mark Montgomery, USN Ret., the executive director of the Cyberspace Solarium Commission, with an update on the cyber aspects of the $1.2 trillion bipartisan infrastructure act and President Biden's proposed $1.85 trillion Build Back Better initiative as well as the commission's proposals that are likely to be adopted by Congress in upcoming legislation; and J. Michael Daniel, the president and CEO of the Cyber Threat Alliance, discusses the recent worldwide cyber threat report issued by Palo Alto Network's Unit 42 — produced in cooperation with CTA — with Defense & Aerospace Report Editor Vago Muradian.
On this week's Cyber Report, sponsored by Northrop Grumman, Michael Daniel, the president of the Cyber Threat Alliance, discusses ransomware gang REvil's accusation against the United States, the role of law enforcement, military and intelligence agencies in fighting ransomware attacks, next steps in the battle, the right policy carrots and sticks to improve private-sector security, and countering Russia's continuing cyber espionage operations with Defense & Aerospace Report Editor Vago Muradian.
In addition to being Chairman and CEO of cybersecurity firm Rapid7, Corey Thomas also serves on the boards of Cyber Threat Alliance, the Massachusetts Competitive Partnership, Blue Cross Blue Shield of Massachusetts, and many others. In this episode, Corey outlines the best career advice he ever received, his observations about the Boston business community and the small moments that were catalysts for his entire career.
Interview linksFollow Michael on Twitter @CyAlliancePrezLearn more about the Cyber Threat AllianceCheck out the Ransomware Task Force, which Michael co-chairsRead Jen's position piece on hack backRapid Rundown linksRead the full text of the Cyber Incident Reporting ActRefresh your memory on the SolarWinds data breachSee who's on the House Homeland Security Committee
Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Today's guest is Tanya Janca (@shehackspurple), founder and CEO of We Hack Purple, an online learning academy, community and weekly podcast that revolves around teaching everyone to create secure software. She's also the best selling author of 'Alice and Bob Learn Application Security'.We chat about Tanya's career journey and the various hats she's collected (there are many!) - as well as being a founder and CEO, she's been a pentester, a CISO, an AppSec Engineer, and software developer. She's worked in startups to public service, including being the CISO for the Canadian elections when Justin Trudeau was elected, to working in tech giants.Tanya has a really interesting perspective on many issues in cybersecurity, as you'll see in this chat. From why application security needs to be given more of a spotlight, to the issue of representation, working closely with devs, and seeking a fundamental change in the way we educate people in the industry.Before that, Ben leads our intro topic. He discusses the influence his father had on him and his security career, which prompts Hazel and Sana to look back at their own lives and talk about their greatest influencers.Plus, we discuss the new proposal from Talos and the Cyber Threat Alliance to truly tackle the global ransomware threat. If you can, please take a few minutes to read Neil Jenkins and Matt Olney's op ed piece on this, which is available on the Talos blog.Time stamps:01:46 - 15:33 Intro topic - Influencing figures, led by Ben15:34 - 32:51 Tanya Janca interview, part 132:52 - 38:49 Ransomware recommendations discussion38:50 - 60:00 Tanya Janca interview, part 260:01 - 66:56 Closing thoughts and outro
This week, in our first segment, we welcome Stephen Newman Vice President of Product Marketing, at Gigamon ThreatINSIGHT, to discuss " Redefining SaaS Security so SOC/IR Teams Aren't in the Dark, Distracted, or Alone "! In the enterprise news, Proofpoint unveils people-centric innovations across its three platforms, Citrix Secure Internet Access Simplifies Hybrid Workforce Challenges, CyberArk : Advances Industry-Leading Identity Security Platform, AI-powered cybersecurity provider ExtraHop to be acquired for $900M, New Israeli Unicorn Exabeam Hits $2.4 Billion Valuation, Microsoft acquires ReFirm Labs to boost its IoT security offerings, and more! In our final segment, we have two prerecorded RSAC 2021 interviews airing back-to-back featuring Kevin Gallagher, Chief Revenue Officer at Netsparker, and then Michael