Podcasts about cylancetv twenty

  • 2PODCASTS
  • 42EPISODES
  • 46mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 15, 2019LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about cylancetv twenty

Latest podcast episodes about cylancetv twenty

InSecurity
Chuck Brooks: Examining the Future

InSecurity

Play Episode Listen Later Jul 15, 2019 60:06


Chuck Brooks: Examining the Future I'm the operator With my pocket calculator I am adding And subtracting I'm controlling And composing By pressing down a special key It plays… Kraftwerk: Pocket Calculator, 1981 Computer World How about this for a picture of the present with a look to the future… What if I told you that chatbots will power 85 percent of customer service by 2020… McKinsey Global Institute did a study that found 20% of C-level executives claim to be using Machine Learning and/or Artificial Intelligence as a core part of their business. Our friends at IDC proclaimed that global spending on cognitive and AI systems is expected to reach $57.6 billion in 2021. And finally… as if we aren’t already tired of hearing about the IT skills gap… Forbes recently announced that the number of jobs requiring AI skills has grown 450% since 2013… Are we ready for the future? Hell… are we even ready for the present!?!?! Chuck Brooks has published over 180 articles about Cybersecurity, Artificial Intelligence, Homeland Security and the Internet of Things… among other things… He has written for some of the most important publications in the world including Forbes, The Hill and the MIT Sloan Blog. It is fair to say that Chuck has his eye on the future and has an idea or two about what needs to be done to secure it. In this week’s episode of InSecurity, Matt Stephenson proudly welcomes in Chuck Brooks for a look into his crystal ball to see what the future may hold for the world of technology and, by definition, cybersecurity. We look at AI, automation, IoT, Quantum Computing and even Ray Kurzweil’s thoughts on what is to come. Want to get weird? This week’s episode is for you. About Chuck Brooks Chuck Brooks (@ChuckDBrooks) is the Principal Market Growth Strategist of General Dynamics Mission Systems for Cybersecurity and Emerging Technologies. He is also Adjunct Faculty in the graduate Applied Intelligence Program at Georgetown University and teaches courses in risk management, homeland security and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn out of their 600 million members. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance” and by IFSEC as the “#2 Global Cybersecurity Influencer” in 2018. He is also a featured contributor to Forbes, a Cybersecurity Expert for The Network at the Washington Post and Visiting Editor at Homeland Security Today. Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University and a Certificate in International Law from The Hague Academy of International Law. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Joseph Menn: Cult of the Dead Cow

InSecurity

Play Episode Listen Later Jun 17, 2019 60:49


Joseph Menn: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow Mudge DilDog Sir Dystic Oxblood Ruffin Lord Digital Mixter Psychedelic Warlord You might not know who they are but they changed your life more than Lewis Rainieri, the I-pod and YouTube put together. Have you ever seen Hackers? The Net? Antitrust? Sneakers? If you’re a subscriber to the InSecurity podcast… odds are you’ve seen and love those movies as well as a list of others we could mention. If you like any of these flicks, then you know… or should know… that they all owe a debt to a group of men and women who changed the world over 30 years ago Long before there was a multi-billion dollar cyber industry, there were some ethical hackers who showed us that the Silicon Valley emperors had no clothes. They looked like misfits, but they showed us how insecure the Internet was and how to make it better” -- Richard A. Clarke, first White House "Cyber Czar" on Cult of the Dead Cow “We were pirates, not mercenaries… Pirates have a code.” -- Rob Beck; Former member @stake and Cult of the Dead Cow Ninja Strike Force; Much @Stake: The Band of Hackers That Defined an Era  In this episode of InSecurity, Matt Stephenson has the rare privilege of a chat with best selling author Joseph Menn on his latest blockbuster book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. It’s been over 30 years, but Joe spoke with the original punk rock hacking collective about what they did and how they changed the world. Oh… and one of them is running for President of the United States. About Joseph Menn Joe Menn (@josephmenn) has been a professional journalist for three decades, specializing in technology stories since 1999. His  most recent book, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, was published in June 2019. The New York Times Book Review said: “The tale of this small but influential group is a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age." An adaptation of the book for Reuters revealed that Beto O'Rourke had been a member of the enormously influential group and drew the most engagement on Reuters.com in its history. Previously, Joe wrote Fatal System Error: the Hunt for the New Crime Lords who are Bringing Down the Internet. That book was the first serious journalism accusing the Russian intelligence agencies of working with organized cyber criminals. It also exposed Gambino crime family investments in Internet gambling operations, and was cited in that context by the Miami Herald and McClatchy Newspapers in their Pulitzer Prize-winning coverage of the Panama Papers money-laundering leaks.  Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom — even democracy itself Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters — activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O’Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Theresa Payton: Inside the War to Hijack Elections

InSecurity

Play Episode Listen Later Jun 10, 2019 64:31


Theresa Payton: Inside the War to Hijack Elections The velocity of social sharing, the power of recommendation algorithms, the scale of social networks, and the accessibility of media manipulation technology has created an environment where pseudo-events, half-truths, and outright fabrications thrive. Edward Murrow has been usurped by Alex Jones. But we’ve known this for a while… Renee DiResta; The Return of Fake News—and Lessons From Spam Sometimes on InSecurity… we like to have some fun. Sometimes we like to get technical. Sometimes… but not that often… we need to take things seriously. This week, we do some of each… but we don’t stray too far from taking it all seriously at the end. In this week’s episode of InSecurity, Matt Stephenson talks with an expert in securing information at the absolute highest levels of Federal Government. Theresa Payton has been putting in the legwork to find out what did and did not happen in the 2016 United States elections. Theresa has been researching a new book about what happens when opposing forces exert their will on the voting populace of a nation in order to alter the course of the electoral process. If we’ve already turned you off because you’ve made up your mind that something did or did not happen… well… stick around. Because today’s guest has likely served much closer to the Oval Office than any of us have. We’ll take a look at how we got here, who did it and why. Theresa Payton has a line on what has already happened and could happen to manipulate the coming 2020 US elections…  About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, co-Founder of Dark Cubed, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer (CIO) at the Executive Office of the President from 2006 to 2008, Theresa administered the information technology enterprise for the President and 3,000 staff members. Prior to her time at the White House, Theresa Payton was a senior technology executive in banking, spending 16 years providing banking solutions using emerging technologies. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security."  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Automox CEO Jay Prassl: Patch Your $#!%

InSecurity

Play Episode Listen Later May 31, 2019 52:05


Jay Prassl: Patch Your $#!% Are ALL of Your Apps and OSes up to date? Are you sure? How can you tell? An American Dental Association study in 2008 found that if you don’t brush your teeth you COULD DIE. The ADA recommends brushing your teeth twice a day for 4 minutes each time. What the hell does that have to do with anything? Stick around… According to Ponemon, nearly half of all companies they surveyed had suffered a breach. 57% of those companies were breached due to an unpatched vulnerability. A third of those companies KNEW they were vulnerable before the breach. The average company spends 321 labor hours a week managing their vulnerability response process. How’s that compare to spending 4 minutes, twice a day brushing your teeth? Starting to feel the connection there? In 2017, WannaCry affected over 200,000 machines in 150 countries over a weekend. The attack weapon was developed using NSA tools built to exploit Windows vulnerabilities. What I told you that Microsoft had released a patch for this vulnerability over a month before WannaCry hit? Speaking of Microsoft… our good friends at TripWire offer the following tell us that, in 2015, Microsoft alone issued 2804 patches. That’s roughly 56 patches every Tuesday… and that’s JUST Windows OS & applications Noodle on those numbers a bit… In this week’s episode of InSecurity, Matt Stephenson spoke with Automox CEO Jay Prassl about the role that patching plays in every business’s cybersecurity hygiene. He founded Automox based on one simple maxim: Patch Your $#!% When most of us think of key components in cybersecurity, we tend to think of things like ransomware attacks, security solutions that bog down your network or terrible things in TV and movies that sound technical but are actually ridiculous. What if you had a way to keep your network clean and up to date by doing something as simple and boring as keeping your Operating Systems and applications up to date… Take a walk with Jay Prassl and see what you think. About Jay Prassl Jay Prassl (@jprassl) is the Founder and CEO of Automox. Jay founded Automox founded to pursue a vision: the complete automation of endpoint configuration, patching, management and inventory. Prior to Automox, Jay led the marketing efforts at SolidFire. Before that, he was employee number five at LeftHand Networks, where he spent 10 years breaking new ground in the storage market with the company's distributed SAN solution. He led multiple parts of the LeftHand business through its acquisition by HP. Somehow… when not saving the world through his pursuit of cyber hygiene… Jay finds time to bike, swim and surf. Some of these hobbies are required by state law in order to live in Boulder, Colorado.  About Automox Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint and software, regardless of location, meets regulatory and operational security requirements. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Kim Crawley: We Need a Diversity of Brains in this World

