POPULARITY
It tells me that goose-stepping morons like yourself should try reading books instead of BURNING them -- Henry Jones, Sr – Indiana Jones and the Last Crusade If you like my opinions, you'll love my latest book. If youdon't like my opinions, I encourage you to buy 3 copies of the book, so you have the satisfaction of burning them. -- Ira Winkler - LinkedIN On this week’s InSecurity, Matt Stephenson speaks with Ira Winkler, president of Secure Mentem and author of multiple books, including You CAN Stop Stupid. We take a frank look at the people and systems involved in the world of cybersecurity and look to point out what is stupid about all of it and what can be done to stop stupid behavior and fix stupid systems. About Ira Winkler Ira Winkler (@irawinkler) is President of Secure Mentem and Author of the forthcoming books, You Can Stop Stupid and Security Awareness for Dummies. He is considered one of the world’s most influential security professionals and was named “The Awareness Crusader” by CSO magazine in receiving their CSO COMPASS Award. Ira is one of the foremost experts in the human elements of cyber security and is known for the extensive espionage and social engineering simulations that he has conducted for Fortune 500 companies globally. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. He and his work have been featured in a variety of media outlets including CNN, The Wall St Journal, USA Today, San Francisco Chronicle, Forbes, among other outlets throughout the world. Ira began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He has also served on the graduate and undergraduate faculties of the Johns Hopkins University and the University of Maryland. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know... Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... Can’t get enough of Insecurity? You can find us at Spotify, Apple Podcasts, and ThreatVector as well as GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
How great would it be to actually be able to GO TO the doctor’s office? Remember when it was a thing for people to actually do that? To actually go to the doctor’s office Did we really need to do that as often as we did? Or at least as often as we should have? According to our friends at MedicalEconomics.com, patients are ready for easier access to healthcare professionals. In the early days of COVID19, 71% of patients had considered telemedicine half had already gone through with a virtual appointment. Patient adoption at the beginning of 2020 was up 33% over the previous year and Venture capital fundingfor telemedicine companies surged in the first quarter of 2020 to $788 million. The market is expected to reach $185.6 billion by 2026. Here’s a tough question: Does it actually help? On this week’s InSecurity, Matt Stephenson has a chat with Pete Fronte, founder & CEO of Altura, a 20 year old company who has built a mechanism that connects medical clinical studies with the people who need to be studied. In the contemporary world of telehealth and everything-from-home, people need access more than ever. COVID is the new horror on the block. People still need access to studies on cancer, heart disease and every other healthcare issue that existed prior to 2020… check it out About Pete Fronte Pete Fronte is the founder and President/CEO of Altura. During the past 20 years Mr. Fronte has been a leader in engaging people for better health via health studies, health experience surveys and health programs. He has been a catalyst for developing innovative processes and technology to accelerate the study and adoption of new medical interventions (e.g. drugs, biologics, medical devices, wearables). Pete’s passion centers on expanding participation in health studies by engaging and enabling patients and health care providers (HCPs). He is a recognized leader in patient centered outreach including Patient Study Life Cycle™ management. Today he continues to lead the expansion of clinical research, evidence based medicine and real word studies into primary care and organized healthcare settings nationally. Mr. Fronte has spearheaded innovative technology such as Altura's Study Engagement Platform which HCP Studies mobile app which is available in 23countries. Pete’s experience includes collaborating with medical groups, integrated health systems, pharmacy and medical management companies, research centers, institutional review boards (IRBs) and study sponsors to design and implement innovative study awareness and patient centered projects that include HIPAA compliant utilization of various forms of electronic health data as well as mobile applications and web portals. Mr. Fronte is currently a member of the Institutional Review Board at St. Joseph Health in Orange County California and is active in various healthcare and clinical research trade associations. He is a national speaker and writer on subjects such as; innovative patient and HCP engagement programs for clinical studies, and health program, site based clinical research operations and the integration of clinical research within primary care and organized healthcare systems. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know... Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... Can’t get enough of Insecurity? You can find us at Spotify, Apple Podcasts, ThreatVector and Blackberry as well as GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Once more unto the breach, dear friends, once more; Or close the wall up with our English dead. In peace there's nothing so becomes a man As modest stillness and humility: But when the blast of war blows in our ears, Then imitate the action of the tiger; Stiffen the sinews, summon up the blood, Disguise fair nature with hard-favour'd rage; Then lend the eye a terrible aspect; Let pry through the portage of the head Like the brass cannon; let the brow o'erwhelm it As fearfully as doth a galled rock O'erhang and jutty his confounded base, Swill'd with the wild and wasteful ocean. Sometimes… the bad guys get in. It happens. When it happens, we need the people who know how to shut down the villainous behavior, fix what’s broken and prevent it from happening again. Was it a hack? Was it a breach? Is there a difference? Does the difference matter? When the data is compromised, it is too late to worry about who did what and why they did it. It is time to repair the damage. For that… you need experts in the world of Incidence Response. On today’s Special Episode of InSecurity, we are bringing you into a special LinkedIN LIVE event where Matt Stephenson spoke with Axon Technologies Director of Security Operations Dave Brown and BlackBerry Sr Director of International Consulting Luke Hull. These two have faced some of the biggest breaches in the world over the last 20 years. They may not have seen it all, but they have seen enough and want to help prevent the next Big Breach. About Dave Brown Dave Brown is Security Operations Director at Axon Technologies. With nearly 20 years of experience in intelligence-driven secure system design, infrastructure architecture, computer, and network defense, Dave has created and operated defense-in-depth initiatives in government sectors within the US Department of Defense as well as highly targeted enterprises in the global oil and gas industry. We could tell you more about the work Dave has done… but we can’t. Let’s just leave it at that… About Axon Technologies Axon Technologies (@Axon_Tech) is a cybersecurity services company focused on protecting organizations of various sizes in this digitally connected world. Their mission is to help organizations predict, prevent, detect, respond to, and recover from cyberattacks with a combination of best of breed security technologies and a specialist team of researchers, analysts, and Incident responders to provide clients the comfort that their organization is protected 24x7. Their vision is to apply automation, orchestration, and machine learning into our security programs to stay one step ahead of the attackers and unleash the value of your security investment. About Luke Hull Luke Hull is Senior Director of International Consulting at BlackBerry. He comes from a strong risk and technical background, covering information security, intelligence and cyber operations with an extensive range of consultancy experience across a broad range of clients and an emphasis on adding business context to consultancy. In a career spanning nearly 20 years with some of the largest companies in the world, he has led and been a part of Incident Response teams at Mandian, Verizon and PriceWaterhouse Coopers. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Gaana, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
What’s your favorite Data Breach? Come on… seriously… you know you have one… Sony? JP Morgan Chase? AdultFriendFinder? Office of Personnel Management? What separates data breaches in your mind? The type of company? The type of data stolen? The notion of a threat to the National Infrastructure? We can get really weird into the idea of which kind of theft poses a bigger threat. You may say the OPM breach is huge because it put the IDs of millions of public servants and other regular people up for sale… But what about the idea that a corporate officer of an 11 figure energy company whose data on AdultFriendFinder gets accessed in a breach… Put your tinfoil on and follow the ripples out on that one… What could a bad guy do to manipulate… oh I don’t know… Purchasing decisions? Green lighting potentially controversial energy projects? See where I’m going here… A breach is a breach is a breach is a breach… What we need are the kind of people who live and think in an asymmetric world in order to deal with kind of asymmetric attacks we have seen over the last several years What if we could get someone on the horn who is as asymmetric as anyone you’ll ever meet? Today might be that day On this week’s InSecurity, Matt Stephenson sits down with Robert Willis to jump all around the world of hacking, red & blue teaming, and the world of cybersecurity writ large. And then, as a special bonus, we dig into the new world Robert is creating, the Paraneon Universe… a cyberpunk comics universe written by hackers for hackers, where the tech is legit. We wouldn’t have had flip phones without Start Trek… who knows what Robert & Pareneon are going to offer that will change the world… About Robert Willis Robert Willis (@rej_ex) Runs consulting at 1337 Inc among other things. He is a Red team, Blue team, and purple team professional. He isnt just breaking into things for clients, he’s also building and running security programs. Robert is featured in the popular Tribe of Hackers series from Wiley, whose new book Tribe of Hackers: Blue Team is out as of September 16th, 2020. In a Previous life, Robert was a Researcher at the Breach and Attack Simulation Pioneer ThreatCare He has worked places he can’t disclose, but which I have personally verified… It’s legitimate, as crazy as that sounds. Robert’s most mind numbing accomplishments cannot be talked about publicly, but if you become his friend he will likely show you some insane stuff -- as long as it doesnt compromise national security. About 1337 Inc 1337 Inc. was founded after years of building cybersecurity programs and providing services for clients of all sizes. They are trusted security partners for both consulting and deliverables for public, private, and government organizations. They are Austin-based, but have a presence across Texas to service companies in the Dallas, Houston, and San Antonio areas as well. They have clients across the United States, and also work internationally when needed. Many of their employees have both civilian and military training credentials, and make it a point to be on top of the latest compliance needs — as well as recently published vulnerabilities. 1337 offers compliance mapping (ISO27001, SOC2, PCI DSS, GDPR, etc), security program and policy creation (mapping to the NIST cybersecurity framework), web application assessments, penetration testing, vulnerability assessments, threat modeling, and much more. About Paraneon Paraneon (@paraneonU) develops and publishes stories from a cyberpunk future. For hackers, by hackers. Earth’s landscape is split between highly technocentric cities, dry desert lands that surround them (known as the drylands), and underground worker colonies. The cities are highly futuristic; everyone who is a citizen of a city has a quality of life much higher than the colonies or drylands. The drylands appear desolate due to dust bowls created from global warming — a problem in earth’s past history. Because of this, all factory operations were moved to Mars to remediate the problems caused by production. Earth is in the healing process from the past damage caused from previous ‘on-earth’ factories. Due to the continued recovery from global warming and chemicals from prior manufacturing, the highest quality resources are reserved for those in the cities. COLONIES Every colony specializes in a different trade. Some of the colonies specialize in food production aided by technology, clean air initiatives, general robotics, general information technology, security testing and exploitation. Colonies were developed as a program to make use of earth’s lower income population — which continues to expand with earth’s limited quality resources. The colonies are small underground cities where families live, train, and work to save enough money for the opportunity to join a city; this is known as being “granted citizenship”. Although the opportunity to move out of a colony is available for those who can afford it, many residents opt to not leave and instead ‘retire’ into virtual reality. Those who choose to live full-time in virtual reality are put into a network of machinery, known as the ‘Hive’. The Hives are massive underground structures, with various locations across earth. The technology within the Hive allows humans to completely abandon the physical world and exist full-time in virtual reality. The leadership in colonies are known as Mayors. Colonies have their own police force, but city forces hold authority over them. DRYLANDS Groups of people decided to opt-out of the cities and colonies to live in the drylands. These people aren’t just known as ‘non-citizens’ (like colony members), but are also known as ‘drylanders’. They are not integrated with technology like the rest of the population, and consider themselves ‘pure’ humans. The drylanders are mysterious, and not considered hostile. The cities and colonies don’t worry about drylanders; since resources on earth are limited and the people in the drylands aren’t technological or a threat, they are left alone by police and fend for themselves. Some of the drylanders are known to be able to grow small amounts of food; they then can act as traders and are granted access to the colonies through timed-passes to sell goods to members of the colonies — if they can show that they have items that are worthy of being sold. DIFFERENCES IN LIVING CONDITIONS Cities are highly sought after because they offer fresh food, sunlight, and fresh air. Residents are able to access all known information in what’s known as ‘the great library’. Information is considered a privilege reserved for city residents. In the colonies the food is in canned or powder form, with fresh items only found when brought in by a member of the drylands. Individuals in the colonies can only study from a shortlist of general studies and what trade their colony specializes in, limiting their knowledge only to what service they provide to society. This was accepted by those in the colonies because society teaches that information as a privilege. Once a colony member becomes a citizen of a city their access to the ‘great library’ is granted. THE BINDING Humans living in the cities and colonies have tech implanted within them, as part of humanities evolution with technology. These modifications are done once a child has hit a certain age, in a ceremony known as the “binding”. The binding ‘modifications’ are required for wireless communication, learning, and access to augmented reality. When walking around in the ‘real world’ you can see people’s avatars due to the augmented reality implants everyone receives after being binded. You can identify someone as an avatar by a small glow around their body, which is required for identification by authorities. Avatar’s are only able to access areas they are granted permission to. Avatars can exist anywhere in the cities and colonies due to an extensive camera network that give the avatars the ability to not just be seen, but to see their surroundings. MARS Mars has a single city (referred to as the ‘Neon Aviary’), scattered research outposts and many large factories. The majority of the population on Mars are androids. Humans on Mars exist to complete advanced research, and manage the android workforce to oversee the production of goods developed. Mars is where all androids are created. EUROPA (Jupiter’s Moon) Humans have expanded as far as Europa (a moon of Jupiter) after discovering oceans there. There isn’t a city on Europa, just a network of various research outposts. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Gaana, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Do you read books? The newspaper? Watch TV? Why? Ever watch a YouTube video? Why? If your vacuum cleaner stops working, do you fix it? Take it to be fixed? Do you just buy a new one? There are people out there who are great at what they do and who want to share their knowledge with anyone who needs it On this week’s InSecurity, Matt Stephenson welcomes CEO, author and cybersecurity expert Scott Schober in for a chat about what it means to beconsidered a “Subject Matter Expert” in a world that is best defined by how quickly it changes rather than its bedrock foundation. With 30+ years in the industry, how do people like Scott get what they know out to the people who need that knowledge? Books… TV… YouTube… look anywhere and you are likely to find Scott Schober About Scott Schober Scott Schober (@ScottBVS) is the President and CEO of Berkeley Varitronics Systems, a 40-year-old New Jersey-based privately held company and leading provider of advanced, world-class wireless test and security solutions. As an experienced software engineer, Scott also invents BVS’s cell phone detection tools, used to enforce a ‘no cell phone policy’. These instruments are effectively used around the globe to find contraband cell phones smuggled into correctional as well as secure federal facilities. Schober is a highly sought after subject expert on the topic of Cybersecurity for media appearances and commentary. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CCTV America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition, MSNBC and many more. His precautionary advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The Peggy Smedley Show. He regularly presents on visionary issues at conferences around the globe discussing wireless technology and its role in the current Cybersecurity breaches along with his vision for best practices to stay safe in the future. Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily News, Newsweek, USA Today, and The New York Times. Scott educates all business around the world about how to prepare for a future of Cybersecurity and corporate espionage, opening their eyes to this ever deepening black hole of liability. He also shares his insights into covert cell phone detection and creates awareness to the subtle but powerful influence of drones. He has spoken at ShowMeCon, GovSec, Counter Terror expo, ISS Americas, Espionage Research International, Connected World, ConstrucTech, IEEE, GSM World Congress and many more events. About Hacked Again Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked. As a small business owner, family man, and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But, when a mysterious hacker begins to steal thousands from his bank account, go through his trash, and take over his social media identity, Scott stands to lose everything he has worked so hard for. Amidst the backdrop of major breaches, Scott shares tips and best practices for all consumers. Most importantly, he shares his own story of being hacked repeatedly and how he has come to realize that the only thing as important as his own cybersecurity is that of his readers and viewers. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
The world is more digitally connected than ever before, and with this connectivity, comes vulnerability. It is therefore vital that all professionals understand cyber risk and how to minimize it. This means that cyber security skills are in huge demand, and there are vast career opportunities to be taken. On this week’s InSecurity, Matt Stephenson welcomes Dr Jessica Barker, co-founder/CEO of Cygenta, author and keynote speaker at RSA 2020 for a chat about the current state of cybersecurity in a world that changes not just day to day, but hour to hour. Dr Barker puts her high powered perception on the people involved in the daily operation of keeping data secure and accessible. It’s not all 1s and 0s… often times it’s the people who make and break cybersecurity. About Dr Jessica Barker Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cyber security, has been named one of the top 20 most influential women in cyber security in the UK and awarded as one of the UK’s Tech Women 50 in 2017. She is the Chair of ClubCISO. Equipped with years of experience running her own consultancy, she co-founded Cygenta, where she follows her passion of positively influencing cybersecurity awareness, behaviours and culture in organisations around the world. Her consultancy experience, technical knowledge and background in sociology and civic design give her unique insight. She is known for her clear communication style and for making cyber security accessible to all. Dr Barker delivers thought-provoking and engaging presentations across the world, at corporate events as well as practitioner and academic conferences. Known for her ability to engage everyone from CEOs to ethical hackers and creative workers, she brings energy, enthusiasm and fun to cyber security. Jessica’s new book Confident Cyber Security is coming in 2020, published by Kogan Page. About Confident Cyber Security This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies from Disney, the NHS, Taylor Swift and Frank Abagnale, as well as social media influencers and the entertainment and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. Let Confident Cyber Security give you that cutting-edge career boost you seek. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
It’s not Paranoia ifThey’re Really After You Brill: We never dealt with domestic. With us, it was always war. Thomas Reynolds: We won the war. Now we're fighting the peace. It's a lot more volatile. Now we've got ten million crackpots out there with sniper scopes, sarin gas and C-4. Ten-year-olds go on the Net, downloading encryption we can barely break, not to mention instructions on how to make a low-yield nuclear device. Privacy's been dead for years because we can't risk it. The only privacy that's left is the inside of your head. Maybe that's enough. You think we're the enemy of democracy, you and I? I think we're democracy's last hope. -- Enemy of the State; Tony Scott, 1998 It’s not paranoia if they’re really after you… On this week’s InSecurity, Matt Stephenson welcomes back Dr Jessica Barker, Freaky Clown and Dave to take a look at the techno-paranoia classic Enemy of the State. We’re looking at surveillance cameras, Faraday Cages, PX-73 Burst Transmitters and UTZ potato chip bags. Why the bag and not the chip? Tune in and find out. About Dr Jessica Barker Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cybersecurity. She has been named one of the top 20 most influential women in cybersecurity in the UK and awarded as one of the UK’s Tech Women 50. She is Co-Founder and Co-Chief Executive Officer of Cygenta, where she positively influences cybersecurity awareness, behaviors and culture in organizations around the world. Dr Barker is a popular keynote speaker and shares her expertise in the media, for example on BBC News, Sky News, Channel 4 News and in Grazia magazine and the Sunday Times. She is Chair of ClubCISO, a peer-based members forum of over 300 information security leaders. In the last year, Dr Barker has given cybersecurity outreach sessions to over 5,000 school students. Jessica’s new book Confident Cyber Security is coming in 2020, published by Kogan Page. About Freaky Clown Freaky Clown (@_Freakyclown_) is a well-known ethical hacker and social engineer. He has been working in the infosec field for over 20 years and excels at circumventing access controls. He has held positions in his career such as Senior Penetration Tester as well as Head of Social Engineering and Physical Assessments for renowned penetration companies. As Head of Cyber Research for Raytheon Missile Systems, and having worked closely alongside intelligence agencies, he has cemented both his skillset and knowledge as well as helped steer governments take correct courses of action against national threats. As an ethical hacker and social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities in the UK and Europe. His work demonstrating weaknesses in physical, personnel and digital controls assists organisations to improve their security. He is motivated by a drive to make individuals, organisations and countries more secure and better- able to defend themselves from malicious attack. Now Co-Founder and Head of Ethical Hacking at Cygenta Ltd, he continues to perform valuable research into vulnerabilities. His client list involves major high-street banks in the UK and Europe, FTSE100 companies and multiple government agencies and security forces. About Dave Dave Mound (@DeathsPirate) is an Experienced Cyber Security Researcher with a demonstrated history of working in the Computer &Network Security industry along with threat intelligence. He’s done a lot of work in Penetration Testing, Reverse Engineering, Agile Methodologies, Computer Forensics, Red Teaming and Threat Intelligence… and… he looks good in a white suit and turtleneck About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Amar Singh: How Do We Rank Trust, Security and Control? This is a story about control My control Control of what I say Control of what I do And this time I'm gonna do it my way I hope you enjoy this as much as I do Are we ready? I am 'Cause it's all about control, And I've got lots of it -- Janet Jackson; Control, 1986, A&M Records On this week’s InSecurity, Matt Stephenson welcomes Amar Singh in for a conversation about the notion of Trust, Security, Risk and Control. The key question, in a nearly completely remote workforce, is how do security practitioners mainten any degree of control? We also wonder if anyone ever really had control in the first place. Toss in a bit of trust and security to season the stew and you’ve got an episode worth listening to. About Amar Singh Amar Singh (@amisecured) is the CEO and interim CISO of Cyber Management Alliance Limited. He is an industry acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including The BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the Al-Jazeera English Channel About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
“Live like you'll die tomorrow, work like you don't need the money, and dance like nobody's watching” -- Bob Fosse On this week’s InSecurity, Matt Stephenson has a chat with Genetec CSO Chris Morin about the misconceptions surrounding video as a component of your security profile. There has to be a middle ground between dancing like no one is watching and knowing that someone is always watching. Is it Security VERSUS Privacy? Or is it Security PLUS Privacy? We dig into this notion and whole lot more… About Christian Morin Christian Morin (@cmor007) is Vice President of Integrations & Cloud Services and Chief Security Officer at Genetec. With over 18 years of experience in IT, telecommunications and physical security industries, Chris has a keen ability to anticipate technological trends and drive meaningful organizational growth. He is a multidisciplinary business leader, having managed the Operations, Customer Service, Sales Engineering, Technical Support, Professional Services, and IT Teams since joining Genetec in 2002. Chris’ executive leadership continues to support the strategic direction and success of the company. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
I accept Chaos. I’m not sure whether it accepts me -- Bob Dylan On this bonus episode of InSecurity, Matt Stephenson chats with BlackBerry CISO John McClurg to discuss his Security Magazine article Unified Endpoint Security: Combating the Chaos, Complexity and Other Conundrums Plaguing Our Community. This was originally a BlackBerry webinar where John breaks down the role Artificial Intelligence can play in a Unified Endpoint Security solution. About John McClurg John McClurg (@JohnMcClurg) is a Sr Vice President and CISO at BlackBerry. He spent his early career with the US government, serving as both a supervisory special agent and branch chief for the FBI as well as a deputy branch chief for the CIA. In these roles, McClurg was involved in the capturing of both Kevin Poulsen and Harold James Nicholson. Following his public service, John has served as a vice-president and Chief Security Officer for Lucent, Honeywelland Dell. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Nothing you are about to hear is true… but it all happened… -- Fred Cohen 11 May, 2020 It all started with a simple Tweet from the Department of Homeland Security… On today’s episode of InSecurity, Matt Stephenson welcomes Chris Blask & Fred Cohen back to InSecurity. As expected we covered a wide range of subjects, but stayed relatively close to the notion of the impact of attribution and validation of trust and security. Should we trust a source if we don’t like what they say? What happens when a trusted source denies saying what we know they said? Trust… verify… attribute… Do they matter? About Chris Blask Chris Blask’s (@chrisblask) career spans the breadth of the cybersecurity industry for more than 25 years. He invented one of the first firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, authored the first book on SIEM, founded an information sharing center for critical infrastructures, and has advised public and private organizations in every sector around the world. In his role within the Office of Innovation at Unisys, Chris created and leads the Operational Technology and IoT practices, invented the Digital Bill of Materials (DBoM) structure, and established the Unisys Marine Living Research Center. Today he chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts. About Fred Cohen, PhD Dr. Fred Cohen (@fc0) is widely considered to be one of the leading security/risk experts in the world. He is best known as the person that defined the term “computer virus” and inventor of the most widely used computer virus defense techniques. Dr. Cohen was also the principal investigator whose team defined information assurance as it relates to critical infrastructure, did seminal research in the use of deception for information protection, a leader in the science digital forensic examination and leading information protection consultant and analyst. He has authored over 200 published research articles, authored several books and established Masters and Ph.D. security programs now part of Webster University. In 2002 Dr. Cohen revived the “Techno-Security Industry Professional of the Year” award and in 2009 he was named the “most famous hacker of all time” by ABC news. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
"We are all very fortunate to not have ordinary lives, so do not listen to what the world tells you has to be done. The real revolution happens when patients are in charge of their own outcomes." -- Matthew Zachary What do you do when you are a gifted composer and musician… and one day your hand stops working? Each year, 77,000 adolescents and young adults aged 15-39 are diagnosed with cancer. That's one every seven minutes. Cancer incidence in young adults has increased more than any other age group, yet somehow, survival rates have not improved at the same rate as other age groups. Cancer is the number one disease killer in young adults. Young adults are the most underserved patient population by age. Delayed cancer diagnosis is disproportionately higher in young adults. Which begs the question… what is being done to improve the resources for Adolescents and Young Adults dealing with cancer On this episode of InSecurity, Matt Stephenson ran amok with Matthew Zachary, founder of Stupid Cancer and Offscrip Media. Why are we talking about cancer advocacy? Ask Matthew… when he entered the "$#!+ Happens" store, there was no one there to greet him. Rather than being told how to die with dignity, he rose up and gathered those facing similar situations. He founded Stupid Cancer and gave birth to the young adult cancer movement. The Stupid Cancer Show broke all the rules and gave a voice to millions. What else can we learn from someone who is winning that ongoing battle? Worth a listen to find out… About Matthew Zachary Ten years after surviving brain cancer at age 21, Matthew Zachary (@matthewzachary) created Stupid Cancer(@stupidcancer), the world's largest young adult cancer community, and The Stupid Cancer Show, the world's first health podcast, which amassed a global listenership in the millions. He stepped down as Stupid Cancer's CEO in 2019 and launched his latest venture, OffScrip Media, the first podcasting network at the intersection of patient advocacy, education, and digital health. True to form, Matthew is also back behind the mic where he belongs. His new show on the OffScrip Media Network, Out of Patients, is being hailed as "the voice of patient advocacy." As he continues to be pissed off with the dumpster fire that is our healthcare system, the through-line of Matthew's entire career is patient advocacy; and he will not stop calling out all sorts of Stupid BS that shouldn't have to be a thing. Matthew is also an acclaimed keynote speaker, accomplished film composer, and award-winning concert pianist. About Offscrip Media Today's healthcare conversations are too polite. Offscrip Media (@offscripmedia) is here to fix all that. Created by Matthew Zachary, a 25-year brain cancer survivor, and the Founder of Stupid Cancer, OffScrip Media is the first podcasting network at the intersection of patient advocacy, education, and digital health. Their mission is to build community, end isolation, amplify voice, and improve quality of life for patients and caregivers. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