Daniel, the President & CEO of Cyber Threat Alliance! Show Notes: https://securityweekly.com/esw230 Segment Resources: https://www.gigamon.com/content/dam/resource-library/english/solution-brief/sb-gigamon-threatinsight.pdf Visit https://securityweekly.com/fortinet to learn more about them! Visit https://securityweekly.com/netsparker to learn more about them! Visit https://securityweekly.com/gigamon to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, in our first segment, we welcome Stephen Newman Vice President of Product Marketing, at Gigamon ThreatINSIGHT, to discuss " Redefining SaaS Security so SOC/IR Teams Aren't in the Dark, Distracted, or Alone "! In the enterprise news, Proofpoint unveils people-centric innovations across its three platforms, Citrix Secure Internet Access Simplifies Hybrid Workforce Challenges, CyberArk : Advances Industry-Leading Identity Security Platform, AI-powered cybersecurity provider ExtraHop to be acquired for $900M, New Israeli Unicorn Exabeam Hits $2.4 Billion Valuation, Microsoft acquires ReFirm Labs to boost its IoT security offerings, and more! In our final segment, we have two prerecorded RSAC 2021 interviews airing back-to-back featuring Kevin Gallagher, Chief Revenue Officer at Netsparker, and then Michael Daniel, the President & CEO of Cyber Threat Alliance! Show Notes: https://securityweekly.com/esw230 Segment Resources: https://www.gigamon.com/content/dam/resource-library/english/solution-brief/sb-gigamon-threatinsight.pdf Visit https://securityweekly.com/fortinet to learn more about them! Visit https://securityweekly.com/netsparker to learn more about them! Visit https://securityweekly.com/gigamon to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Ransomware, hackers hijacking systems and demanding big money to release them, has become more than a threat for state and local governments and school districts. So far the federal government has been lucky. Now a coalition of companies and non profits called the Institute for Security and Technology has come up with a long list of recommendations for dealing with ransomware. For more the president and CEO of the Cyber Threat Alliance and for White House cybersecurity special assistant, Michael Daniel.
In this second “Secure in Mind” podcast episode, Nick Kelly speaks with J Michael Daniel, President Obama's Cyber Security Czar, on the importance of constructing an effective Cyber Security Policy, for Cybersecurity360.it This “Secure in Mind” podcast episode sees Nick Kelly speak with J. Michael Daniel, who prior to his current role as CEO of the Cyber Threat Alliance, served as the advisor on Cyber Security in the Executive Office of the President to President Obama from 2012 – 2017. This position earned him the title ‘President Obama's Cybersecurity Czar'. The complexities of constructing effective cyber policy In what was an incredibly rich and interesting discussion with a man who has seen it all, we explored the complexities of constructing effective cyber policy in a multi-layered, complicated environment with numerous moving parts. How do you ensure that clear communication and threat intelligence-sharing is conducted across Federal & State government departments, the Military, Intelligence, Private sector, the broader international community and allies, as well as the global citizenry? Listen to this podcast to find out. The Secure in Mind project Our mission is to greatly increase and encourage community discussion about technological and ethical issues that have done, are and will impact society on a global scale. There is a longstanding and distinct disconnect between the way information is packaged and presented to the public and the effectiveness of this presentation in terms of generating informed, considered debate. If we can take complex, important topics and present them, as best we can, in a manner that can interests people from outside the speciality, then we have surpassed our expectations. Nick Kelly Bio Nick has spent years living and breathing different cultures in far flung lands the world over. From Guatemala to Cambodia and numerous places in between, he has collaborated, negotiated, elaborated and celebrated with fascinating people from all walks of life the world over. Not one to be put in a box, his background is highly varied and yet has always been involved in or associated with technology and ethics, and he brings this unique breadth of perspective to the table.
