POPULARITY
LaColombe CEO Todd Carmichael: Yes… Coffee Really Is That Important "You know… this is, excuse me, a damn fine cup of coffee. I’ve had I can’t tell you how many cups of coffee in my life, and this… this is one of the best" -- Special Agent Dale Cooper, Twin Peaks When is the last time you went to work and saw no one drinking a cup of coffee? Imagine a cybersecurity world where this is no lattes… no PSLs… no nitro cold brews… I know… I know… it’s totally science fiction and the stuff of nightmares. LaColombe co-founder and CEO Todd Carmichael is here to allay those fears. When he isn’t revolutionizing the coffee world, he is putting in good works around the country and around the world. Whether it is assisting in rebuilding Haitian coffee farms or working in his area to help his local school district, Todd has a lot on his plate. Did we mention that he holds the world record for the fastest solo trek across Antarctica to reach the South Pole? Yeah. He did that. Now consider our real world… What if I told you that US coffee drinkers consume about 3 cups a day on average… What if I told you that the US coffee shop market did $45.4 BILLION in business 2018 with over 35,000 stores… Did I mention that Pabst Blue Ribbon recently introduced Hard Coffee? Yeah… Coffee really is that important This week on InSecurity Matt Stephenson speaks with Todd Carmichael about a life long, globe spanning journey that includes trekking across Antarctica, a hand-restored sailboat, all 7 continents, a hand made, blown glass bong that revolutionized the coffee industry, helping to rebuild Haitian coffee farms and how he hacked the coffee industry because “America deserves a better cup of coffee.” About Todd Carmichael Todd Carmichael’s passion to push the U.S. coffee scene forward, alongside his partner and co-founder JP Liberit, pushed La Colombe to the forefront of the ethical trade movement where they regularly dabble in new terrain, invent ground-breaking new brewing devices and beverages, such as the first ever Draft Latte. He is also the host of two Travel Channel series, Dangerous Grounds and Uncommon Grounds. A passionate crusader for social and ecological causes, Todd has a decades-long history of undertaking self-supported treks into challenging environments. He’s visited nearly half of the world’s countries, crossed large parts of the Sahara Desert on foot, as well as the Gobi Desert, Namib Desert, and others. He is also the first American to solo trek across Antarctica from the coast to the South Pole, establishing a world record speed of 39 days, 7 hours, and 49 minutes. Oh… and… in 2018, he was the 46th Coolest Dad in the world. Just saying… Married to singer songwriter Lauren Hart, the couple have expanded their family by adopting three beautiful girls and a baby boy from Ethiopia. Todd is also an author and contributor to the Huffington Post and Esquire Magazines. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Parham Eftekhari: Is Government Cybersecurity Broken? … the Internet is not something that you just dump something on. It's not a big truck. It's a series of tubes. -- former Senator Ted Stevens, 2006 This photo… is not a photo of the internet… in case you were wondering. Do we really want to trust that our elected officials have the slightest idea of what to do with regards to cybersecurity? Whether it is election meddling, attempts to hack voting facilities or data breaches of personnel records… this is territory that needs detailed research and expert analysis. The current administration proposed an overall federal cybersecurity budget of $17.4 billion, which is an increase from the estimated $16.6 billion in fiscal 2019. Under this proposal, Civilian agencies overall would receive $7.79 billion which is roughly 1.5 percent below current levels. If that number seems odd, that’s probably okay considering how much attention cybersecurity is attracting. However, it could have been worse, given the current administration’s general desire to trim civilian-agency spending. The White House is proposing to reduce overall non-defense spending by 5 percent. With just a little bit of focus, we can discern that an agency was more likely to be proposed for an increase if it works on national security in some way. Cybersecurity efforts at the Departments of Energy, Justice and State all saw increases of over 7% or more. Cyber programs at the Office of Personnel Management, which is under close scrutiny for how it protects the data of federal employees, saw a 4% increase to $47 million. You may recall the famous OPM data breach a few years back that put over 21 Million records into the wild Oh… and… not for nothing… but it was Cylance that fixed that one… In this episode of the InSecurity Podcast, Matt Stephenson welcomes ICIT Executive Director Parham Eftekhari for a chat about what is happening in Washington when it comes to American policies on Cybersecurity. We take a look at the key pillars of Technology, Budget, Lobbying/Partisan politics and Legislation. Wanna drain the swamp? Take a listen first. About Parham Eftekhari Parham Eftekhari (@icitorg) is the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), the nation’s leading cybersecurity Think Tank whose mission is to improve the resiliency of the country’s 16 critical infrastructure sectors and empower generations of cybersecurity leaders. Leveraging 15 years of technology industry experience, Parham advises the world’s top public and private sector cybersecurity leaders, manages strategic alliances, executes business strategies, and builds meaningful thought leadership and educational programs. Parham has organized, led or contributed to over 100 cybersecurity briefings and events at institutions including Congress, TEDx, C-SPAN and the World Bank, and regularly speaks to the media on cybersecurity issues. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Chuck Brooks: Examining the Future I'm the operator With my pocket calculator I am adding And subtracting I'm controlling And composing By pressing down a special key It plays… Kraftwerk: Pocket Calculator, 1981 Computer World How about this for a picture of the present with a look to the future… What if I told you that chatbots will power 85 percent of customer service by 2020… McKinsey Global Institute did a study that found 20% of C-level executives claim to be using Machine Learning and/or Artificial Intelligence as a core part of their business. Our friends at IDC proclaimed that global spending on cognitive and AI systems is expected to reach $57.6 billion in 2021. And finally… as if we aren’t already tired of hearing about the IT skills gap… Forbes recently announced that the number of jobs requiring AI skills has grown 450% since 2013… Are we ready for the future? Hell… are we even ready for the present!?!?! Chuck Brooks has published over 180 articles about Cybersecurity, Artificial Intelligence, Homeland Security and the Internet of Things… among other things… He has written for some of the most important publications in the world including Forbes, The Hill and the MIT Sloan Blog. It is fair to say that Chuck has his eye on the future and has an idea or two about what needs to be done to secure it. In this week’s episode of InSecurity, Matt Stephenson proudly welcomes in Chuck Brooks for a look into his crystal ball to see what the future may hold for the world of technology and, by definition, cybersecurity. We look at AI, automation, IoT, Quantum Computing and even Ray Kurzweil’s thoughts on what is to come. Want to get weird? This week’s episode is for you. About Chuck Brooks Chuck Brooks (@ChuckDBrooks) is the Principal Market Growth Strategist of General Dynamics Mission Systems for Cybersecurity and Emerging Technologies. He is also Adjunct Faculty in the graduate Applied Intelligence Program at Georgetown University and teaches courses in risk management, homeland security and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn out of their 600 million members. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance” and by IFSEC as the “#2 Global Cybersecurity Influencer” in 2018. He is also a featured contributor to Forbes, a Cybersecurity Expert for The Network at the Washington Post and Visiting Editor at Homeland Security Today. Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University and a Certificate in International Law from The Hague Academy of International Law. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Jay Prassl: Patch Your $#!% Are ALL of Your Apps and OSes up to date? Are you sure? How can you tell? An American Dental Association study in 2008 found that if you don’t brush your teeth you COULD DIE. The ADA recommends brushing your teeth twice a day for 4 minutes each time. What the hell does that have to do with anything? Stick around… According to Ponemon, nearly half of all companies they surveyed had suffered a breach. 57% of those companies were breached due to an unpatched vulnerability. A third of those companies KNEW they were vulnerable before the breach. The average company spends 321 labor hours a week managing their vulnerability response process. How’s that compare to spending 4 minutes, twice a day brushing your teeth? Starting to feel the connection there? In 2017, WannaCry affected over 200,000 machines in 150 countries over a weekend. The attack weapon was developed using NSA tools built to exploit Windows vulnerabilities. What I told you that Microsoft had released a patch for this vulnerability over a month before WannaCry hit? Speaking of Microsoft… our good friends at TripWire offer the following tell us that, in 2015, Microsoft alone issued 2804 patches. That’s roughly 56 patches every Tuesday… and that’s JUST Windows OS & applications Noodle on those numbers a bit… In this week’s episode of InSecurity, Matt Stephenson spoke with Automox CEO Jay Prassl about the role that patching plays in every business’s cybersecurity hygiene. He founded Automox based on one simple maxim: Patch Your $#!% When most of us think of key components in cybersecurity, we tend to think of things like ransomware attacks, security solutions that bog down your network or terrible things in TV and movies that sound technical but are actually ridiculous. What if you had a way to keep your network clean and up to date by doing something as simple and boring as keeping your Operating Systems and applications up to date… Take a walk with Jay Prassl and see what you think. About Jay Prassl Jay Prassl (@jprassl) is the Founder and CEO of Automox. Jay founded Automox founded to pursue a vision: the complete automation of endpoint configuration, patching, management and inventory. Prior to Automox, Jay led the marketing efforts at SolidFire. Before that, he was employee number five at LeftHand Networks, where he spent 10 years breaking new ground in the storage market with the company's distributed SAN solution. He led multiple parts of the LeftHand business through its acquisition by HP. Somehow… when not saving the world through his pursuit of cyber hygiene… Jay finds time to bike, swim and surf. Some of these hobbies are required by state law in order to live in Boulder, Colorado. About Automox Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint and software, regardless of location, meets regulatory and operational security requirements. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future I have absolute control of the record. The thing was, you’re not supposed to touch the middle of the vinyl. DJs are going to hate you. People are going to hate you. You’re going to ruin these records. I decided… that this… was the only way to do this. -- Grandmaster Flash Let’s push the talk about hacking shall we? Hacking is about finding the vulnerable spots in any systems and making your own choices about how to improve that system... rarely with the permission of the system’s owners. Viewed through that prism, Hip-Hop has always been about hacking. Hacking was running 1000 feet of extension cord to a public outlet in order to have a Battle in the park. Hacking was a DJ talking over a record at a club. Hacking was Kool Herc throwing a party at 1520 Sedgwick Ave in the Bronx and not playing disco or pop music. Hacking was Grandmaster Flash touching the middle of the vinyl. Hacking is rhyming with Orange. Dr Roy Christopher has spent a lifetime listening to, researching, teaching and loving Hip-Hop. In this week’s episode of InSecurity, Matt Stephenson digs into the crates with Roy about how Hip-Hop hacked the world to become one of the most significant drivers of modern culture. This will likely be the first podcast you listen to this week featuring steganography, Li’l Pump and John Baptist Porta’s 1558 book series Magia naturalis Do we even need to go on…? Dead Precedents: How Hip-Hop Defines the Future, uses the concerns and conceits of cyberpunk to thoughtfully remap hip-hop's spread from around the way to around the world. Its central argument is that the cultural practices of hip-hop culture are the blueprint to the 21st century, and that an understanding of its appropriation of language and technology is an understanding of the now. This book is about is the many ways that the foundations of hip-hop appropriation--allusions and creative language use, as well as technology and sampling--inform the new millennium. -- www.roychristopher.com About Roy Christopher Roy Christopher (@RoyChristopher) marshals the middle between Mathers and McLuhan… He’s a self-described aging BMX and skateboarding zine kid. That’s where he learned to turn events and interviews into pages with staples. He has written about music, media, and culture for everything from magazines and blogs to journals and books. His current book, Dead Precedents: How Hip-Hop Defines the Future, is an Amazon Best Sller. Roy holds a Ph.D. in Communication Studies from the University of Texas at Austin. He is currently a Visiting Assistant Professor at the University of Illinois-Chicago and a member of the Adjunct Faculty at Loyola University Chicago Disinformation has referred to Roy as “One of the Internet’s leading interviewers of subculture and new-science icons.” Oh… as a child, he solved the Rubik’s Cube competitively. How bout that? About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
