Podcasts about guidepoint security

  • 24PODCASTS
  • 43EPISODES
  • 35mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about guidepoint security

Latest podcast episodes about guidepoint security

The CyberWire
Salt in the wound.

The CyberWire

Play Episode Listen Later Feb 13, 2025 34:41


Salt Typhoon is still at it. Russian cyber-actor Seashell Blizzard expands its reach. The EFF sues DOGE to protect federal workers' data. House Republicans pursue a comprehensive data privacy bill. Fortinet patches a critical vulnerability. Google views cybercrime as a national security threat. Palo Alto Networks issues 10 new security advisories. Symantec suspects a Chinese APT sidehustle. Guest Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware. A massive IoT data breach exposes 2.7 billion records. Here come the AI agents.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest, Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware. Selected Reading China's Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers (WIRED) Russian Seashell Blizzard Enlists Specialist Initial Access Subgroup to Expand Ops (Infosecurity Magazine) EFF Leads Fight Against DOGE and Musk's Access to US Federal Workers' Data (Infosecurity Magazine) Elon Musk and the Right Are Recasting Reporting as ‘Doxxing' (New York Times) FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now! (Hackread) Cybercrime evolving into national security threat: Google (The Record) House Republicans launch group for comprehensive data privacy legislation (The Record) Palo Alto Networks Patches Potentially Serious Firewall Vulnerability (SecurityWeek) Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job (SecurityWeek) Massive IoT Data Breach Exposes 2.7 Billion Records, Including Wi-Fi Passwords (Cyber Security News) Are You Ready to Let an AI Agent Use Your Computer? (IEEE Spectrum) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Darknet dollars exposed.

The CyberWire

Play Episode Listen Later Sep 27, 2024 34:50


International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users' passwords in plaintext. Delaware's public libraries grapple with the aftermath of a ransomware attack. Tor merges with Tails. Progress Software urges customers to patch multiple vulnerabilities. A critical vulnerability in VLC media player has been discovered. Our guests are Mark Lance, Vice President of DFIR and Threat Intelligence at GuidePoint Security, and Andrew Nelson, Principal Security Consultant at GuidePoint Security discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." Having the wisdom to admit you just don't know.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Mark Lance, Vice President DFIR and Threat Intelligence at GuidePoint Security, discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story."  Selected Reading US-led operation disrupts crypto exchanges linked to Russian cybercrime (The Record) Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected (SecurityWeek) Criminal charges coming in alleged Iranian hack of Trump campaign emails: Sources (ABC News) Meta fined $101 million for storing hundreds of millions of passwords in plaintext (The Record) Hackers attack Delaware libraries, seek ransom. Here's what we know (Delaware Online) Tor Merges With Security-Focused OS Tails (SecurityWeek) Progress urges admins to patch critical WhatsUp Gold bugs ASAP (Bleeping Computer) VLC Player Vulnerability Let Attackers Execute Malicious Code, Update Now (Cyber Security News) Bigger AI chatbots more inclined to spew nonsense — and people don't always realize (Nature) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Behind the Investigation with Atlanta News First
A day in the life of a ransomware negotiator

Behind the Investigation with Atlanta News First

Play Episode Listen Later Sep 4, 2024 18:12


Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. What is it really like to negotiate with ransomware attackers? Why negotiate? What's the most moment in a ransomware negotiation? Mark Lance is vice president of GuidePoint Security, who talks about the many aspects involved in negotiating after a ransomware attack.

The CyberWire
Spinning the web of tangled tactics. [Research Saturday]

The CyberWire

Play Episode Listen Later Aug 3, 2024 24:49


This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. The high-confidence assessment by GuidePoint's DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions. The research can be found here: Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider Learn more about your ad choices. Visit megaphone.fm/adchoices

Research Saturday
Spinning the web of tangled tactics.

Research Saturday

Play Episode Listen Later Aug 3, 2024 24:49


This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. The high-confidence assessment by GuidePoint's DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions. The research can be found here: Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider Learn more about your ad choices. Visit megaphone.fm/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 38: Regulating OT Data Breaches And Ransomware Reporting

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 7, 2024 42:50


Podcast: Error Code (LS 25 · TOP 10% what is this?)Episode: EP 38: Regulating OT Data Breaches And Ransomware ReportingPub date: 2024-06-04When critical infrastructure is shut down due to ransomware or some other malicious attack. Who gets notified when? And does that help or hinder trying to keep the systems back up and running? Chris Warner, from GuidePoint Security, discusses the upcoming Cyber Incident Reporting for Critical Infrastructure Act or CIRCIA, and what will it will mean for critical infrastructure organizations.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 38: Regulating OT Data Breaches And Ransomware Reporting

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 7, 2024 42:50


Podcast: Error Code (LS 25 · TOP 10% what is this?)Episode: EP 38: Regulating OT Data Breaches And Ransomware ReportingPub date: 2024-06-04When critical infrastructure is shut down due to ransomware or some other malicious attack. Who gets notified when? And does that help or hinder trying to keep the systems back up and running? Chris Warner, from GuidePoint Security, discusses the upcoming Cyber Incident Reporting for Critical Infrastructure Act or CIRCIA, and what will it will mean for critical infrastructure organizations.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Error Code
EP 38: Regulating OT Data Breaches And Ransomware Reporting

Error Code

Play Episode Listen Later Jun 4, 2024 42:50


When critical infrastructure is shut down due to ransomware or some other malicious attack, who gets notified and when? Chris Warner, from GuidePoint Security, discusses the upcoming Cyber Incident Reporting for Critical Infrastructure Act or CIRCIA and what it will mean for critical infrastructure organizations.