InSecurity

Play Episode Listen Later May 20, 2019 57:40


Kim Crawley: We Need a Diversity of Brains in this World The National Autism Association states that Autism is a bio-neurological developmental disability that generally appears before the age of 3. Autism impacts the normal development of the brain in the areas of social interaction, communication skills, and cognitive function.  Since autism was first diagnosed in the U.S. the incidence has climbed to a rate of 1 in 59 children in the U.S. According to pop culture… it may be a super power as well. There seems to be a lot of Doctors on TV now who are on the Autism Spectrum like Dr. Temperance Brennan on Bones or Dr. Sheldon Cooper from The Big Bang Theory We also get the occasional action herosuch as Ryan Gosling’s The Driver or Lisbeth Salander from The Girl With the Dragon Tattoo. And of course, the classic American underdog heroes Raymond Babbitt and Forrest Gump Out here in the real world… people on the Autism Spectrum are all around you. Most of them do not have Salander like superpowers, but rather are every day Janes and Joes who go to work, do their jobs and live their lives.  Ever wonder what’s it’s like to chat with someone on the Autism Spectrum? You shouldn’t… if CDC statistics are accurate, there are nearly 6.8 MILLION people on the Autism Spectrum in the United States In this week’s episode of InSecurity, Matt Stephenson sat down with respected security writer Kim Crawley to talk about the current state of the cybersecurity world, some of the issues with locking down IoT, drumming… and Kim’s recent diagnosis as being on the Autism Spectrum. Take a walk with Kim as she shares her experience in the security industry and why being on the Autism Spectrum is just another facet of her personality. For more information on Autism, go to www.autisticadvocacy.org and look for #ActuallyAutistic on Twitter About Kim Crawley Kimberly Crawley spent years working in consumer tech support. Malware-related tickets intrigued her, and her knowledge grew from fixing malware problems on thousands of client PCs. By 2011, she was writing study material for the InfoSec Institute’s CISSP and CEH certification exam preparation programs. She’s since contributed articles on information security topics to CIO, CSO, Computerworld, SC Magazine, and 2600 Magazine. Her first solo-developed PC game, Hackers Versus Banksters, and was featured at the Toronto Comic Arts Festival in May 2016. She now writes for Tripwire, AT&T and BlackBerry Cylance. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at BlackBerry Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Tom Pace: How Much is an Ounce of Prevention Really Worth?

InSecurity

Play Episode Listen Later May 6, 2019 38:49


Tom Pace: How Much is an Ounce of Prevention Really Worth? According to the Verizon Data Breach Investigations report, 4% of people will click on any given phishing campaign. You have 16 minutes until the first click A savvy user will report the phishing campaign within 28 minutes… In those 12 minutes, someone on the other side of the world could take your entire corporate database hostage. Then offer to sell it back to you for thousands or millions of dollars. In this week’s episode of InSecurity, Matt Stephenson sat down with BlackBerry Cylance Sr Director of Worldwide Consulting Tom Pace to have a chat about why Ransomware is still looming threat against organizations large and small. Fresh off an appearance on CBS’s 60 Minutes, Tom talks with Matt about the experience of being featured on the most respected news show in America and the effects a data breach can have on an organization and an industry. About Tom Pace Tom Pace (@TommyPastry) is a Sr. Director of Worldwide Consulting at BlackBerry Cylance. In that role, Tom ensures best-in class services delivery as well as technical expertise throughout the entire service offering lifecycle. He leverages his experience from the federal government, large financial institutions, and the military to provide strategic solutions to secure organizations. Over the course of Tom’s career, he has created a multitude of programs and strategies to ensure the effectiveness and success of cybersecurity teams and organizations.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcastsand GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radioand wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Richard Stiennon: The IT Security Industry: A Complete History

InSecurity

Play Episode Listen Later Apr 29, 2019 57:46


Richard Stiennon: The IT Security Industry: A Complete History We here at InSecurity have a question… Why Hasn’t Anyone Catalogued the Entirety of the IT Security Industry? Why hasn’t the Cybersecurity industry gotten better at protecting all the things? There are SO many companies offering variations on existing solutions or brand new solutions… but the threats remain and the bad actors continue to be successful. Outside of The Internet… where can we go to get information on and analysis of the companies who are creating solutions that work? Can we learn where they came from? Have they been successful previously? If only we knew someone who could compile a compendium of all that is going on in the IT Security world… In this week’s episode of InSecurity, Matt Stephenson somehow managed to wrangle 60 minutes with industry legend Richard Stiennon. The take a walk through Richard’s work as author of multiple books on the threat of cyberwar, the role analysts play in the industry and his eye toward the future. His latest project is creating a Farmer’s Almanac of the entirety of Cybersecurity. It is such a fabulous idea, we’re kind of flummoxed as to how no one has done it yet. It is also such a breathtaking undertaking… we kind of understand why no one has done it yet. Come grab a seat with one of the greatest historians in all of the IT world and find out what is coming next! About Richard Stiennon Richard Stiennon (@stiennon) is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Secure Cloud Transformation: The CIO'S Journey, Surviving Cyberwar and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes and The Analyst Syndicate. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future

InSecurity

Play Episode Listen Later Apr 15, 2019 57:57


Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future   I have absolute control of the record. The thing was, you’re not supposed to touch the middle of the vinyl. DJs are going to hate you. People are going to hate you. You’re going to ruin these records. I decided… that this… was the only way to do this.  -- Grandmaster Flash   Let’s push the talk about hacking shall we? Hacking is about finding the vulnerable spots in any systems and making your own choices about how to improve that system... rarely with the permission of the system’s owners. Viewed through that prism, Hip-Hop has always been about hacking. Hacking was running 1000 feet of extension cord to a public outlet in order to have a Battle in the park. Hacking was a DJ talking over a record at a club. Hacking was Kool Herc throwing a party at 1520 Sedgwick Ave in the Bronx and not playing disco or pop music. Hacking was Grandmaster Flash touching the middle of the vinyl. Hacking is rhyming with Orange. Dr Roy Christopher has spent a lifetime listening to, researching, teaching and loving Hip-Hop. In this week’s episode of InSecurity, Matt Stephenson digs into the crates with Roy about how Hip-Hop hacked the world to become one of the most significant drivers of modern culture. This will likely be the first podcast you listen to this week featuring steganography, Li’l Pump and John Baptist Porta’s 1558 book series Magia naturalis Do we even need to go on…?     Dead Precedents: How Hip-Hop Defines the Future, uses the concerns and conceits of cyberpunk to thoughtfully remap hip-hop's spread from around the way to around the world. Its central argument is that the cultural practices of hip-hop culture are the blueprint to the 21st century, and that an understanding of its appropriation of language and technology is an understanding of the now. This book is about is the many ways that the foundations of hip-hop appropriation--allusions and creative language use, as well as technology and sampling--inform the new millennium.  -- www.roychristopher.com About Roy Christopher Roy Christopher (@RoyChristopher) marshals the middle between Mathers and McLuhan… He’s a self-described aging BMX and skateboarding zine kid. That’s where he learned to turn events and interviews into pages with staples. He has written about music, media, and culture for everything from magazines and blogs to journals and books. His current book, Dead Precedents: How Hip-Hop Defines the Future, is an Amazon Best Sller. Roy holds a Ph.D. in Communication Studies from the University of Texas at Austin. He is currently a Visiting Assistant Professor at the University of Illinois-Chicago and a member of the Adjunct Faculty at Loyola University Chicago Disinformation has referred to Roy as “One of the Internet’s leading interviewers of subculture and new-science icons.” Oh… as a child, he solved the Rubik’s Cube competitively. How bout that? About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Jeremiah Cornelius: What Happens when you Assume Virtual Security?

InSecurity

Play Episode Listen Later Apr 8, 2019 50:52


Jeremiah Cornelius: Virtualization… the Trend Has Become the Standard Do you belive that my being stronger or faster has anything to do with my muscles in this place? You think that's _air_ you're breathing now? Today’s question: What Happens when you Assume Virtual Security? Virtual Machines were originally created to solve the problems of managing PC systems with mostly Windows operating systems, as a replacement for more resilient and fault tolerant technology that Intel PCs were replacing in enterprise computing. Things have evolved significantly since then. With great technology comes great security risk… what can we do to mitigate that risk and protect that virtual reality? In this week’s episode of InSecurity, Matt Stephenson digs deep into the weeds of the virtual world with industry legend Jeremiah Cornelius. They talk about what’s easy and what’s hard about securing data in virtual environments. Stick around… you may learn something before their through. About Jeremiah Cornelius Jeremiah Cornelius has been an information security professional since 1995, and was previously Executive Security Advisor and Technology Specialist for Microsoft, facilitating technical relationships with CSO's for Silicon Valley's largest Internet commerce and online media enterprises. Jeremiah's prior experience covers support of development and Internet systems security, defensive technical controls, vulnerability assessment and identifying platform and infrastructure security risks. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Rob Capps: 22 Years in the Trenches of Tech Jounalism

