Podcast appearances and mentions of lenny zeltser

  • 13PODCASTS
  • 29EPISODES
  • 54mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 16, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about lenny zeltser

Latest podcast episodes about lenny zeltser

Paul's Security Weekly TV
Prioritizing Business Needs over Tools for Cost-Effective Protection - Lenny Zeltser, Mayeuresh Ektare - BSW #306

Paul's Security Weekly TV

Play Episode Listen Later May 16, 2023 32:35


Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw306 

Business Security Weekly (Video)
Prioritizing Business Needs over Tools for Cost-Effective Protection - Lenny Zeltser, Mayeuresh Ektare - BSW #306

Business Security Weekly (Video)

Play Episode Listen Later May 16, 2023 32:35


Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw306 

Paul's Security Weekly
BSW #306 - Mayeuresh Ektare, Molly McLain Sterling, Lenny Zeltser

Paul's Security Weekly

Play Episode Listen Later May 15, 2023 63:10


Medtronic's Security Ambassador program has seen tremendous growth and engagement in recent years. Learn how they gave their program a shot of adrenaline and haven't looked back since.   Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw306 

Business Security Weekly (Audio)
BSW #306 - Mayeuresh Ektare, Molly McLain Sterling, Lenny Zeltser

Business Security Weekly (Audio)

Play Episode Listen Later May 15, 2023 63:10


Medtronic's Security Ambassador program has seen tremendous growth and engagement in recent years. Learn how they gave their program a shot of adrenaline and haven't looked back since.   Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw306 

Hacker Valley Blue
Mastering the Fundamentals with Lenny Zeltser

Hacker Valley Blue

Play Episode Listen Later Oct 18, 2021 35:01


In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from. Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities.  To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.'”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!   Key Takeaways:   0:00 Previously on the show 1:40 Lenny introduction 2:05 Episode begins 3:10 What Lenny is doing today 5:35 The evolution of Lenny's career 8:30 Parallels between beginning and now 10:38 Journey and growth of REMnux 13:00 Challenges Lenny has faced 15:21 Collaboration surprises 17:18 Horror stories 20:18 Enforcing policies 23:34 Asset management 26:08 New tech and trends 28:45 Biggest discovery about self 32:38 Advice for others 34:24 Keeping up with Lenny     Links: What Lenny Does Lenny on the Web Follow Lenny on Twitter Lenny on LinkedIn Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ron Eddings on Twitter Follow Chris Cochran on Twitter Sponsored by Axonius

Hacker Valley Blue
Hacker Valley Blue: Know Thyself Finale

Hacker Valley Blue

Play Episode Listen Later Oct 18, 2021 28:03


This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story. Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.   Key Takeaways 0:02 Introduction to the show 0:49 Our Sponsor, Axonius  2:09 Welcome back 2:31 Reflecting on Know Thyself 3:17 Recap This Seasons Guest 3:22 Marcus Carey 4:17 John Strand 5:05 Aaron Reinhart & Jamie Dixon 5:54 Chaos Engineering 7:12 Lenny Zeltser, asset inventory 7:54 Kevin Allison, Storytelling is a soft skill 10:19 John Strand 12:13 Can we do better? 13:54 What kind of leader are you? 14:26 Do you have unsupported devices? 17:34 Ask yourself these questions 13:33 Go back to the EASY Framework 21:50 Learning 23:29 Exploration 24:00 Immersion 27:28 Reach Hacker Valley   Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ron Eddings on Twitter Follow Chris Cochran on Twitter Supported by Axonius  