“What’s changed most about Tor is the drug markets have taken over… We had all these hopeful things in the beginning but ever since Silk Road has proven you can do it, the criminal use of Tor has become overwhelming. I think 95% of what we see on the onion sites and other dark net sites is just criminal activity. It varies in severity from copyright piracy to drug markets to horrendous trafficking of humans and exploitation of women and children.” -- Andrew Lewman; cyberscoop, 22 May, 2017 Do you know what the Darknet is? No seriously… do you ACTUALLY understand what the Darknet is? On this episode of InSecurity, Matt Stephenson and Michelle Moskowitz speak with Dark Owl Exec VP Andrew Lewman about The Darknet. As the former CEO of The Tor Project, he knows a thing or two about what happens in the Upside Down of the internet. From the Multiverse of Darknets to why business needs to be concerned with activity on the Darknet to the work Andrew is doing with law enforcement, it’s a wide-open look at an area not everyone understands. About Andrew Lewman Andrew Lewman (@andrewlewman) is the Executive Vice President at Dark Owl. He has more than 30 years of global-scale technology experience in a variety of domains, including information security, systems administration, and data management. His interest lies in the intersection of technology and humans. He successfully grew a few companies as a co-founder and top executive, such as TechTarget, The Tor Project, Farsight Security, and DarkOwl. Andrew advises the US and its Allies, having worked on SAFER Warfighter, MEMEX, SHARKSEER, CRISP, and others. And as a technology advisor to Interpol’s Crimes Against Children Initiative. Andrew is a keynote speaker and frequent media contact for conferences, invited speeches and the global press. He is publishing with Elsevier Digital Investigations, EMCDDA, and Fordham University Press. Andrew’s most recent publication is in Digital Investigation: The darknet’s smaller than we thought: The lifecycle of Tor Hidden Services. As Treasurer for Emerge, Andrew is helping to stop domestic violence through counseling abusers. As Chairman of Each One Teach One, he’s providing economic opportunity for women and girls through technology education. About Michelle Moskowitz Michell Moskowitz is Vice President of Business Development & Chief of Staff at Sublime Communications. In her previous lives, she spun up the New Media Division for Lifetime network as well as working with numerous cybsecurity startups. With a career spent swimming in the waters of digital marketing and consulting Michelle has somehow found the time to also be a journalist at the Greenwich Sentinel. Michell will be joining us as a recurring co-host to bring additional perspective to the important role that communication plays in a world that grows increasingly technical. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Given all that has happened in the past 3 months… are you ready for what comes next? Yeah… so… 2020 am I right? Say you’re a CISO for a company with nearly 10,000 employees sprinkled around the world. You need to be ready for… Operating System updates… hardware compatibility… rogue employees… know-it-all executive types… phishing attacks… malware… ransomware… data breaches… Hey… how about we add in a global healthcare crisis that sends THE ENTIRE WORKFORCE home? Now… we get to add in things like… local cable companies being the connective tissue of your company… your spouse… your kids… roommates… siblings… pets. Not so bad if you live in a mild climate that doesn’t get severe weather… a different story if you have to deal with things like… hurricane season… tornadoes… blizzards or sub-zero temperatures. Well… at least the good news is that the bad guys are totally declaring a cease-fire during these whack-job times… no way they would try to take advantage of a combination of events that is crippling the world in a way we really have not witnessed in the modern computing era. Wait… what? On this episode of InSecurity, Matt Stephenson sits down with Spectris CISO Anna-Lisa Miller for a chat about the challenges of building a culture of security in a company with operations in 30 countries around the world. The equipment Spectris creates measures everything from tiles on the International Space Station to the Gloop Factor in ketchup (that’s A Thing). How does she wrap her arms around such a diverse operation? About Anna-Lisa Miller Anna-Lisa Miller is the Group CISO at Spectris PLC. She oversees the information and cyber security, governance, risk and compliance of a global organization that spans 3 continents and over 9,000 users. Her network is comprised of 12 companies under the Spectris umbrella spread across 30 countries. Yes, that really is a picture of Anna-Lisa and The Queen. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector, Blackberry, Apple Podcasts and Spotify as well as GooglePlay, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
You tired of hearing about the Cyber Skills Gap? What about the recent unemployment numbers due to COVID19? What if we brought you some really good news that includes a great story? What if that good news and great story includes something that is replicable, accessible and available? What if we get on with it and stop asking so many dumb questions? In today’s episode of InSecurity, Matt Stephenson has a chat with Kip Boyle about the current state of employment in the cybersecurity world. Is it all doom and gloom? Make no mistake… there is reason to feel gloomy. But that doesn’t mean that it’s all doom. Kip is putting in the kind of work to bring folks into cybersecurity that gives us all a reason to be hopeful. Check it out… About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. About Steve McMichael Steve McMichael is a SOX Compliance Manager at BlackBerry… but not for much longer. He has a CPA, CMA and MBA… but always had a yen for the security side of the business world. How does someone with a resume like that make a move at a point in his career where many of us would be more than proud of our accomplishments? Why not get it directly from the source? About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
“There are leaders and there are those who lead. Leaders hold a position of power or influence. Those who lead inspire us. Whether individuals or organizations, we follow those who lead not because we have to, but because we want to. We follow those who lead not for them, but for ourselves.” -- Simon Sinek; Start with Why, 2009 Once upon a time, not that long ago… the music industry was flying high, peaking at over $22 BILLION in global sales then was laid low by a combination of events and technology it was not ready for. There were decisions to be made which could have not only saved the industry, but made it thrive. Leadership did not make those. There were relationships to be forged with users that could have done the same. The industry began suing their consumers. What if industry leaders made a point to really look out for their users and their employees first? You think that might be a catalyst for a company to grow and thrive even though it is facing a potential disaster? In today’s episode of InSecurity, Matt Stephenson sits down with Spirion CEO Kevin Coppins for a chat about the role of a new leader in the middle of the most tumultuous time in the modern computing era. Having spent time in the music+tech upheaval of the Napster era, Kevin Coppins has steered through some whitewater rapids in his time. What do we do when the whole world gets turned upside down? Stay tuned and find out… About Kevin Coppins As President and CEO of Spirion, Kevin Coppins (@ktcoppins) wakes up every day on a mission to protect what he knows matters most—your sensitive personal data. With a team of passionate data privacy professionals at his back, Kevin is working to re-envision the culture of entire industries, putting privacy at the forefront where it belongs. Kevin’s more than 25-year track record of growth, leadership, and achievement spans multiple roles and industries. In addition to handling finance and procurement for non-tech giants ExxonMobil and Bausch & Lomb, he’s served in senior executive positions across the tech space at Novell, Alcatel Lucent, Meru Networks, EasyVista, CyFIR, and NEC. He has a BS in Marketing from Penn State, an MBA from Loyola University New Orleans, and a Certificate of Professional Development from University of Pennsylvania’s Wharton School of Business. This unique diversity of experience and education equipped Kevin with the depth and breadth of skills needed to thrive at the helm of Spirion—a company whose data discovery and classification solutions have empowered the data privacy, security, and compliance strategies of thousands of organizations worldwide. Kevin is determined to help C-suite execs understand the importance of minimizing their sensitive data footprint and preventing data breaches—not only to minimize the risks, costs, and reputational damage of successful cyberattacks and regulatory violations, but because it’s the right thing to do. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 Spotify: https://open.spotify.com/show/7qUp6uGXoshmBKHYJlXBtb?si=ZQdQWM39T6e4X5dgx1BZ0Q Make sure you Subscribe, Rate and Review!
What would you do if, overnight, the number of things under your protection increased by an order of magnitude? Would you be ready? Would you even know what to do? On today’s episode of InSecurity, Matt Stephenson talks with Justin Kallhoff, founder of Infogressive, on the impact Quarantine and Shelter-in-Place orders have impacted the role Managed Security Service Providers. Suddenly, a company who already protected users in 21 countries had an entirely new ecosystem surrounding the one they already ran. What did they do? They started hiring… check it out About Justin Kallhoff Justin Kallhoff (@justinkallhoff) founded Infogressive Inc. in October of 2006 with a dream of creating a world-class team of information security professionals that could make a difference for clients spanning the globe. Over the past decade, Justin and the crew at Infogressive have built an enterprise spread over 46 states and 20 countries, comprising nearly 60,000 seats. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Nothing you are about to hear is true… but it all happened… -- Fred Cohen 11 May, 2020 What happens when you get two legends of the security industry together for a chat about everything? Well… first, you can throw the carefully created outline right out the window because there is no way anyone can corrall these two into talking about just a few topics. The best you can hope for is that they agree to come back and do it again… because there’s just too much ground to cover and not nearly enough time to get into all of it in a single episode. Let’s just say that we set out to have a discussion on creating a way to catalog all of the things that go into making things. That catalog would also include where those things were made and what they were made of and how they arrived from their place of origin. The catalog would then include data on the place of origin and what went on there… see where we’re going with this? It’s a bit like a fractal version of the periodic table of elements. On today’s episode of InSecurity, Matt Stephenson did his best to stay out of the way in a freewheeling jam session with security legends Chris Blask & Dr Fred Cohen. Trying to describe their chat is like chasing mercury. Let it be known that the conversation included discussions of a Digital Bill of Materials for… pretty much everything, and the positive effect having access to this record could produce. But that doesn’t come near to doing justice to what all they covered… check it out About Chris Blask Chris Blask’s (@chrisblask) career spans the breadth of the cybersecurity industry for more than 25 years. He invented one of the first firewall products, built a multi-billion dollar firewall business at Cisco System, co-founded an early SIEM vendor, authored the first book on SIEM, founded an information sharing center for critical infrastructures, and has advised public and private organizations in every sector around the world. In his role within the Office of Innovation at Unisys, Chris created and leads the Operational Technology and IoT practices, invented the Digital Bill of Materials (DBoM) structure, and established the Unisys Marine Living Research Center. Today he chairs a range of non-profit cybersecurity organizations and contributes to a wide range of global security efforts. About Fred Cohen, PhD Dr. Fred Cohen (@fc0) is widely considered to be one of the leading security/risk experts in the world. He is best known as the person that defined the term “computer virus” and inventor of the most widely used computer virus defense techniques. Dr. Cohen was also the principal investigator whose team defined information assurance as it relates to critical infrastructure, did seminal research in the use of deception for information protection, a leader in the science digital forensic examination and leading information protection consultant and analyst. He has authored over 200 published research articles, authored several books and established Masters and Ph.D. security programs now part of Webster University. In 2002 Dr. Cohen revived the “Techno-Security Industry Professional of the Year” award and in 2009 he was named the “most famous hacker of all time” by ABC news. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Chris Coleman: Reversing the Economics of Cyber Defense “When you are able to maintain your own highest standards of integrity - regardless of what others may do - you are destined for greatness.” -- Napoleon Hill On today’s episode of InSecurity, Matt Stephenson & Michelle Moskowitz chat with Chris Coleman, Advisor to the Chairman fo Lookingglass Cyber Solutions. In a wide-ranging discussion they take a look that escalating cybersecurity arms race, the role of Venture Capital in growing or stifling innovation and the need for standards in interoperability across the world of hardware and software in order to increase the security industry’s chancing of winning this battle. About Chris Coleman Chris Coleman (@cdeltac) has over 20 years of experience in information security and technology industry. He currently serves in an Advisor to the Chairman at Lookingglass Cyber Solutions. Prior to his stint as CEO at Lookingglass, Coleman served as the Director of Cyber Security for Cisco Systems' U.S. Public Sector Theater. Chris focused on driving Cisco and partner technology into solutions that helped address customer problems and leverage the core value of Cisco’s network technologies. Coleman served as a liaison between sales and engineering with regards to cyber security technology and development. Coleman also served as Vice President and Director of Engineering Services for ManTech International. During his tenure at ManTech, he was responsible for direct contract PNL and PNL associated with ManTech’s, remote security monitoring services and data center hosting services. In addition, Chris was responsible for ManTech IS&T's Divisional IT services and operations, and a subset of ManTech International’s IR&D. He also managed the NetWitness product development team, developed the initial architecture for moving from pure technology into a commercially viable product, defined the business case for developing a sales team and conceived the spin out of the technology and product team from ManTech International. About Michelle Moskowitz Michell Moskowitz is Vice President of Business Development & Chief of Staff at Sublime Communications. In her previous lives, she spun up the New Media Division for Lifetime network as well as working with numerous cybsecurity startups. With a career spent swimming in the waters of digital marketing and consulting Michelle has somehow found the time to also be a journalist at the Greenwich Sentinel. Michell will be joining us as a recurring co-host to bring additional perspective to the important role that communication plays in a world that grows increasingly technical. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Be formless… shapeless like water. Now you put water in a cup, it becomes the cup. You put water in a bottle, it becomes the bottle… you put water in a teapot, it becomes the teapot. Now water can flow or it can crash… Be water my friend.” -- Bruce Lee According to our friends at the International Labour Organization (ILO) the COVID-19 pandemic will wipe out 6.7 percent of working hours in the second quarter of this year. To put that in perspective, that is the equivalent of 195 million full-time workers. Huge losses are expected across different income groups, especially in upper-middle income countries (7.0%, 100 million full-time workers) Fear not though… we’re not here to just lay a bunch of bad news on you! We want to show what ingenuity and adaptability can do for a company, for their personnel and for the the rest of us as well. Textiles company American Roots converted its facility to produce medical supplies. LVMH Group has turned its perfurmery brands, including Dior, Givency and Bulgair, into hand sanitizer manufacturers. Tito’s Vodka converted production facilities to make hand sanitizer. Thanks to the combination of their attitude and ingenuity, they now have the ability and capacity to manufacture over 60 tons a week. What is corporate leadership doing to adapt to and overcome a situation that has shown devastating consequences? On this episode of InSecurity, Matt Stephenson welcomes new co-host Michelle Moskowitz for a chat with Forcepoint CMO Matt Preschern. With the ongoing COVID-19 pandemic affecting us all, we learn how Forcepoint adapted quickly to get the most out of their 2800 employees and give them the opportunity to adapt in order to help their customers and themselves. How can companies help themselves in order to help others? Check it out.. About Matt Preschern Matt Preschern (@mattpreschern) is the chief marketing officer for Forcepoint. He leads the company’s global marketing organization that includes brand management, corporate communications, events marketing, digital and web marketing, revenue and field marketing, and sales enablement. He joined Forcepoint in January 2019. Preschern is a veteran technology marketing leader with more than 25 years of experience in brand, digital marketing, demand generation and revenue management, customer experience, and corporate communications. Previously, Matt was senior vice president of marketing at CA Technologies where he was responsible for the development and execution of global, regional and partner marketing programs across all businesses. He has also served as the CMO of HCL Technologies where he led the effort to substantially increase HCL’s brand recognition as a digital solutions, IT services and technology consulting company and supported its rapid, multi-billion dollar growth. He also served as the Enterprise CMO of Windstream Communications. Early in his career, he held numerous vice president roles at IBM across marketing strategy and performance marketing and played an integral part in launching IBM’s Smarter Planet initiative. Matt is an award-winning marketer, having been named among the top 20 most influential CMOs by Forbes and recognized for his success in driving marketing innovation by the CMO Club. About Michelle Moskowitz Michell Moskowitz is Vice President of Business Development & Chief of Staff at Sublime Communications. In her previous lives, she spun up the New Media Division for Lifetime network as well as working with numerous cybsecurity startups. With a career spent swimming in the waters of digital marketing and consulting Michelle has somehow found the time to also be a journalist at the Greenwich Sentinel. Michell will be joining us as a recurring co-host to bring additional perspective to the important role that communication plays in a world that grows increasingly technical. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Sometimes the best person to teach kids about online safety… is a fat orange cat who loves lasagna… and his friends. Well... he loves his friends, but let's be real... he loves lasagna more The Center for Cyber Safety and Education, formerly the (ISC)² Foundation, is a global non-profit charity formed in 2011 as a conduit to reach society and empower students, teachers, parents and the general public to secure their online life with award winning cyber safety education and awareness programs in the community. They hold the exclusive global rights to Garfield to teach young children how to be safe and secure online. Pat Craven is far too selfless to spend any time telling you what he does, so we’re going to do that for him. He and his team have spent nearly a decade helping to educate children, parents, seniors and cybersecurity professionals on the things they can do to protect themselves and their loved ones safe online. On this episode of InSecurity, Matt Stephenson talks with Pat Craven of the Center for Cyber Safety Education about the work they are doing to provide teachers, parents and seniors with the tools they need to keep themselves and their children safe online. Did we mention that Garfield (yes that Garfield) and his friends are helping out too? About Pat Craven Pat Craven (@cravenpat) is the Executive Director of the Center for Cyber Safety and Education. In his prior lives he has served as the Regional Executive Director of Pinellas County / Chief Development Officer Big Brothers Big Sisters of Tampa Bay. Pat also was the Vice President of Development for the Vietnam Veterans Memorial Fund in Washington DC. Prior to that, Pat spent 24 years with Boy Scouts of America in various capacities. We think it is fair to say that Pat Craven has spent his entire career putting in work to help pretty much anyone besides himself. If you need someone to help you help someone else… Pat Craven is your man. Like we said… he would never tell you this stuff, but we thought you should know. About The Center for Cyber Safety and Education The nonprofit Center for Cyber Safety and Education (@ISC2Cares) was founded in 2011 with the purpose of empowering students, teachers and whole communities to secure their online life through cyber safety education and awareness. They achieve this goal by providing Safe and Secure Online educational program, college scholarships and industry research. Their educational content was developed by the Center along with members of (ISC)², the top cyber security professionals in the world. With their knowledge, the Center turned to legendary cartoonist Jim Davis to bring it all to life, using everyone’s favorite cat, Garfield. The first series of Garfield’s Cyber Safety Adventures tackles issues such as Privacy, Safe Posting, and Cyberbullying. This program is perfect for elementary education and is currently in 14 countries. In addition, the Center provides educational materials for parents and seniors to grow their knowledge about the dangers of the internet and ensure our mission of making the cyber world a safer place for everyone. Learn more about their programs at www.iamcybersafe.org About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Decade of the RATs: Novel APT Attacks Targeting Linux, Windows & Android BlackBerry researchers have released a new report that examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade. The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s China Initiative. The BlackBerry report, titled Decade of the RATs: Cross-Platform APT Espionage Attacks Targeting Linux, Windows and Android, examines how APTs have leveraged the “always on, always available” nature of Linux servers to establish a “beachhead” for operations. Given the profile of the five APT groups involved and the duration of the attacks, it is likely the number of impacted organizations is significant. On this bonus episode of InSecurity, Matt Stephenson takes a deep dive into the world of Espionage Attacks Targeting Linux Windows & Android. He welcomes BlackBerry Director of Sales Engineering Sara Löfgren and Director of Threat Research Kevin Livelli. The research paints a picture of an espionage effort targeting the backbone of large organizations’ network infrastructure. This isn’t a sales pitch or a product demonstration. This is straight up, deep dive research. About Sara Löfgren Sara Löfgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for over a decade, with focus on solving enterprise security problems through the union of technology, people, and processes. Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. About Kevin Livelli Kevin Livelli is a Director of Threat Intelligence at Cylance, where he conducts long-term, complex investigations with the Research and Intelligence team. His work here follows ten years at 60 Minutes, where his investigative reporting and analysis were recognized with Peabody and Emmy awards. Before that, Livelli supervised investigations at the nation’s largest independent police oversight agency. A graduate of Dartmouth, he earned master's degrees from Trinity College Dublin and Columbia University. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Cybersecurity At the Movies: Sneakers The world isn't run by weapons anymore, or energy or money. It's run by ones and zeroes, little bits of data. It's all just electrons… There's a war out there, old friend, a world war… and it's not about who's got the most bullets… It's about who controls the information ...what we see and hear, how we work, what we think. It's all about the information. -- Cosmo; Sneakers, 1992 We are stepping WAY out of the box for a technical deep dive examination of one of the great Hacker movies of all time… Sneakers. Maybe the last great techno-thriller before the emergence of the commercial internet… Sneakers features everything you want from a hacker movie… wire tapping, social engineering, a little black book and tech that looks/feels familiar enough that you recognize it, but aren’t quite sure what it actually does. On this week’s episode, Matt Stephenson takes a technical look at the 1992 classic hacker film Sneakers with people who, in real life, do what the heroes of Sneakers do onscreen. Dr Jessica Barker, Freaky Clown and Death’s Pirate (or… just Dave) have broken into banks, kidnapped executives and, some times, just straight up hacked networks (while wearing White Hats of course)… Let’s sit down with real life experts to see if Hackers got it right! About Dr Jessica Barker Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cybersecurity. She has been named one of the top 20 most influential women in cybersecurity in the UK and awarded as one of the UK’s Tech Women 50. She is Co-Founder and Co-Chief Executive Officer of Cygenta, where she positively influences cybersecurity awareness, behaviors and culture in organizations around the world. Dr Barker is a popular keynote speaker and shares her expertise in the media, for example on BBC News, Sky News, Channel 4 News and in Grazia magazine and the Sunday Times. She is Chair of ClubCISO, a peer-based members forum of over 300 information security leaders. In the last year, Dr Barker has given cybersecurity outreach sessions to over 5,000 school students. Jessica’s new book Confident Cyber Security is coming in 2020, published by Kogan Page. About Freaky Clown Freaky Clown (@_Freakyclown_) is a well-known ethical hacker and social engineer. He has been working in the infosec field for over 20 years and excels at circumventing access controls. He has held positions in his career such as Senior Penetration Tester as well as Head of Social Engineering and Physical Assessments for renowned penetration companies. As Head of Cyber Research for Raytheon Missile Systems, and having worked closely alongside intelligence agencies, he has cemented both his skillset and knowledge as well as helped steer governments take correct courses of action against national threats. As an ethical hacker and social engineer, FC ‘breaks into’ hundreds of banks, offices and government facilities in the UK and Europe. His work demonstrating weaknesses in physical, personnel and digital controls assists organisations to improve their security. He is motivated by a drive to make individuals, organisations and countries more secure and better- able to defend themselves from malicious attack. Now Co-Founder and Head of Ethical Hacking at Cygenta Ltd, he continues to perform valuable research into vulnerabilities. His client list involves major high-street banks in the UK and Europe, FTSE100 companies and multiple government agencies and security forces. About Death’s Pirate… okay… it’s Dave Mound Dave Mound (@DeathsPirate) is an Experienced Cyber Security Researcher with a demonstrated history of working in the Computer &Network Security industry along with threat intelligence. He’s done a lot of work in Penetration Testing, Reverse Engineering, Agile Methodologies, Computer Forensics, Red Teaming and Threat Intelligence… and… he looks good in a white suit and turtleneck About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Ron Ross: Bringing the NIST Framework Home “If you do good software development, most of our security problems will go away because all of the nagging vulnerabilities that we see in software — a lot of those are attributed to people not using secure coding techniques and things we should be doing,” -- Ron Ross Things are changing at such a rapid pace, it’s hard to keep pace with what used to work, what is working and what we can count on working when we log in tomorrow. It’s almost like we need to count on some kind of established framework to use as a guideline. While this episode of InSecurity touches on the impact of COVID19 on the global workforce, it’s not yet another blog or podcast about the same thing. We talk with NIST Fellow Ron Ross about the future of work, healthcare and the IT industry writ large. This week on Insecurity, Matt Stephenson welcomes Cybersecurity legend Dr Ron Ross about… well… lots of things. We talk about the quick transition of the world’s workforce from on prem to telework as well as his recent move from leading FISMA at NIST to their newly created DevSecOps and why that matters now more than ever About Ron Ross Ron Ross (@ronrossecure) is a Fellow at NIST. His focus areas include cybersecurity, systems security engineering, cyber resiliency, security architecture, privacy, and risk management. Dr. Ross leads the FISMA Implementation Project and the Systems Security Engineering Initiative, which includes the development of cybersecurity and privacy standards and guidelines for the federal government, contractors, and the U.S. critical infrastructure. Dr. Ross also leads the Joint Task Force, a partnership with the Department of Defense, Office of the Director National Intelligence, U.S. Intelligence Community, and the Committee on National Security Systems, with responsibility for the development of the Unified Information Security Framework for the federal government and its contractors. Dr. Ross previously served as the Director of the National Information Assurance Partnership, a joint activity of NIST and the National Security Agency. Dr. Ross also supports the U.S. State Department in the international outreach program for cybersecurity and critical infrastructure protection. A graduate of the United States Military Academy at West Point, Dr. Ross served in many leadership and technical positions during his twenty-year career in the United States Army. He is a five-time recipient of the Federal 100 award for his leadership and technical contributions to critical cybersecurity projects affecting the federal government and is a recipient of the Presidential Rank Award. Dr. Ross has also received the Department of Commerce Gold and Silver Medal Awards and has been inducted into the National Cyber Security Hall of Fame. In addition, Dr. Ross has been inducted into the Information Systems Security Association Hall of Fame and given its highest honor of Distinguished Fellow. During his military career, Dr. Ross served as a White House aide and a senior technical advisor to the Department of the Army. He holds a Bachelors degree in Engineering from the U.S. Military Academy and Masters and Ph.D. degrees in Computer Science from the Naval Postgraduate School specializing in artificial intelligence and robotics. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