DirtySecurity: Kip Boyle: Beware the Cyber-Cooties… Risk Travels We all think we are working hard to protect our data inside our corporate networks. But are we putting the same time and effort into protecting ourselves outside those walls? Risk doesn’t stop at the exit. Once those cyber-cooties get on you, they will travel with you everywhere you go. In this week’s episode of DirtySecurity, Edward Preston sits down with Kip Boyle, Founder and CEO at Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They chat about cyber-hygeine, the ways that risk travels beyond the walls of your corporate network and how public wi-fi is similar to a less than clean municipal swimming pool. About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. s Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Chuck Lerch: In Hawaii, Hi Tech Hui’s Customers Are Ohana When you think of Hawaii… what do you think of? Do you automatically go to white sands, volcanoes and surfing? Or do you think of a $3,000,000,000 IT industry that includes over 2100 related businesses? Do you think of the 31,000 people employed in the tech industry with an average industry wage that is 71% higher than the state’s annual private sector wage? Maybe it is time to reconsider your view of Hawaii… On this week’s episode of DirtySecurity, Edward Preston sits down with Chuck Lerch, CEO of Hi Tech Hui. Edward and Chuck talk about the unique nature of running an MSP in Hawaii. From the the constant battles ransomware and malware to dealing with the cloud, it turns out that it’s not always paradise living and working in… well… paradise. About Chuck Lerch Chuck Lerchis the CEO at Hi Tech Hui, based in Honolulu, Hawaii. He is an expert in IT Architecture and Infrastructure. Chuck’s diverse experience with multiple industries and startups has helped him solve the most technical and complex IT problems. He's been the CIO and CTO at security focused companies both in Hawaii and the continental United States. Chuck’s passion for secure networks is what lead him to his love and vision to bring cybersecurity solutions to the Hawaiian islands. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Greg Silberman: Keep Ya Nose Out My Business Are the neighbors watching? Is the mail man watching me And I don't feel safe anymore Oh what a mess! I wonder who's watching me now Who? The I.R.S.?!?! -- Rockwell, Somebody’s Watching Me, 1984 Privacy is fundamentally about the ethical and responsible handling of personal data - from initial collection to eventual deletion. It is about understanding the context under which data is shared, providing people choices over how their data is used, and it's about respecting the individual. Many in information security often confuse the goals of privacy and security, or believe that privacy is about secrecy. Put simply, privacy is why security is done and security is how privacy is achieved. It is easy to have security without privacy, but impossible to have privacy without security. In this week’s episode of InSecurity, Matt Stephenson takes a walk with Greg Silberman. Greg is the Chief Privacy Officer at Cylance and knows a thing or two about data privacy at the corporate, user and individual levels. Since the implementation of GDPR, coutries around the world are considering or implementing their own data privacy laws, with varying degrees of success. In the United States, we are about to see California lead with way with 2020’s California Consumer Protection Act. How will this impact business? What will it do to your favorite social media platforms? Will it affect you personally? Come hear what Greg has to say. We won’t tell anyone About Greg Silberman Greg Silberman (@gpsilberman) is the Chief Privacy Officer and Vice President of Legal Affairs at Cylance. As Chief Privacy Officer, Greg oversees the implementation and enforcement of practices that manage data in accordance with the Cylance’s Privacy Principles with respect to employee and customer privacy. Greg has over 20 years’ experience working with companies to develop solutions to address complex business and legal issues at the intersection of intellectual property, privacy, and information security. Prior to joining Cylance in 2016, he was a partner in the Cybersecurity, Privacy, and Data Protection practice group in the Silicon Valley office of Jones Day. Earlier in his career, Greg served as Intellectual Property Counsel at Lawrence Berkeley National Laboratory. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Gabe Deale: Building a Sales Engineering Team to Save the World On this week’s episode of DirtySecurity, Edward Preston chats with Cylance Worldwide VP of Sales Engineering Gabe Deale. Edward and Gabe talk about a wide variety of subjects, ranging from the SE role in securing healthcare data to building an engineering team to phlebotomy… seriously… phlebotomy. What does that have to do with cybersecurity? Tune in and find out! About Gabe Deal Gabe Deal(@Gdealio) has spent over 18 years in the channel and developing startups. Most notably 10 of those years were spent serving as a consultant, an SE and ultimately in a leadership capacity to build out both the pre-sales engineering and national technology solutions consulting practices for Accuvant (now Optiv Security). The channel provided a unique vantage point from which to watch the industry evolve. In 2013, it was clear that big-data analytics and machine-learning were going to change the way we think about solving some of our most challenging security problems. He joined the Cylance team in 2014, where he’s been rapidly expanding the worldwide sales engineering team ever since. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
John Strand: How Does Defence in Depth Look Today? “Our main goal is not to prove that we can hack into a company but to help the customer deveop a series of on point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative” -- John Strand In this week’s episode of InSecurity, Matt Stephenson sits down with John Strand. John is the owner of Black Hills Information Security. If you aren’t familiar, you may want to check out their Sacred Cash Cow Tipping webcast to learn why security love and fear BHIS. Take a walk with us on this one… Matt and John dig into hosted firewalls, Powerman 5000, types of Artificial Intelligence, Joe Vs the Volcano and a few other relevant topics. You are definitely going to want to catch this episode… About John Strand John Strand(@strandjs) is a senior instructor with the SANS Institute. He teaches SEC504: Hacker Techniques, Exploits, and Incident Handling; SEC560: Network Penetration Testing and Ethical Hacking; SEC580: Metasploit Kung Fu for Enterprise Pen Testing; and SEC464: Hacker Detection for System Administrators. John is the course author for SEC464: Hacker Detection for System Administrators and the co-author for SEC580: Metasploit Kung Fu for Enterprise Pen Testing. John is also the owner of Black Hills Information Security, a company specializing in penetration testing and security architecture services. He feels strongly that education is how the world of information security will change for the better and spends a considerable amount of time teaching and presenting around the world. He has presented for the FBI, NASA, the NSA, DefCon and is a frequent guest on Enterprise Security Weekly. In his spare time he writes loud rock music and makes various futile attempts at fly-fishing. There’s a reason the name Black Hills Information Security puts security vendors on notice… check out their webcasts and podcasts to find out why. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Rob Bathurst: Is It Even Possible to Secure Connected Medical Devices? Global spending on Medical IoT has exploded. In 2015, research showed it at $5 Billion. Current projections for 2020 state that Medical IT spending will top $20 Billion. McKinsey predicts the IoT market will be worth $581 Billion for Industrial Control Technology by 2020 Connected medical devices and other IoT embedded systems are big targets for criminal organizations looking to capitalize on any weakness in their security. But it’s not just criminals. Connected devices are attractive targets for a variety of bad actors including nation states who are looking for any weak spot to gain entrance into networks and cause chaos On this week’s episode of DirtySecurity, Edward Preston sits down with Cylance the Worldwide Managing Director of Healthcare Rob Bathurst. Rob addresses the unique challenges that Healthcare providers face in protecting their medical devices. With the rise of connected devices and IoT in healthcare, there are more vulnerable points than ever that must be secured and protected. About Rob Bathurst Rob Bathurst is the Worldwide Managing Director of Healthcare at Cylance. Rob also serves as the General Manager of CypherFrame. With over 16 years in information technology and cybersecurity leadership, Rob is a recognized expert in embedded systems and strategic information security spaces and is often requested as an executive advisor and consultant. Prior to Cylance, Rob was the senior technical advisor for emerging threats to healthcare at the Mayo Clinic where he started and built the technical vulnerability assessment team and in-house medical device testing program. In his executive capacity, Rob has led and overseen engineering and security services for multiple Fortune 100 clients in everything from automotive to healthcare. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Stephanie Domas: Maybe Your Pacemaker Can’t Kill You Being a CISO for a large healthcare organization has a degree of difficulty that will give you a headache. For a second… forget about the fact that hospitals are here to heal, cure and research. Take a cold, clinical look just at the medical technology involved in a hospital Let’s look at one Healthcare org as an example: The Mayo Clinic has 25,000 networkd medical devices More than 6,000 unique makes and models Industry Best Practices states that each device should have A unique 20 character password For every employee On every device A system that locks users out after 10 minutes of inactivity A new passwords every 30 days Mayo Clinic has 63,000 doctors, and allied health staff Do the math... That’s around 19,000,000,000 passwords to be entered. And that’s assuming no one is automatically logged out after 10 minutes of inactivity. In the healthcare industry, inefficiency can cost lives. But so can a lack of security. In this week’s episode of InSecurity, Matt Stephenson talks with Stephanie Domas. Stephanie is the Vice President of Research & Development at MedSec. Her job is to oversee the design and manufacture of connected medical device solutions that save lives, but are also secure. File this one under “be careful what you wish for.” About Stephanie Domas Stephanie Domas is a driven leader and respected industry authority in healthcare, and device cybersecurity. Her passion for cybersecurity, secure product design, and healthcare has earned her industry recognition and presentations at dozens of cybersecurity and healthcare conferences. In her current role as Vice President of Research & Development at MedSec she leads business strategy, engineering and research teams to deliver service and product offerings that help the Healthcare community meet the unique challenges of cybersecurity in medical devices. Her current focus is leading product cyber security teams, software development teams, and business strategy for a wide range of services and product offerings, along with implementing security governance programs into quality systems and design process Stephanie has presented security talks at some of the most important events in the world, including Black Hat, DEFCON, DerbyCon and a myriad of notable Healthcare conferences. Make sure to check out Stephanies Ted Talk: Protecting Medical Devices from Cyberharm About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Bill Strub: Durability among MSPs in Cybersecurity Your Inbox, voice-mailbox and social media feeds (aka unfiltered research pages) … are filling up everyday with spam and junk from companies trying to tell you that the aliens from Saturn’s 3rd moon are about to attack and your organization clearly do not have the best security posture. To compound the problem… many of the claims in the junk are true… or at least contain a nugget of truth 3rd party Consultants, Resellers, Managed Security Service Providers … what does it take to be durable among so many other vendors in the cybersecurity space? Do you have to get lucky? Do you have to find one magical product or servic? What is the secret? On this week’s episode of DirtySecurity, Edward Preston chats with Navilogic Co-Founder Bill Strub on the appeal of founding a new organization in an ever-crowding cybersecurity industry. They also take a look at the work Navilogic is doing to with some new and exciting young companies you may not have heard so much about and why new and/or different approaches work better for Navilogic’s customers. About Navilogic NaviLogic offers managed and co-managed services and technologies to help their clients take control of their risk and compliance, drive efficiency, and use actionable insights to enable effective decisions. About Bill Strub Bill Strub is the co-founder of Navilogic. He is a dynamic and strategic IT security leader and consulting executive with more than 20 years of accomplishment in growing and expanding businesses. He is an entrepreneur and business leader with success integrating strategies, innovations, technologies, and personnel to build successful teams. Prior to co-founding NaviLogic in 2014, Bill was Director of Strategic Alliances for Qualys, a cloud security and compliance services firm. Before that, Mr. Strub co-founded and served as Vice President of Service Offerings for Accuvant (now Optiv Security). While at Accuvant, Bill played a leading role in building one of the largest, most well-respected information security providers in the United States. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review! and compliance services firm. Before that, Mr. Strub co-founded and served as Vice President of Service Offerings for Accuvant (now Optiv Security). While at Accuvant, Bill played a leading role in building one of the largest, most well-respected information security providers in the United States. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future. In this week’s episode of InSecurity, Matt Stephenson chats with Kip Boyle, Founder and CEO at Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They discuss the tools and processes a business will need to mitigate cyber risk and online threats. Kip has developed a 5-Principle approach that will help safeguard your business from cyber attacks. Fire Doesn’t Innovate The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Ramita Sawhney: You Build the Things; MSSPs Will Secure Your Data According to SecurityBoulevard.com, more Managed Service Providers will partner up with Managed SecurityService Providers in 2019 than ever before. This can be great news for the enduser. A good MSSP will handle their data security allowing the enduser to focus on their business. But what about the companies who make the security solutions? This can be a tricky situation, as they need to develop their solutions to fit the needs of the MSSP, the MSP and the enduser. Who would be crazy enough to sign up for a gig that includes this many variables? On this week’s episode of DirtySecurity, Edward Preston chats with Cylance Senior Product Manager Ramita Sawhney to find out what, exactly, is involved in evolving a security solution from an enterprise model to one who plays well in the MSSP world. About Ramita Sawhney Ramita Sawhney is a Technical Product Management leader with expertise in building enterprise software in cybersecurity, primarily responsible for development of cloud console, RESTful APIs, and strategic partner integrations. She has extensive experience and passion for building products from ideation to launch through all phases of product development, including market research, competitive analysis, user requirements, UI/UX design, development, beta testing and go-to-market. About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record “Were it left to me to decide whether we should have a government without newspapers, or newspapers without a government, I should not hesitate a moment to prefer the latter.” Thomas Jefferson(before he became president) “Nothing can now be believed which is seen in a newspaper. Truth itself becomes suspicious by being put into that polluted vehicle.” Thomas Jefferson(While serving 2ndterm as president) Odds are, if you are affiliated with cybersecurity in any way, you have been touched by The Cyberwire. They are a cyber security-focused news service which is viewed as a trusted, independent voice in the world of news swirling around cybersecurity. Cyberwire delivers accessible and relevant information by working hard to separate the signal from the noise in an industry overloaded with information and competing messages As our world gets more connected with each new wired device, each new piece of IoT, we need to understand how to protect these things, and by extension, ourselves. In this week’s episode of InSecurity, Matt Stephenson chats with Dave Bittner about Cybersecurity in the year that was and the year to come. They also quote Albert Brooks, discuss octopus eyeballs and debate the merits of Vinyl LPsand cassettescompared to digital music and streaming. You’re not going to want to miss this one… About Dave Bittner Dave Bittner(@bittner) is the Producer and host of the CyberWire DailyPodcast, the top-ranking daily cybersecurity podcast in the world according to iTunes. In addition his duties as host of the CyberWire podcast, he also hosts the Hacking Humans&Recorded Futurepodcasts. Bittner has over twenty years experience in digital media, video and television production and interactive technology. He has developed award winning interactive training programs for a variety of industries, and produced countless corporate, industrial and broadcast programs as co-owner of Pixel Workshop. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Doris Yang: It Takes a Village to Raise a Security Solution “Trust the process” -- Several people associated with the Philadelphia 76ers Most of you are probably aware that developing, testing and releasing a successful and useful software is not a one person job. There may be a visionary who sparks the initial idea, but there is an, at times, arduous process to develop the idea, write the code, test the solution and get it to market in a timeframe that makes it useful to its target market. We all know the role that developers and engineers play in this process, but we may not be as educated on a team who plays a key role… Product Management. On this week’s episode of DirtySecurity, guest host Matt Stephenson chats with Cylance Senior Director of Product Management Doris Yang. Doris explains what it means to be a Product Manager and the role PM plays in the development process. She also digs into Cylance’s Product Management process as well as the role AI can play in the future. About Doris Yang Doris Yangis a Senior Director of Product Management at Cylance where she plays a pivotal role in defining the development and evolution of the CylancePROTECT solution. Before joining Cylance, Doris held senior product management and engineering positions at Vectra Networks, Palo Alto Networks and Symantec. It’s safe to say she has a pretty good idea of how to bring a good security solution to market. About Matt Stephenson (Fill in) DirtySecurity host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward didn’t host this episode, but this is his show, so we need to make sure you know what’s up. Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
InSecurity Podcast: Sara Lofgren: What the Hell does IoT Even Mean? An 80s keypad stuck on a 60s computer system. Take two things that work and nail them together Sam “The Falcon” Wilson Ultimate Galactus Trilogy– Warren Ellis IOT: even the name has different meanings to different people. While people in technology know that IOT stands for “Internet of Things,” what counts as a thing? IOT adoption is ramping faster than home PC or WWW adoption did. The small price tag, stand-alone nature, ease-of-use, and business value of IOT make it appealing to both individuals and industry. With any new technology, utility always proceeds security. So unsurprisingly, security is currently the biggest hurdle to adoption - or as some technologists joke, “there is no 'S' in IOT”. In this week’s episode of InSecurity, Matt Stephenson chats with Sara Lofgren about the present state and future of the Internet of Things. As discrete network boundaries continue to dissolve, the web of connected things will continue to grow and be increasingly vulnerable. These always connected, diverse, and limited-function devices will need a bold and visionary security solution that does not require human interaction. Sara wants to make sure that we are doing the needful to protect the Things, the Data and ourselves… About Sara Lofgren Sara Lofgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for over a decade, with focus on solving enterprise security problems through the union of technology, people, and processes. Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