@BEERISAC: CPS/ICS Security Podcast Playlist
Navigating the Convergence: Securing OT in a Connected World

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 26, 2024 43:33


Podcast: IoT Security PodcastEpisode: Navigating the Convergence: Securing OT in a Connected WorldPub date: 2024-05-14In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and healthcare. With insights from Patrick Gillespie, an OT expert at GuidePoint Security, we'll discuss the convergence of IT and OT systems, the risks introduced by COVID-19, and the advanced solutions from providers like Phosphorus that are combatting these threats. Patrick also sheds light on his personal journey from military service to a cybersecurity career, and the essential steps organizations should take to bolster their OT security, from embracing cyber hygiene to implementing robust security programs. Join us as we uncover the pressing issues facing IoT security today and how innovations are driving a safer, more secure operational environment. Let's connect about IoT Security!Follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
Navigating the Convergence: Securing OT in a Connected World

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later May 26, 2024 43:33


Podcast: IoT Security PodcastEpisode: Navigating the Convergence: Securing OT in a Connected WorldPub date: 2024-05-14In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and healthcare. With insights from Patrick Gillespie, an OT expert at GuidePoint Security, we'll discuss the convergence of IT and OT systems, the risks introduced by COVID-19, and the advanced solutions from providers like Phosphorus that are combatting these threats. Patrick also sheds light on his personal journey from military service to a cybersecurity career, and the essential steps organizations should take to bolster their OT security, from embracing cyber hygiene to implementing robust security programs. Join us as we uncover the pressing issues facing IoT security today and how innovations are driving a safer, more secure operational environment. Let's connect about IoT Security!Follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcastThe podcast and artwork embedded on this page are from Phosphorus Cybersecurity, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

IoT Security Podcast
Navigating the Convergence: Securing OT in a Connected World

IoT Security Podcast

Play Episode Listen Later May 14, 2024 43:33


In this episode, we're diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from manufacturing to critical infrastructure and healthcare. With insights from Patrick Gillespie, an OT expert at GuidePoint Security, we'll discuss the convergence of IT and OT systems, the risks introduced by COVID-19, and the advanced solutions from providers like Phosphorus that are combatting these threats. Patrick also sheds light on his personal journey from military service to a cybersecurity career, and the essential steps organizations should take to bolster their OT security, from embracing cyber hygiene to implementing robust security programs. Join us as we uncover the pressing issues facing IoT security today and how innovations are driving a safer, more secure operational environment. Let's connect about IoT Security!Follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 26: Securing Railroad OT Systems

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 22, 2023 42:13


Podcast: Error Code (LS 25 · TOP 10% what is this?)Episode: EP 26: Securing Railroad OT SystemsPub date: 2023-12-20Can your OT function if the IT system goes down? OT self-sufficiency is critical for infrastructure such as rail systems. Christopher Warner, from GuidePoint Security, discusses how this infrastructure resilience is important not only for the rail industry but for most of the other critical infrastructures in general.   The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
EP 26: Securing Railroad OT Systems

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 22, 2023 42:13


Podcast: Error Code (LS 24 · TOP 10% what is this?)Episode: EP 26: Securing Railroad OT SystemsPub date: 2023-12-20Can your OT function if the IT system goes down? OT self-sufficiency is critical for infrastructure such as rail systems. Chris Warner, from GuidePoint Security, discusses how this infrastructure continuity is important not only for the rail industry but for most of the 16 other critical infrastructures in general.   The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Error Code
EP 26: Securing Railroad OT Systems

Error Code

Play Episode Listen Later Dec 20, 2023 42:13


Can your OT function if the IT system goes down? OT self-sufficiency is critical for infrastructure such as rail systems. Christopher Warner, from GuidePoint Security, discusses how this infrastructure resilience is important not only for the rail industry but for most of the other critical infrastructures in general.   

ot securing railroads guidepoint security
The CyberWire
A dark web take down.

The CyberWire

Play Episode Listen Later Dec 19, 2023 35:06


The FBI takes down ALPHV/BlackCat. Comcast reveals breach of nearly 36 million Xfinity customers. Microsoft and Cyberspace Solarium Commission release water sector security report. Malware increasingly uses public infrastructure. Iran's Seedworm and its telco targets. QR code scams. Feds release joint analysis of 2022 election integrity. Joint advisory on Play ransomware group. In today's Mr Security Answer Person, John Pescatore considers the risks of AI. Rick Howard talks with Lauren Brennan of GuidePoint Security about evaluating and maturing your SOC. Iranian gas stations running on empty. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guests John Pescastore joins us for Mr. Security Answer Person to address the question, “Things seem to be moving quickly with AI, what is your feeling about that positioning for early 2024?” Today's guest is Lauren Brennan of GuidePoint Security. N2K's Rick Howard caught up with Lauren recently  at the MITRE ATT&CKcon 4.0. They discussed evaluating and maturing your SOC. Selected Reading Authorities claim seizure of notorious ALPHV ransomware gang's dark web leak site (TechCrunch+) Comcast says hackers stole data of close to 36 million Xfinity customers (TechCrunch+) Microsoft, Cyberspace Solarium Commission propose measures to strengthen water sector cybersecurity (Industrial Cyber) Malware leveraging public infrastructure like GitHub on the rise (Reversing Labs) Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa (Symantec) “Quishing” you a Happy Holiday Season (netcraft) 2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS (Securityweek) US and Australia Warn of Play Ransomware Threat (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Hashtag Realtalk with Aaron Bregg
Episode 96 - The 'Unnatural' Side of Security Sales - Buyers Beware!