InSecurity

Play Episode Listen Later Apr 1, 2019 62:14


Rob Capps: 22 Years in the Trenches of Tech Jounalism   If I'd written all the truth I knew for the past ten years, about 600 people - including me - would be rotting in prison cells from Rio to Seattle today. Absolute truth is a very rare and dangerous commodity in the context of professional journalism.  -- Hunter S Thompson Today’s question: Can we assess the future of tech by examining it’s past? To do that, it would be worthwhile to speak with someone who was the to chronicle all that was awesome, awful, cool and weird over the past 20+ years… In this week’s episode of InSecurity, Matt Stephenson takes a walk with Rob Capps. Rob is Head of Editorial at Godfrey Dadich Parters and former editor at WIRED magazine. He has written about everything from why DVDs suck to Helena Bonham Carter to the death of the Flip camera. Want to hear from an award winning journalist who has been reporting from the front lines of technology culture for over 20 years? Rob is your man. About Rob Capps Rob Capps(@robcapps) is the Head of Editorial and a partner at Godfrey Dadich Partners. He runs the editorial division of the studio, specializing in longform narrative journalism, podcasts, documentary television and film, and other forms of non-fiction storytelling. GDP works with everyone from established media companies to large brands to emerging start-ups. Previously he was the Editorial Director of WIRED, where he oversaw editorial for all platforms, including the magazine, WIRED.com, and live events. During his 13-year career at WIRED the publication garnered 21 National Magazine Award nominations with eight wins. He also spearheaded the programing for multiple live events, including the WIRED Business Conference, the WIRED Data | Life health conference, and the WIRED x Design creativity retreat. He wrote the article “Why Things Fail,” which won the prestigious Gerald Loeb Award for Distinguished Business and Financial Journalism. His article “The Good Enough Revolution,” was discussed in publications ranging from the Economist to the New Yorker and was noted by the New York Times as one of the big ideas of the year. Rob is also the co-curator of the annual PopTechideas conference. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
My Awesome InSecurity Podcast Mixtape: RSA Edition!

InSecurity

Play Episode Listen Later Mar 21, 2019 34:34


My Awesome InSecurity Podcast Mixtape: RSA Edition! RSA 2019 was another grand and glorious mess! 50,000+ attendees, vendors, journalists and who knows who else stormed San Francisco for seven days to look, listen, learn and who knows what else. We had time to sit down with a wide swath of people. We found CEOs, Engineers, Global Ambassadors and even a CIO of the White House! How bout that? Kick back and the perspectives this group of experts has to offer on the present state and future of cybersecurity Enjoy! Stuart Mcclureon the BlackBerry & Cylance, Hacking Exposed and the future BlackBerry CMO Mark Wilsonis excited about Cylance joining the BlackBerry family Tom Pace& Kevin Livellipresent Operation Shaheen at RSA Garret Grajekputs the AI in Identity Gabe Dealesees the future of BlackBerry Cylance and it Smart Cities John McClurghas been around the world… is security the tie that binds cultures? Scott Schefermanwants the industry to focus on what users need, not what vendors want Fortalice CEO Theresa Paytonis looking beyond just nation states for who is meddling with us About Matt Stephenson   Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

InSecurity

Play Episode Listen Later Mar 4, 2019 43:07


Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense Is a Terminator T-800 an endpoint? Is Voltron an endpoint? Could we have prevented a lot of damage to the Earth if Tony Stark had just installed a BlackBerry Cylance endpoint protection solution on the Iron Legion? In this week’s episode of InSecurity, Matt Stephenson chats with BlackBerry CTO Charles Eagan and BlackBerry Cylance CPO Eric Cornelius... two people charged with leading the charge to combine BlackBerry and Cylance into a security solution that will protect every Thing under the sun. Take a walk with them as Matt finds out what the future holds now that BlackBerry and Cylance have come together. If you are in San Francisco for RSA, make sure to come say hello to Charles, Eric, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm.  Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities. Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by.  About Charles Eagan Charles Eagan is the Chief Technology Officer for BlackBerry. In this role, Charles oversees the standardization and integration of all company products and is responsible for the advancement of new technologies and partnerships, with an emphasis on defining BlackBerry’s Enterprise of Things platform as well as driving innovation within emerging markets. Charles was previously the Global Head of Electronics at Dyson Ltd (U.K.), focused on IoT device deployment. Prior to that he served as BlackBerry’s Global Head of Device Software, and spearheaded development of the BlackBerry 10 operating system and the transition to secure Android. Charles was formerly Vice President of Engineering for QNX Software, where he concentrated on the automotive and embedded markets. He also worked at Cisco and directed development of the seminal CRS-1 carrier routing system. Charles is a noted speaker, thought leader and IoT expert who has been at the forefront of new frontiers in digital connectivity for over three decades. He graduated with honors from the University of Waterloo (Canada) with a bachelor’s degree in applied mathematics and electrical engineering minor. About Eric Cornelius   Eric Cornelius is the Chief Product Officer at Blackberry Cylance. In this role, Eric drives product and innovation. Previously Eric served as VP of Innovation, Director of Critical Infrastructure/ICS and Technical Director of Incident Response/Critical Infrastructure at Cylance. Eric brings this wealth of knowledge and long history as a security practitioner, consultant, trusted advisor and product builder to his work in elevating our product development initiatives, and to leading our product management and corporate development teams. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2  GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review! 

InSecurity
Rick Holland: Analysts Make the Best CISOs

InSecurity

Play Episode Listen Later Feb 25, 2019 45:24


Rick Holland: Analysts Make the Best CISOs In this week’s episode of InSecurity, Matt Stephenson has a chat with Rick Holland, CISO at Digital Shadows. Rick took a unique path to the CISO role, following a distinguished career as an analyst at Forrester. They touch on a myriad of subjects including Rick’s Security and Risk Playbook for CISOs Rick Holland is hard to miss online. You can hear him regularly on the Award Winning podcast ShadowTalk. He also blogs regularly and will get up to some mishceif on Twitter.  If you are heading to RSA San Francisco, make sure to come and say hello to Rick, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm. Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities. Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by.  About Rick Holland Rick Holland (@rickhholland) is the CISO and Vice President of Strategy at Digital Shadows. Rick has more than 15 years’ experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently the co-chair of the SANS Cyber Threat Intelligence Summitand holds a B.S. in business administration from the University of Texas, Dallas. Rick regularly speaks at leading security conferences across the globe and has been interviewed by industry and business media including BBC News, CNN, Dark Reading, Motherboard, NPR, The Register and Wall Street Journal. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Greg Silberman: Keep Ya Nose Out My Business

InSecurity

Play Episode Listen Later Feb 19, 2019 54:06


Greg Silberman: Keep Ya Nose Out My Business   Are the neighbors watching? Is the mail man watching me And I don't feel safe anymore Oh what a mess! I wonder who's watching me now Who? The I.R.S.?!?!       -- Rockwell, Somebody’s Watching Me, 1984 Privacy is fundamentally about the ethical and responsible handling of personal data - from initial collection to eventual deletion. It is about understanding the context under which data is shared, providing people choices over how their data is used, and it's about respecting the individual. Many in information security often confuse the goals of privacy and security, or believe that privacy is about secrecy. Put simply, privacy is why security is done and security is how privacy is achieved. It is easy to have security without privacy, but impossible to have privacy without security. In this week’s episode of InSecurity, Matt Stephenson takes a walk with Greg Silberman. Greg is the Chief Privacy Officer at Cylance and knows a thing or two about data privacy at the corporate, user and individual levels. Since the implementation of GDPR, coutries around the world are considering or implementing their own data privacy laws, with varying degrees of success. In the United States, we are about to see California lead with way with 2020’s California Consumer Protection Act. How will this impact business? What will it do to your favorite social media platforms? Will it affect you personally?  Come hear what Greg has to say. We won’t tell anyone About Greg Silberman Greg Silberman (@gpsilberman) is the Chief Privacy Officer and Vice President of Legal Affairs at Cylance. As Chief Privacy Officer, Greg oversees the implementation and enforcement of practices that manage data in accordance with the Cylance’s Privacy Principles with respect to employee and customer privacy. Greg has over 20 years’ experience working with companies to develop solutions to address complex business and legal issues at the intersection of intellectual property, privacy, and information security. Prior to joining Cylance in 2016, he was a partner in the Cybersecurity, Privacy, and Data Protection practice group in the Silicon Valley office of Jones Day. Earlier in his career, Greg served as Intellectual Property Counsel at Lawrence Berkeley National Laboratory.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as   ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

InSecurity
John Strand: How Does Defence in Depth Look Today?