Podcast: The Cyberlaw Podcast (LS 46 · TOP 1% what is this?)Episode: Episode 351: When will Cyberattacks on the Grid Become the New Normal?Pub date: 2021-03-01In the news roundup, David Kris digs into rumors that Chinese malware attacks may have caused a blackout in India at a time when military conflict was flaring on the two nation's Himalayan This leads us to Russia's targeting of the US grid and to uneasy speculation on how well our regulatory regime is adapted to preventing successful grid attacks.; The Biden administration is starting to get its legs under it on cybersecurity. In its first major initiative, Maury Shenk and Nick Weaver tell us, it has called for a set of studies on how to secure the supply chain in several critical products, from rare earths to semiconductors. As a reflection of the rare bipartisanship of the issue, the President's order is weirdly similar to Sen. Tom Cotton's to "beat China" economically.; Nick explains the most recent story on how China repurposed an NSA attack tool to use against US targets. Bottom line: It's embarrassing for sure, but it's also business as usual for attack teams. This leads us to a surprisingly favorable review of the Cyber Threat Alliance's recent paper on how to run a Vulnerability Equities Process.; Maury explains the new rules that Facebook, WhatsApp and Twitter will face in India. Among other things, the rules will require Indi-based "grievance officers" to handle complaints. I am unable to resist snarking that if ever there were a title that the wokeforce at these companies should aspire to, it's Chief Grievance Officer.; Nick and I make short work of two purported scandals – ICE investigators using a private utility database to enforce immigration law and the IRS purchasing cellphone location data. I argue that the first is the work of ideologues who would loudly protest ICE access to the White Pages. And the second is a nonstory largely manufactured by Sen. Wyden.; In a story that isn't manufactured, David and I predict that the Supremes will agree to decide the scope of cellphone border searches. More than that, we conclude, the Ninth Circuit will lose. The hard question is how broadly the Court decides to rule once it has kicked the Ninth Circuit rule to the curb.; Maury reports that Facebook and Google have pushed the Aussie government into a compromise on paying Aussie media fees for links.; Facebook gets the credit for being willing to shoot the family members the government was holding hostage (although in Facebook's case, the hostage was probably a second cousin once removed).; Maury predicts that the negotiations will be tougher once the European Union starts rounding up its hostages.; In Quick Hits, I claim credit for pointing out years ago that sooner or later the crybullies would come for "quantum supremacy." And they have.; Maury and I note the rise of audits for AI. He's mildly favorable; I am not. And I close by noting the surprisingly difficult choices illustrated by Pro Publica's story on how the content moderation sausage was made at Facebook when the Turkish government demanded that a Kurdish group's postings be taken down.; And more! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.The podcast and artwork embedded on this page are from Steptoe & Johnson LLP, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In the news roundup, David Kris digs into rumors that Chinese malware attacks may have caused a blackout in India at a time when military conflict was flaring on the two nation's Himalayan border. This leads us to Russia's targeting of the U.S. grid and to uneasy speculation on how well our regulatory regime is adapted to preventing successful grid attacks. The Biden administration is starting to get its legs under it on cybersecurity. In its first major initiative, Maury Shenk and Nick Weaver tell us, it has called for a set of studies on how to secure the supply chain in several critical products, from rare earths to semiconductors. As a reflection of the rare bipartisanship of the issue, the president's order is weirdly similar to Sen. Tom Cotton's to “beat China” economically. Nick explains the most recent story on how China repurposed an NSA attack tool to use against U.S. targets. Bottom line: It's embarrassing for sure, but it's also business as usual for attack teams. This leads us to a surprisingly favorable review of the Cyber Threat Alliance's recent paper on how to run a Vulnerability Equities Process. Maury explains the new rules that Facebook, WhatsApp and Twitter will face in India. Among other things, the rules will require Indi-based “grievance officers”to handle complaints. I am unable to resist snarking that if ever there were a title that the wokeforce at these companies should aspire to, it's Chief Grievance Officer. Nick and I make short work of two purported scandals—ICE investigators using a private utility database to enforce immigration law and the IRS purchasing cellphone location data. I argue that the first is the work of ideologues who would loudly protest ICE access to the White Pages. And the second is a nonstory largely manufactured by Sen. Wyden. In a story that isn't manufactured, David and I predict that the Supremes will agree to decide the scope of cellphone border searches. More than that, we conclude, the Ninth Circuit will lose. The hard question is how broadly the Court decides to rule once it has kicked the Ninth Circuit rule to the curb. Maury reports that Facebook and Google have pushed the Aussie government into a compromise on paying Aussie media fees for links. Facebook gets the credit for being willing to shoot the family members the government was holding hostage (although in Facebook's case, the hostage was probably a second cousin once removed). Maury predicts that the negotiations will be tougher once the European Union starts rounding up its hostages. In quick hits, I claim credit for pointing out years ago that sooner or later the crybullies would come for “quantum supremacy.” And they have. Maury and I note the rise of audits for AI bias. He's mildly favorable; I am not. And I close by noting the surprisingly difficult choices illustrated by Pro Publica's story on how the content moderation sausage was made at Facebook when the Turkish government demanded that a Kurdish group's postings be taken down. And more! Download the 351st Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets.