DirtySecurity Podcast: Anton Grashion: The Private Parts of Security Does privacy even exist any more? Who has access to you and your data? The launch of GDPR in Europe, the signing of the Japanese Act on the Protection of Personal Information (APPI), and the Brazilian Lei Geral de Proteção de Dados (LGPD) started a global shift toward comprehensive data privacy regulations. Gartner predicts that by the end of 2018, more than 50 percentof companies affected by GDPR will not be in full compliance with the requirements. With just a few weeks left to go in the year, many global organizations still fail to adhere to the regulation’s strict conditions and are instead taking a wait-and-see approach. They mistakenly believe compliance only affects large organizations with deep pockets. Cylance provides needed resources to organizations that don’t have the IT and personnel budgets to meet compliance regulations on their own—from identification to remediation to ongoing prevention. In this week’s episode of DirtySecurity, Edward Preston talks with Cylance Managing Director of Security Practice Dr Anton Grisham about living in a post-GDPR world. The pressure is on businesses now to respect and protect the privacy of people across the UK and European Union. About Anton Grashion Anton Grashion, PhD (@doctor_know) is Managing Director, Security Practice at Cylance. Anton has a Masters in Computer Science and PhD in Aritificial Intelligence from Staffordshire University. He’s been in the security game for over 25 years, having founded one of the UK’s first email security-as-a-service companies in 1989. When not working to secure every device under the sun, Anton is a beekeeper and self-describe “rabid” rugby league fan. About Edward Preston Edward Preston (@eptrader) is the Global Director of Consumer Sales at Cylance. Over the past 22 years, Edward has created an eclectic professional portfolio that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Edward joined Cylance in January 2015 in order to help Cylance build out their Business Development, Renewals and SMB divisions and is now a natural evangelist for the entire Cylance brand. Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
DirtySecurity Podcast: Israel Perez & Wajnih Yassine are The Real CSI Cyber Guys It’s Sunday afternoon, about a quarter past 3. You are in your backyard with friends and family members… Everyone is relaxed with a refreshing beverage… sharing stories… laughing at jokes… life is good. Then it happens…. You get that call from one of your C-Level Execs That buzz kill moment when you realize extremely sensitive corporate data is now in the hands of a stranger capable of causing significant damage to your corporate reputation. Your heart races… Your stomach aches… Your head is spins trying to figure out one thing… who am I going to call to help me return my world to normal? In this week’s episode of DirtySecurity, host Edward Preston talks with Cylance Incident Response teammates Israel Perez and Wajih Yassine about the Stages of a Cybersecurity Incident and what their team does to get the world spinning back on its axis again. About Israel Perez Israel is a Consulting Director, IR & Forensics at Cylance. Specializing in incident response, network intrusions, malware reverse engineering and digital forensics. Israel’s expertise with digital forensics has taken him from the Orange County District Attorney’s office, through the ranks at Foundstone and McAfee to Cylance, where he was the very first member of the Incident Response team. About Wajih Yassine Wajih began his time at Cylance as an intern and quickly moved through the ranks thanks to his stellar work with the Threat Analysis team. He is now a Sr. Incident Response & Forensics consultant with a focus on forensic investigation. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Tales from Cylance’s Ultimate Road Warrior Road Shows and Lunch & Learns and Meet & Greets OH MY! For the past 3 years, Richard Melick has traveled all over the world bringing Cylance’s prevention-based endpoint protection to the masses. From the Unbelievable Tour to the UNDRWRLD Tour and beyond, Richard has created 0-Day malware and ransomware in front of thousands of people, then challenged CylancePROTECT to prevent those 0-Days from executing… all live in front of a an audience. There was no safety net. There was no chance to make a second first impression. These events were more than just marketing though. Richard was there to inform and educate his guests on the perils of Ransomware-as-a-Service. Sometimes, there were even headline grabbing events like WannaCry and Petya/NotPetya. In this week’s episode of DirtySecurity, Edward Preston chats with Cylance’s world traveler about the evolution of their live road shows. Find out what we’ve learned from the past, what we’re doing in the present and Cylance’s plans for the future. About Richard Melick Richard Melick(@RCMelick) has over a decade of experience in Cybersecurity and Antivirus Software. Working in various career functions in the industry that have taken him all over the world. His focus is emerging next generation Cybersecurity and Antivirus Software About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
HuntSource is working hard to fill the Cybersecurity skills gap Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe. Over two thirds of all network compromises are not discovered for months The average cost to a business for each record lost to a data breach is $148 3.5 million cybersecurity job vacanciesby 2021 These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present? Have you heard some of this before? We hope you enjoyed last week’s tribute to Orson Welles and our CyberWar of the Worldpodcast. Now let’s get serious and have an in depth discussion about the Cybersecurity Skills gap…. In today’s episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day. About Huntsource Huntsourceseeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything. Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe. About Matt Donato Matt Donatois the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business. About Jack Hall Jack Hallis the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
InSecurity Podcast: Steve Snyder on the past, present and future of currency Fortnite and Bitcoin and Dollars OH MY! What makes real money... REAL? What if I told you a man named Matthew Mellon owned a cache of Ripple that at one point was valued at over $1 BILLION and was still worth over $500 MILLION at the time of his unexpected death Mellon claimed to have kept the digital keys to his Ripple wallet locked in cold storage in other people's names at various locations around the US What does the family of the deceased do in a situation like this? What does anyone do with the notion of hundreds of millions of dollars in value that is locked away and utterly inaccessible? What the hell is Ripple anyway? In this episode of the InSecurity Podcast, Steve Snyder joins Matt Stephenson and Edward Preston for a look into the fact, fiction and myth of crypto-currencies. And just to make things a bit weirder… we’re also going to talk about weapon skins that are trading for $50,000 inside games. FIFTY. THOUSAND. DOLLARS. Noodle on that for a minute… About Steve Snyder Steve Snyderis a member of Bradley’s Banking and Financial Services and Cybersecurity and Privacyteams. He leverages his industry experience as a network engineer and cyber risk manager to assist clients matters related to data protection arising from emerging technologies. Steve is a thought leader in privacy and data security and routinely writes and speaks on cybersecurity topics. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
