POPULARITY
There's substantial cybersecurity risk in critical infrastructure and addressing it is a complex problem that involves regulatory and private sector efforts. Joshua Corman, founder of I am the Cavalry and the CyberMed Summit, and Rob Knake, cybersecurity expert and former federal cybersecurity official, join host Eric Hanselman to explore the nature of the problems and the challenges we face in addressing them. This is a conversation that continues from their session at the America's Growth Capital's annual West Coast Cybersecurity Conference that ran alongside the RSA Conference. One of the challenges in securing critical infrastructure, is that it's often addressed as independent activities. That can miss the impact of cascading failures that can occur, given the interdependencies that exist across utilities and the social services that depend on them. Ransomware attacks on hospitals have taken weeks to resolve, rather than days. The Colonial pipeline attack shutdown services for a week. Behind this is a set of challenges that need to be addressed on the scale of the Y2K crisis at the start of the century, but that lack a hard deadline. There is progress being made, but there is much more to do. Host: https://www.spglobal.com/marketintelligence/contributors/1535668/eric-hanselman https://www.linkedin.com/in/erichanselman/ Guests: https://www.linkedin.com/in/joshcorman/ https://www.linkedin.com/in/rknake/ Links to show content: https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf https://youtu.be/dhJvslRRlFc?si=TmNbbRuh4MeSu0BO https://www.rsaconference.com/library/presentation/usa/2024/getting%20serious%20critical%20disruptionsthinkingresponses%20%20rumors%20of%20war https://www.cisa.gov/resources-tools/programs/chemical-facility-anti-terrorism-standards-cfats
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the cybersecurity community. In this episode, we explore Joshua's professional journey, from his early days in the industry to his current position as a respected cybersecurity leader. With a focus on practical strategies and real-world challenges, Joshua shares valuable insights into the complexities of modern cybersecurity and the strategies organizations can employ to navigate this dynamic landscape. As a recognized authority on security, Joshua Corman's expertise spans a range of topics, including risk management, threat intelligence, and the intersection of security with technology and business. Join us as we delve into his experiences, lessons learned, and the principles that guide his approach to addressing the ever-present challenges of cybersecurity. Whether you are a cybersecurity professional, technology enthusiast, or someone keen on understanding the intricacies of safeguarding digital assets, this podcast offers a unique opportunity to gain perspective from one of the industry's thought leaders. Tune in to discover the wisdom and practical advice Joshua Corman brings to the table, shedding light on the current state of cybersecurity and its future trajectory. Show Notes: https://securityweekly.com/vault-psw-9
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the cybersecurity community. In this episode, we explore Joshua's professional journey, from his early days in the industry to his current position as a respected cybersecurity leader. With a focus on practical strategies and real-world challenges, Joshua shares valuable insights into the complexities of modern cybersecurity and the strategies organizations can employ to navigate this dynamic landscape. As a recognized authority on security, Joshua Corman's expertise spans a range of topics, including risk management, threat intelligence, and the intersection of security with technology and business. Join us as we delve into his experiences, lessons learned, and the principles that guide his approach to addressing the ever-present challenges of cybersecurity. Whether you are a cybersecurity professional, technology enthusiast, or someone keen on understanding the intricacies of safeguarding digital assets, this podcast offers a unique opportunity to gain perspective from one of the industry's thought leaders. Tune in to discover the wisdom and practical advice Joshua Corman brings to the table, shedding light on the current state of cybersecurity and its future trajectory. Show Notes: https://securityweekly.com/vault-psw-9
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the cybersecurity community. In this episode, we explore Joshua's professional journey, from his early days in the industry to his current position as a respected cybersecurity leader. With a focus on practical strategies and real-world challenges, Joshua shares valuable insights into the complexities of modern cybersecurity and the strategies organizations can employ to navigate this dynamic landscape. As a recognized authority on security, Joshua Corman's expertise spans a range of topics, including risk management, threat intelligence, and the intersection of security with technology and business. Join us as we delve into his experiences, lessons learned, and the principles that guide his approach to addressing the ever-present challenges of cybersecurity. Whether you are a cybersecurity professional, technology enthusiast, or someone keen on understanding the intricacies of safeguarding digital assets, this podcast offers a unique opportunity to gain perspective from one of the industry's thought leaders. Tune in to discover the wisdom and practical advice Joshua Corman brings to the table, shedding light on the current state of cybersecurity and its future trajectory. Show Notes: https://securityweekly.com/vault-psw-9