Hacker Valley Studio
Hacker Valley Blue Season 2 Finale

Hacker Valley Studio

Play Episode Listen Later May 18, 2021 28:03


This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story. Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.   Key Takeaways 0:02 Introduction to the show 0:49 Our Sponsor, Axonius  2:09 Welcome back 2:31 Reflecting on Know Thyself 3:17 Recap This Seasons Guest 3:22 Marcus Carey 4:17 John Strand 5:05 Aaron Reinhart & Jamie Dixon 5:54 Chaos Engineering 7:12 Lenny Zeltser, asset inventory 7:54 Kevin Allison, Storytelling is a soft skill 10:19 John Strand 12:13 Can we do better? 13:54 What kind of leader are you? 14:26 Do you have unsupported devices? 17:34 Ask yourself these questions 13:33 Go back to the EASY Framework 21:50 Learning 23:29 Exploration 24:00 Immersion 27:28 Reach Hacker Valley   Learn more about Hacker Valley Studio Support Hacker Valley Studio on Patreon Follow Hacker Valley Studio on Twitter Follow Ron Eddings on Twitter Follow Chris Cochran on Twitter Supported by Axonius  

Hacker Valley Studio
Hacker Valley Blue S2 Episode 4 - Lenny Zeltser

Hacker Valley Studio

Play Episode Listen Later May 18, 2021 35:02


In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from. Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities.  To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!   Key Takeaways:   0:00 Previously on the show 1:40 Lenny introduction 2:05 Episode begins 3:10 What Lenny is doing today 5:35 The evolution of Lenny’s career 8:30 Parallels between beginning and now 10:38 Journey and growth of REMnux 13:00 Challenges Lenny has faced 15:21 Collaboration surprises 17:18 Horror stories 20:18 Enforcing policies 23:34 Asset management 26:08 New tech and trends 28:45 Biggest discovery about self 32:38 Advice for others 34:24 Keeping up with Lenny     Links:   What Lenny Does   Lenny on the Web   Follow Lenny on Twitter   Lenny on LinkedIn   Learn more about Hacker Valley Studio   Support Hacker Valley Studio on Patreon   Follow Hacker Valley Studio on Twitter   Follow Ron Eddings on Twitter   Follow Chris Cochran on Twitter   Sponsored by Axonius

Hacker Valley Studio
Episode 47 - The Role of a CISO with Lenny Zeltser

Hacker Valley Studio

Play Episode Listen Later Mar 18, 2020 21:13


In this exciting episode, Lenny Zeltser - CISO @ Axonius joins the podcast. Lenny is someone we really enjoy speaking to and is an all around expert in malware, technical writing, and managing teams to success.

lenny ciso lenny zeltser
Hands-Free Security
#5: Vendor insights featuring Lenny Zeltser from Minerva

Hands-Free Security

Play Episode Listen Later Feb 8, 2019 25:40


Swimlane CEO Cody Cornell is joined by Minerva VP of Products Lenny Zeltser to discuss the cybersecurity industry from a vendor's perspective. Key takeaways include insights on defense-in-depth, aspirations for a security silver bullet, looking ahead to 2020 and more.

Crimen Digital
#65 Ingeniería reversa de Malware con Lenny Zeltser · Crimen Digital

Crimen Digital

Play Episode Listen Later Dec 13, 2018 42:19


Qué tal estimados Podescuchas por fin estamos en nuestro episodio #65, y como les comentábamos en nuestros episodios pasados, hoy les tenemos un tema bastante interesante que es “Ingeniería reversa de Malware” ¿Por qué se debe aplicar ingeniera reversa al malware?¿De qué manera podemos llevar a cabo un análisis de comportamiento? De estos y más puntos nos habla el experto Lenny Zeltser quién también es instructor de SANS institute, esperamos que lo disfruten.

Paul's Security Weekly (Video-Only)
Lenny Zeltser, Minerva Labs - Paul's Security Weekly #585

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Dec 8, 2018 66:39


Lenny Zeltser the VP of Products at Minerva, will be giving a technical segment on Evasion Tactics in Malware from the Inside Out. He will explain the tactics malware authors use to evade detection and analysis and find out how analysts examine these aspects of malicious code with a disassembler and a debugger. To learn more about Minerva Labs, go to: https://l.minerva-labs.com/security-weekly Full Show Notes: https://wiki.securityweekly.com/Episode585 Follow us on Twitter: https://www.twitter.com/securityweekly

products inside out malware pre recorded techsegment paul asadoorian minerva labs lenny zeltser evasion tactics paul's security weekly
Paul's Security Weekly TV
Lenny Zeltser, Minerva Labs - Paul's Security Weekly #585