InSecurity

Play Episode Listen Later Feb 11, 2019 56:13


John Strand: How Does Defence in Depth Look Today? “Our main goal is not to prove that we can hack into a company but to help the customer deveop a series of on point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative”  -- John Strand In this week’s episode of InSecurity, Matt Stephenson sits down with John Strand. John is the owner of Black Hills Information Security. If you aren’t familiar, you may want to check out their Sacred Cash Cow Tipping webcast to learn why security love and fear BHIS. Take a walk with us on this one… Matt and John dig into hosted firewalls, Powerman 5000, types of Artificial Intelligence, Joe Vs the Volcano and a few other relevant topics. You are definitely going to want to catch this episode… About John Strand John Strand(@strandjs) is a senior instructor with the SANS Institute. He teaches SEC504: Hacker Techniques, Exploits, and Incident Handling; SEC560: Network Penetration Testing and Ethical Hacking; SEC580: Metasploit Kung Fu for Enterprise Pen Testing; and SEC464: Hacker Detection for System Administrators. John is the course author for SEC464: Hacker Detection for System Administrators and the co-author for SEC580: Metasploit Kung Fu for Enterprise Pen Testing. John is also the owner of Black Hills Information Security, a company specializing in penetration testing and security architecture services. He feels strongly that education is how the world of information security will change for the better and spends a considerable amount of time teaching and presenting around the world. He has presented for the FBI, NASA, the NSA, DefCon and is a frequent guest on Enterprise Security Weekly. In his spare time he writes loud rock music and makes various futile attempts at fly-fishing. There’s a reason the name Black Hills Information Security puts security vendors on notice… check out their webcasts and podcasts to find out why. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Marcus Carey: Tribe of Hackers

InSecurity

Play Episode Listen Later Jan 28, 2019 51:15


Marcus Carey: Tribe of Hackers There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. With his new book Tribe of Hackers, Marcus Carey wants to change that. Tribe of Hackers is a collection of industry, career, and personal insights from 70 cybersecurity luminaries. In this week’s episode of InSecurity, Matt Stephenson sits down with world renowned hacker Marcus Carey, CEO of Threatcare, to talk about talk about his new book, Tribe of Hackers as well as mentors from his past who have influenced him and, by extension, influenced the world of cybersecurity. About Tribe of Hackers These are the wisdom and perspectives of real-life hackers and cybersecurity practitioners, including David Kennedy, Wendy Nather, Lesley Carhart, and Bruce Potter. Threatcare will be giving away three copies per day (fifteen total) at the RSA Conference. Follow Threatcare on Twitter and Sign Up for the Risk Report to learn more about the details. All proceeds from the book will go towards Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid’s Club. About Marcus Carey Marcus Carey is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy and holds a Master’s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. Currently, working as founder and CEO of cybersecurity company Threatcare, Marcus is passionate about giving back to the community through things like mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time. Tribe of Hackers is his first published book, but will definitely not be his last. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem

InSecurity

Play Episode Listen Later Jan 21, 2019 55:05


Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future. In this week’s episode of InSecurity, Matt Stephenson chats with Kip Boyle, Founder and CEO at  Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They discuss the tools and processes a business will need to  mitigate cyber risk and online threats. Kip has developed a 5-Principle approach that will help safeguard your business from cyber attacks.  Fire Doesn’t Innovate The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook.  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

InSecurity
Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record

InSecurity

Play Episode Listen Later Jan 14, 2019 45:34


Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record “Were it left to me to decide whether we should have a government without newspapers, or newspapers without a government, I should not hesitate a moment to prefer the latter.” Thomas Jefferson(before he became president) “Nothing can now be believed which is seen in a newspaper. Truth itself becomes suspicious by being put into that polluted vehicle.” Thomas Jefferson(While serving 2ndterm as president) Odds are, if you are affiliated with cybersecurity in any way, you have been touched by The Cyberwire. They are a cyber security-focused news service which is viewed as a trusted, independent voice in the world of news swirling around cybersecurity. Cyberwire delivers accessible and relevant information by working hard to separate the signal from the noise in an industry overloaded with information and competing messages  As our world gets more connected with each new wired device, each new piece of IoT, we need to understand how to protect these things, and by extension, ourselves. In this week’s episode of InSecurity, Matt Stephenson chats with Dave Bittner about Cybersecurity in the year that was and the year to come. They also quote Albert Brooks, discuss octopus eyeballs and debate the merits of Vinyl LPsand cassettescompared to digital music and streaming. You’re not going to want to miss this one… About Dave Bittner Dave Bittner(@bittner) is  the Producer and host of the CyberWire DailyPodcast, the top-ranking daily cybersecurity podcast in the world according to iTunes. In addition his duties as host of the CyberWire podcast, he also hosts the Hacking Humans&Recorded Futurepodcasts. Bittner has over twenty years experience in digital media, video and television production and interactive technology. He has developed award winning interactive training programs for a variety of industries, and produced countless corporate, industrial and broadcast programs as co-owner of Pixel Workshop. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Doris Yang: It Takes a Village to Raise a Security Solution

DirtySecurity

Play Episode Listen Later Jan 9, 2019 30:56


Doris Yang: It Takes a Village to Raise a Security Solution “Trust the process”  -- Several people associated with the Philadelphia 76ers Most of you are probably aware that developing, testing and releasing a successful and useful software is not a one person job. There may be a visionary who sparks the initial idea, but there is an, at times, arduous process to develop the idea, write the code, test the solution and get it to market in a timeframe that makes it useful to its target market. We all know the role that developers and engineers play in this process, but we may not be as educated on a team who plays a key role… Product Management. On this week’s episode of DirtySecurity, guest host Matt Stephenson chats with Cylance Senior Director of Product Management Doris Yang. Doris explains what it means to be a Product Manager and the role PM plays in the development process. She also digs into Cylance’s Product Management process as well as the role AI can play in the future. About Doris Yang Doris Yangis a Senior Director of Product Management at Cylance where she plays a pivotal role in defining the development and evolution of the CylancePROTECT solution. Before joining Cylance, Doris held senior product management and engineering positions at Vectra Networks, Palo Alto Networks and Symantec. It’s safe to say she has a pretty good idea of how to bring a good security solution to market. About Matt Stephenson (Fill in) DirtySecurity host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward didn’t host this episode, but this is his show, so we need to make sure you know what’s up. Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
My Awesome Podcast Mixtape!

InSecurity

Play Episode Listen Later Jan 7, 2019 41:21


My Awesome InSecurity Podcast Mixtape! 2018 was quite a year in the world of cybersecurity. Here at the inSecurity Podcast we had the incredible good fortune to speak with some of the top minds in the industry about all kinds of different subjects. We ran the gamut from an Amazon Best Selling Authorto the creator of Microsoft’s first Bug Bounty Program to a superstar Nerdcore MC. And that’s barely scratching the surface! Of course we want you to check out each podcast to get the full lowdown from each expert… but in the meantime, pop in this epic mixtape and taste a sample of the amazing work being done by some of the best minds in the industry. Enjoy! Clint Watts: Crank Calling Carfeezi… the Early Days of Social Engineering Jenny Radcliffe: The Difference Between Hacking and Social Engineering Nick Percoco: The Evolving Roll of the Hacker Pete Herzog: We Have to Teach Kids to Hack Kip Boyle: Good Cyberhygeine Can Save a Small Business Brian Fanzo: Collaberation is the Future of Innovation Pete Schiefelbein: Comparing Cybersecurity Between Military and Civilian Operations Ellinor Mills: When Security Became the Story Katie Moussouris: A Bug? A Glitch? Maybe It’s Just Poor Coding OHM-I: Young Black Men in Technology HUGE shoutout to OHM-I for contributing two killer tracks to the broadcast Domain Internet Connection Dig into his virtual crates on Bandcampand Soundcloudto hear more! About Matt Stephenson   Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Sara Lofgren: What the Hell does IoT Even Mean?

InSecurity

Play Episode Listen Later Dec 21, 2018 32:37


InSecurity Podcast: Sara Lofgren: What the Hell does IoT Even Mean? An 80s keypad stuck on a 60s computer system. Take two things that work and nail them together Sam “The Falcon” Wilson Ultimate Galactus Trilogy– Warren Ellis IOT: even the name has different meanings to different people. While people in technology know that IOT stands for “Internet of Things,” what counts as a thing? IOT adoption is ramping faster than home PC or WWW adoption did. The small price tag, stand-alone nature, ease-of-use, and business value of IOT make it appealing to both individuals and industry. With any new technology, utility always proceeds security. So unsurprisingly, security is currently the biggest hurdle to adoption - or as some technologists joke, “there is no 'S' in IOT”. In this week’s episode of InSecurity, Matt Stephenson chats with Sara Lofgren about the present state and future of the Internet of Things. As discrete network boundaries continue to dissolve, the web of connected things will continue to grow and be increasingly vulnerable. These always connected, diverse, and limited-function devices will need a bold and visionary security solution that does not require human interaction. Sara wants to make sure that we are doing the needful to protect the Things, the Data and ourselves… About Sara Lofgren Sara Lofgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for over a decade, with focus on solving enterprise security problems through the union of technology, people, and processes. Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Poking the Bear: Three-Year Campaign Targets Russian Critical Infrastructure

