POPULARITY
In the spirit of the end of the year, I decided to put together some highlights from a handful of episodes over the course of 2024. This episode will feature a select few snippets from five different episodes over the course of the year including Chris from RADICL and LogRhythm, Gil from Orca, Chris from Veracode, Andy from BreachRx, and Kabir from Leen. There will be a mix of stories of unique crossroads, general entrepreneurial advice, and cybersecurity-specific challenges. Thank you to all the listeners this year! Sponsor: Vulncheck
Gadalia Montoya Weinberg O'Bryan, CEO and founder at Dapple Security is our feature interview this week, interviewed by our own Frank Victory. News from Southwest Airlines, Alterra Mountain Company, Vail Resorts, Botdoc, Crowdstrike, LogRhythm, Red Canary, Lares, Webroot and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Southwest breaks with 50-year tradition and will assign seats; profit falls at Southwest, American Denver-based ski giants to host Olympics events How the Colorado, New Mexico quantum industry plan to use its federal funding Colorado company strikes AI partnership for security at car dealerships Communications outages from CrowdStrike update cancel RTD trains, shut down Colorado DMVs, hinder first responders A Comparison of AI Regulatory Frameworks Merged Exabeam and LogRhythm cut jobs, face lawsuit Halting a hospital ransomware attack - Red Canary Enhancing Organizational Communication and Culture through Purple Team Testing 7 Tips on Keeping Your Data Private When Using AI - Webroot Blog Job Openings: Pax8 - GRC Analyst City & County of Denver - CISO Lumen - Vice President, Deputy Chief Security Officer CoBank - Director, Internal Controls and Operational Risk, IT Westerra Credit Union - Director of Information Security (Hybrid - must reside in CO Meta - Security Partner - Mergers & Acquisitions (M&A) Robinhood - Enterprise Risk Manager State of Colorado - Cyber Criminal Investigator IV Fastly - Senior Manager, Security Detection and Response Motion Recruitment - GRC Analyst The Trade Desk - Sr Staff Product Manager-Data Governance & Policy Applications - Trust & Safety Upcoming Events: This Week and Next: ISSA COS - August Meeting - 8/13 ISSA Denver - August Meeting, "Incident Response" - 8/14 Let's Talk Software Security - Vulnerability Remediation:Fixing Problems or Creating New Ones? - 8/14 ISSA COS - August Mini Seminar - 8/17 Colorado = Security & Colorado CSA Summer Picnic - 8/24 ISC2 Pikes Peak - August Meeting - 8/28 Denver ISSA - AI/ML Special Interest Group - 8/28 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Mary Writz, SVP of Product Management at Red Canary is our feature interview this week. News from Tattered Cover, Arrow Electronics, PhotoPacks.ai, Ping Identity, Lares, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Morrison's new cameras flag 9,000 speeders in less than two weeks - Canyon Courier Barnes & Noble CEO explains Tattered Cover bookstores deal New AI summit in Denver to focus on how to address affordability Colorado public companies notch big profits and big losses in DBJ rankings Denver startup uses AI to generate professional headshots How Colorado's tech leaders want the state's new AI law changed Denver lacks comprehensive approach to cybersecurity risks, city auditor says How Session Management Works and Why It's Important The Power of Modern-Day Purple Teaming: A Consultant's Perspective How to Ensure Your Data is Ready for an AI-Driven SOC | LogRhythm Job Openings: Pax8 - IAM Architect Gates - Sr Cybersecurity Analyst Brownstein Hyatt Farber Schreck - CISO Affirm - Director of Product, Trust & Safety Bank of America - Senior Information Security Officer Meta - Security Partner - Mergers & Acquisitions HealthEdge - Director, Governance, Risk, and Compliance Presidio - Vice President, Cyber Security Practice DAT - Security Analyst 1 Ryder System - Application Security Engineer Upcoming Events: This Week and Next: ISSA COS - Cybersecurity First Friday - 7/12 ISSA COS - July meeting - Conversations that count - 7/16 CSA Colorado - Responding to the Quantum Computing Threat - 7/16 Denver ISSA - BBQ - 7/17 Denver OWASP - AI in the Age of Application Security - 7/17 ISSA COS - July Mini Seminar "Blackout Brainstorm" Tabletop around EMPs - 7/20 Let's Talk Software Security - What do