Paul's Security Weekly TV

Play Episode Listen Later Dec 8, 2018 66:39


Lenny Zeltser the VP of Products at Minerva, will be giving a technical segment on Evasion Tactics in Malware from the Inside Out. He will explain the tactics malware authors use to evade detection and analysis and find out how analysts examine these aspects of malicious code with a disassembler and a debugger. To learn more about Minerva Labs, go to: https://l.minerva-labs.com/security-weekly Full Show Notes: https://wiki.securityweekly.com/Episode585 Follow us on Twitter: https://www.twitter.com/securityweekly

products inside out malware pre recorded techsegment paul asadoorian minerva labs lenny zeltser evasion tactics paul's security weekly
Paul's Security Weekly
The Bleeding Edge - Paul's Security Weekly #585

Paul's Security Weekly

Play Episode Listen Later Dec 8, 2018 141:12


This week, how Docker containers can be exploited to mine for cryptocurrency, WordPress sites attacking other WordPress sites, why the Marriott breach is a valuable IT lesson, malicious Chrome extensions, why hospitals are the next frontier of cybersecurity, and how someone is claiming to sell a Mass Printer Hijacking service! In our first Technical Segment, we welcome Marcello Salvati, Security Consultant at BHIS, to talk about SILENTTRINITY, a post-exploitation agent powered by Python, IronPython, C#/.NET! In our second Technical Segment, we air a pre-recorded interview of Lenny Zeltser, VP of Products at Minerva! Lenny will be discussing Evasion Tactics in Malware from the Inside Out!   Full Show Notes: https://wiki.securityweekly.com/Episode585 Visit https://www.securityweekly.com/psw for all the latest episodes!   To learn more about Minerva Labs, go to: https://l.minerva-labs.com/security-weekly To learn more about Black Hills Information Security, go to: https://www.blackhillsinfosec.com/PSW To look more into SILENTTRINITY, go to: https://github.com/byt3bl33d3r/SILENTTRINITY   Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

security products wordpress inside out chrome python breach lenny marriott printers malware docker hijacking marcello infosec pre recorded bleeding edge security consultant security news psw security weekly black hills information security techsegment paul asadoorian bhis ironpython minerva labs technicalsegment ai hunter lenny zeltser larry pesce evasion tactics joffthyer hacknaked paul's security weekly marcello salvati silenttrinity mass printer hijacking
Paul's Security Weekly (Podcast-Only)
The Bleeding Edge - Paul's Security Weekly #585

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Dec 8, 2018 141:12


This week, how Docker containers can be exploited to mine for cryptocurrency, WordPress sites attacking other WordPress sites, why the Marriott breach is a valuable IT lesson, malicious Chrome extensions, why hospitals are the next frontier of cybersecurity, and how someone is claiming to sell a Mass Printer Hijacking service! In our first Technical Segment, we welcome Marcello Salvati, Security Consultant at BHIS, to talk about SILENTTRINITY, a post-exploitation agent powered by Python, IronPython, C#/.NET! In our second Technical Segment, we air a pre-recorded interview of Lenny Zeltser, VP of Products at Minerva! Lenny will be discussing Evasion Tactics in Malware from the Inside Out!   Full Show Notes: https://wiki.securityweekly.com/Episode585 Visit https://www.securityweekly.com/psw for all the latest episodes!   To learn more about Minerva Labs, go to: https://l.minerva-labs.com/security-weekly To learn more about Black Hills Information Security, go to: https://www.blackhillsinfosec.com/PSW To look more into SILENTTRINITY, go to: https://github.com/byt3bl33d3r/SILENTTRINITY   Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

security products wordpress inside out chrome python breach lenny marriott printers malware docker hijacking marcello infosec pre recorded bleeding edge security consultant security news psw security weekly black hills information security techsegment paul asadoorian bhis ironpython minerva labs technicalsegment ai hunter lenny zeltser larry pesce evasion tactics joffthyer hacknaked paul's security weekly marcello salvati silenttrinity mass printer hijacking
Paul's Security Weekly TV
Lenny Zeltser and Eddy Bobritsky, Minerva Labs - Enterprise Security Weekly #88