InSecurity

Play Episode Listen Later Dec 14, 2018 34:05


Poking the Bear: Three-Year Campaign Targets Russian Critical Infrastructure Nation-state conflict has come to dominate many of the policy discussions and much of the strategic thinking about cybersecurity. When events of geopolitical significance hit the papers, researchers look for parallel signs of sub rosacyber activity carried out by state-sponsored threat actors—espionage, sabotage, coercion, information operations—to complete the picture. After all, behind every story may lurk a cyber campaign. Rosneft is a Russian company which likes to refer to itself as one of the largest publicly traded oil companies in the world. According to the New York Times, it is also a prominent foreign policy toolof the Russian government. More than half of the company is owned by Moscow and serves as a major pillar of critical infrastructure for Russia as well as other neighboring nation states. Rosneft is a large company with a very wide reach. It plays a massive role in Russian critical infrastructure as well in surrounding countries. There are HUGE sums of money involved in its privatization. It also wields incredible domestic and international political power. All of these characteristics made it a highly likely and legitimate target of foreign espionage efforts. In today’s episode of InSecurity, Matt Stephenson talks with Cylance Directors of Threat Intelligence Jon Gross and Kevin Livelli about their new report: Poking the Bear. Their research team took a look at an Advanced Persistent Threat campaign which targeted many state-sponsored fuel and agricultural companies as well as critical infrastructure organizations. About Jon Gross Jon Gross is a Director of Threat Intelligence at Cylance. Other than that… he doesn’t tell us much  About Kevin Livelli Kevin Livelliis Director of Threat Intelligence at Cylance, where he conducts long-term, complex investigations with the Research and Intelligence team. His work there follows ten years at 60 Minutes, where his investigative reporting and analysis were recognized with Peabody and Emmy awards. Before that, Livelli supervised investigations at the nation’s largest independent police oversight agency. A graduate of Dartmouth, he earned master's degrees from Trinity College Dublin and Columbia University.  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Infogressive CEO Justin Kallhoff: How Much is Securing Your Business Worth?

InSecurity

Play Episode Listen Later Dec 3, 2018 49:02


InSecurity Podcast: Infogressive CEO Justin Kallhoff: How Much is Securing Your Business Worth? "The biggest bang for the buck in security is to ask for more money—because it's free!"  overheard at SecureWorld Chicago In today’s cybersecurity market, it can be difficult for a small business to catch the attention of the major security players. Oftentimes, those large players offer a scaled-back version of their enterprise solution at a lower price or a souped-up version of their consumer product. Neither option tends to meet the needs of the type of small business that is frequently the victim of a data breach. Especially when you consider that, according to the 2018 Verizon Data Breach Investigations Report, of those breaches 28% involved internal actors 30% included malware 68% took months or longer to discover Some folks in Lincoln, Nebraska didn’t particularly care for that status quo and decided to do something about it. Over the past decade, CEO Justin Kallhoff and the crew over at Infogressive have built an enterprise spread over 44 states and 20 countries, comprising over 30,000 seats.  In today’s episode of InSecurity, Matt Stephenson chats with Justin Kallhoff about the trials and tribulations of the Small to Medium enterprise in the contemporary world of Cryptovariants, ransomware and how MSSPs work to shoulder the burden of cybersecurity. About Justin Kallhoff Justin Kallhoff (@justinkallhoff) founded Infogressive Inc. in October of 2006 with a dream of creating a world-class team of information security professionals that could make a difference for clients spanning the globe. Over the past decade, Justin and the crew at Infogressive have built an enterprise spread over 44 states and 20 countries, comprising over 30,000 seats. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

InSecurity
Pete Schiefelbein: It’s Not Just Cybersecurity, It’s Information Security

InSecurity

Play Episode Listen Later Nov 28, 2018 61:02


InSecurity Podcast: Lieutenant Colonel (Ret) Pete Schiefelbein: It’s Not Just Cybersecurity, It’s Information Security  The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners." CSFI was born out of the collaboration of dozens of experts, and today CSFI is comprised of a large community of nearly 81,000 Cyber Security and Cyber Warfare professionals from the government, military, private sector, and academia. Pete Schiefelbein is a key part of CSFI and works to provide the kind of training to military and private sector companies that can be the difference between a major data breach and just another day at the office. In today’s episode of InSecurity, Matt Stephenson chats with Pete about a broad spectrum of topics including the evolution of the Marine Corps into a state of the art Cyber Defense unit as well its traditional role as an elite wartime fighting force. They dig into the notion of generational change and how it can effect a military organization. Further, Matt and Pete dig into the notion of information security compared to cybersecurity. Oh… and for good measure, they even talk a bit about the fact that Pete and his son are both Eagle Scouts and the role scouting is playing in developing the next generation of cybersecurity professionals. For more information on the topics discussed in the podcast, make sure to check out the following: Cyber Security Forum Initiative Veterans for American Ideals Boy Scouts of America STEM Nova Awards About Pete Schiefelbein PeteSchiefelbein is an Advisory Board Member at the Cyber Security Forum Initiative (@CSFI_DCOE)  He also is a systems engineer at CSCI. Prior to his current work, Pete served 24 years in the United States Marine Corps, recently retiring as a Lieutenant Colonel. However, once a Marine, always a Marine. His final billet in the Marines was as Director, G-6 for the Marine Corps Training and Education Command in Quantico, Virginia, responsible for the governance, procurement, sustainment, and cyber security of over 20,000 user seats at more than 70 Marine Corps formal learning centers across the United States. It is safe to say that Pete knows a thing or two about operating a sophisticated network and protecting data from a variety of threats. Pete is a graduate of the U.S. Naval Academy (B.S., Mechanical Engineering) and the Naval Postgraduate School (M.S., Electrical Engineering). About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Jeff Tang: Stop Trying to Make “Weaponized” Cyber Happen

InSecurity

Play Episode Listen Later Nov 19, 2018 41:50


InSecurity Podcast: Jeff Tang is Beggin’ You… Stop Trying to Make “Weaponized” Cyber Happen     The Missing Persons tried to tell usin the 1980s… “Media overload bombarding you with action It's getting near impossible to cause distraction Someone answer me before I pull out the plug What are words for when no one listens anymore” When it comes to cybersecurity, who is telling you the right things? And we don’t mean who is telling you the truth. We mean who is using the right words to describe the things and the actions that are affecting you and your ability to protect your data. Everywhere Jeff Tang looks, he is besieged with news stories using terms like “weapons-grade exploits” to describe the latest malware outbreak. The narrative constructed that results from this colorful language is detrimental to the progress of securing our computer networks, because it seeks to categorically apply the metaphor of military conflict to cybersecurity - and not every incident in cyber conflict qualifies as a military-style “attack.” In today’s episode of InSecurity, Matt Stephenson chats with Cylance Executive Mischief Consultant Jeff Tang about the value of words in cybersecurity. Jeff explains why it is mind boggling to compare the inconvenience of not being able to access your social media or online banking to a real-world kinetic attack that causes mass human causalities. Join us and understand that, while computers work in a world of binaries, that doesn’t mean our thinking about them has to be binary as well. It’s time we transition away from these military terms when discussing cybersecurity – or face the real-world consequences. About Jeff Tang Jeff Tang(@mrjefftang) is a Senior Security Researcher at Cylance focused on operating systems and vulnerability research. He started his career as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency, where he conducted computer network exploitation operations in support of national security requirements. Prior to Cylance, Jeff served as the Chief Scientist at VAHNA to develop a security platform for identifying targeted network intrusions, and also worked as a CNO Developer at ManTech where he researched tools, techniques and countermeasures in computer network vulnerabilities. Jeff completed his Bachelor of Science (BSc) in Electrical Engineering and Computer Science at the University of California, Berkeley and a Master of Science (MSc) in Offensive Computer Security at Eastern Michigan University. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Chris Stephen on What Separates Cylance from the Herd

DirtySecurity

Play Episode Listen Later Nov 14, 2018 32:30


Chris Stephen on What Separates Cylance from the Herd For over a century, IBM has urged the world to “Think.” In 1997, Apple challenged the world to “Think Different.” In 2012, Cylance picked up that mantle and charged at the Cybersecurity world with a different approach to protecting endpoints. Was this legit? Is Cylance actually doing things differently in a way that is improving cybersecurity and not just renaming existing approaches? Chris Stephen is on the front lines of the ongoing battle to protect datacenters and networks worldwide. He is a  Sales Engineer who works in the government and education sector and thus sees the kind of targeted attacks that can cripple a municipality and cause real damage to the nation’s infrastructure. In this week’s episode of DirtySecurity, guest host Matt Stephenson talks with Chris about what Cylance is doing that is so fundamentally different from the old guard of the cybersecurity industry and the new kids trying to make a splash. Are Cylance’s claims about Artificial Intelligence real? Tune in and judge for yourself. About Chris Stephen Chris Stephen is a Senior Sales Engineer for Cylance based in the Southeast United States. He holds multiple medical device patents and is an Apple Certified Genius. He is really really good at Magic the Gathering but doesn’t like to talk about that outside of that particular circle. About Matt Stephenson (Fill in) DirtySecurity host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come  About Edward Preston Edward didn’t host this episode, but this is his show, so we need to make sure you know what’s up. Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2   GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