Hashtag Realtalk with Aaron Bregg

Play Episode Listen Later Nov 15, 2023 40:24


*Disclaimer* Thoughts and opinion in this episode are solely myself or my guests and not necessarily reflective of our employers.In this episode I had a chance to sit down with Matt Nelson and do the podcast from a very cool location.  Matt is a Senior Security Architect for Guidepoint Security. The topic of our rant was centered around all of the things 'wrong' with cybersecurity sales and why it hurts everyone.Talking Points Include:Ineffective Bad Behavior - You are doing you and your company a disservice Improper In-person Event EtiquetteDo Social Engineering for Good!What you as a Customer can do to help set expectationsThe importance of building relationshipsSpecial shout outs to Maril Vernon, Michelle Beracy and Anthony Coggins!

sales security buyers unnatural matt nelson expectationsthe senior security architect guidepoint security
Breaking Through in Cybersecurity Marketing
Healthy & Profitable Vendor-Reseller Relationships - Replay from CyberMarketingCon 2022

Breaking Through in Cybersecurity Marketing

Play Episode Listen Later Oct 11, 2023 43:39


The time for #CyberMarketingCon2023 is fast approaching and we hope to see you in Austin in December. So mark those calendars and get your tickets, the conference will be from December 10th through 13th. It's filled with education, the best speakers, hands-on workshops, networking, networking, AND MORE networking.  Maria and Gianna cannot wait to see you. Enjoy this episode and be sure to get your ticket by clicking ➡️➡️➡️here! In this session, the focus was on understanding the dynamics of channel partner relationships in the cybersecurity industry. The two speakers, Amanda McLaughlin, Director of Mid-Atlantic Marketing at GuidePoint Security (Former Marketing Manager for GuidePoint Security), and David Brown, Head of Global Alliance and Partner Marketing at ReversingLabs (Former Director, Global Partner Marketing at ZEROFOX) are on a mission to educate and dispel misconceptions about VAR (Value-Added Reseller) and vendor relationships while also providing valuable tips and tricks on how to establish and maintain healthy VAR and vendor relationships.    Here are the key points covered: Promoting a better understanding of VAR and vendor relationships. Also highlighting their significance in the context of the cybersecurity industry. An in-depth explanation of what a VAR is: “entities that offer not only products but also their expertise and services in conjunction with solutions provided by solution providers.” The speakers used GuidePoint Security as an example as it is a cybersecurity VAR offering its services and expertise to clients. Addressing Misunderstandings: Amanda and David acknowledged that VAR and reseller relationships can be misunderstood, which is something similar to the classic sales and marketing relationship. But they also highlight how important it is to clear misunderstandings to establish effective partnerships. To close the session the speakers also went into what a successful vendor looks like to a VAR. The key metrics for success and some tips if you feel like your reseller relationship is not working? They also opened the floor for some questions!   More on #CyberMarketingCon2023 here, see you in Texas!

The CyberWire
Ransomware in Colombia. An accidental data exposure. Cyberespionage hits unpatched systems. An attack on IT systems disrupts industrial production. Bots and bad actors.

The CyberWire

Play Episode Listen Later Sep 19, 2023 27:16


Colombia continues its recovery from last week's cyberattacks. AI training data is accidentally published to GitHub. The cyberespionage techniques of Earth Lusca. Clorox blames product shortages on a cyber attack. Cybersecurity incidents in industrial environments. Where the wild bots are. Joe Carrigan looks at top level domain name exploitation. Our guest is Kristen Bell from GuidePoint Security with a look at vulnerability vs. exploitability. And there's talk of potential Russia-DPRK cooperation in cyberspace. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/179 Selected reading. More than 50 Colombian state, private entities hit by cyberattack -Petro (Reuters)  Colombia Mulls Legal Action Against US Firm Targeted In Cyber Attack (Barron's) Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token (Microsoft Security Response Center) Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages (SecurityWeek) Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement (Trend Micro)  Chinese hackers have unleashed a never-before-seen Linux backdoor (Ars Technica) The Clorox Company FORM 8-K (US Securities and Exchange Commission)  Clorox Warns of Product Shortages Following Cyberattack (Wall Street Journal) Clorox warns of product shortages, profit hit from August cyberattack (The Street)  Can't find the right Clorox product? A recent cyberattack is causing some shortages (USA Today)  Clorox warns of product shortages after cyberattack (Fox Business)  As flu season looms, hackers force a shortage of Clorox products (Fortune) New Research Finds Cyberattacks Against Critical Infrastructure on the Rise, State-affiliated Groups Responsible for Nearly 60% (Business Wire) Death By a Billion Bots (Netacea) Russian and North Korea artillery deal paves the way for dangerous cyberwar alliance (EconoTimes)  Learn more about your ad choices. Visit megaphone.fm/adchoices

The Hacker Mind
EP 72: Tales From A Ransomware Negotiator

The Hacker Mind

Play Episode Listen Later May 30, 2023 41:31


Say you're an organization that's been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not?  Mark Lance, the VP of DFIR and Threat Intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he's handled and best practices for how to handle such an event.