Paul's Security Weekly TV

Play Episode Listen Later Apr 27, 2018 29:59


Cyber and Information Security Expert with 13+ years of experience. After 7 years in different cyber units at the Israeli Defense Forces (IDF), Eddy was self-employed, senior consultant for the defense and finance industries, leading country level cyber security projects. Lenny Zeltser is a seasoned business and tech leader with extensive information security expertise. He builds innovative endpoint defense solutions as VP of Products at Minerva Labs. Lenny and Eddy join John and Paul this week for an interview! Full Show Notes: https://wiki.securityweekly.com/ES_Episode88 Visit http://securityweekly.com/esw for all the latest episodes!

israel interview companies products enterprise cyber lenny john strand israeli defense forces idf enterprise security weekly minerva labs lenny zeltser eddy bobritsky
Paul's Security Weekly
That Seems Political - Enterprise Security Weekly #88

Paul's Security Weekly

Play Episode Listen Later Apr 26, 2018 82:53


This week, John Strand and I interview Lenny Zeltser and Eddy Bobritsky of Minerva Labs! In our Technical Segment, we're joined by the one and only Eyal Neemany of Javelin Networks to talk about how AD Domain Trusts and Forest Trusts operate! In the news, we have updates from RSA, Fortinet, Twitter, SANS, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode88   Visit https://www.securityweekly.com/esw for all the latest episodes!

security political protect hack naked cyber hacking labs networks strand lenny rsa infosec javelin eyal fortinet john strand asadoorian enterprise security weekly zeltser minerva labs lenny zeltser technicalsegment javelin networks secweekly eddy bobritsky eyal neemany bobritsky ad domain trusts forest trusts
Enterprise Security Weekly (Video)
Lenny Zeltser and Eddy Bobritsky, Minerva Labs - Enterprise Security Weekly #88

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 26, 2018 29:59


Cyber and Information Security Expert with 13+ years of experience. After 7 years in different cyber units at the Israeli Defense Forces (IDF), Eddy was self-employed, senior consultant for the defense and finance industries, leading country level cyber security projects. Lenny Zeltser is a seasoned business and tech leader with extensive information security expertise. He builds innovative endpoint defense solutions as VP of Products at Minerva Labs. Lenny and Eddy join John and Paul this week for an interview! Full Show Notes: https://wiki.securityweekly.com/ES_Episode88 Visit http://securityweekly.com/esw for all the latest episodes!

israel interview companies products enterprise cyber lenny john strand israeli defense forces idf enterprise security weekly minerva labs lenny zeltser eddy bobritsky
Enterprise Security Weekly (Audio)
That Seems Political - Enterprise Security Weekly #88

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 26, 2018 66:13


This week, John Strand and I interview Lenny Zeltser and Eddy Bobritsky of Minerva Labs! In our Technical Segment, we're joined by the one and only Eyal Neemany of Javelin Networks to talk about how AD Domain Trusts and Forest Trusts operate! In the news, we have updates from RSA, Fortinet, Twitter, SANS, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode88   Visit https://www.securityweekly.com/esw for all the latest episodes!

security political protect hack naked cyber hacking labs networks strand lenny rsa infosec javelin eyal fortinet john strand asadoorian enterprise security weekly zeltser minerva labs lenny zeltser technicalsegment javelin networks secweekly eddy bobritsky eyal neemany bobritsky ad domain trusts forest trusts
Paul's Security Weekly TV
Lenny Zeltser, Minerva Labs - Enterprise Security Weekly #77

Paul's Security Weekly TV

Play Episode Listen Later Jan 26, 2018 29:48


Lenny Zeltser, VP of Products at Minerva Labs, is a seasoned business and tech leader with extensive information security expertise. He joins Paul and John for an interview! Full Show Notes: https://wiki.securityweekly.com/ES_Episode77 Visit http://securityweekly.com/esw for all the latest episodes!

interview products john strand enterprise security weekly minerva labs lenny zeltser enterprise news
Enterprise Security Weekly (Audio)
The Eternal Optimist - Enterprise Security Weekly #77

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jan 25, 2018 58:36


This week, Paul and John interview Lenny Zeltser, VP of Products for Minerva Labs! In the news, we have updates from ThreatMetrix, CrowdStrike, SmartBear, Carbon Black, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode77   Visit https://www.securityweekly.com/esw for all the latest episodes!