This is the true story, of 2 security professionals and their kids, living in house in the northern Midwest, now sequestered becaue of a global health crisis. Find out what happens, when Cybersecurity professionals stop being polite, and start getting real… The Real World… Stay Home Order Edition! Any comic book readers out there? Who’s familiar with the Marvel family? Shazam family? Shazamily? How about Reed & Sue Richards? The Fantastic Four? Mister Fantastc and the Invisible woman? Not sure if that one is appropriate because Sara is definitely not invisible… but Tom is definitely Fantastic The point is… what happens in house run by pair of superho level cybersecurity professionals in the age of COVID19? Oh… and did we mention they also own a livestock farm? Cows and horses and lots of other things? How does a family already swimming in the world of Cybersecurity deal with working from home during the era of COVID19 This week on Insecurity, Matt Stephenson speaks with Sara and Tom Löfgren, a married couple, both elite cybersecurity professionals… who find themselves (along with the rest of us) in a quarantine situation. Is it different for security pros to bring it all in house? How do you balance co-workers, clients, kids and livestock… oh yeah… and still be a person? About The Löfgren (that’s grammatically accurate if you are Swedish) They have been raising baby chickens in their bathtub (Sara’s idea). They have somewhere around 4 kids and an estimated 50 horses but can't really keep count because they don't hold still. Sara’s cow's name is either Coco or Norman depending on who you ask. About Sara Löfgren Sara Löfgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for nearly 20 years with a focus on solving enterprise security problems through the union of technology, people, and processes. Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. Sara lives in Minnesota with 4 kids, 2 dogs, a cat, and many rescue horses. Oh… her husband Tom… we’re pretty sure he’s around too. About Tom Löfgren Tom Löfgren is a Sales Engineer at Ionic Security. He’s really good at securing Linux and encryption. Because he is really good at security, privacy and encryption… we don’t know much about him other than the kids, the dogs, cat and rescure horses… and Sara. According to Sara, Tom plays hockey and has eaten surstromming voluntarily. He has a map of Ikea in his head and thinks it's normal when people eat pasta with ketchup on it (again… according to Sara… because Tom is really good at security and privacy, so we are going to have to take her word for it). About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Theresa Payton & Doug Citizen: Who Do You Trust? The 2016 Oxford Dictionary word of the year was post-truth 2017 Term of the Year by the Collins English Dictionary was Fake News Has it really been nearly 15 years since Stephen Colbert brought truthiness into our lives? It used to be, everyone was entitled to their own opinion, but not their own facts. But that's not the case anymore. Facts matter not at all. Perception is everything. It's certainty. -- Stephen Colbert; AV Club, 01.25.06 Only in today's modern age can you hate your neighbor but love someone posting something in Germany that you don't even know -- Clint Watts; 07.15.08 Distorting the truth is not just about elections it’s a global issue. It’s a war against our minds. Making us not know who or what to believe… manipulating us to create a vacuum and make you not trust reputable sources of information. It’s about all social issues. It impacts all countries. The motivations behind it are not what you think and will surprise and shock you. Reporters and overall traditional news media are at risk… Let’s talk about why… Elections are at risk… Let’s talk about why… Let’s see if we can help you get learned up on spotting manipulation campaigns and how to report them. And… not for nothin… how can we help you avoid being a victim of one? This week on InSecurity, Matt Stephenson welcomes 3 time defending champion Fortalice CEO and former White House CIO Theresa Payton back to the show. We add a wrinkle this week by inviting Dough Citizen… an undisclosed “regular person” who is a small business owner, voter and someone who genuinely cares about the present & future of his country. This isn’t about politics, this is about the mechanics of elections & government. Don’t get it twisted… this is more important than ever About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." Theresa’s new book drops in April. Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth In her new book, cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late. In the book, Theresa reveals: How digital voting machines, voting online, and automatic registration may boost turnout but make us more vulnerable to cyberattacks. How trolls from Russia and other nations actively stroke discord among Americans in falsely-generated controversies over race relations, vaccinations, fracking, and other social issues. Whether what we have uncovered from the Mueller investigation so far is only what they wanted us to know. About Doug Citizen Doug is a small business owner in a municipality smaller than Tokyo by with more than 10 occupants. He lives in a town somewhere between the Atlantic and Pacific oceans and somewhere between the borders of Canada and Mexico. He represents 330,000,000 people in the conversation. He cares. That’s what is important. Respect his security and privacy. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review
Reconnaissance. Target. Weaponize. Paralyze the enemy. Attack. The enemy always votes for chaos. “Voting is about our capability to change the way the government works by changing the people who makes the decsions. Voting is our capability to have a peaceful transfer of power. If you don’t have that, the alternatives are revolutions.” -- Harri Hursti, Kill Chain: The Cyber War on America's Elections If you don’t want to know how easy it is for a canny individual—or a malicious state actor—to hack into the electronic voting technology used in the U.S., don’t watch Kill Chain: The Cyber War on America’s Elections. -- Stephanie Zacharek ; Time, 25 March 2020 This week on InSecurity, Matt Stephenson has a chat with security legend Harri Hursti and Nordic Innovation Labs co-founder Dan Webber about the sad state of affairs regarding the security of United States voting machines. Add in a health crisis that prevents voters from actually going to the polls and you get… what? Tune in and find out! Make sure to check out the HBO Documentary Kill Chain: The Cyber War on America's Elections for an in-depth look at just how easy it can be to hack the voting process of one of the world’s most important elections. Because this subject is that important, HBO has also made it available for free on YouTube. About Harri Hursti Harri Hursti (@harrihursti) is a founding partner at Nordic Innovation Labs. You may know him better as a world-renowned data security expert, internet visionary and serial entrepreneur. He began his career as the prodigy behind the first commercial, public email and online forum system in Scandinavia. Harri founded his first company at the age of 13 and went on to cofound EUnet-Finland in his mid- 20’s. Today, he continues to innovate and find solutions to the world’s most vexing problems. He is among the world’s leading authority in the areas of election voting security and critical infrastructure and network system security. Hursti is considered one of the world’s foremost experts on the topic of electronic voting security, having served in all aspects of the industry sector. He is considered an authority on uncovering critical problems in electronic voting systems worldwide. In the last 10 years, Harri has pursued this important area out of a sense of duty. About Dan Webber Dan Webber (@SocialDanWebber) is Managing Partner and Chief Innovation Officer at Nordic Innovation Labs. He has served as Chief Information Officer, Security Officer, and Technology Officer for 22 years, 13 of those years in healthcare and biotech, the other 9 in manufacturing, technology and hospitality companies. Dan advises companies that provide artificial intelligence/machine learning, cyber security, innovation, design, analytics, advanced computing and digital services to large private and public enterprises around the world. Over the course of his career, Webber designed, implemented, and envisioned the network and system process workflow for the first FDA Approved DNA based sequencing system as Chief Information Officer of Bayer Visible Genetics. His pharmacogenomic systems supported drug discovery and research activities in the areas of HIV, HCV, HBV, and multiple areas of cancer. About Kill Chain: The Cyber War on America’s Election In advance of the 2020 Presidential Election, Kill Chain: The Cyber War on America’s Election stakes a deep dive into the weaknesses of today’s election technology, an issue that is little understood by the public or even lawmakers. From directors Simon Ardizzone, Russell Michaels and Sarah Teale, the team behind HBO’s 2006 Emmy-nominated documentary Hacking Democracy, Kill Chain again follows Finnish hacker and cyber security expert Harri Hursti as he travels across the U.S. and around the world to show how our election systems remain unprotected, with very little accountability or transparency. Hursti’s eye-opening journey is supplemented by candid interviews with key figures in the election security community, as well as cyber experts and U.S. senators from both parties who are fighting to secure the integrity of the vote before November 2020. As the film shows, individuals, foreign states and other bad actors can employ a myriad of techniques to gain access to voting systems at any stage – from voter registration databases to actual election results. Through this lens, seemingly unrelated or uncoordinated security breaches of the recent past can be seen as part of a “kill chain” – a military doctrine to plot meticulous, long-game attacks, understanding that breaking down trust in voting results is the surest way to undermine democracy. As enlightening as it is disturbing, Kill Chain underscores the fragility of our election process and points to the clear solutions available to protect us against sabotage. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Alex Willis & Zach Beimes: Securely Enable Remote Workers Anything new going on in your professional life recently? Anybody making the move from an office to your house? The good news is… you’re not alone Well… I mean you are… but… we’re here with you Without being… you know what I mean Let’s take aå look at just how not alone-while-alone we all our From our friends at Global Workplace Analytics 56% of employees have a job where at least some of what they do could be done remotely Only 3.6% of the workforce currently work-at-home half-time or more 80% of employees want to work from home at least some of the time The BILLION dollar question is… How many people will become remote workers after the dust settles on Covid-19? Matt Stephenson Zooms in for a chat with serial enterpreneur Zach Beimes and BlackBerry VP of Sales Engineering Alex Willis for a chat about what all is involved in sending your ENTIRE WORKFORCE home. Are they ready for it? Do the have access to the VPN? Do their kids play Fortnite on their work machines? Dig it… About Zach Beimes Zach Beimes is an entrepreneur, problem solve, technologist, humanist… and mountain climber. Seriously… He’s climbed the highest peaks in 41 states and Washingtong DC & Puerto Rico in these United States. And when we say that he’s never had “a job” that is real. All of the companies he has worked for are companies he has started. About Alex Willis Alex Willis is a Vice President of Sales Engineering & ISV Partners at BlackBerry where he is r esponsible for the overall direction and management of Technical pre-sales, Technical Channel Management and Technical Account Management, customer success and ISV partnerships globally including Enterprise, Regional, Channels & Partners About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
The BlackBerry Cylance 2020 Threat Report contains a broad range of topics vital to the interests of anyone with a computer. The report is drivey by veterans of the security industry from BlackBerry and Cylance. The goal of the report is to make security information, predictions, and lessons learned accessible to everyone, regardless of role or title. The 2020 Threat Report examines 2019’s major security breaches and considers recent advancements that may prevent past mistakes from repeating. We have gathered some of the researchers for a discussion about what went into the report… and what you can get out of it. This special episode of InSecurity takes a look at the cybersecurity threats of 2019 through a conversation with Threat Researchers Ebudo Osime, Anuj Soni & Tom Bonner. We examine BlackBerry Cylance’s research on all things cybersecurity for the prior year in order to get a handle on the coming years. We’re not selling products… we’re putting our experts to work to analyze the prior year in order to see what might be coming… About Ebudo Osime Ebudo Osime is a Threat Intelligence Analyst at BlackBerry. She is a threat intelligence advocate, threat hunter, researcher and an engineer with over 4 years in security. She has previously worked in IT Project Management, IT Consulting with Ernst and Young, Network and Security Operations. Ebudo Received her GIAC certification in Threat Intelligence and holds a Masters in Electronic Systems Engineering with a specialization in creating secure protocols for detecting denial of service attacks in IoT networks. About Anuj Soni Anuj Soni (@asoni) is a Senior Threat Researcher at BlackBerry Cylance. In addition to his corporate work, he is a SANS Certified instructor. Anuj has over 15 years of experience in the world of cybersecurity including previous stops at Booz Allen Hamilton where he worked as an Incident Response & Malware/Forensic Analyst About Tom Bonner Tom Bonner (@thomas_bonner) is a Director of Threat Research: BlackBerry Cylance. With over 18 years of experience in the security industry, including stops at HP Enterprise, Promon AS and Norman Shark… Tom helped design the block, build the block and has definitely been around the Cybersecurity block About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Women in Cybersecurity: Perspectives on The New Normal Science is not a boy's game, it's not a girl's game. It's everyone's game. It's about where we are and where we're going. Space travel benefits us here on Earth. And we ain't stopped yet. There's more exploration to come -- Nichelle Nichols Tennis legend Serena Williams was once asked by a reporter about being considered “one of the greatest female athletes of all time,” She replied: “I prefer the words ‘one of the greatest athletes of all time." That made news for a week, which is embarrassing given the fact that Venus has more titles than Michael Jordan, Michael Schumacher and Cristiano Ronaldo… combined. How bout we just round up the some of the top people in the field for a discussion on what is happening in this crazy world right now? Sound good? Good. This week on Insecurity, Matt Stephenson speaks with an All-Star Cybersecurity panel of experts including Dr Jessica Barker, Cheryl Biswas, Sherri Davidoff & Theresa Payton. With COVID19 changing everything from industry conferences to the US Presidential Election process, what role does cybersecurity play in The New Normal and The Next Normal? Check it out… About Dr Jessica Barker Dr Jessica Barker (@drjessicabarker) is a leader in the human nature of cybersecurity. She has been named one of the top 20 most influential women in cybersecurity in the UK and awarded as one of the UK’s Tech Women 50. She is Co-Founder and Co-Chief Executive Officer of Cygenta, where she positively influences cybersecurity awareness, behaviors and culture in organizations around the world. Dr Barker is a popular keynote speaker and shares her expertise in the media, for example on BBC News, Sky News, Channel 4 News and in Grazia magazine and the Sunday Times. She is Chair of ClubCISO, a peer-based members forum of over 300 information security leaders. In the last year, Dr Barker has given cybersecurity outreach sessions to over 5,000 school students. Jessica’s new book Confident Cyber Security will be released on June 3rd, 2020, published by Kogan Page. About Cheryl Biswas Cheryl Biswas (@3ncr1pt3d) is a Strategic Threat Intel Analyst with a major bank in Toronto, Canada. Previously, she worked as a Cybersecurity Consultant with KPMG. Her experience includes strategic analysis of threat actors and campaigns, security audits and assessments, privacy, DRP, project management, vendor management and change management. Cheryl holds an ITIL certification and has a degree in political science. She is actively involved in the security community as a conference speaker and a volunteer, and encourages women and diversity in infosec as a founding member of the The Diana Initiative. About Sherri Davidoff Sherri Davidoff (@sherridavidoff) is the CEO of LMG Security and the author of Data Breaches: Crisis and Opportunity. As a recognized expert in cybersecurity, Davidoff has been called a “security badass” by the New York Times. She has conducted cybersecurity training for many distinguished organizations, including the Department of Defense, the American Bar Association, FFIEC/FDIC and many more. Sherri is an instructor for Black Hat, and the co-author of Network Forensics: Tracking Hackers through Cyberspace. Davidoff is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and holds her degree in computer science and electrical engineering from MIT. She has been featured as the protagonist in the book, Breaking and Entering: The