Cy Saves the Day
Ep 58: Why is it so hard to break into cyber w/Matt Peterson

Cy Saves the Day

Play Episode Listen Later May 9, 2023 35:29


In this week's podcast, we discussed why it was so hard to break into cybersecurity. With the increasing importance of cybersecurity, it was no wonder that more and more people were interested in pursuing a career in this field. Our guest today was Matt Peterson with Guidepoint Security, a cybersecurity professional with over two decades of experience.Matt explained that one of the biggest challenges in breaking into cybersecurity was the ever-changing nature of the field. As new technologies and threats emerge, cybersecurity professionals must constantly stay up to date with the latest tools and techniques. This requires a significant amount of time and effort and can be daunting for those just starting out.Another challenge is the lack of formal education and training programs specifically tailored to cybersecurity. While there are some degree programs and certifications available, they may not provide the practical experience and hands-on training that employers are looking for. This can make it difficult for new professionals to get their foot in the door and gain the necessary knowledge to advance in their careers.Additionally, the cybersecurity field is highly competitive, with many qualified candidates vying for a limited number of job openings. This means that even those with the necessary skills and experience may struggle to find employment in the field.Despite these challenges, Matt emphasized that breaking into cybersecurity is not impossible. Networking, gaining practical experience through internships or volunteer work, and continuing education and training can all help aspiring professionals stand out in a crowded field. With dedication and perseverance, it is possible to build a successful career in cybersecurity.

Hashtag Realtalk with Aaron Bregg
Episode 82 - What the Heck is Wrong with Security (Updated)

Hashtag Realtalk with Aaron Bregg

Play Episode Listen Later Apr 5, 2023 44:24


4.6.23 Update:If you had downloaded this file before 6pm on April 6th you received the wrong episode. This error has been fixed and you have my sincerest apologies for the mess up!*Disclaimer* While there was no physical harming of bad security vendors in this episode, there is a lot of honest #RealTalk. Opinions in this episode are my own and do not necessarily reflect the views of my leadership or my employer. Additionally, this episode is not sponsored and therefore is not influenced by outside sources.In this episode I finally had some time to go over to the 'Fresh' Coast of West Michigan and sit down with Matt Nelson to talk about the current state of the cybersecurity industry. Matt is a Senior Solutions Architect for GuidePoint Security and brings a plethora of both useful and useless security knowledge to the conversation!We kept the conversation focused on several different key areas of information security:How NOT to work with a business if you are a security vendorHow are companies dealing with the rising cost of cybersecurityGiving some #RealTalk advice to  people looking to break into the information security industryWhile this episode went a little bit longer that I would like, it contains a TON of useful advice for not only employees and leaders, but security vendors as well.

@BEERISAC: CPS/ICS Security Podcast Playlist
Knocking down the legs of the industrial security triad.

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Feb 14, 2023 19:45


Podcast: Research SaturdayEpisode: Knocking down the legs of the industrial security triad.Pub date: 2023-02-11Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.The research can be found here:GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol Learn more about your ad choices. Visit megaphone.fm/adchoicesThe podcast and artwork embedded on this page are from N2K Networks, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The CyberWire
Knocking down the legs of the industrial security triad. [Research Saturday]

The CyberWire

Play Episode Listen Later Feb 11, 2023 21:45


Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process. In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment. The research can be found here: GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Research Saturday
Knocking down the legs of the industrial security triad.

Research Saturday

Play Episode Listen Later Feb 11, 2023 21:45


Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process. In this research, they are targeting Rockwell Automation's FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment. The research can be found here: GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

The Cyber Queens Podcast
Episode 11 - Being the Diversity Hire in Cyber w/ Amber DeVilbiss

The Cyber Queens Podcast

Play Episode Listen Later Dec 7, 2022 42:17 Transcription Available


**DISCLAIMER: All of our opinions are our own. They do not represent, nor are they affiliated with the interests and beliefs of the companies we work for. **In this episode, The Queens dive into the difference of being hired into cyber as the “diversity hire” or being “hired for talent.” Today's featured guest is Amber DeVilbiss (@engineeramber) - Security Advisor at GuidePoint Security. Amber has spent the past 14 years in cybersecurity, she wrote and published a children's cyber security book “The Little Cyber Engineer,” and is the founder of a non-profit Teach Kids Tech. Amber and the Queens share their experiences of being a female in cyber- a heavily male dominated field. From this episode, you can get a good understanding of how to navigate being the diversity hire and talent hire. You will get some advice around how Gen-Z is changing the workforce. You will also hear some of our “war stories” from the field and how to identify when you are stuck in one. We hope you will enjoy this episode as much as we did because its AMBER DAY!!!!Key Topics: Hiring For Diversity vs. Hiring For TalentNavigating The Diversity HireNavigating The Talent Hire How Does Being The Only Female On Your Team Affect Your Actions Or Approach?War Stories From The Field Of Being A Woman In CyberThe Acronym Conundrum Success Based Off GenderWomen Only Advance In Cyber Through Sexual Encounters Not KnowledgeWomen Become Desensitized To The Gender Discrimination In Cyber & Accept It As “Normal”Advice For Gen-Z On How To Handle Being The Diversity HireDiversity Hiring Advice To Companies…..Butt In Seats Is Not EnoughHow Gen-Z/Diversity Is Changing The Workforce Sources:GuidePoint SecurityAmber's Book “The Little Cyber Engineer”  Amber's Non-Profit Company “Teach Kids Tech” LIFT, Empowered By Women In Security DEF CON ConferenceCyber Queens Episode 9 – Gen-Z Strengths & Weaknesses Get in Touch with AmberAmber DeVilbiss - TikTok or Instagram @engineeramberAmber DeVilbiss – LinkedIn Get in Touch: Maril Vernon - @SheWhoHacks Erika Eakins - @ErikaEakins Amber DeVilbiss - @EngineerAmber Queens Twitter - @TheCyberQueens Queens LinkedIn Calls to Action: Subscribe to our newsletter for exclusive insight and new episodes! If you love us- share us!