Paul's Security Weekly
The Eternal Optimist - Enterprise Security Weekly #77

Paul's Security Weekly

Play Episode Listen Later Jan 25, 2018 58:36


This week, Paul and John interview Lenny Zeltser, VP of Products for Minerva Labs! In the news, we have updates from ThreatMetrix, CrowdStrike, SmartBear, Carbon Black, and more on this episode of Enterprise Security Weekly!   Full Show Notes: https://wiki.securityweekly.com/ES_Episode77   Visit https://www.securityweekly.com/esw for all the latest episodes!

Enterprise Security Weekly (Video)
Lenny Zeltser, Minerva Labs - Enterprise Security Weekly #77

Enterprise Security Weekly (Video)

Play Episode Listen Later Jan 25, 2018 29:48


Lenny Zeltser, VP of Products at Minerva Labs, is a seasoned business and tech leader with extensive information security expertise. He joins Paul and John for an interview! Full Show Notes: https://wiki.securityweekly.com/ES_Episode77 Visit http://securityweekly.com/esw for all the latest episodes!

interview products john strand enterprise security weekly minerva labs lenny zeltser enterprise news
Cyber Security Interviews
#007 – What I Am Learning So Far

Cyber Security Interviews

Play Episode Listen Later Jan 2, 2017 6:51


This is going to be the second holiday break episode and the first of 2017. In this episode, I am taking a quick look back at the first five episodes (https://cybersecurityinterviews.com/episodes/) with my guests to date: Chris Pogue (https://cybersecurityinterviews.com/001-chris-pogue-like-chihuahua-pork-chop/) David Cowen (https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants/) Lenny Zeltser (https://cybersecurityinterviews.com/003-lenny-zeltser-can-never-know-everything/) Nicholas Percoco (https://cybersecurityinterviews.com/004-nicholas-percoco-dont-second-guess/) Morgan Wright (https://cybersecurityinterviews.com/005-morgan-wright-rule-threes/) Each of these cyber security professionals have had their own, unique journeys to get where they are. In each interview, I learned a lot about them as individuals, but also got their perspectives on a variety of topics that influence the industry as well as some valuable advice. Thanks everyone for listening to the first episodes of Cyber Security Interviews. I hope you are all getting some valuable insight to the industry as well as some sage advice. Next week we are back with our regular schedule of interviews with top cyber security pros. Have a safe and happy new year everyone, I look forward to speaking to you all soon. Remember to sign up here (https://cybersecurityinterviews.com/email-sign-up/) for email notifications of new episodes.

learning morgan wright lenny zeltser david cowen
Cyber Security Interviews
#003 – Lenny Zeltser: You Can Never Know Everything

Cyber Security Interviews

Play Episode Listen Later Dec 4, 2016 70:40


Lenny Zeltser (https://www.linkedin.com/in/lennyzeltser) is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization's security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by CenturyLink), where he managed the US team of service professionals, aligning their expertise to the firm’s cloud solutions. Lenny helps shape global infosec practices by teaching incident response and malware defenses at Minerva Labs (https://www.minerva-labs.com/) . Lenny’s approaches to business and technology are built upon his work experience, independent research, as well as a Computer Science degree from the University of Pennsylvania and an MBA degree from MIT Sloan. His expertise is strongest at the intersection of business, technology, and information security, and spans incident response, infosec cloud services and business strategy. To get a sense for Lenny’s thought process and knowledge areas, take a look at his blog (https://zeltser.com/) . In this interview we will discuss why he is passionate about security, stagnating in information security and going back to grad school, public speaking, who has inspired him, his personal challenge asking for advice, early failures in technology, why he developed REMnux to make malware analysis accessible to as many people as possible, cloud security, writing better job descriptions, refining communication skills to technical and non-technical audiences, how to use certifications as a signaling mechanism, building industry relationships, and much more. I hope you enjoy this discussion. Please leave your comments below! Where you can find Lenny: LinkedIn (https://www.linkedin.com/in/lennyzeltser) Twitter (https://twitter.com/lennyzeltser) Lenny's Blog (https://zeltser.com/) REMnux (https://remnux.org/)