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the cybersecurity community. In this episode, we explore Joshua's professional journey, from his early days in the industry to his current position as a respected cybersecurity leader. With a focus on practical strategies and real-world challenges, Joshua shares valuable insights into the complexities of modern cybersecurity and the strategies organizations can employ to navigate this dynamic landscape. As a recognized authority on security, Joshua Corman's expertise spans a range of topics, including risk management, threat intelligence, and the intersection of security with technology and business. Join us as we delve into his experiences, lessons learned, and the principles that guide his approach to addressing the ever-present challenges of cybersecurity. Whether you are a cybersecurity professional, technology enthusiast, or someone keen on understanding the intricacies of safeguarding digital assets, this podcast offers a unique opportunity to gain perspective from one of the industry's thought leaders. Tune in to discover the wisdom and practical advice Joshua Corman brings to the table, shedding light on the current state of cybersecurity and its future trajectory. Show Notes: https://securityweekly.com/vault-psw-9
The February cyberattack on Change Healthcare, a unit of UnitedHealth Group, continues to cause concern and frustration for providers. In this episode, HFMA Senior Editor Nick Hut and Policy Director Shawn Stack discuss the latest developments, and Joshua Corman, founder of cybersecurity organization I Am the Cavalry, shares insights on what should come next in healthcare.
We pick back up with Joshua Corman, founder of grass roots organization I Am the Cavalry, for part two of our discussion. Josh shares insights from his many years on the healthcare cyber front lines and provides both a captivating and sobering perspective on the state of healthcare security today. And while there have been many strides forward, we still have a long way to go. Audra and I learned so much during our discussion including themes such as cyber asbestos, the emerging care desert, dependency on undependable things, recalibrating the cost of connected medicine, if you can't protect it/can't connect it, the Omnibus Appropriations Act, and actionable insights on what we can do right now, as individuals and collectively, to make a difference. Joshua Corman is the founder of I Am the Cavalry, a grassroots organization focused on the intersection of digital security, public safety, and human life. He was formerly chief strategist of CISA's COVID Task Force, where he advised on the pandemic response, provided cybersecurity expertise on healthcare infrastructure, and supported control systems and life safety initiatives. Prior to CISA, Josh was SVP and chief security officer at PTC, where he accelerated cyber safety maturity across industries. Previously, he served as director of the Atlantic Council's Cyber Statecraft Initiative, on the Congressional Task Force for Healthcare Industry Cybersecurity, and in leadership roles at Sonatype, Akamai, IBM, and the 451 Group. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e248
We had so much to talk about with this week's guest that we made it a two-part episode! Joining us this week, and next week, is Joshua Corman, founder of grass roots organization I Am the Cavalry. Josh shares insights from his many years on the healthcare cyber front lines and provides both a captivating and sobering perspective on the state of healthcare security today. And while there have been many strides forward, we still have a long way to go. Audra and I learned so much during our discussion including themes such as cyber asbestos, the emerging care desert, dependency on undependable things, recalibrating the cost of connected medicine, if you can't protect it/can't connect it, the Omnibus Appropriations Act, and actionable insights on what we can do right now, as individuals and collectively, to make a difference. Joshua Corman is the founder of I Am the Cavalry, a grassroots organization focused on the intersection of digital security, public safety, and human life. He was formerly chief strategist of CISA's COVID Task Force, where he advised on the pandemic response, provided cybersecurity expertise on healthcare infrastructure, and supported control systems and life safety initiatives. Prior to CISA, Josh was SVP and chief security officer at PTC, where he accelerated cyber safety maturity across industries. Previously, he served as director of the Atlantic Council's Cyber Statecraft Initiative, on the Congressional Task Force for Healthcare Industry Cybersecurity, and in leadership roles at Sonatype, Akamai, IBM, and the 451 Group. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e247