Extraordinary Story of a Hacker Called Alien. About Theresa Payton Theresa Payton (@TrackerPayton) is President and CEO of Fortalice Solutions, former White House CIO, star of the CBS hit show Hunted, and best-selling author of the book Privacy in the Age of Big Data. Payton is one of the nation’s most respected authorities on information security, cybercrime, fraud mitigation, and security technology implementation. As White House Chief Information Officer at the Executive Office of the President from 2006 to 2008, Payton administered the information technology enterprise for the President and 3,000 staff members. Theresa founded Fortalice in 2008 and lends her expertise to government and private sector organizations to help them improve their information technology systems. In 2010, Security Magazine named her one of the top 25 "Most Influential People in Security." Theresa’s new book, Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Dr Saif Abed: The Role of Technology in a Global Health Crisis Coronavirus Cases: 179,223 Active Cases: 93,871 Currently Infected Patients in Mild Condition: 87,714 Serious or Critical: 6,157 Closed: 85,352 Cases which had an outcome: Recovered / Discharged: 78,285 Deaths: 7.067 - 16 March, 2020; worldOmeter "Containing something as transmissible as COVID-19 means we shouldn't be flocking to a family physician or emergency room at the slightest symptom, because that can exacerbate spread, so remote monitoring could be powerful," - Dr Saif Abed, MD; Healthcare IT News, 05 March, 2020 What can the technology that we have already developed due in a time of global crisis such as the one we are facing now with COVID-19? Why not go directly to the experts for more information? This week on Insecurity, Matt Stephenson speaks with cybersecurity expert Dr Saif Abed, founder of The Abed GrahamGroup, Clinical Cyberdefense Systems and a MEDICAL DOCTOR. If we’re going to speak with someone about what technology can accomplish during a worldwide healthcare crisis, a cybersecurity expert with an MD is a great place to start. Check it out… About Dr Saif Abed Dr Saif Abed (@Saif_Abed) is a medical doctor and healthcare cybersecurity/national security expert. He is a recognised subject matter expert within all sub-sectors of healthcare IT with a primary field of specialisation in cyber-warfare and crime targeting public sector healthcare systems. He is currently a Founding Partner and Director of Cybersecurity Services at The Abed Graham Group, Europe's leading exclusively clinically based healthcare cybersecurity consultancy. He is also the CEO of Clinical Cyber Defense Systems, a Boston based cybersecurity analytics company supporting US healthcare providers to derive clinical and business insights from technical security data. He holds additional roles as an independent expert for the European Commission's Horizon 2020 programme with a focus on healthcare and cybersecurity and as an expert for the World Health Organisation's Digital Health Technical Advisory Group. Dr Abed is regularly invited to contribute content and thought leadership for national media outlets, healthcare technology articles and global security events. Additionally, he has previously been recognised as a multiple international award winning and published researcher in the field of oculo-plastic surgery whilst a trainee at St. George's Hospital Medical School, London. About The AbedGraham Group The Abed GrahamGroup (@AbedGraham) is a leading, clinically based, European health IT and cybersecurity consultancy that provides advisory services for large technology infrastructure suppliers and government agencies that are involved in, or are responsible for, the digital transformation of healthcare systems. Our consultants are clinically trained as well as being qualified experts in specialist areas such as cybercrime and threat modelling. Selected services including strategic research, policy analysis, bid support, regulatory compliance guidance and project management. About Clinical Cyber Defense Systems Clinical Cyber Defense Systems (@CyberClinical) is a US developer of cybersecurity analytics and visualization platforms for healthcare providers. CCDS is headquartered in Boston, Massachusetts and is composed of a team of pioneering physicians, security architects and data scientists. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
InSecurity Podcast Mixtape Vol IV: RSAC 2020 Edition Safe to say that RSA 2020 was a unique experience compared to years past. We saw major players withdraw due to concerns about the Coronavirus. For the first time since… who can even remember a couple of industry pillars were no longer around due to being acquired. It definitely felt like one of those before-and-after kind of events. Be that as it may… it was a thrilling week with a stellar cast of new players, evolving technologies and industry pillars. We feel like we could have been there for a month and not learned all there was to discover. The good news is that we had the good fortune to speak with some of the top minds in the industry and some folks who are the future of security. Seriously… we spoke with students who are quite literally the next generation of security What did we learn? Take a listen and find out for yourself Sheri Davidoff: Threat Hunting in the Cloud Dr Jessica Barker: Confident Cybersecurity Ted Claypoole: Does AI Have Rights? Theresa Payton: Protecting the Process Alissa Gilbert & Sienna Bates: The Future of Cybersecurity Joseph Menn: Malware Is More Interesting than I Thought Paula Januszkiewicz & Dr Mike Jankowski-Lorek: How a Pentester Makes a Grown Man Cry Cheryl Biswas & Joshua Corman: Hacking Our Way from Vicious-to-Virtuous Cycle (yes, that is still a MiniDisc) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review
How Smart Is Your Car? The global autonomous vehicle market accounted for US $27.9 billion in 2017. Forecasters expect a compounded annual growth rate of 41.5% through 2026 which would boost the market to US $615 BILLION Autonomous vehicle could reach 15% of global light vehicle sales by 2030 This progress toward modern mobility sounds positive, it comes with complexities. Biggie Smalls once said something about dramatic infusions of capital and the subsequent results. Our friends at the Ponemon Institute did some digging… 84% of automakers and their suppliers aren’t sure cybersecurity practices are keeping pace with evolving technologies 30% of survey respondents do not have an established product cybersecurity program or team 63% test less than half of their hardware, software and other technologies for vulnerabilities. There’s plenty that the automotive industry can control. But, do you know what steps you can take to avoid the potential damage cyberthreats can cause to your organization? Well… you are in luck because today’s guest on the InSecurity Podcast is someone who knows many of those steps This week on InSecurity, Matt Stephenson chats with Jeff Davis, Head of Smart Transportation Innovation and Development at BlackBerry about the ever-changing world of connected transportation. It’s not all self-driving cars though. Want to take a deep dive into what is involved in building a smart city? Stick around… About Jeff Davis Jeff Davis (@jdavisusmc) is the Head of Smart Transportation Innovation and Development at BlackBerry. In this position, Jeff holds responsibility for the strategic innovation and development of smart transportation markets. He’s developed cybersecurity, mobility and connectivity programs that specifically focus on human interaction with advanced technologies and new concepts. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at BlackBerry Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecuritypodcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
InSecurity Podcast Mixtape Vol III: CES 2020 Edition WOW was CES a great big glorious riot of technology, humanity and everything in between. We saw everything from concept air taxis to laser skin care products to vintage video games… and that was just in the elevator of our hotel! We had the amazing good fortune to meet innovators who are doing some incredible things across the spectrum of technology that is a part of our daily lives What did we learn? Take a listen and find out for yourself Derek Dorresteyn: A 200 mph ELECTRIC Superbike? Damon Motorcycles Builds Those Faye Francy: Auto ISAC is Focused on Making Tomorrow’s Vehicles Safe & Secure Eric Hansen: Where Can Blue Prism Go with Robotic Process Automation Rob Catto: Full Sail University Students Putting their Skills to Use Helping Others Jacob Bangsgaard: ERTICO Is Making Mobility Smarter, Safer & Cleaner in Europe Jason Stinson: Renovo Tells Us Your Car Produces 32 TB of Data a Day Ryan Permeh: Leading the AI Journey from Cylance to BlackBerry (yes, that is still a MiniDisc) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Richard Stiennon: Security Yearbook 2020 Security Yearbook 2020 is the story of the people, companies, and events that comprise the history of of the IT security industry. In this inaugural edition, author Richard Stiennon digs into the early history of Symantec, Network Associates, BorderWare, Check Point Software. These iconic names and dozens of other companies contributed to the growth of an industry now is comprised of over 2,000 vendors of security products. In addition to the history there are stories from industry pioneers such as Gil Shwed CEO and founder of Check Point Software; Chris Blask Co-inventor of Borderware Firewall and Sandra Toms Chief Organizer of the RSA Conference. The directory lists all the vendors alphabetically, by country, and by category, making an invaluable desk reference for students, practitioners, researchers, and investors. For the first time ever, a complete history of the development of IT security solutions is presented in one place. The focus is on the pioneers in the space and the companies that arose from their efforts. Individual stories from these pioneers are presented in their own voice while the overall story of the space is recounted as it grew from modest beginnings to a $100 billion+ industry with over 2,200 companies. This week on InSecurity, Matt welcomes Richard Stiennon back to the show. Already a legend in cybersecurity, Richard poured his knowledge and skill into creating the Security Yearbook 2020. Is this THE definitive guide to the ever-evolving and growing Cybsecurity world? Tune in and find out! If you are coming to the RSA Conference in San Francisco at the end of the month you can find copies all over. Check out Where to Find Stiennon at RSAC 202. About Richard Stiennon Richard Stiennon (@stiennon & @cyberwar)played his own part in the IT security industry starting in 1995 at Netrex, one of the first MSSPs. He was a Manager of Technical Risk Services at PricewaterhouseCoopers before being drafted into Gartner in 2000 to cover the network security industry. He left Gartner in 2004 to join Webroot Software as VP of Threat Research. He has also had roles as Chief Marketing Officer at Fortinet, and Chief Strategy Officer at data erasure company, Blancco Technology Group. Richard is the author of four books, including Secure Cloud Transformation: The CIO's Journey. He is an aerospace engineer (University of Michigan '82) turned historian (King's College, London, 2014) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Kip Boyle: Virtual CISO at Your Service Are you active on LinkedIn? Not active like the ones who just say “congratulations on your work anniversary.” We mean active like asking questions, replying to posts and really engaging with your contacts. There is a lot of great conversation out there that can provide answers to some important questions and contribute to solving problems in your work environment. One of the things that makes LinkedIn great is that there are sincere people who genuinely want to help, not just their personal connections, but the larger community. Kip Boyle is one of those people. Some people might find it enough to put in the work as a CISO. Others may stop after publishing their book. Not Kip Boyle. Kip is out there every day engaging fellow security professionals in conversations that spur creative approaches to solving problems. His latest project is looking into how he can ease the entrance into the world of Cybersecurity. Take a moment to check out Masterclass: How to Break Into Cybersecurity Matt welcomes Kip Boyle back to InSecurity. Kip is a cybersecurity CEO & author who is also prolific contributor to LinkedIn. We go through some of the more thought provoking conversations Kip has started on LinkedIn over the past year. These are the topics people are discussing. Join us to hear what the person who made the statement or asked the question has to say! Fire Doesn’t Innovate The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager holds. About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Kip led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Jordan DeVries: Yes. User Exerpience Really Is THAT Important This… ‘stuff’? Oh… okay. I see. You think this has nothing to do with you. You go to your closet and you select out, oh I don’t know, that lumpy blue sweater, for instance, because you’re trying to tell the world that you take yourself too seriously to care about what you put on your back. But what you don’t know is that that sweater is not just blue, it’s not turquoise, it’s not lapis, it’s actually cerulean. You’re also blindly unaware of the fact that in 2002, Oscar de la Renta did a collection of cerulean gowns. And then I think it was Yves St Laurent, wasn’t it, who showed cerulean military jackets? And then cerulean quickly showed up in the collections of eight different designers. Then it filtered down through the department stores and then trickled on down into some tragic “casual corner” where you, no doubt, fished it out of some clearance bin. However, that blue represents millions of dollars and countless jobs and so it’s sort of comical how you think that you’ve made a choice that exempts you from the fashion industry when, in fact, you’re wearing the sweater that was selected for you by the people in this room. From a pile of “stuff.” -- Miranda Priestly; The Devil Wears Prada, 2006 Think of something in your life that works well. It really works. There are a couple of ways to consider this thing. First: it is simply delightful. Whatever you do with it makes you feel happy… or better… or just some kind of positive emotion toward this thing. It could be a device. It could be your car. It could be an evening out at your favorite restaurant. It could be a lot of things. Second: it just works. It works so well, so consistently, so easily that you really don’t even consider it. It might be a motion sensing light in your kitchen. It might be a stop sign. It might be a lightswitch. What these things have in common is superior design which leads to gratifying User Experience. We all have User Experiences in our lives that run the spectrum from surprisingly fun and wonderful to grating and dread-inducing. While many of us enjoy traveling, few of us would consider the queue at TSA to be part of the trip that we look forward to. However, consider the options without the design of airport security and things start to look a little different. Many of us don’t take the time to consider the surrounding work that is done to ensure that when we use A Thing, we get the most out of our experience. Many of us don’t realize how much research and development goes into creating a smooth, satisfying User Experience. Many of us may not even realize that there are some very special people who are experts at crafting the intersection between creators of A Thing and users of A Thing. Matt sits down with Jordan Devries, Director of User Experience at Brave UX to discuss what goes into designing a product or service or solution that will provide the maximum positive User Experience. And they might talk about why Legos are the greatest UX ever made. What does this have to do with security? Stick around… About Jordan DeVries Jordan DeVries (@theastralj) is the Director of User Experience at Brave UX. With a background in design, animation, code, and content, Jordan guides projects through both information architecture and visual design with a specialization in complex interfaces for desktop, mobile and web. He did his undergrad work at Carnegie Mellon where he earned a degree in Mechanical Engineering. Jordan’s teammates at Brave UX consider him a Pop Culture guru and random fact machine. He’s also a bit of a Lego enthusiast… to put it mildly. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