Paul's Security Weekly
Paul's Security Weekly - Episode 200 - June 4th, 2010

Paul's Security Weekly

Play Episode Listen Later Jun 10, 2010 53:55


Episode 200 Show Notes HISTORIC Episode 200 all day podcast in support of hackersforcharity.org. Part 1 with Lenny Zeltser talking about malicious documents. Remember its never to little or to late to donate to Jhonny Long's hackers for charity. Hosts: Larry "HaxorTheMatrix" Pesce, Paul Asadoorian, John Strand, Mick Douglas, Carlos "Dark0perator" Perez Audio Feeds:

security hacking john strand security weekly paul asadoorian mick douglas lenny zeltser paul's security weekly
Paul's Security Weekly
Paul's Security Weekly - Episode 150 - Intro & Interview with Lenny Zeltser- April 30, 2009

Paul's Security Weekly

Play Episode Listen Later May 8, 2009 55:32


In this first part of Episode 150 we crack the keg, introduce the show, and do a short interview with Lenny Zeltser: "Much of security advice under the "best practices" umbrella seems to assume that the company is interested in having strong security or in being a high performer of IT/security practices. Yet, most companies (e.g SMBs) don't care about high performance: they just want to survive and conduct business and to have security that's just good enough. So, what advice should we offer to companies who will never be proactive about security, who will never implement defense-in-depth, and who maybe don't need to worry about these issues? That's why I've been creating one-page cheat-sheets to assist companies who haven't prepared, yet a stuck in a tough spot. " More information here

smbs lenny zeltser paul's security weekly
Paul's Security Weekly
Paul's Security Weekly - Episode 110 - June 5, 2008

Paul's Security Weekly

Play Episode Listen Later Jun 10, 2008 90:12


Live from the Security Weekly studios featuring guest host Lenny Zeltser!... Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Network Security Projects Using Hacked Wireless Routers Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want some cool Security Weekly Gear? Do you hack naked? Check out our Cafepress Store! Full Show Notes Hosts: Larry "Uncle Larry" Pesce, Paul Asadoorian

Paul's Security Weekly
Paul's Security Weekly - Episode 97 - January 24, 2008

Paul's Security Weekly

Play Episode Listen Later Jan 27, 2008 93:47


Live from the Paul's Security Weekly Studio with a cast of special guests, including: The authors of SANS SEC610 Reverse-Engineering Malware: Malware Analysis Tools and Techniques including Lenny Zeltser, Mike Murr and Bojan Zdrnja. Of course, our "reverse engineering specialist", the baby maker from Canada himself, Justin Seitz! Want to register for any SANS conference? Please visit http://www.securityweekly.com/sans/ for our referral program and sign up for SEC535 - Embedded Device Hacking Today! Sponsored by Core Security, listen for the new customer discount code at the end of the show Sponsored by Tenable Network Security, creators of Nessus and makers of the Tenable Security Center, software that extends the power of Nessus through sophisticated reporting, remediation workflow, IDS event correlation and much more. Want some cool Security Weekly Gear? Do you hack naked? Check out our Cafepress Store! Use the Backtrack Live CD for hacking? Want to learn more? Check out training from Offensive Security! Full Show Notes Hosts: Larry "Uncle Larry" Pesce, Paul Asadoorian Email: psw@securityweekly.com

live canada ids offensive security nessus tenable network security core security justin seitz lenny zeltser paul's security weekly cafepress store