InSecurity Podcast: Why is Cylance entering the consumer market? What if I told you that 67% of workers use their own personal devices while at work 37% of US workers telecommute What if you asked me “why should I care?” Cloud-based solutions (Office365, DropBox, Box, Trello, Atlassian, etc) allow employees to access corporate assets from personal devices Employees can connect USB thumb drives to personal devices infected with malware, then plug them into a company device Employees can access corporate email on personal devices Telecommuters can VPN into work from a personal device Cached credentials from employees logging into company assets from a personal device could be stolen by malware Web-cam enabling malware on a personal device could spy on and compromise employees The virtual borders of a Corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employee’s home networks have become blurred. CISOs and their Security Teams have a difficult time controlling their security risk and exposure from cybersecurity threats originating from employee’s homes. Think you’ve got the kind of security solution in place you need to protect your network from not just the bad guys, but hard-working employees? In this episode of the InSecurity Podcast, Hiep Dang and Edward Preston join Matt Stephenson to introduce Cylance’s new baby… Cylance Smart Antivirus. Hiep and Edward will explain how Cylance is bringing their groundbreaking, enterprise security solutions to the home user. About Hiep Dang Over 14 years ago, Hiep Dang (@Hiep_Dang) serendipitously turned a casual curiosity in computer forensics and viruses into a full time professional career in the cyber-security industry. His journey has given Hiep a spectrum of experiences from burgeoning startups to Fortune 500 companies while solving deep technical to abstract business problems. Hiep’s sweet spot is product management because it is at the intersection of product strategy and technical execution. During the day, he geeks out on building innovative security products and at night Hiep teaches Kung Fu. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
InSecurity Podcast: Katie Moussouris answers the question… Should the pursuit of coding perfection always include Bug Bounties? What if I told you that the industry average is 15-50 bugs per 1000 lines of code? You may not care if you’re creating a Word doc. What if you are in charge of launching the latest SpaceX rocket? What if you are Lewis Hamilton driving for Mercedes Formula 1 and a software glitchcauses you to lose a 3 second lead at the Australian Grand Prix? What if you are a general in charge of military forces using tools that include the same software I can buy on Amazon or Ali Baba? With so much of our world now driven by software, everything is on the line: money, property, lives. Perfection is never going to be an option, but it is fair to say that we need to be as close to perfect as possible No small feat… and no pressure on folks like today’s guest Katie Moussouris joins Matt Stephenson on the InSecurity podcast to talk about bugs and bug bounties and the impact they can have on security and privacy. Katie is an industry legend perhaps best known for creating Microsoft’s first Bug Bountyprogram in 2013. In this episode of the InSecurity Podcast, Katie Moussouris breaks it down for Matt Stephenson. Who needs a bug bounty? Is a bug bounty program even appropriate for a company? There are risks in every question and every answer. About Katie Moussouris Katie Moussouris(@k8em0) is the founder and CEO of Luta Security, specializing in helping businesses and governments work with hackers to better defend themselves from digital attacks. She is a noted authority on vulnerability disclosure & bug bounties, advising companies, lawmakers, & governments on the benefits of hacking& security. Katie is a hacker - first hacking computers, now hacking policy & regulations. About Matt Stephenson Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste
IP Fridays - your intellectual property podcast about trademarks, patents, designs and much more
Today we have an Interview with Malcolm Harkins, Global Chief Information Security Officer of Cylance Inc. and former VP of Intel. We also have a story about the registration of recreational drones. And we talk about the newly published rules of the proceedings before the Unified Patent Court UPC) in Europe. I also have a [...]
ControlTalk NOW thanks Belimo — this week’s Platinum sponsor! Innovations in Comfort, Energy Efficiency and Safety Solutions. Belimo Americas, a world leader in the design and manufacture of damper actuators and control valves used in commercial HVAC systems. Known for its direct-coupled actuator and innovations in pressure independent control valve technology, Belimo has solutions to maintain an energy efficient building environmen Make a Splash This Summer with the “Dive into FIN” Program: Throughout Summer 2013, J2 Innovations is running a special program designed to help System Integrators and Distributors quickly become experts in FIN by providing personalized one-on-one support. Is Your Building Automation System an Open Door To Hackers? interview Cylance Inc.’s Terry McCorkle at IBcon 2013. If you have been following Controltrends, you know we have been sounding the alarm about the current trend of building automation systems being hacked and the problems caused by these intrusions. KMC Needs Your Vote to Win 2013 BACnet International Competition! For the next couple of weeks a window of opportunity is open for you to acknowledge the role of KMC Controls in the BACnet community. The annual BACnet International Leaders of the Pack award nominations are now underway. We encourage you to take advantage of this open window to nominate KMC or KMC-submitted success stories for recognition. A Day In The Life of A Smart Building: Prelude for Ken’s interview tomorrow with Dan Klasen, from ESI, by watching this video, ControlTrends members will get a better perspective of the Master Systems Integrator’s grand scale integration. ESI’s Dan Klasen Explains the Role of Master Systems Integrator at IBCON 2013: Environmental Systems Inc. (ESI) is a leading Master Systems Integrator servicing the GSA, Kohls, Macys, and other national accounts to provide “portfolio-driven” services generating the normalized data source that optimizes efficiencies and reduces operational costs. ESI combines their own resources and experience with those of the local systems integrators to meet the