Cyber Work
Behind the scenes of ransomware negotiation | Guest Tony Cook

Cyber Work

Play Episode Listen Later Nov 14, 2022 40:00


Tony Cook of GuidePoint Security knows a lot about threat intelligence and incident response. But he's also used these skills while working in ransomware negotiation! Cook has handled negotiations for all the big threat groups — REvil, Lockbit, Darkside, Conti and more — and he told me about what a ransomware negotiator can realistically accomplish, which threat groups are on the rise, and why negotiating with amateurs is sometimes worse and harder than dealing with elite cybercriminals.  – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Ransomware negotiating 2:42 - How Tony Cook got into cybersecurity4:00 - Cook's work at GuidePoint 9:31 - Life as a ransomware negotiator 11:41 - Ransomware negotiation in 202213:52 - Stages of a successful ransomware negotiation 15:23 - How does ransomware negotiation work?19:11 - The difference between threat-acting groups20:43 - Bad ransomware negotiating22:43 - Ransomware negotiator support staff25:21 - Ransomware research26:26 - Is cyber insurance worth it? 29:14 - How do I become a ransomware negotiator? 32:25 - Soft skills for a ransomware negotiator33:46 - Threat research and intelligence work37:45 - Learn more about Cook and GuidePoint38:17 - OutroAbout InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.

The CyberWire
Gary Brickhouse: Riding the wave of growth. [CISO] [Career Notes]

The CyberWire

Play Episode Listen Later Nov 6, 2022 10:39


Gary Brickhouse, CISO from GuidePoint Security, sits down to share his story, looking back over the last 25 years of his career working for Fortune 100 companies, including Disney. He shares that every role he has had, he's had to grow into and how each one was a pivotal point in his technical career. Gary ended up transitioning to a different organization and says how it was really compliance that was the transitional sort of moment for him as he grew into different roles. He says, “What I found was sort of just, riding the wave of growth and opportunity and trying to take advantage of it along the way." He shares some advice for new people entering the industry, saying that he wants to help shatter the myth that you have to be technical to get into this field. We thank Gary for sharing his story.

Career Notes
Gary Brickhouse: Riding the wave of growth. [CISO]

Career Notes

Play Episode Listen Later Nov 6, 2022 10:39


Gary Brickhouse, CISO from GuidePoint Security, sits down to share his story, looking back over the last 25 years of his career working for Fortune 100 companies, including Disney. He shares that every role he has had, he's had to grow into and how each one was a pivotal point in his technical career. Gary ended up transitioning to a different organization and says how it was really compliance that was the transitional sort of moment for him as he grew into different roles. He says, “What I found was sort of just, riding the wave of growth and opportunity and trying to take advantage of it along the way." He shares some advice for new people entering the industry, saying that he wants to help shatter the myth that you have to be technical to get into this field. We thank Gary for sharing his story.

Caveat
How will cybersecurity insurance change in the coming years?

Caveat

Play Episode Listen Later Sep 22, 2022 46:52


Gary Brickhouse former head of cybersecurity for Disney and CISO of cybersecurity firm GuidePoint Security joins Dave to discuss where we will see continued changes when it comes to cybersecurity insurance as the economy tanks, recession hits and cyber criminals take advantage. Ben discusses the 5th circuit's controversial take on content moderation. Dave's got the story of the Pentagon taking a closer look at its covert psychological operations. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  5th Circuit Rewrites A Century Of 1st Amendment Law To Argue Internet Companies Have No Right To Moderate Morgan Stanley Paying $35 Million to Settle Claims of Failing to Protect Customer Records Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you.

The Cyber Crime Lab Podcast
Understanding the Business of Cybercrime

The Cyber Crime Lab Podcast

Play Episode Listen Later Jun 15, 2022 21:02


It might be easy to characterize cyber criminals as random threat actors, but plenty of them work within sophisticated organizations that function like legitimate businesses. Someone who has observed their behaviors up close is Mark Lance, Senior Director of Cyber Defense at GuidePoint Security. On this episode of The Cyber Crime Lab Podcast, host Andy Anderson asks Mark to share some of his observations and experiences to give insight into the mindset of these threat actors. Andy and Mark discuss: the different types of threat actors and their differing motivations how criminal organizations have their own IT support and HR departments why no organization, no matter how small or niche, is immune from attack You'll also hear Mark deconstruct some incidents he's responded to, including the breach of a celebrity's email account, which almost led to a theft of $2.5M. The Cyber Crime Lab Podcast is brought to you by DataStream Insurance When the worst happens, you want the best financial, legal, and technical support to get you back up and running again. With Cyber Insurance from DataStream, we offer the most comprehensive insurance coverage on the market alongside critical post-incident customer support — all for the price of a cup or two of coffee each day. Make DataStream part of your business continuity plans today. Book a meeting with us at datastreaminsurance.com 

Caveat
Encore: Pay the ransom anyway regardless of payment ban?