InSecurity
The White Company: Inside the Operation Shaheen Espionage Campaign

InSecurity

Play Episode Listen Later Nov 12, 2018 46:17


InSecurity Podcast: The White Company: Inside the Operation Shaheen Espionage Campaign The tumultuous inner-drama of Pakistan has been keeping foreign heads of state awake at night for much of the country’s 70-year history. That’s because Pakistan’s story has been one of contradictions. It has enjoyed peaceful civilian rule, but also violent military coups. It has been a key counterterrorism partner in Afghanistan, but also an accused sponsor and enabler of terrorists. It has been outwardly focused on deterring its rival India, but also inwardly focused on managing domestic separatist and terrorist threats. It has been the home of more than 100 nuclear weapons, but also the most notorious terrorist in history, Osama bin Laden. At the heart of Pakistan’s curious and contradictory history has been its military, whose outsized in uence in Pakistani a airs has made it a key actor at home and abroad, playing roles both highly visible and long hidden. Today, the Pakistani military is at the center of shifting geopolitical alliances — and a sustained cyber espionage campaign. Cylance calls this campaign Operation Shaheen, a reference to the Shaheen Falcon which stands as the symbol of the Pakistani Air Force — the branch of the Pakistani military repeatedly referenced in this campaign’s phishing lures. In today’s episode of InSecurity, Matt Stephenson talks with Cylance Advisory Board Member Ryan Smith and Cylance Directors of Threat Intelligence Jon Gross and Kevin Livelli. Their research team unravel the mystery of a campaign in which traditional approaches to analysis, focused primarily on the malware and infrastructure, yielded few clues and misleading assumptions; however, a comprehensive breakdown of the exploit and shellcode revealed insights into a threat actor whose unique way of cobbling together tools may ultimately lead to their unmasking.   About Ryan Smith Ryan Smith is a member of the Cylance Advisory Board. Prior to that, he was the Vice President of Research at Cylance, where he lead teams performing both internal and external research. He has spent the last decade leading such teams for consulting, product, and fortune 50 organizations. As an individual contributor, Ryan has discovered and exploited highly impactful vulnerabilities in widely deployed client and server software. His interests include reverse engineering, exploitation, vulnerability discovery, analysis algorithms, and magnets. He has spoken at international conferences and is a two-time Pwnie Award winner for best server and client bugs. About Jon Gross Jon Gross is a Director of Threat Intelligence at Cylance. Other than that… he doesn’t tell us much   About Kevin Livelli Kevin Livelli is Director of Threat Intelligence at Cylance, where he conducts long-term, complex investigations with the Research and Intelligence team. His work there follows ten years at 60 Minutes, where his investigative reporting and analysis were recognized with Peabody and Emmy awards. Before that, Livelli supervised investigations at the nation’s largest independent police oversight agency. A graduate of Dartmouth, he earned master's degrees from Trinity College Dublin and Columbia University.   About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
HuntSource is working hard to fill the Cybersecurity skills gap

InSecurity

Play Episode Listen Later Nov 5, 2018 47:11


HuntSource is working hard to fill the Cybersecurity skills gap Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe. Over two thirds of all network compromises are not discovered for months The average cost to a business for each record lost to a data breach is $148 3.5 million cybersecurity job vacanciesby 2021 These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present? Have you heard some of this before? We hope you enjoyed last week’s tribute to Orson Welles and our CyberWar of the Worldpodcast. Now let’s get serious and have an in depth discussion about the Cybersecurity Skills gap…. In today’s episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day.  About Huntsource Huntsourceseeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything. Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe. About Matt Donato Matt Donatois the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business. About Jack Hall Jack Hallis the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as  ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
The Cybersecurity Skill Shortage is a Matter of National Security

InSecurity

Play Episode Listen Later Oct 29, 2018 16:41


Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe. Over two thirds of all network compromises are not discovered for months The average cost to a business for each record lost to a data breach is $148 Now consider that, according to the Herjavec group, there will be over 3.5 million cybersecurity job vacancies by 2021. These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present? In today’s special LIVE episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day. About Huntsource Huntsource seeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything. Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe. About Matt Donato   Matt Donato is the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business. About Jack Hall Jack Hall is the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

InSecurity
Brian Fanzo Translates the Geek Speak and Simplifies the Complex

InSecurity

Play Episode Listen Later Oct 22, 2018 54:28


Brian Fanzo Translates the Geek Speak and Simplifies the Complex Do you know what a Botnet is? What about the difference between Cloud-Based and Cloud-Enabled Security Is there a difference between Machine Learning, Artificial Intelligence and a Difference Engine? Could you explain the difference between a DoS and DDoS attack to your CFO? Could you make her care that there is a difference? Should Americans care about GDPR? Do Americans know what GDPR is? There’s a LOT going on just in the vocabulary words that we use in the cybersecurity world. We don’t just have to make the solutions that protect our users and prevent attacks from happening, we have to communicate what we are doing in a way that the users understand. In this episode of InSecurity, Matt Stephenson sits down with proud pager-wearing millennial Brian Fanzo to talk about the important role effective communications plays in cybersecurity and the larger business world. With a social media following over 130,000 and over 150 episodes of his 2 podcasts published, it is fair to say that Brian Fanzo knows about the value of communicating. About Brian Fanzo Brian Fanzo (@iSocialFanz) inspires, motivates and educates businesses on how to leverage emerging technologies and digital marketing to stand out from the noise and reach the millennial and Gen-Z consumers. He has a diverse background working for the Department of Defense in cybersecurity, then as a technology evangelist at a booming cloud computing startup. Brian is the founder of iSocialFanz which has helped launch digital and influencer strategies with the world’s most iconic brands like Dell EMC, Adobe, IBM, UFC and SAP.   Brian hosts two podcasts (FOMOFanz & SMACtalk), has traveled to over 70 countries and has spoken at many of the world’s largest events including SXSW, CES, Mobile World Congress. Brian is a diehard Pittsburgh sports fan and semi-professional poker player who isn’t afraid to leverage his fast talking skills to read your body language and spot when you’re bluffing. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Digital Bigfoot is the Threat… Rocus Networks are the Squatchers

InSecurity

Play Episode Listen Later Oct 15, 2018 51:22


Digital Bigfoot is the Threat… Rocus Networks are the Squatchers Don’t know what a Squatcher is? Urban Dictionary offers you this bit of knowledge: One who hunts for Sasquatch, Bigfoot, Yeti  The fine folks at Rocus Networks are Digital Squatchers, to be sure What if I told you that 58% of all malware attack victims are categorized as small businesses.  What if I told you that In 2017, cyberattacks cost SMBs an average of $2,235,000 What if I told you that Nearly 1/5 of system breaches occur because of human error What if I told you that only 38% of companies say they are adequately protected Rocus Networks began in 2014 after seeing a need to fill a void in the IT space. Their goals seem obvious, but you’d be surprised how many SMBs do not pay enough attention to their own security, then wonder what happened after a devastating hack or data breach And… Bigfoot About Rocus Networks Rocus Networkssecures confidence in the digital economy as the cybersecurity solution for business. With leading security experts and best-in-breed technology, we provide visibility, controls and monitoring for complete, proactive network and data protection About Pete Seeber Pete Seeberis aCybersecurity Entrepreneur and Executive with a demonstrated history of working in the information technology and services industry. Rocus Networks provides world-class information security and technology solutions through engineering, design and consulting. We concentrate on providing Security, Reliability and Flexibility to drive productivity and competitive advantage in the marketplace.  About Mike Viruso Mike Virusois a sales professional with over 20 years of successful sales experience in start-up and expanding territories within the technology industry. Mike has established many long standing relationships with clients and partners in the Southeast. He has consistently exceed his business objectives and has established himself as a leader and trusted advisor in the markets he serves. About Rick Ingersoll Rick Ingersollhas very little to say about himself on LinkedIN and other social media platforms. But trust us… he has put in the work over 20+ years in cybersecurity and is very good at what he does.  About Matt Stephenson Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Theresa Payton has protected our money, our President and now our most at-risk children

InSecurity

Play Episode Listen Later Oct 8, 2018 20:15


InSecurity Podcast: Theresa Payton has protected our money, our President and now our most at-risk children What if I told you that there are awful people out there exploiting children and using high end technology to cover their tracks? What if I told you that they are getting away with it? What if I told you that there are people out there with the experience, knowhow, technology… and most importantly, the will… to find these people What if I told you that they ARE finding these scumbags What if I told you that can help… Theresa Payton is currently the CEO of Fortalice and co-founder of Dark Cube. She started her career in the financial sector before moving on to public service. She once worked in a big white building you might recognize. In today’s episode of InSecurity, Matt Stephenson speaks with Theresa about her journey from the banking business in Florida… to becoming the CIO of the White House… to starring on a hit show on CBS… to playing a role in finding exploited children. Her journey is incredible and you won’t want to miss it. About Theresa Payton Theresa Payton is President and CEO of Fortalice Solutions, co-Founder of Dark Cubed, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer (CIO) at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Prior to her time at the White House, Theresa Payton was a senior technology executive in banking, spending 16 years providing banking solutions using emerging technologies. Payton founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security."   About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Is Nerdcore the future of Infosec and Hip Hop? OHM-I shows the way.