Cyber Security Uncut presents a new quarterly podcast series with Claroty. In this first episode, the company's vice-president of cyber safety strategy, Joshua Corman, talks to host Liam Garman to shed light on how cyber criminals can remotely access medical devices and healthcare infrastructure — threatening human safety. The pair begin the podcast discussing Corman's experience as a white hat hacker, before analysing the extent to which medical devices can be accessed by cyber criminals. Corman and Garman then discuss how attacks against healthcare providers can be a simple task for some hackers, and those fundamental steps that hospitals and infrastructure providers must take to reduce their threat surface and keep people safe. The podcast wraps up by unpacking the must-need tools for businesses to protect their operations, including Claroty's asset discovery and proprietary protocol offerings to build a resilient OT network. Future quarterly episodes will feature Claroty subject matter experts providing insight into how businesses can secure cyber physical assets across different industries. Enjoy the podcast, The Cyber Security Uncut team
Cyber Security Uncut presents a new quarterly podcast series with Claroty. In this first episode, the company's vice-president of cyber safety strategy, Joshua Corman, talks to host Liam Garman to shed light on how cyber criminals can remotely access medical devices and healthcare infrastructure — threatening human safety. The pair begin the podcast discussing Corman's experience as a white hat hacker, before analysing the extent to which medical devices can be accessed by cyber criminals. Corman and Garman then discuss how attacks against healthcare providers can be a simple task for some hackers, and those fundamental steps that hospitals and infrastructure providers must take to reduce their threat surface and keep people safe. The podcast wraps up by unpacking the must-need tools for businesses to protect their operations, including Claroty's asset discovery and proprietary protocol offerings to build a resilient OT network. Future quarterly episodes will feature Claroty subject matter experts providing insight into how businesses can secure cyber physical assets across different industries. Enjoy the podcast, The Cyber Security Uncut team
Today when computer systems fail, they can cause real, physical harm. In just the last few years, we've seen cyber attacks interfere with our food supply, tamper with city water supplies, and disrupt gas pipelines. While cheap consumer electronics often have poor security, medical devices like insulin pumps and pacemakers are also vulnerable to attack - and the consequences of failure can be lethal. The free market doesn't reward better security. Regulations are weak or nonexistent, regulators are understaffed and underfunded. Targeted organizations lack sufficient funding, training and personnel to prepare and respond. They need help. I Am the Cavalry aims to engage technologists and hackers to ride to the rescue. Joshua Corman is VP of Cyber Safety Strategy at Claroty, Founder of I am The Cavalry, and formerly served as Chief Strategist for CISA regarding COVID, healthcare, and public safety. Interview Links I Am The Cavalry: https://iamthecavalry.org/ BSides 2022 Cavalry presentation: https://www.youtube.com/watch?v=aw3egJej7so The Cavalry Isn't Coming (DEF CON 21 talk): https://www.youtube.com/watch?v=2kMGdkOMSK0 Rugged Software Manifesto: https://github.com/rugged-software/rugged-software.github.io CISA Bad Practices: https://www.cisa.gov/BadPractices CISA Information Sharing and Awareness: https://www.cisa.gov/information-sharing-and-awareness Maslow's Hierarchy of Needs: https://www.simplypsychology.org/maslow.html Click Here to Kill Everyone: https://www.schneier.com/books/click-here/ SBOM interview: https://podcast.firewallsdontstopdragons.com/2021/07/19/its-time-to-drop-the-sbom/ My Jeff Moss interview: https://podcast.firewallsdontstopdragons.com/2022/08/29/the-night-the-lights-went-out-in-vegas/ Further Info 300th episode promotion: https://fdsd.me/ep300 Patron promotion: https://fdsd.me/coinpromo Send me your questions! https://fdsd.me/qna Subscribe to the newsletter: https://fdsd.me/newsletter Check out my book, Firewalls Don't Stop Dragons: https://fdsd.me/book Become a Patron! https://www.patreon.com/FirewallsDontStopDragons Donate directly with Monero! https://firewallsdontstopdragons.com/contact/ Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-Speaker Generate secure passphrases! https://d20key.com/#/ Table of Contents Use these timestamps to jump to a particular section of the show. 0:01:28: Giveaway and promotion update 0:02:46: Holiday gift ideas 0:03:59: Interview preview 0:08:35: How did I Am the Cavalry get started? 