Caveat

Play Episode Listen Later Jun 9, 2022 39:55


Guest Mark Lance from GuidePoint Security talks with Dave about the FBI's recent advice not to ban ransom payments, some listener follow-up from Kevin who asks for ways a company or small business could keep their security gaps out of courts, Ben shares the story of a judge allowing a lawsuit against Apple alleging privacy violation in its use of Siri, Dave's got the details on trade groups lobbying for streamlined breach reporting standards. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Links to stories: U.S. judge rules Google must face much of lawsuit over Voice Assistant Industry Groups Urge Lawmakers to Streamline Cyber Breach Reporting Rules Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 

Control System Cyber Security Association International: (CS)²AI
41: Writing a Book to Leverage Your Expertise and Improve Your Career with Pascal Ackerman

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Jun 7, 2022 50:40


Derek Harp is happy to welcome Pascal Ackerman as his guest for today's podcast! Pascal is a security professional, focused on industrial control systems and he's currently the Sr Security Consultant for Operational Technology - Threat & Attack Simulation at GuidePoint Security. He has a Master's of Science degree in Electrical Engineering (MSEE/CE). He has had 18 years of experience in industrial Ethernet design and support, information and network security, risk assessments, pen-testing, forensics, and threat hunting, WAN/LAN/Internet and Wireless Technologies, Windows Environments, Unix, Linux, IIS, and Apache. He specialized in the architecture, engineering, and securing of plant-wide Ethernet networks using Purdue-model design strategies, IDS/IPS sensors, network monitoring, Security Information, and Event Management (SIEM) solutions, next-gen firewalls, MS domain services, WSUS servers, MS SQL server clusters, etc. Pascal was born and raised in the Netherlands. Right after leaving high school, he was put behind a POC by a company that sent him out across the world installing prototype machinery for filling machines. He is an engineer, programmer, gamer, hacker, traveler, tinkerer, pen-tester, and father.  In this episode of the (CS)²AI Podcast, he shares his superhero backstory and discusses his certifications, his education, and his career path. He also offers advice for those who would like to get into the field of cybersecurity and people thinking about writing a book. If you are considering a career in cybersecurity or if you are an engineer and want to specialize in cyber security, you will gain a lot from this podcast! Stay tuned for more! Show highlights: After leaving college, Pascal stayed with the company where he did his internship. The company got him to set up a software simulation to test their POC programs and later put him on their commissioning team. (6:51) Pascal talks about what he did while working as a controls engineer. (8:08) How Pascal got invited to move to the US to continue with his work. (9:50) Pascal explains how many doors opened for him after presenting his first report in 2005. (12:27) Pascal talks about how security measures first intersected with his work in 2008-2009. (14:07) Pascal pinpoints the moment when he decided to change his career path. (16:00) Pascal offers advice for traditional engineers who want to improve what they do and join the cyber security workforce. (17:35) A Network Plus certification will help controls engineers understand the fundamentals of networking. (18:19)  Pascal explains why he got hired as a commercial engineer in Network and Security at Rockwell. (21:16) Pascal talks about his book, Industrial Cybersecurity. (23:39) The book Hacking Exposed by Clint Bodungen inspired Pascal to write his first book. (27:50) How Threat GEN became a company based around a game Pascal developed. (29:10) Pascal offers advice on where people in IT who want to know more about safety, reliability, resiliency, and POCs can start. (32:36) The most successful companies have a combined IT and OT team with knowledgeable people on both sides. (36:43) Why do you need to figure out what you like the most and focus on that technology? (37:58) Architecture will be the next big step for monitoring everything. (45:06) Pascal discusses the process of writing his books and offers advice for those who would like to write a book. (45:49) Links: https://www.cs2ai.org/ ((CS)²AI) https://www.linkedin.com/in/pascal-ackerman-036a867b/ (Pascal Ackerman on LinkedIn) https://www.amazon.com/Industrial-Cybersecurity-Efficiently-cybersecurity-environment/dp/1800202091 (Industrial Cybersecurity by Pascal Ackerman) Books mentioned: https://www.amazon.com/Hacking-Exposed-Industrial-Control-Systems/dp/1259589714 (Hacking Exposed by Clint Bodungen) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful...

Performance Delivered
Rewind - Sam Erdheim | The Number One Way To Get Your Emails Opened

Performance Delivered

Play Episode Listen Later May 18, 2022 28:32


Email marketing has become so much white noise because too many companies are failing to implement smart strategies.  They don't know who is on their listservs so they can't target content  They create content that is too long and detailed  They jump right into the sale before establishing credibility  Sam Erdheim, VP of Marketing at GuidePoint Security, has over two decades of marketing experience. He shares his expertise and what you can do to get your marketing emails opened by the right people.  Get smart, break through the clutter, and let email marketing drive your business success. 

Data Privacy Law Talk
Business Email Compromise Attacks - What They Are and How They Target Your Business

Data Privacy Law Talk

Play Episode Listen Later Apr 18, 2022 53:39


Host Jim Paulick is joined by Chris Teodorski, Managing Security Consultant at Guidepoint Security, to discuss Business Email Compromise (BEC) Attacks.In these attacks, a hacker gains access to an email account and impersonates your coworker, client, or other trusted advisor, often sending an email request for (fraudulent) payment, which appears to be a legitimate email. BEC's accounted for $1.8 Billion worth of losses to businesses in 2021, according to the FBI.Jim & Chris discuss the methodologies of these attacks, and what you need to know to protect your business.This podcast episode is for informational purposes only and is not intended to and does not constitute legal advice or a solicitation for the formation of an attorney-client relationship.