InSecurity Podcast Mixtape: The Year that Was: 2019 Volume Two Did we mention the big year that 2019 was for the InSecurity podcast? It was so good we have ANOTHER mixtape for you to sample! While we had the great fortune to speak with some of the top technical people who make our industry go, we also took a walk a bit outside the mainstream of what would be considered security or “hacking.” These folks include authors, media members, CEOs and a bona fide Kung Fu master! What did we learn? Take a listen and find out for yourself Theresa Payton: Hacking elections is far more than breaking into voting machines. Joe Menn: Who populated the legendary hacker collective Cult of the Dead Cow? Brian Fanzo: Is AI invading creative spaces like marketing and design? Mimi Chan: What are the roles and opportunities for women in Martial Arts? Clint Watts: Have Advanced Persistent Manipulators have weaponized Social Media? Todd Carmichael: How have experiences in some of the most remote regions of the world affected his life? Bradley Hope: The TRUE story of Jho Low’s multi-billion dollar scheme that brought him to the top of the entertainment and financial worlds (yes, that is a MiniDisc) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the broadcast media team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and video series at events around the globe. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Mixtape: The Year that Was: 2019 Volume One We had quite a year here on the InSecurity podcast. From the opening bell of the year through RSA and SXSW then onto Hacker Summer Camp before closing out the year in DC with ICIT surrounded by the movers and shakers of cybersecurity in the Federal Government, we have had the enormous good fortune to speak with some of the most interesting people in our industry… What did we learn? Take a listen and find out for yourself Kip Boyle: Cybersecurity is a Business Problem, not a Technical Problem… How can companies reconcile the two? Marcus Carey: A young veteran with top security clearance… who faced a job market that knew exactly how much he had been paid… what now? Stephanie Domas: What are the unique issues we face securing medical devices? Greg Silberman: Are Privacy, Secrecy and Security the same thing? John Strand: What Security buzzwords need to be retired? Rob Capps: From Napster to Gnutella to Bit Torrent… How has the revolution started by Napster changed not just music, but the world at large? Kim Crawley: Autism… truths, misconceptions and the need for a diversity of brains in this world Richard Stiennon: Documenting the entirety of the Cybersecurity Industry for the first time (yes, that is a MiniDisc) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review
If you like global intrigue, financial crime, wealth porn, and absurdity, “Billion Dollar Whale,” by Tom Wright and Bradley Hope, is for you. It’s the story of Jho Low, an enterprising businessman from Malaysia who used his social connections to the country’s former Prime Minister Najib Razak to transform himself into an international financier. According to Wright and Hope’s account, Low persuaded Razak to create an investment fund, 1MDB, financed with government money, which Low managed behind the scenes. Goldman Sachs and other banks helped raise ten billion dollars for the fund. Then approximately five billion dollars of the money disappeared, prompting an international scandal. Sheelah Kolhatkar; September 28, 2018; The New Yorker "I met these guys, and said to my girlfriend Anne, ‘these guys are #@&%ing criminals… this is a #@&%ing scam, anybody who does this has stolen money.‘ You wouldn't spend money you worked for like that." Jordan Belfort; January, 2017; com "I am very pleased to confirm that a landmark comprehensive, global settlement has been reached with the United States government." Jho Low; October, 2019 This week on InSecurity, Matt Stephenson welcomes Pulitzer Prize nominated journalist Bradley Hope for a conversation detailing the mindboggling saga of Jho Low and his jaw dropping tale of theft and debauchery. How do you break into Hollywood, New York society and Global Financial Markets? Having $5 BILLION in purloined money in your pocket certainly helps. Stick around… About Bradley Hope Bradley Hope (@bradleyhope) has worked for the Wall Street Journal for the last four years, covering finance and malfeasance from New York City and London. Before that, he spent six years as a correspondent in the Middle East, where he covered the Arab Spring uprisings from Cairo, Tripoli, Tunis, and Beirut. He was detained by authorities in Bahrain, reported from the front lines of the Libyan civil war, and has been teargassed in raucous Egyptian protests. Bradley is a Pulitzer finalist and a Loeb winner, and also author of Last Days of the Pharaoh, a chronicle of the final days and hours of the presidency of Hosni Mubarak. “Billion Dollar Whale,” an Absurd Tale of Financial Fraud The definitive inside account of the 1MDB scandal, a true life thriller about a modern Gatsby who managed to swindle over $5 billion with the aid of Goldman Sachs and others. Billion Dollar Whalre is an epic tale that exposes the secret nexus of elite wealth, banking, Hollywood, and politics from two award-winning Wall Street Journal reporters. In 2009, with the dust yet to settle on the financial crisis, a baby-faced, seemingly mild-mannered Wharton grad began setting in motion a fraud of unprecedented gall and magnitude--one that would come to symbolize the next great threat to the global financial system. His name is Jho Low, a man whose behavior was so preposterous he might seem made up. An epic true-tale of hubris and greed, Billion Dollar Whale reveals how this young social climber pulled off one of the biggest heists in history--right under the nose of the global financial industry. Federal agents who helped unravel Bernie Madoff's Ponzi scheme say the 1MDB affair will become the textbook case of financial fraud in the modern age--and its fallout is already being credited for taking down the prime minister of Malaysia. For readers of Liar's Poker, Den of Thieves, and Bad Blood, Billion Dollar Whale will become a classic, harrowing parable about finance run amok. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Blockchain and AI and IoT, OH MY! “Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly.” -- Vitalik Buterin, co-founder Ethereum and Bitcoin Magazine According to our friends at Proto, IDC Health predicts that blockchain adoption in health care will increase eightfold by 2022. Yet for now, it remains a technology in its infancy, and one recent survey of health care organizations found that only 6% were building blockchain programs and just 3% had pilot programs underway. Nearly two in five weren’t doing anything at all. “it’s pretty confusing, right?" slick-to-the-touch banker Jared Vennett (Ryan Gosling) asks in voiceover not far into The Big Short. "Does it make you feel bored? Or stupid? Well, it’s supposed to. Wall Street loves to use confusing terms to make you think only they can do what they do. Or even better, for you to just leave them the #@&% alone: -- Jared Vennett (Ryan Gosling); The Big Short, 2015 Does the cybersecurity industry do that to you? Do we set up in these vocabulary word protected forts in order to unnerve you to the point that you doing really understand anything other than the fact that ALL YOUR DATA IS AT RISK AND ONLY WE CAN SAVE YOU What if I told you that there are plainspoken people involved in some of the most esoteric aspects of security who really WANT you to understand what is happening and why some magical technology might provide a better solution What if she used plain language to explain some very bleeding edge technology? Spiritus CEO Susan Ramonat joins Matt Stephenson this week to talk about the role of Distributed Ledger Technology and Blockchain in securing healthcare data About Susan Ramonat Susan Ramonat is the CEO of Spiritus, where she draws upon 25 years of executive experience in enterprise sales, product management, technology strategy, corporate development, operational risk management, and cybersecurity. She is a strategic ground-breaker with a historical sensibility. In her work, Susan brings an understanding of context, contingency and uncertainty to bear with humility and pragmatism to inform decisions and promote a recognizably human, desirable future. She speaks frequently at industry conferences and universities about DLT/blockchain, artificial intelligence, IoT and cybersecurity for critical infrastructure. Susan serves on the Dean’s Advisory Council at Loyola University Chicago and is an Industry Associate at UCL Blockchain Centre of Excellence. She is a magna cum laude graduate of Princeton University. About Spiritus Spiritus (@SpiritusPtrs) is delivering ground-breaking transparency and analytics about the safety and condition of medical devices at the point of care. With Spiritus, health systems, manufacturers and 3rd party service providers connect the dots across a medical device's operating life cycle. In a shared middle ground, they agree on a single service history… for life, using multi-party consensus. Based in Exton, PA with a development center in Edinburgh, Scotland, Spiritus is raising the bar for governance, risk and compliance at leading health systems in the process of digitally-enabling their clinical operations. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
“Your most unhappy customers are your greatest source of learning -- Business @ the Speed of Thought; Bill Gates, 1999 “I think most people either forget or don’t know that Microsoft only hires people with IQs well over 130” -- NY Times; Douglas Coupland, 1998 Last week, Microsoft Windows turned 34 years old. Next year, it can be President of the United States. You think that means Microsoft is getting old and losing touch? Maybe… but consider the facts that, as of May 07, 2019, 1.5 BILLION machines run Windows AND… according to Microsoft, over 900 MILLION machines run Windows 10. Every day, Microsoft analyzes over 6.5 TRILLION signals in order to identify emerging threats and protect customers. While Microsoft may not be rolling out streaming services or dropping new devices in splashy events every fall, this summer, they quietly became only the third company in world history to be valued at over ONE TRILLION DOLLARS. Say what you will about them, but it’s a lot harder to go through a day without Office, Windows and Azure than it is without an iPad, Linux or Amazon And… don’t even get us started on gaming… Halo? End of discussion. Steam? As of November 2018, 90% of Steam gaming machines were running Windows 10 There’s a reason Bill Gates overtook Warren Buffet as the world’s wealthiest person. This week on InSecurity, Matt Stephenson chats with CQURE founder & CEO Paula Januszkiewicz about the security orbit around Microsoft… what are the misconceptions? What is Microsoft doing right? How does security training impact an organization? What is hype and what is legit in security? And a bit more… About Paula Januszkiewicz Paula Januszkiewicz (@PaulaCqure) is the founder and CEO of CQURE Inc., a a provider of specialized services in IT infrastructure security, business applications, consulting and advisory services. She is an IT Security Auditor and Penetration Tester, Cloud and Datacenter Management MVP and trainer (MCT), and Microsoft Security Trusted Advisor. Paula is also a top speaker at many well-known conferences including TechEd conferences around the world, Microsoft Ignite, RSA, Black Hat USA, and CyberCrime. She is engaged as a keynote speaker for security related events and writes articles on Windows Security. She drives her own company, CQURE, working on security related issues and projects. Paula has conducted hundreds of IT security audits and penetration tests, some for governmental organizations. Her distinct specialization is on Microsoft security solutions-she holds multiple Microsoft certifications, and is familiar with and possesses certifications in other related technologies. Paula is passionate about sharing her knowledge with others. In private, she enjoys researching new technologies, which she converts to authored trainings. Oh… and… Paula has access to the Windows source code! About CQURE Inc. and CQURE Academy CQURE is a provider of specialized services in IT infrastructure security, business applications, consulting and advisory services. Our projects Every project is discussed in detail with Clients. We believe that this is the only way to achieve full satisfaction in IT projects. Our key to success are: highly qualified team and good planning. We build the detailed project schedules, thus avoiding a delay. CQURE was formed in November 2008 and since that time we finalized many projects: starting from IT, Security Audits, ending up with trainings and implementations. Clients range from the global corporations to small companies. For large and medium companies they offer authorship training packs, intensive IT Security audits for the whole IT environment and solutions adjusted to their needs. CQURE Academy (@CQUREAcademy) is a part of CQURE company that was formed in 2008 in Poland and since then has expanded to the rest of Europe, the Americas, Middle East and Asia – as well as opening offices in New York and in Dubai. On a daily basis, they deliver IT services — ranging from IT security audits, to penetration tests or solution implementations in big and small organisations around the world. In CQURE Academy they share our expertise offline at seminars and conferences and online through videos and blog posts. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the host of the InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on InSecurity, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
In the summer of 2017, a group of political activists in the UK figured out how to use Tinder to attract new supporters. They understood how the platform worked and how its users tended to use the app. Most importantly, they understood how Tinder’s algorithms distributed content, so they built a bot to automate flirty exchanges with real people. Over time, those flirty conversations turned to politics—and to the strengths of the U.K.’s Labour Party. The bot would take over a Tinder profile owned by a user sympathetic to the Labour party who agreed to the temporary repurposing of the account. The bot then sent roughly 40,000 messages, targeting 18- to 25-year-olds where the Labour candidates were running in tight races. While it is impossible to know if any voters were actually swayed by this campaign, what cannot be denied are the results of the election. In several targeted districts, the Labour Party won in tight races. As part of their victory celebrations… some of the winners gave Twitter shoutouts to the Tinder election bot. (This information is courtesy of Philip N. Howard and his article How Political Campaigns Weaponize Social Media Botsfrom IEEE Spectrum; October, 2018) Here’s the thing though… not all Bots are the same. In fact, not unlike most things in the world, the overwhelming amount of Bots perform important, yet perhaps tedious functions that allow people to focus on high-level assignments that truly support agency missions and outcomes. However, automation is not solely about offloading mundane tasks from humans. Instead, this type of technology creates an environment in which humans and technology not only collaborate to accelerate workflow processes but also speeds up decision-making. In this episode of the InSecurity Podcast, Matt Stephenson sits down with Ron Jones, Head of Solutions Architecture at Blue Prism. Ron is a builder of Robotic Process Automation. A mouthful right? You may know them as “Bots” and they are one of the most misunderstood pieces of technology around. Stick around and Ron will help you understand them a little better. About Ron Jones Ron Jones (@rgjSP) is an experienced leader specializing in enterprise technology strategy and consulting for the public sector. Ron currently serves North American Public Sector organizations implementing Blue Prism, the world’s most scalable, secure, and proven intelligent automation platform. About Blue Prism Blue Prism (@blue_prism) pioneered Robotic Process Automation (RPA), emerging as the trusted and secure intelligent automation choice for the Fortune 500 and the public sector. They offer a connected-RPA supported by the Digital Exchange (DX) app store—marrying internal entrepreneurship with the power of crowdsourced innovation. Blue Prism’s connected-RPA can automate and perform mission critical processes, allowing people the freedom to focus on creative, meaningful work. More than 1,500 global customers leverage Blue Prism’s Digital Workforce deployed in the cloud or on premises as well as through the company’s Thoughtonomy SaaS offering, empowering organizations to automate billions of transactions while returning hundreds of millions of hours of work back to the business. Blue Prism was recently named to Fast Company’s inaugural list of the Best Workplaces for Innovators – an honor achieved by 50 companies. Blue Prism is the only RPA provider and UK-based company to be recognized. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Brian Haugli: Livin’ La Vida CISO According to our friends at Ponemon… in a 24 month period, a business has a 1 in 4 chance of being hit with a significant threat. A separate study shows that nearly 75% of businesses do NOT have an established incident response strategy that is applied consistently across their organization. In a Crisis Situation, the most scarce and precious resource a CISO has is time. How a CISO implements his or her OODA Loop can make or break a company and a career. What if you are a Small or Medium business who does not have a traditional C-Suite structure or security team? What if you are a CISO and all eyes are on you? Will you be ready? Are you ready now? What if we told you that there are companies out there who can help your organization deal with these crisis situations without the process and expense of hiring a full time CISO? In this episode of the InSecurity Podcast, Matt Stephenson with Side-Channel Security co-founder and former CISO Brian Haugli. Brian has been around the CISO block more times than most and is the host of the #CISOLife series on YouTube. He is leading the charge to bring Enterprise Level CISO talent to mid-market companies in order to protect their business and keep the bad guys out. About Brian Haugli Brian Haugli (@BrianHaugli) is a Co-Founder and Partner at SideChannel Security. He is also the creator and host of #CISOLife on YouTube. Viewed as a "full stack CISO", he is an executive security leader and mentor focused on building high performance security teams, deploying effective operating models, and delivering risk management capabilities for global, domestic, and local enterprises. Brian has held senior advisory & practitioner roles within DoD, the Intelligence Community and Fortune 1000 companies. He has been recognized as a NIST expert, specifically with the Cyber Security Framework (CSF) and 800-53, and for industrial control systems & operational technologies. Brian is a firm believer that the small & mid-market companies deserve security guidance and realistic capabilities just the same as large organizations. About SideChannel Security Side Channel Security specializes in consulting organizations who need CISO advice to protect their digital assets. They offer CISO & advisory services to the C suite, their boards, and those accountable for security across their operations or their products. SideChannel Security has engaged in military operations under the DoD and consulted the largest companies in the world in Big 4 consulting. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