Talos intakes a ridiculous amount of information every day. So how do we parse what is and isn’t important enough to share? In this episode of Talos Takes, Amy Henderson from our Threat Intelligence and Interdiction team talks about our information-sharing partnerships with both private and public entities. How do we disseminate important information to our friends in the field? And why are security organizations like the Cyber Threat Alliance so important?
This episode was recorded live on: 6/8/2020 The Cyber Threat Alliance is unique. No other organization enables cybersecurity providers to share threat intelligence at both machine and human speed – and then do something with that intelligence. Here, FortiGuard Labs' Derek Manky sits down with CTA's Michael Daniel to discuss lessons learned in building this organization from the ground up. We will discuss the challenges we overcame, how we evolved as the cyber industry and the threat world evolved, and the benefit of collaborating with your peers across the industry from a member’s point of view. We have proven that threat intelligence sharing among competitors not only benefits the ecosystem as a whole, but it makes the sharing organizations better off too. Building this program was not easy and we'll reflect back on the years it took to get the threat intelligence sharing framework and platform right. Learn more: https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&referrer=https%3A%2F%2Ft.co%2FaHuGAtCF0U%3Famp%3D1&eventid=2386279&sessionid=1&key=28574C45EA4DBC080C8B6F2C02D21C0B®Tag=&sourcepage=register Watch on YouTube: https://www.youtube.com/watch?v=Z3LrvcUZjXs
In this episode, host Jim Lewis talks with Michael Daniel, President and CEO of the Cyber Threat Alliance, and former Special Assistant to President Barack Obama and Cybersecurity Coordinator at the National Security Council. They discuss how cybersecurity leadership can be structured in the executive branch, the role of government in driving cybersecurity progress, and the importance of threat intelligence sharing for reducing cybersecurity risks.
Barack Obama's former cybersecurity coordinator Michael Daniel, now the CEO of the nonprofit Cyber Threat Alliance, talks with Recode’s Kara Swisher about the state of US cybersecurity heading into the 2020 elections. Daniel says the proposed solutions to election hacking may just cause new problems: "If you can track your vote," he says, "I can track your vote." Featuring: Michael Daniel (@CyAlliancePrez), president and CEO, Cyber Threat Alliance Hosts: Kara Swisher (@karaswisher), Recode co-founder and editor-at-large More to explore: Subscribe for free to Pivot, Kara’s podcast with NYU Professor Scott Galloway that offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. About Recode by Vox: Recode by Vox helps you understand how tech is changing the world — and changing us. Follow Us: Newsletter: Recode Daily Twitter: @Recode and @voxdotcom ... But enough about us We are conducting an audience survey to better serve you. It takes no more than five minutes, and it really helps out the show. Please take our survey here. Learn more about your ad choices. Visit megaphone.fm/adchoices
In today’s podcast, we hear about leadership changes at the US Department of Homeland Security. A look at credential stuffing. Cryptojacking disrupts production at an optical equipment manufacturer. The British Government moves toward establishing a duty of care that would impose new legal responsibilities on search engines, social media, and others. Tax season scams grow more plausible, and some of them are aimed at rounding up money mules. Rick Howard from Palo Alto networks reflects on the accomplishments of the Cyber Threat Alliance. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_08.html Support our show
In today’s Cyber Security Brief, Dick O’Brien is joined by Neil Jenkins, the Chief Analytic Officer at the Cyber Threat Alliance (CTA). The CTA brings together various vendors in the cyber security community to help them better protect their customers and the public at large. Neil tells Dick about the aims of the CTA, its achievements and challenges so far, and the alliance’s plans for the future.
The White House released a new national cybersecurity strategy last fall. Is it working? Two cyber experts think they have the answer. Federal News Network's Scott Maucione spoke with Jason Healey, senior research scholar at Columbia University's School for International and Public Affairs, and Neil Jenkins, chief analytic officer at the Cyber Threat Alliance, on Federal Drive with Tom Temin.
The EastWest Institute's Global Vice President Bruce McConnell speaks with Michael Daniel, president of the Cyber Threat Alliance and former special assistant to the President and cybersecurity coordinator at the White House, on how governments and the private sector respond to cyber incidents and threats. “There are some estimates that are showing that the level of criminal activity has reached the point where it actually outstrips the GDP of all but a few handful of the largest economics on the planet,” says Daniel. “That’s not really a tenable place for us to be… that’s actually becoming a threat to cyberspace and the utility of cyberspace, as well.”