InSecurity

Play Episode Listen Later Sep 28, 2018 58:52


Is Nerdcore the future of Infosec and Hip Hop? OHM-I shows the way. At your wit’s end because of APT attacks? Tried everything but the bad guys keep finding creative ways in? Have you considered listening to Nerdcore hip hop for inspiration? No? You’re missing out. Yo, you need fortify heavily I see your database services and version 1 SMB You know what this nerd gon’ do, payloads I’mma turn on you That quad 4 make you sad forever, that’s ETERNALBLUE That’s just a taste of the knowledge OHM-I has in store for you. In this episode of InSecurity, Matt Stephenson sits down with Nerdcore superstar OHM-I to find out what is happening in the world of Nerdcore Hip Hop and where it intersects with the world of cybersecurity. OHM-I has spent over a decade in both games and has plenty to say about his time in each. Did legends like Grandmaster Flash and Rick Rubin hack music in the formative days of Hip Hop? What role can tech companies play in bringing young black men into STEM programs at an early age? Is there such a thing as Nerdcore Country music?  About OHM-I, AKA Leron Gray Leron Gray is the secret identity of Nerdcore superstar MC and producer and OHM-I. Leron spent 10 years in the Navy including a recent post as a Cryptologic Technician. With a history of network vulnerability assessments, incident response and network reconstruction, he now enters the private sector as a pen-tester and Red-Teamer. With multiple LPs, EPs and singles to his credit, OHM-I is a stalwart on the Nerdcore scene. Look for him at events like Magfest, SXSW, Nerdapalooza and other Nerd-friendly venues. Dig into his virtual crates on Bandcamp and Soundcloud to hear more!   About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Look for the InSecurity Podcast with Matt Stephenson on Spotify and Soundcloud!

InSecurity
As a Healthcare CISO, Taylor Lehmann protects more than just Endpoints

InSecurity

Play Episode Listen Later Sep 24, 2018 47:00


InSecurity Podcast: As a Healthcare CISO, Taylor Lehmann protects more than just Endpoints Is a Patient a User? A Customer? A Client? Wellforce CISO Taylor Lehmann Needs to Protect Them All. Taylor Lehmann is the CISO of a healthcare system spread over 8 locations that treats hundreds of thousands of patients and employs thousands of staff. He has to be on top of all it from a cybersecurity perspective. Wellforce users and “customers” are a very different responsibility for Taylor compared to that of the average CISO. Lives are literally on the line. In this episode of InSecurity, Matt Stephenson chats with Wellforce’s Taylor Lehmann on the role of the CISO at a large, multi-location healthcare system. Taylor isn’t just a suit-and-tie executive, though. He puts on the scrubs and does rounds with the medical staff in order to immerse himself in the daily operations of the facilities. For Taylor, that is the only way to grok what is happening at Wellforce and to know what he and his teams must be doing to protect it About Taylor Lehmann Taylor Lehman (@sidechannelsec) is the CISO of Wellforce and Tufts Medical Center. He was formerly the CPO/CISO/CIO/ Director for Independent Health, HealthEdge, and PwC, as well as the former VP of Cyber Risk Management at State Street Bank. Taylor is also an expert in securing software development and delivery, and is on the boards of Gartner Evanta, the HITRUST Community Extension Program, the TPA Summit, and the Business Associate Council. He has CBCP, CISM, CISA, CRISC, CIPP/US, CCSFP (HITRUST), ITIL, HCISPP, and PMP certifications.  About Matt Stephenson Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Sentinel Technologies has earned the trust for businesses to put their most precious assets in their care

InSecurity

Play Episode Listen Later Aug 26, 2018 46:11


Sentinel Technologies has earned the trust for businesses to put their most precious assets in their care. The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.  - James Comey Sentinel Technologies. They may be one of the most important companies you’ve never heard of. They have been In business for over 35 years. With over 500 employees and over 50 Company Certifications and over 2400 individual certifications with industry pillars including EMC, VMware and NetApp, they have been around a lot of different blocks and solved a lot of different problems for their clients. With a customer base striped across Education, Finance, Healthcare, Manufacturing and Government… It’s fair to say that Sentinel Technologies has a lot of fingers in a lot of pies About Sentinel Technologies   Sentinel has stayed at the forefront of IT developments and maintained a singular focus on providing practical and innovative solutions. With single-source accountability, Sentinel processes and teams address a range of IT needs – from communications, to data center, to cloud and managed services. About Bob Keblusek   Bob Keblusek (@rkeblusek) is the Chief Technology Officer at Sentinel Technologies. About Rick Spatafore Rick Spatafore (@RickSpatafore) is the Strategic Advisor for Security & Healthcare at Sentinel Technologies  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward Preston (@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Sticher, SoundCloud, I Heart Radio as well as   https://threatvector.cylance.com/en_us/category/podcasts.html  iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Susan Etlinger on The Ever Expanding Role of Artificial Intelligence

InSecurity

Play Episode Listen Later Aug 19, 2018 37:56


From Amazon Echo to self-driving cars to Norman, the Psychopathic AI… the Artificial Intelligence diaspora appears to be growing as diverse as humanity itself. Are we good with that?   Susan Etlinger joins Matt Stephenson on the InSecurity podcast to dig into the business ramifications of the ever-increasing presence Artificial Intelligence in the data center. Susan is an industry analyst focusing on industry trends related to the impact of emerging technologies on organizations and individuals. Susan specializes in business strategies related to artificial intelligence, data science, analytics and digital ethics.   In this episode of Insecurity, Susan calms Matt's irrational fears of the potential of AI while illuminating the exciting present and future of Artificial Intelligence and Machine Learning. We'll take a look at what is happening in "The Enterprise" and why AI experiments like Microsoft's Tay and MIT's Norman can provide value. Given that Susan was recently named among 100 #AI Influencersby US AI, she is among the most qualified among us to lead this conversation.  About Susan Etlinger Susan Etlinger(@setlinger), an industry analyst at Altimeter Group, is a globally recognized expert in digital strategy, with a focus on artificial intelligence, big data, AI ethics and big data. Susan conducts independent research and has authored many reports that are available to the public. Susan works with Global 2000 clients to assess the impact of AI and related technologies on business, and identify use cases, opportunities, risks and organizational structure and culture. She also works with technology vendors to refine product road maps and strategies based on her independent research.  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2  GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Lee Mangold on the role of Government in Cybersecurity

InSecurity

Play Episode Listen Later Aug 14, 2018 41:03


Lee Mangold on The role, responsibility and expectations of Government in Cybersecurity Regardless of where you stand on the political spectrum, there can be no denying that the United States if facing threats entirely different from anything we have seen in the first 230 years of our democracy From Edward Snowden to Chelsea Manning to Julian Asange to… well… all of Russia… the cyber-threats are real and they are only increasing in scale and complexity Much like the law, our lawmakers have appeared woefully ignorant of how these attacks work, how to defend against them and, most prominently, how to prevent them Lee Mangold spent 14 years working as a government contractor developing training systems and cybersecurity technologies. Now he is a Candidate for District 28 in the Florida State House of Representative.  In this episode of the InSecurity Podcast, Lee Mangold sits down with Matt Stephenson and Jack McHugh to discuss what part Government needs to play in the overall scheme of Cybersecurity. About Lee Mangold Lee Mangold (@LeeMangold) is a cybersecurity thought leader with 20 years of experience in security, IT, computer science, and engineering. Throughout his career, Lee has supported the US Government, Fortune companies, and small businesses alike. He has a Bachelor's in Computer Science, an MBA with a computer science concentration, and his Doctorate in Computer and Information Security. Additionally, Lee is a professor at the University of Central Florida, Vice President and Lead Instructor at Florida Cyber Alliance and Officer, ISSA Coordination, BSides Orlando.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. About Jack McHugh Hailing from Stockton, California, Jack McHugh left for the rural confines of Boise State University where he discovered his passion for technology. After surviving a tumultuous IPO, he made a move to Cylance, joining the sales organization where he supports strategic accounts in North America. Jack brings a  unique combination of youth and experience to his perspective as it pertains to Cybersecurity.  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts iTunes/Apple Podcasts GooglePlay Music

InSecurity
InSecurity Podcast: Steve Snyder on the past, present and future of currency