John McClurg: The Most Interesting Man in Cybersecurity The police often question him just because they find him interesting Mosquitos refuse to bite him purely out of respect In museums, he is allowed to touch the art Once while sailing around the world, he discovered a short cut He has won the lifetime achievement award, twice His business card simply says “I’ll call you” When you’ve traveled the globe and seen and done it all… what in the cybersecurity world gets you out of bed in the morning? How about taking down legendary hackers like Kevin Poulsen or Harlod James Nicholson? Too ordinary… okay… Imagine your first day as CSO at Dell and it starts in Baghdad. Maybe taking on the Mexican drug cartels with their IT budgets that are comparable to G7 countries… Maybe it’s something like studying the intersection of linguistics, philosophy, religion, law and interpretation… you know… Hermeneutics. Now… about being the Most Interesting Man in Cybersecurity… This week on Insecurity, Matt Stephenson sits down with one of those rare, been-there-done-that cybersecurity legends, John McClurg. John has tackeld cybersecurity for the FBI, the CIA, private enterprise and everywhere in between. He’s forgotten more amazing stories about security than most of us will be lucky enough to witness. Pull up a chair and enjoy! About John McClurg John McClurg is an American security professional. He spent his early career with the US government, serving as both a supervisory special agent and branch chief for the FBI as well as a deputy branch chief for the CIA. In these roles, McClurg was involved in the capturing of both Kevin Poulsen and Harold James Nicholson. Following his public service, John has served as a vice-president and Chief Security Officer for Lucent, Honeywell, Dell, and currently BlackBerry|Cylance. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Dr Saif Abed: From the ICU to the Data Center; Why an MD in Cybersecurity Makes Sense I was feelin' so bad, I asked my family doctor just what I had, I said, Doctor… Mr. M.D. … Now can you tell me, tell me, tell me, What's ailin' me?" --Good Lovin’; The Rascals, 1966 What if I told you that, according to the 2018 Horizon Report from Fortified Health Security, 100 percent of web applications connected to critical health information is vulnerable to cyber attacks. Varonis tells us that the loss of data and related failures will cost healthcare companies nearly $6 trillion in damages in the next three years. Meanwhile, ISACA reports that 27% of healthcare firms say they are unable to find candidates to fulfill cybersecurity roles This week on Insecurity, Matt Stephenson speaks with cybersecurity expert Dr Saif Abed, founder of AbedGraham, Clinical Cyberdefense Systems and a MEDICAL DOCTOR! Why would someone leave the calm world of the ICU for the chaos of securing a data center? Take a walk with Dr Abed to learn about his journey from healing patients in the surgery to keeping patient data safe and protected worldwide. About Dr Saif Abed Dr Saif Abed (@Saif_Abed) is a medical doctor and healthcare cybersecurity/national security expert. He is a recognised subject matter expert within all sub-sectors of healthcare IT with a primary field of specialisation in cyber-warfare and crime targeting public sector healthcare systems. He is currently a Founding Partner and Director of Cybersecurity Services at AbedGraham, Europe's leading exclusively clinically based healthcare cybersecurity consultancy. He is also the CEO of Clinical Cyber Defense Systems, a Boston based cybersecurity analytics company supporting US healthcare providers to derive clinical and business insights from technical security data. He holds additional roles as an independent expert for the European Commission's Horizon 2020 programme with a focus on healthcare and cybersecurity and as an expert for the World Health Organisation's Digital Health Technical Advisory Group. Dr Abed is regularly invited to contribute content and thought leadership for national media outlets, healthcare technology articles and global security events. Additionally, he has previously been recognised as a multiple international award winning and published researcher in the field of oculo-plastic surgery whilst a trainee at St. George's Hospital Medical School, London. About AbedGraham AbedGraham (@AbedGraham) is a leading, clinically based, European health IT and cybersecurity consultancy that provides advisory services for large technology infrastructure suppliers and government agencies that are involved in, or are responsible for, the digital transformation of healthcare systems. Our consultants are clinically trained as well as being qualified experts in specialist areas such as cybercrime and threat modelling. Selected services including strategic research, policy analysis, bid support, regulatory compliance guidance and project management. About Clinical Cyber Defense Systems Clinical Cyber Defense Systems (@CyberClinical) is a US developer of cybersecurity analytics and visualization platforms for healthcare providers. CCDS is headquartered in Boston, Massachusetts and is composed of a team of pioneering physicians, security architects and data scientists. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
El Camino School: Teaching the Future Unsung Heroes of Music In the IT world, we carry laptops, tablets and phones. Our performance areas include data centers and server rooms. Imagine a world where the creation, maintenance and repair of our most important tools was the most overlooked part of the industry. Imagine a world where most people actually believed that the talented sales and marketing people… built their own machines and not only kept them running at top optimization, but also did the innovation that created The Next Big Thing. While there are definitely those types in our industry… the unsung heroes are often the folks down in the trenches of the data center and on the other end of the helpdesk tickets that we open. In the music world, it is no different. When we see or hear Jack White or Kerry King melting our brains on stage, they are not the only ones responsible for the art they create. There is an entire world of roadies, guitar techs and others who work in anonymity behind the scenes in order to bring a band and performance to life. Hey… you in the data center… sound familiar? This week on Insecurity, Matt Stephenson has a chat with John Theisen, founder of El Camino School, a new school in Central Florida that is about not just making music… but making and repairing the things we use to make music. What does this have to do with IT? Any time you hear guitar or amp, swap in laptop and server. Guitar techs are the help desk of the music world! About El Camino School El Camino School (@elcaminoschoolusa) is a community-based music school offering a wide variety of courses, lessons, guest lectures and events. One of the main focuses at El Camino School will be trade-based learning, and developing the next generation of touring technicians, but that’s not all. The school’s primary objective is to create a true collaboration with the community and local music industry in order to impart knowledge for those seeking to further their understanding, careers, or hobbies. We also aim to educate current and aspiring musicians on how the music is created before the artists even strike a string. This includes everything under the surface in creating music, from guitar circuitry to the inner workings of a guitar amp or effects pedals. Musicians that understand how it all works are more likely to succeed in their craft. The vision is to bring people together to grow in and around music, within the music. Aside from the technical aspects of music production, El Camino offers Music Therapy, a course that focuses on community building, wellness, and self-empowerment through music. The creation of music, moving to music, and even listening to music can do wonders when dealing with those with cognitive, emotional, and even physical conditions. El Camino School will also be providing music therapy to bridge the gaps between its students and the world around them. About John Theisen John Theisen is the founder of El Camino School. He is a longtime contributor to the local Orlando music scene, has had a love for music and a high amount of respect for the people that make the show possible behind the scenes. Aside from being a musician, he was a community fundraiser and arts administrator for over a decade. Theisen’s vision was to create a space that helps inspire and empower others through learning. This school is a community space where people can come together and learn from other professionals on their journey to becoming an integral part of a production or some future in music. Moving to Central Florida in 1999, John attended the University of Central Florida and graduated with a degree in Cinema Studies, Film Theory and Mass Communication. He went on to become Head of Operations at the DMAC (Downtown Media Arts Center) where his passion for working for the greater community was sparked. When John isn’t founding schools or contributing to the local art and music scene, John is the lead singer and washboard player (!) of the legendary Bloody Jug Band. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Haathi Cloth: Hacking the World of Indian Weddings Are you familiar with India? If not… well… this really isn’t the podcast for you Here are some things you may or may not be familiar with There are over 31 Million Non Resident Indians or Persons of Indian Origin living outside of India across the world. Over 7 Million NRIs or PIOs live in the USA, the UK and the Canada. The Indian wedding market is estimated at $50 billion making it the world’s second-largest, after the $70 billion US market and it is growing at an estimated rate of 20% year over year. Some would say… the traditional clothing one wears to an Indian wedding, while spectacular… is not that comfortable. The a Southeast Asian engineer from the Midwestern US met an Indian Entreprenuer from Austin Texas… it was time for a change. This week on Insecurity, Matt Stephenson sits down with the founders of Haathi Cloth for a discussion about Kurtas and pyjamas. What in the world does this have to do with cybersecurity and technology? Have you ever been in a data center where the pressure is on and it’s hot… like… really hot? Now try going to an Indian wedding in the summer. This was a system ripe for a Blue Team style hack. About Josh Fu Josh Fu (@jfusecurity), CISM, CISSP, is a Security Engineer for Cylance. Josh has experience as a Channel Manager and consultant in cloud infrastructure and as a Sales Engineer in cybersecurity. Josh founded the West Coast chapter of the International Consortium of Minority Cybersecurity Professionals and has presented in front of industry audiences across the country. When he isn’t too busy protecting the world from cybercriminals and other miscreants, he finds the inefficiencies in other systems… which leads to the creation of companies like Haathi Cloth. About Samit Shah Samit Shah is a serial entrepreneur who can't look at a problem and not try to find a solution. He is currently involved as founder of 3 different companies: Haathi Cloth, Persource and Evolve Energy. These companies are about as far apart on the spectrum of what businesses do that they almost don’t even belong on the same chart. Where they intersect… is at Samit. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Brian Robison: Mobile Malware and APT Espionage Until now, the public’s exposure to mobile phone malware has been dominated by news about the privately run “greyware” vendors, including Gamma Group, Hacking Team and NSO. Their commercial smartphone spyware seems to inevitably end up in the hands of autocrats who use it to hamper free speech, quash dissent, or worse. Consumers of these news stories are often left with the impression that mobile malware is just something paranoid dictators purchase for use within their own borders in luddite countries few people can find on a map. It is not. In a coming report, BlackBerry Cylance researchers will reveal what the focus on those groups has overshadowed: several governments with well-established cyber capabilities have long ago adapted to, and exploited, the mobile threat landscape for a decade or more. In this context, mobile malware is not a new or niche effort, but a longstanding part of a cross-platform strategy integrated with traditional desktop malware in diverse ways across the geopolitical sphere. This week on Insecurity, Matt Stephenson has a chat with BlackBerry Cylance Chief Evangelist Brian Robison about the scourge of Mobile Malware and how the threats that come from attacking mobile devices are different… and thus require a different mindset when it comes to securing those devices and your network. About Brian Robison Brian Robison has over 20 years of cybersecurity experience. As Chief Evangelist at BlackBerry Cylance he is focused on educating and inspiring the world. Robison hosts live Hacking Exposed events, where he demonstrates the tools and techniques of real-world threat actors. Brian is a regular speaker at industry events such as RSA, Black Hat, thought leadership forums like ISC2 Think Tank and is highly sought after to speak at partner events. Prior to joining BlackBerry Cylance, Robison worked to defend organizations from mobile security threats —three years as a Director at Citrix XenMobile and two driving enterprise strategy at Good Technology. Brian also spent over six years at McAfee with a special focus on end-point security -leading efforts to modernize ePolicy Orchestrator. During this time, he also managed vulnerability and policy compliance solutions. His early career ranges from a six-year period with Tripwire, Inc. to cutting his professional teeth in consumer electronics at Diamond Multimedia. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Matt Stephenson: The AI Manifesto Mirror, mirror on the wall Tell me, mirror, what is wrong? Can it be my de la clothes Or is it just my de la song? What I do ain't make-believe People say I sit and try But whan it comes to being de la It's just me myself and I -- Me Myself and I; De La Soul, 1989 What happens when all of your scheduled guests have to cancel? You roll with it and do something new! Working from an essay by Malcolm Harkins and the BlackBerry Cylance Threat Intelligence Team, Matt Stephenson is going to take a look at Artificial Intelligence and a myriad of its ethical implications on industry and society as well as the roll the humanity must play. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!