Recorded 8/8/18 - We decided to broadcast while we were all together at Black Hat - and invited everyone over for lunch and beers. Since we had a room full of people, we made this EP “choose your own podcast” and tooks topics from the audience. Neil Jenkins from the Cyber Threat Alliance came by to bestow befitting superhero swag on Matt and Adam for their work on VPNFilter. Headlining this event is our very special guest - Dave Bittner from The CyberWire. Full show notes podcast [blog post](https://blog.talosintelligence.com/2018/08/beers-with-talos-ep-35-live-from-rira.html)
In today's podcast we hear that Ukraine has warned of hybrid warfare during UN counter-terrorism meetings. ProtonMail DDoS continues. Security concerns surrounding ZTE, Huawei, and China Mobile. Retail data breaches. A quiz app's backup data are accessed by unauthorized parties. FBI, FTC, and SEC sift through Facebook's answers to questions for the record. A strange set of symptoms among diplomats in China arouses suspicion of infrasound weapons. Rick Howard from Palo Alto Networks on the Cyber Threat Alliance. Guest is Vince Arneja from 5nine on secure cloud implementations.
One of the most prolific CSO's in the industry, who works for one of the largest Cyber Security Companies in the World, appears on this week's episode of Task Force 7 Radio. Listen to Rick Howard of Palo Alto Networks talk about his views in quantifying the risks associated with Cyber Security threats and vulnerabilities, how the wrong risk management approach can actually introduce more risk into your environment, and how quantitative, probabilistic methods are an effective way to mitigate risk in the cyber security space. Howard also delves into his views on the defense in depth security model, if companies are really implementing the Cyber Kill Chain Model effectively, what is Automatic Security Enterprise Orchestration, the importance of partnerships in cyber security, what the Cyber Threat Alliance is and what they are trying to accomplish, the Cyber Security Talent Crisis and how organizations can attract more minorities, including women into the cyber security field.
Michael Daniel, President of the Cyber Threat Alliance and former Special Adviser to President Obama joins Chuck to talk about the state of cyber defense. Along the way he describes how internet security is like disaster response, and why your Amazon Echo might not be so bad after all.
Michael Daniel, President of the Cyber Threat Alliance and former Special Adviser to President Obama joins Chuck to talk about the state of cyber defense. Along the way he describes how internet security is like disaster response, and why your Amazon Echo might not be so bad after all.
In our 156th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, and Stephanie Roy discuss: Wikileaks releases a second installment, this time mostly focusing on Apple, which scoffs at the alleged vulnerabilities; Wikileaks offers contract to pre-disclose leaked vulnerabilities; Third Circuit upholds contempt ruling for forgetting password; Congress begins the CRA process for internet telecom privacy regulations; another bad omen for the crypto imperialists of Silicon Valley: UK Home Secretary calls Whatsapp crypto “completely unacceptable.; Does GCHQ spy on Americans for NSA?; electronic devices won’t fly from Mideast; Bossert urges no changes to 702; North Korea’s bid to breach global banks. Our guest interview is with Michael Daniel, former Special Assistant to the President and Cybersecurity Coordinator at the White House and current President of the Cyber Threat Alliance. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
In today's podcast we hear assessments of WikiLeaks' latest Vault 7 files—compromised supply chain or damp squib? NATO worries about Russian information operations. ISIS continues to push jihadist inspiration online, claiming the London killer as one of the Caliphate's soldiers. Facile attribution can mislead, as seen in a surprising arrest. Comments on America's Joblink Alliance breach. Acalvio's Chris Roberts wonders if AI and Machine Learning are all they're cracked up to be. Palo Alto Networks' Rick Howard has an update on the Cyber Threat Alliance. And Estonian experience suggests to the world that President Putin is a proud spirit who cannot endure to be mocked.
TechByter Worldwide (formerly Technology Corner) with Bill Blinn
The Cyber Threat Alliance says that it has cracked the code on CryptoWall, malware that's associated with $325 million in payments to crooks, but there's bad news, too. A single image created by today's digital cameras, shooting in raw mode, wouldn't even fit on the original PC hard drives. And that's just one crazy thing about today's technology. In Short Circuits: The end is approaching for Windows 7, a first glance at On1's Photo 10, and Firefox seems to be fading away. In Spare Parts (only on the website): Traditional camera manufacturers are being overrun by electronics manufacturers, the launch of Halo 5 was the biggest ever for the franchise, and there's a utility that claims to eliminate dead links on websites and in documents.