0:16:52: How does focusing on physical harms change your approach to cybersecurity? 0:20:33: Why is it so important to 'meet people where they are'? 0:23:40: How do you best help organizations that are target rich but cyber poor? 0:31:47: What is the crawl, walk, run progression? 0:34:33: Why is it so important to compartmentalize systems? 0:35:56: How do we do a better job of designing security in from the start? 0:39:01: Is it safer for small companies to use managed services? 0:42:17: What role should the government play here? 0:52:57: If I want to get help for my organization, where should I go? 0:58:18: What's next for the Cavalry and how can I get involved? 1:05:09: Interview wrap-up 1:06:35: Book recommendations 1:07:43: Preview of upcoming shows
On this week's episode of IoT: The Internet of Threats podcast, host Eric Greenwald discusses recent news in product and supply-chain cybersecurity with Nick and Sam, the Vidovich brothers. He interviews Joshua Corman, former Chief Strategist at CISA COVID Task Force and Founder of I am The Cavalry. News Roundup: This week's Weekly News Roundup covers: Assessing the difference between Spring4Shell and Log4j vulnerabilities New draft, bipartisan legislation that would require SBOMs for medical devices Interview with Josh Corman: Josh has worked in security for many years. His background includes a lot of in-depth work in cyber and physical security for medical devices. Josh is also widely known as the godfather of the Software Bill of Materials (SBOM). All of this experience led to his recent work with the government as the Chief Strategist for the CISA COVID Task Force. On the episode, Josh and Eric discuss the key functions of a product security team and the critical leadership role of the Chief Product Security Officer. Josh and Eric also discuss: How a world increasingly dependent on digital infrastructure can be protected Trends and forces that have made product security roles increasingly important General principles for prioritizing and accurately interpreting the severity of threat reports Guidance for teams that lack sufficient resources How to buy down more risk with fewer resources Connect with Josh Corman: https://www.linkedin.com/in/joshcorman/ Learn more about I am The Cavalry at https://iamthecavalry.org/ Read up on the Health Care Industry Cybersecurity Task Force here: https://www.phe.gov/Preparedness/planning/CyberTF/Pages/default.aspx Thank you for listening to this episode of IoT: The Internet of Threats podcast, powered by Finite State — the leading product security solution provider for connected devices and embedded systems. If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast. To learn more about building out a robust product security program, protecting your connected devices, and complying with emerging supply-chain cybersecurity regulations and technical standards, visit https://finitestate.io/.
In this podcast, John Riggi, highly decorated veteran of the FBI and Senior Advisor for Cybersecurity and Risk at the American Hospital Association talks to two leading experts and colleagues in the field of cybersecurity from the Cybersecurity and Infrastructure Agency (CISA) / U.S. Department of Homeland Security, Dr. L. Reuven Pasternak, Interim Senior Advisor and Joshua Corman, Chief Strategist. Reuven and Joshua will discuss a CISA Insights report “Provide Medical Care is in Critical Condition: Analysis and Stakeholder Decision Support to Minimize Further Harm” a groundbreaking qualitative and quantitative analysis, which models and measures hospital strain associated with excess deaths, as well as the effect of ransomware and the impact such a strain can have on a hospital and region, further contributing to excess deaths. This report tends to corroborate what to many is intuitive - ransomware attacks on hospitals may disrupt care delivery, risk patient safety and are threat to life crimes.
Podcast: Hack the PlantEpisode: Where is the Cavalry?Pub date: 2020-09-28Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Hackers may be our best, last hope as our dependence on connected technology is increasing faster than our ability to safeguard ourselves. This episode you will learn about I Am the Cavalry - a volunteer organization of cybersecurity experts devoted to improving the security of medical devices, transportation, connected homes, and infrastructure - and its co-founder, Joshua Corman, who serves as an ambassador between the security community and federal officials protecting us on the front lines.
Matthew Brodsky of Security Studies Group on Israeli elections. Ellen Voie of Women in Trucking Association on a call for more women in trucking. Joshua Corman of PTC and IAmThe Cavalry.org on hacking medical devices. Megan Delaney of Monmouth University on ecotherapy - getting outside more. Author Samuel Pollen on his book "The Year I Didn't Eat" and his eating disorder. Rachel Wadham of Worlds Awaiting on getting the most of reading aloud.
Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Corman previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, & strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.
Symposium Closing Keynote - Bits & Bytes, Flesh & Blood, and Adapting for the Next 20 Years About the speaker: Joshua Corman is a Founder of I am The Cavalry (dot org), and formerly served as Chief Strategist for CISA regarding COVID, healthcare, and public safety. He previously served as CSO for PTC, Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, and other senior roles. He co-founded RuggedSoftware and I am The Cavalry to encourage new security approaches in response to the world's increasing dependence on digital infrastructure. His unique approach to security in the context of human factors, adversary motivations, and social impact has helped position him as one of the most trusted names in security. He also serves as an Adjunct Faculty for Carnegie Mellon's Heinz College, and was a member of the Congressional Task Force for Healthcare Industry Cybersecurity.
In our 157th episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Stephen Heifetz, and Philip Khinda discuss: Two White House Officials Helped Give Nunes Intelligence Reports; Buzzfeed motion; how Cisco responded to the Wikileaks Vault7 leak; Donald Trump has a new iPhone — so it looks like he isn’t boycotting Apple anymore; James Comey’s Twitter Account. Our guest interview is with Joshua Corman, Director of the Cyber Statecraft Initiative for the Atlantic Council, also serving on the HHS CyberSecurity Task Force required by CISA, and founder of "I am The Cavalry" a volunteer group focused on public safety/human life in connected technologies and Justine Bone, CEO and Director of MedSec, a company that analyzes the quality and security of technology solutions in the medical device and healthcare industries. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
Joshua Corman of Cyber Statecraft Initiative joins us, our listener feedback segment covers "Magic Wiffle Dust", and in our security news, Dropbox has been breached (again). Stay tuned!
Joshua Corman is Director of the Cyber Statecraft Initiative for the Atlantic Council. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to increasing dependence on technology. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode479#Interview:_Joshua_Corman.2C_Cyber_Statecraft_Initiative-_6:00PM-6:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Joshua Corman of Cyber Statecraft Initiative joins us, our listener feedback segment covers "Magic Wiffle Dust", and in our security news, Dropbox has been breached (again). Stay tuned!
Joshua Corman is Director of the Cyber Statecraft Initiative for the Atlantic Council. He co-founded @RuggedSoftware and @IamTheCavalry to encourage new security approaches in response to increasing dependence on technology. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode479#Interview:_Joshua_Corman.2C_Cyber_Statecraft_Initiative-_6:00PM-6:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Host Kevin Greene and guest Joshua Corman, chief technology officer at Sonatype, discuss the importance of secure and trusted software in car cybersafety. Corman talks about the possibilities of self-healing software for securing the Internet of Things. He also discusses the significance of an “underwriters lab” for software to help ensure software integrity and provide visibility in the software supply chain.
Joshua Corman & Marie Moe discuss the potentially dire consequences of insecure medical devices at StoryCorps @ RSA Conference 2016.