Reimagining Cyber
Building better AppSec Teams: Communication, Collaboration, and Cloud

Reimagining Cyber

Play Episode Listen Later Apr 11, 2022 18:45


Kristen Bell, Senior Manager of Application Security Engineering at GuidePoint Security, is back, sharing her insights into “Building better AppSec teams: Communication, collaboration, and culture.” Two weeks ago, Bell joined the Reimagining Cyber team, Rob Aragao and Stan Wisseman, to share her perspective on “Governing a better AppSec program by empowering dev teams.” Collaboration is KeyTo build a better AppSec team, Bell explains the importance of collaboration. Many developers have a bad taste in their mouths when it comes to automation. Developing a multi-phased approach where you can share each step and mitigate any barriers to adoption (for example, many developers don't like a lot of “noise” or false positives), can be helpful. When it comes to the actual scanning itself, Bell recommends doing a lot of work on the front end to make it run as smoothly as possible, ensuring the highest-quality results for ease of use. Additionally, she recommends integrating a ticketing system like JIRA to provide a continuous feedback loop. This way, you can pull metrics to show return on investment. Lastly, Bell recommends getting buy-in from application developers and owners. With skin in the game and a seat at the table, they'll have influence and investment in the security program's direction. Communicate, communicate, communicateCreating a streamlined and organized communications approach when building out your AppSec team is crucial. It is critical to have one centralized location to house all information for your security team, whether it's standards or blueprints. “It's super important that if you're building a portal, or a Wiki, or this one-stop-shop, for the developers, to have these self-service options, they need to know it exists,” Bell says. Reiterating it in multiple ways (an All Hands call, a newsletter, an e-mail) is critical. You have to remind people 13 times before they'll remember something.Get out into the communityThere's OWASP, ISACA, (ISC)2, ISSA and lots of different kinds of AppSec and cybersecurity related organizationsthat team members can go and be active in in their local communities. I would also encourage people on the security team, if you go to a conference, invited the good AppSec-related speakers in to speak to the team or the developers. They usually are looking for opportunities to engage and are open to do it.AppSec in the CloudBuilding a Cloud-centric AppSec team has its challenges. Bell recommends: •Separation of duties: Developers don't typically have access to production and don't make changes in production. However, when it comes to the Cloud, that all changes. By creating different profiles and having people commit to certain tasks allows teams to divide and conquer. •Threat modeling: Bell recommends running threat models, testing different scenarios and looking at data flows and trust boundaries to help document repeatable processes and confirming adherence to compliance requirements (like geolocation of data).•Testing automation: DAST services allow you to now test GUI-less technologies to understand Have you tried any of these tips when building out your AppSec team? Do you have any to add to Bell's suggestions? Let us know in the comments.

In Conversation… with Frank Schaeffer

Frank Schaeffer In Conversation with Kim Graham Lee, CEO of Integrating Women Leaders Foundation, exploring the Allyship-In-Action Benchmark Study, the first nationally-focused study to measure the perceived practice of allyship to women in Corporate America today._____LINKSParticipate in the State of Allyship-In-Action Benchmark Study through April 10, 2022Integrating Women Leaders Foundation_____Kim Graham LeeCEO, Integrating Women Leaders Foundation (IWL)For the past 5 years, she has served as the CEO of Integrating Women Leaders (IWL) Foundation, an Indianapolis-based organization founded in 2010 that is focused on accelerating the advancement of ALL WOMEN to drive individual and organizational growth and impact. Her involvement with IWL actually began shortly after the organization was founded in 2010 when she began her service on its Board.IWL is best known for its annual women's leadership conferences. Kim has led the organization's strategic expansion which includes global and year-long programming to support women and other under-represented groups in the workplace. Activating men as allies is also an important part of IWL's work and a reflection of Kim's passion and thumbprint on the organization.Active in the community, Kim is also a co-founder and serves as co-president of the Indianapolis chapter of Conscious Capitalism, an international movement of like-minded companies that believe there is a better way to run a business that is focused on the long-term and all stakeholders, including shareholders. She also sits on the newly-formed Board of Visitors for the Walker Center for Business Ethics at Marian University. Kim has served on and led several other national and local boards and has also been recognized for her groundbreaking leadership efforts to build an anti-bullying program at her children's high school before bullying captured the national spotlight.Kim is proudest of her role as mom to her two children, both in their careers--Brent, a CPA and Program Director, Community Development at Lilly Endowment, and Brittany, Sales Operations Manager, at Guidepoint Security, a global cybersecurity company. Kim proudly wears her “Grammy” hat with Griffin, Adrienne and Gabe, all 3 years of age or younger._____In Conversation… with Frank Schaeffer is a production of the George Bailey Morality in Public Life Fellowship. It is hosted by Frank Schaeffer, author of Fall In Love, Have Children, Stay Put, Save the Planet, Be Happy.Learn more at https://www.lovechildrenplanet.comFollow Frank on Facebook, Twitter, and YouTube.https://www.facebook.com/frank.schaeffer.16https://twitter.com/Frank_Schaefferhttps://www.youtube.com/c/FrankSchaefferYouTubeIn Conversation… with Frank Schaeffer PodcastApple Podcasts: https://podcasts.apple.com/us/podcast/in-conversation-with-frank-schaeffer/id1570357787_____Support the show

Reimagining Cyber
Governing an AppSec Program by Empowering Dev Teams

Reimagining Cyber

Play Episode Listen Later Mar 8, 2022 18:10


While organizations need to gain visibility into application security risks, it can be challenging to build and mature an effective application security program. In this episode of Reimagining Cyber, Kristen Bell, a Senior Manager of Application Security Engineering at GuidePoint Security, shares some the best practices that she's used to help organizations overcome common obstacles to success. Bell uses a collaborative approach between AppSec team and developers that can create a positive security-aware development culture.