the Developers Think of your Security Program? - 7/23 ISC2 Pikes Peak - July Meeting - 7/24 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Guy Sereff, Partner at Michael Best is our feature interview this week. News from Arapahoe Community College, Guild, Katilyst, LogRhythm, Ping Identity, Red Canary and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Denver Named Number One on List of Best U.S. Cities for Foodies Colorado Legislature Passes First-in-Nation Artificial Intelligence Bill Denver-area community college first to join Space Force effort to teach aerospace workers How Colorado organizations are preparing to fill quantum positions Denver tech firm Guild grew rapidly, now it is shrinking rapidly Katilyst - Out of Stealth and Ready to be Your Security Champion LogRhythm and Exabeam Announce Intent to Merge, Harnessing Collective Innovation Strengths to Lead the Future of AI-Driven Security Operations What Is Liveness Detection? How It Helps Fraud Prevention What to consider when evaluating EDR Job Openings: Pax8 - IAM Architect Bank of America - Azure - Senior Cloud Security Engineer State of CO - Senior Security Administrator (Audit) CoBank - Director, Internal Controls and Operational Risk, IT Maxar - Senior Information Security Specialist Gates Corp - Cybersecurity & DLP Specialist Quizlet - Staff Cloud Security Engineer Flexential - Manager, Security Architecture Western Union - Information Security Engineer Upcoming Events: This Week and Next: RMISC - 6/11-13 BSides Boulder - 6/14 Let's Talk Software Security - Quality Tests, Security Outcomes: Are We There Yet? - 6/20 CSA Colorado - June Meeting, "Modern AI Threats and Challenges" - 6/25 ISC2 Pikes Peak - June Meeting - 6/26 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Pat Moorhead and Daniel Newman sat down with Sam Burd to discuss AI PCs at Dell Tech World. These new PCs include significant new AI integrations, and Dell expects these to initiate a "super cycle" of PC upgrades. We discussed the importance of Qualcomm Snapdragon X Elite earlier in the program, but what should we make of the market for AI PCs? This and more announcements from Dell Tech World on The Rundown. Time Stamps: 0:00 - Welcome to The Rundown 1:00 - Dell Writes a HYCU in their PowerProtect DataDomain 3:36 - GitHub Patches Massive Security Hole in Enterprise Servers 6:45 - Palo Alto Networks Acquires IBM QRadar 10:35 - Exabeam and LogRhythm to Merge to Strengthen AI-Driven Security Future 14:00 - PC Makers Debut AI PCs with Microsoft CoPilot+ 19:36 - CoPilot+ Totally Recalls Everything 23:09 - Announcements from Dell Tech World 23:55 - Dell AI Factory Using NVIDIA for AI Adoption 26:55 - Dell collaborates with NVIDIA, Microsoft, and ServiceNow on Dell NativeEdge 32:50 - Dell PowerStore using APEX AI innovations to Improve Storage Performance, Efficiency, and Resiliency 36:08 - Dell's AI PCs using Copilot+ 47:22 - The Weeks Ahead Hosts: Tom Hollingsworth: https://www.twitter.com/NetworkingNerd Stephen Foskett: https://www.twitter.com/SFoskett Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT Tags: #Rundown, #DellTechWorld, #Copilot, #AI, @TheSixFiveMedia, @TheFuturumGroup, @TechFieldDay, @GestaltIT, @SFoskett, @NetworkingNerd, @DellTech, @DanielNewmanUV, @Krista_Lee, @PatrickMoorhead, @HYCU_Inc, @GitHub, @IBM, @PaloAltoNtwks, @LogRhythm, @Exabeam, @Qualcomm, @DellTech, @Lenovo, @HP, @Microsoft, @NVIDIA, @ServiceNow,
Take a Network Break! This week we discuss what IBM and Palo Alto Networks get out of a deal for Palo Alto Networks to buy the SaaS version of the QRadar SIEM from IBM, why LogRhythm is merging with Exabeam, and how Google is positioning its latest AI chip to take on the Nvidia juggernaut.... Read more »
Take a Network Break! This week we discuss what IBM and Palo Alto Networks get out of a deal for Palo Alto Networks to buy the SaaS version of the QRadar SIEM from IBM, why LogRhythm is merging with Exabeam, and how Google is positioning its latest AI chip to take on the Nvidia juggernaut.... Read more »
Take a Network Break! This week we discuss what IBM and Palo Alto Networks get out of a deal for Palo Alto Networks to buy the SaaS version of the QRadar SIEM from IBM, why LogRhythm is merging with Exabeam, and how Google is positioning its latest AI chip to take on the Nvidia juggernaut.... Read more »