Cybersecurity Insights & Perspectives host Kevin Greene and guest Joshua Corman by StateScoop
Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Corman-Percoco/DEFCON-22-Josh-Corman-Nicholas-Percoco-Cavalry-Year-0-UPDATED.pdf The Cavalry Year[0] & a Path Forward for Public Safety Joshua Corman CTO, SONATYPE Nicholas J Percoco VP STRATEGIC SERVICES, RAPID7 At DEF CON 21, The Cavalry was born. In the face of clear & present threats to "Body, Mind & Soul" it was clear: The Cavalry Isn't Coming... it falls to us... the willing & able... and we have to try to have impact. Over the past year, the initiative reduced its focus and increased its momentum. With a focus on public safety & human life we did our best "Collecting, Connecting, Collaborating" to ensure the safer technology dependence in: Medical, Automotive, Home Electronics & Public Infrastructure. We will update the DEF CON hearts & minds with lessons learned from our workshops & experiments, successes & failures, and momentum in industry and with public policy makers. Year[0] was encouraging. Year[1] will require more structure and transparency if we are to rise to these challenges... As a year of experimentation comes to an end, we will share where we've been, take our licks, and more importantly outline a path forward... Joshua Corman is the Chief Technology Officer for Sonatype. Previously, Corman served as a security researcher and strategist at Akamai Technologies, The 451 Group, and IBM Internet Security Systems. A respected innovator, he co-founded Rugged Software and IamTheCavalry to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure. Josh's unique approach to security in the context of human factors, adversary motivations and social impact has helped position him as one of the most trusted names in security. He is also an adjunct faculty for Carnegie Mellon’s Heinze College, IANS Research, and a Fellow at the Ponemon Institute. Josh received his bachelor's degree in philosophy, graduating summa cum laude, from the University of New Hampshire. Twitter: @joshcorman Nicholas J. Percoco is vice president of strategic services at Rapid7. In his role he leads a team that advises customers on how to mitigate and respond to threats using data driven analysis to empower more relevant, timely, and impactful decisions. Over the past decade, Nicholas has presented security research with a focus on custom malware, mobile devices, and data breach trends to audience all over the world including a Keynote at RSA Conference 2013, TEDx Naperville, and eights previous talks at DEF CON. When he is not on an airplane or working with customers, he enjoys running the THOTCON hacking conference in Chicago, trying new and interesting craft beers, and being a founding member of the Cavarly movement. Prior to Rapid7, he ran SpiderLabs at Trustwave before taking a few months off to explore the Great Pit of Carkoon on Tatooine. Now that he is back on planet Earth, you can find him on Twitter as "c7five". Follow @iamthecavalry on Twitter.
Beau Woods and Joshua Corman discuss automotive security, society, and the law. Please make sure to check out the "Five Star Automotive Cyber Safety Program"
About the speaker: As a security strategist and philosopher serving in the IT Security space, Joshua Corman's cross-domain research highlights adversaries, game theory and motivational structures. A passionate advocate who "fights for the user" and the oft neglected public good, Corman's research has shifted toward the rise of hactivism, internet governance, cyber-conflict, and the growing tensions between technology and civil liberties.Prior to joining Sonatype, Corman was the Director of Security Intelligence at Akamai Technologies. He is also the former Research Director of the 451 Group. He co-founded Rugged Software and IamTheCavalry, was named a Top Influencer of IT in NetworkWorld and serves as a Fellow with the Ponemon Institute. Corman received his bachelor's degree in philosophy, graduating summa cum laude, from the University of New Hampshire.
Welcome to our very special episode 350! We have a very special episode, all in support of wounded veterans in our armed services. Please take the time to donate using the links above. We've got an epic day in store for you, including contests, panel discussions, technical segments and more! Active Defense: Taking The Fight To Attackers: Should We? We've all heard the term "Hacking Back". We all have mixed feelings about this term. Lets be clear, its not about feelings! The revenge-based "hacking back" was doomed for failure from the beginning. On the flip side, we're losing the battle against attackers on many fronts. What can we do? Setting traps, tracking attackers, luring them into areas of the network and systems deemed "honeypots" is on the table, or is it? What are the legal ramifications to this activity? Benjamin Wright is the author of several technology law books, including Business Law and Computer Security, published by the SANS Institute. With over 25 years in private law practice, he has advised many organizations, large and small, private sector and public sector, on privacy, computer security, e-mail discovery, outsourcing contracts and records management. Nothing Mr. Wright says in public is legal advice for your particular situation. If you need legal advice or a legal opinion, you should retain a lawyer. Joshua Corman is the Director of Security Intelligence for Akamai. Mr. Corman’s cross-domain research highlights adversaries, game theory and motivational structures. His analysis cuts across sectors to the core security challenges plaguing the IT industry, and helps to drive evolutionary strategies toward emerging technologies and shifting incentives. Dave Dittrich is an Affiliated Research Scientist with the Office of the Chief Information Security Officer at the University of Washington. He is also a member of the Honeynet Project and Seattle's "Agora" computer security group. Robert Graham is the co-founder and CTO of Errata Security, a firm specializing in cybersecurity consulting and product verification. Mr. Graham learned hacking as a toddler from his grandfather, a WW-II codebreaker. His first IDS was written more than 10 years ago designed to catch Morris-worm copycats.