Cloud Security Today
What (actually) Works In Cloud Security

Cloud Security Today

Play Episode Play 24 sec Highlight Listen Later Sep 21, 2021 37:27 Transcription Available


Some of the most pertinent issues in cloud security are also very foundational. Questions like where to start, what works, and also what doesn't work, can leave teams feeling frustrated and at a loss over how to proceed. Here to help us unpack these important questions is Jonathan Villa, the Cloud Security Practice director at GuidePoint Security. Jonathan's career wasn't always in security, he has spent time as an application developer, and as a pentester. All of this led him to build solutions in the cloud over a decade ago which organically transitioned into cloud security. In our conversation with Jonathan, we discuss what he learned about cloud security throughout his career, what he has found to be effective, both in terms of technology and managing teams. We explore important issues like how security has struggled with automation and how to address it. Later we address the challenges facing talent development in security and how to address them, including having leadership take a more long-term view and training junior staff members. Jonathan also discusses the RACI model, why so many companies struggle to implement it correctly and how best to be effective. Today's episode offers key insight into cloud security, leadership, and the importance of teams, so make sure you tune in today!Jonathan's LinkedIn profile“I think that if security organizations really look to build more, they may attract more talent with development experience.” — Jonathan Villa [0:08:07]“When you look at the average tenure of a CISO, I don't know what it is now, it's like two years or something like that. It's like, how do you build a long-term talent development model if the leaders themselves are gone every two years?” — Jonathan Villa [0:20:39]Comprehensive, full-stack cloud security Prisma Cloud is the industry's only comprehensive Cloud Native Security Platform for IaaS/PaaS.

Caveat
Pay the ransom anyway regardless of payment ban?

Caveat

Play Episode Listen Later Sep 16, 2021 39:55


Guest Mark Lance from GuidePoint Security talks with Dave about the FBI's recent advice not to ban ransom payments, some listener follow-up from Kevin who asks for ways a company or small business could keep their security gaps out of courts, Ben shares the story of a judge allowing a lawsuit against Apple alleging privacy violation in its use of Siri, Dave's got the details on trade groups lobbying for streamlined breach reporting standards. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney.  Links to stories: U.S. judge rules Google must face much of lawsuit over Voice Assistant Industry Groups Urge Lawmakers to Streamline Cyber Breach Reporting Rules Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 

Performance Delivered
Sam Erdheim | The Number One Way To Get Your Emails Opened

Performance Delivered

Play Episode Listen Later Jul 28, 2021 28:32


On this week's episode of the Performance Delivered Podcast, we talk to Sam Erdheim, VP of Corporate Marketing at GuidePoint Security. Sam has two decades of experience across all facets of marketing and product management for enterprise software companies, with 15 years focused on cybersecurity.Today we sit down with him to talk about digital marketing in 2021, and: Directing, differentiating, and solving problems with your content Hitting the right target with your content every time Where to get the biggest bang for your buck on social And more

SON OF A BREACH!
#BadgeLife

SON OF A BREACH!

Play Episode Listen Later Jul 15, 2021 46:26


Conference badges have evolved from paper and plastic to collectable mini-computers of all shapes and sizes, coveted and collected by security professionals and enthusiasts. The rise of #Badgelife signifies one of the most creative offshoots of security conferences, with its underground culture of hardware art and ingenuity.  In this episode of SON OF A BREACH!, CRITICALSTART CTO Randy Watkins welcomes badge creator Florida Man, a/k/a Jonathan Singer, to celebrate the allure of #Badgelife, reveal how deep the culture runs, and share tips on how to get started in the community. Tune in to learn:·       The colorful, flashy history of #Badgelife·       How unofficial conference badges have come to symbolize the security culture's uniqueness and sense of community ·       Steps to start collecting or creating digital badges that people want to take home and talk about·       What tools and techniques you need to design and produce your own #Badgelife creationBoth fun and functional, digital badges celebrate computers and the security around them at the hardware level. Many are intentionally hackable so you can take control of the lights, noises, and other built-in features. Singer shares some favorites from his extensive badge collection, which you can see by watching the recorded video of this podcast episode on YouTube.Jonathan Singer is SIEM and SOAR Practice Lead at GuidePoint Security, with certifications including GPEN, GWAPT, GCIA, GCFE, and CEH. He is a self-taught badge creator, who launched his first digital badge at Bsides Orlando 2013. Singer also shares his passion for cybersecurity and hardware on his YouTube channel.

On the Map (audio)
S2E3 - Cyber Security & Working from Home

On the Map (audio)

Play Episode Listen Later Apr 10, 2020 40:41


In this week's podcast we talk with Jon Singer of Guidpoint Security. We discuss threats emerging during the COVID-19 crisis with more people working from home, shopping online, and relaxing security protocols. Jon also explains physical security threats facing construction sites, tips when traveling abroad, and five things you can do today to better secure your business. To learn more about Guidepoint Security visit: guidepointsecurity.com

Layer 8 Podcast
Episode 15: Cat Murdock - Know Your Name and Bring Snacks

Layer 8 Podcast

Play Episode Listen Later Mar 9, 2020 42:07


For this episode, we welcome Cat Murdock, a security consultant and social engineer from Guidepoint Security. You can find Cat on Twitter at CatMurd0ck. While most of our episodes are safe for work, this one has a few words mixed in that you might not want children to hear. Cat takes us through some of her social engineering encounters, explains why snacks and bathroom breaks are important and why the names on paperwork are very important.

cat snacks murdock guidepoint security