challenges of large, coast-to-coast portfolios. Contemporary Controls Video: Understanding EIA-485: Connectors, Grounding and Protection: This video discusses the importance of cabling and repeaters. Cables attenuate and distort signal, so cable selection depends on data rate, encoding, distance. Repeaters that use the data link protocol are more reliable than basic EIA-485 repeaters. Can Honeywell Win Variable Frequency Drive of The Year Again? Not if Teco Westinghouse, Siemens, Johnson Controls, ABB, and all the other self respecting VFD manufactures have anything to say about it. Click here to see Honeywell bring home the award at the 2012 ControlTrends Awards, and click here to register to nominate and vote for the 2013 ControlTrends Awards. Enerliance’s LOBOS Leads the Way — Ray Pustinger at IBCON 2013. Enerliance was founded by two building controls experts, Scot Duncan, P.E. and Bob Johnson. Before founding Enerliance, Scot and Bob spent 30 years working together manually optimizing the performance of some of California’s premier real estate facilities. Doesn’t the Honeywell Delphi Boiler Control System Make Absolute Sense to You? The Delphi Combustion Efficiency Panel integrates flame safeguard control, fuel-air ratio control, O2 Trim, variable frequency drive (VFD) control, and proportional integral derivative (PID) control into a single, integrated, pre-wired panel with a PC touchscreen for easy, user-friendly commissioning. CAN2GO Demo Suitcase — The Most Powerful Sales Tool in the Industry! Can2Go has packaged a full Building Energy Management System (BEMS) to demonstrate the power of CAN2GO’s technology and its interaction with a varied ecosystem of wireless devices. Contact your Schneider Electric or Viconics representative to order your CAN2GO Demo Suitcase today! Ken’s TOP 5 Information Pivot Points of Week 30: 1. Building a Digital Culture: Patrick Hoffstetter, the Chief Digital Officer of Renault, describes the challenges that many companies face in creating a culture with digital at its core. Tridium News — 2014 Niagara Summit — Cosmopolitan of Las Vegas — April 27-29, 2014: Tridium’s Niagara Summit is three days of world class education from industry leading experts. Honeywell WEBs Squad Update: At the beginning of the year we launched WEBs Squad – a team focused on improving our customer’s overall experience and driving continuous improvements with technical support, engineering, and marketing. ControlTalk NOW will continue to provide a weekly episode featuring the people, products, and the News of the Week shaping our world of controls, building automation, and the HVAC industry. Click here to listen to or download the Podcast version of ControlTalk Now. Want to subscribe and listen to ControlTalk now as a Podcast? The post ControlTalk Now For The Week Ending July 28, 2013 appeared first on ControlTrends.
Make a Splash This Summer with the “Dive into FIN” Program: Throughout Summer 2013, J2 Innovations is running a special program designed to help System Integrators and Distributors quickly become experts in FIN by providing personalized one-on-one support. Is Your Building Automation System an Open Door To Hackers? interview Cylance Inc.’s Terry McCorkle at IBcon 2013. If you have been following Controltrends, you know we have been sounding the alarm about the current trend of building automation systems being hacked and the problems caused by these intrusions. KMC Needs Your Vote to Win 2013 BACnet International Competition! For the next couple of weeks a window of opportunity is open for you to acknowledge the role of KMC Controls in the BACnet community. The annual BACnet International Leaders of the Pack award nominations are now underway. We encourage you to take advantage of this open window to nominate KMC or KMC-submitted success stories for recognition. A Day In The Life of A Smart Building: Prelude for Ken’s interview tomorrow with Dan Klasen, from ESI, by watching this video, ControlTrends members will get a better perspective of the Master Systems Integrator’s grand scale integration. ESI’s Dan Klasen Explains the Role of Master Systems Integrator at IBCON 2013: Environmental Systems Inc. (ESI) is a leading Master Systems Integrator servicing the GSA, Kohls, Macys, and other national accounts to provide “portfolio-driven” services generating the normalized data source that optimizes efficiencies and reduces operational costs. ESI combines their own resources and experience with those of the local systems integrators to meet the challenges of large, coast-to-coast portfolios. Contemporary Controls Video: Understanding EIA-485: Connectors, Grounding and Protection: This video discusses the importance of cabling and repeaters. Cables attenuate and distort signal, so cable selection depends on data rate, encoding, distance. Repeaters that use the data link protocol are more reliable than basic EIA-485 repeaters. Can Honeywell Win Variable Frequency Drive of The Year Again? Not if Teco Westinghouse, Siemens, Johnson Controls, ABB, and all the other self respecting VFD manufactures have anything to say about it. Click here to see Honeywell bring home the award at the 2012 ControlTrends Awards, and click here to register to nominate and vote for the 2013 ControlTrends Awards. Enerliance’s LOBOS Leads the Way — Ray Pustinger at IBCON 2013. Enerliance was founded by two building controls experts, Scot Duncan, P.E. and Bob Johnson. Before founding Enerliance, Scot and Bob spent 30 years working together manually optimizing the performance of some of California’s premier real estate facilities. Doesn’t the Honeywell Delphi Boiler Control System Make Absolute Sense to You? The Delphi Combustion Efficiency Panel integrates flame safeguard control, fuel-air ratio control, O2 Trim, variable frequency drive (VFD) control, and proportional integral derivative (PID) control into a single, integrated, pre-wired panel with a PC touchscreen for easy, user-friendly commissioning. CAN2GO Demo Suitcase — The Most Powerful Sales Tool in the Industry! Can2Go has packaged a full Building Energy Management System (BEMS) to demonstrate the power of CAN2GO’s technology and its interaction with a varied ecosystem of wireless devices. Contact your Schneider Electric or Viconics representative to order your CAN2GO Demo Suitcase today! Ken’s TOP 5 Information Pivot Points of Week 30: 1. Building a Digital Culture: Patrick Hoffstetter, the Chief Digital Officer of Renault, describes the challenges that many companies face in creating a culture with digital at its core. Tridium News — 2014 Niagara Summit — Cosmopolitan of Las Vegas — April 27-29, 2014: Tridium’s Niagara Summit is three days of world class education from industry leading experts. Honeywell WEBs Squad Update: At the beginning of the year we launched WEBs Squad™ – a team focused on improving our customer’s overall experience and driving continuous improvements with technical support, engineering, and marketing. ControlTalk NOW will continue to provide a weekly episode featuring the people, products, and the News of the Week shaping our world of controls, building automation, and the HVAC industry.