InSecurity

Play Episode Listen Later Aug 2, 2018 51:28


InSecurity Podcast: Steve Snyder on the past, present and  future of currency Fortnite and Bitcoin and Dollars OH MY! What makes real money... REAL? What if I told you a man named Matthew Mellon owned a cache of Ripple that at one point was valued at over $1 BILLION and was still worth over $500 MILLION at the time of his unexpected death Mellon claimed to have kept the digital keys to his Ripple wallet locked in cold storage in other people's names at various locations around the US What does the family of the deceased do in a situation like this? What does anyone do with the notion of hundreds of millions of dollars in value that is locked away and utterly inaccessible? What the hell is Ripple anyway? In this episode of the InSecurity Podcast, Steve Snyder joins Matt Stephenson and Edward Preston for a look into the fact, fiction and myth of crypto-currencies. And just to make things a bit weirder… we’re also going to talk about weapon skins that are trading for $50,000 inside games. FIFTY. THOUSAND. DOLLARS. Noodle on that for a minute… About Steve Snyder Steve Snyderis a member of Bradley’s Banking and Financial Services and Cybersecurity and Privacyteams. He leverages his industry experience as a network engineer and cyber risk manager to assist clients matters related to data protection arising from emerging technologies. Steve is a thought leader in privacy and data security and routinely writes and speaks on cybersecurity topics.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come  About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Hiep Dang & Edward Preston introduce Cylance Smart Antivirus

InSecurity

Play Episode Listen Later Aug 1, 2018 36:26


InSecurity Podcast: Why is Cylance entering the consumer market? What if I told you that 67% of workers use their own personal devices while at work 37% of US workers telecommute What if you asked me “why should I care?” Cloud-based solutions (Office365, DropBox, Box, Trello, Atlassian, etc) allow employees to access corporate assets from personal devices Employees can connect USB thumb drives to personal devices infected with malware, then plug them into a company device Employees can access corporate email on personal devices Telecommuters can VPN into work from a personal device Cached credentials from employees logging into company assets from a personal device could be stolen by malware Web-cam enabling malware on a personal device could spy on and compromise employees The virtual borders of a Corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employee’s home networks have become blurred. CISOs and their Security Teams have a difficult time controlling their security risk and exposure from cybersecurity threats originating from employee’s homes. Think you’ve got the kind of security solution in place you need to protect your network from not just the bad guys, but hard-working employees? In this episode of the InSecurity Podcast, Hiep Dang and Edward Preston join Matt Stephenson to introduce Cylance’s new baby… Cylance Smart Antivirus. Hiep and Edward will explain how Cylance is bringing their groundbreaking, enterprise security solutions to the home user. About Hiep Dang Over 14 years ago, Hiep Dang (@Hiep_Dang) serendipitously turned a casual curiosity in computer forensics and viruses into a full time professional career in the cyber-security industry. His journey has given Hiep a spectrum of experiences from burgeoning startups to Fortune 500 companies while solving deep technical to abstract business problems. Hiep’s sweet spot is product management because it is at the intersection of product strategy and technical execution. During the day, he geeks out on building innovative security products and at night Hiep teaches Kung Fu. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  

InSecurity
InSecurity Podcast: Katie Moussouris answers the question… Should the pursuit of coding perfection always include Bug Bounties?

InSecurity

Play Episode Listen Later Jul 30, 2018 44:47


InSecurity Podcast: Katie Moussouris answers the question… Should the pursuit of coding perfection always include Bug Bounties? What if I told you that the industry average is 15-50 bugs per 1000 lines of code? You may not care if you’re creating a Word doc. What if you are in charge of launching the latest SpaceX rocket? What if you are Lewis Hamilton driving for Mercedes Formula 1 and a software glitchcauses you to lose a 3 second lead at the Australian Grand Prix? What if you are a general in charge of military forces using tools that include the same software I can buy on Amazon or Ali Baba? With so much of our world now driven by software, everything is on the line: money, property, lives. Perfection is never going to be an option, but it is fair to say that we need to be as close to perfect as possible No small feat… and no pressure on folks like today’s guest Katie Moussouris joins Matt Stephenson on the InSecurity podcast to talk about bugs and bug bounties and the impact they can have on security and privacy. Katie is an industry legend perhaps best known for creating Microsoft’s first Bug Bountyprogram in 2013. In this episode of the InSecurity Podcast, Katie Moussouris breaks it down for Matt Stephenson. Who needs a bug bounty? Is a bug bounty program even appropriate for a company? There are risks in every question and every answer. About Katie Moussouris Katie Moussouris(@k8em0) is the founder and CEO of Luta Security, specializing in helping businesses and governments work with hackers to better defend themselves from digital attacks.  She is a noted authority on vulnerability disclosure & bug bounties, advising companies, lawmakers, & governments on the benefits of hacking& security. Katie is a hacker - first hacking computers, now hacking policy & regulations. About Matt Stephenson Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
InSecurity Podcast: Mike Daugherty and Malcolm Harkins... Who Can You Trust?

InSecurity

Play Episode Listen Later Jul 25, 2018 50:16


What if I told you that there are companies out there who deliberately spoof data breaches in order to blackmail their “customers” into paying for their “breach remediation services”? What if I told you that, after failing to be a good little victim to such a scam, LabMD began hearing from the Federal Trade Commission about its security and technology practices? Would you believe me if I said that, in a battle that is now in its 17thyear, our guest has attempted the impossible and stood up to the crooks and the FTC? Rather than settle a case that he knew was wrong, our guest refused to live in the world he was given. He has battled to change that world and keep his company’s name and his own name from being steamrolled by the bureaucracy of a government agency that may not really know what they are doing when it comes to data privacy and security. Joining Matt Stephenson on the InSecurity podcast are Mike Daugherty and Malcolm Harkins. Mike is the CEO of LabMD who refused to be the victim of a shady “Breach Mediation” company, which led to a decade long battle with the Federal Trade Commission. Malcolm is the Chief Security & Trust Officer at Cylance. He is not one to sit idly by and let the cybersecurity industry focus on profits over people. Imagine what might happen when you get these two in a room together… About Mike Daugherty Mike Daugherty is embroiled in the biggest regulatory cybersecurity legal battle in the country today. The CEO of LabMD, a cancer testing laboratory, author, speaker, consultant and policy advocate, he has spent most of the last decade defending his company against charges that it had deficient cybersecurity practices. The early years of his entering and fighting Washington, DC, are recorded in his book, The Devil Inside the Beltway. In so doing, he has become the only litigant to challenge the basic authority that underlies more than 200 enforcement actions relating to cybersecurity and online privacy that the FTC has brought over the past 15 years. Every one of the 200+ litigants before him – including some of the largest companies in the world – have settled with the FTC, creating an unquestioned and untested belief that the FTC has broad authority to regulate in these areas. Following oral arguments in June, 2017, before a panel of the 11th Circuit Court of Appeals, on June 6, 2018, he actually prevailed. In so doing, he toppled key pillars of the FTC’s cybersecurity and online privacy edifice, successfully exposing and challenging The Administrative State. The cybersecurity regulatory framework for all of industry has been flipped on its head. About Malcolm Harkins As the Chief Security and Trust Officer at Cylance, Malcolm Harkins (@ProtectToEnable) is responsible for all aspects of information risk and security, security and privacy policy, and for peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks. Previously, he was Vice President and Chief Security and Privacy Officer at Intel Corp. In that role, Malcolm was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html  iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Clint Watts on Social Media Manipulation

InSecurity

Play Episode Listen Later Jun 18, 2018 45:27


Clint Watts: Social Media Manipulation What if I told you that the most effective way to hack an election isn’t injecting code into a voting machine or surreptitiously changing the vote count, but rather by means of clever and extensive use of popular social media platforms like Facebook and Twitter? The major platforms are designed to be able to target specifics groups of people who fit specific profiles demographically. Nefarious organizations can use those platform features to influence public opinion and dialogue. Bots can create what appear to be armies of people who publish what seems on the surface to be “news” that finds a home with like-minded people. And that, friends, is how someone half a world away can sway an election from an iPhone. In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Clint Watts, national security contributor at MSNBC and author of the recently released best-selling book Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News. About Clint Watts Clint Watts (@selectedwisdom) is a Robert A. Fox Fellow in the Foreign Policy Research Institute’s Program on the Middle Eastas well as a Senior Fellow at the Center For Cyber and Homeland Security at The George Washington University. Watts is a consultant and researcher modeling and forecasting threat actor behavior and developing countermeasures for disrupting and defeating state and non-state actors. His research predominately focuses on terrorism forecasting and trends seeking to anticipate emerging extremist hotspots and anticipate appropriate counterterrorism responses. More recently, Watts used modeling to outline Russian influence operations via social media and the Kremlin’s return to Active Measures. Before becoming a consultant, Clint served as a U.S. Army Infantry Officer after graduating from West Point, an FBI Special Agent on a Joint Terrorism Task Force (JTTF), as the Executive Officer of the Combating Terrorism Center at West Point (CTC) and as a consultant to the FBI’s Counter Terrorism Division (CTD) and National Security Branch (NSB).  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!