Private equity giant Thoma Bravo has announced that its security information and event management (SIEM) company LogRhythm will be merging with Exabeam, a rival cybersecurity company backed by the likes of Cisco and Lightspeed Venture Partners. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Exabeam merge, likely with the hopes of weathering the coming storm. The situation seems clear - there's no such thing as "best of breed" SIEM anymore. It's a commodity to be attached to the existing dominant security platforms. Are the days numbered for the older pure-play SIEM/SOAR vendors out there? Crowdstrike and Palo Alto alone could displace a lot of incumbents, even with a less than stellar product. Visit the show notes for full descriptions on each RSAC executive interview! Show Notes: https://securityweekly.com/esw-362
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Exabeam merge, likely with the hopes of weathering the coming storm. The situation seems clear - there's no such thing as "best of breed" SIEM anymore. It's a commodity to be attached to the existing dominant security platforms. Are the days numbered for the older pure-play SIEM/SOAR vendors out there? Crowdstrike and Palo Alto alone could displace a lot of incumbents, even with a less than stellar product. Visit the show notes for full descriptions on each RSAC executive interview! Show Notes: https://securityweekly.com/esw-362
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Exabeam merge, likely with the hopes of weathering the coming storm. The situation seems clear - there's no such thing as "best of breed" SIEM anymore. It's a commodity to be attached to the existing dominant security platforms. Are the days numbered for the older pure-play SIEM/SOAR vendors out there? Crowdstrike and Palo Alto alone could displace a lot of incumbents, even with a less than stellar product. Show Notes: https://securityweekly.com/esw-362
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Exabeam merge, likely with the hopes of weathering the coming storm. The situation seems clear - there's no such thing as "best of breed" SIEM anymore. It's a commodity to be attached to the existing dominant security platforms. Are the days numbered for the older pure-play SIEM/SOAR vendors out there? Crowdstrike and Palo Alto alone could displace a lot of incumbents, even with a less than stellar product. Show Notes: https://securityweekly.com/esw-362
Are we on the brink of a new era in cybersecurity, one where artificial intelligence (AI) reshapes how we protect our digital frontiers? Join us on this episode of Tech Talks Daily as we delve into this fascinating topic with Andrew Hollister, Chief Information Security Officer and Vice President of Labs R&D at LogRhythm. In our conversation, Andrew shares his insights on the evolving role of generative AI in cybersecurity. Despite widespread apprehension that automation may displace human analysts, Andrew suggests a different narrative—AI as a collaborator enhancing human capabilities, not replacing them. With its rapid development, generative AI is finding its place in cybersecurity, aiding in tasks like summarizing threat reports, detecting patterns in massive datasets, and translating technical log data into understandable language. However, the technology has its challenges. Andrew points out the potential risks of AI, such as producing misleading information—what he terms "hallucinating false facts." This underscores the irreplaceable role of human oversight, where seasoned analysts apply critical judgment to AI outputs. Looking ahead, we explore the future skills necessary for cybersecurity professionals. As AI takes over more routine, data-heavy tasks, there's a growing need for roles focused on strategy, problem-solving, and lifelong learning to adapt alongside evolving technologies. What will the future security operations centers (SOCs) look like? How will AI transform the cybersecurity landscape? After listening to our discussion, what are your thoughts on AI's role in cybersecurity? Share your views with us as we explore these questions and more.
News from Stanley Hotel, Boom Supersonic, Ibotta, Red Canary, Optiv, LogRhythm, Webroot and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel A new plan for the Stanley Hotel in Estes Park: Sell it to Colorado Boom Announces Successful Flight of XB-1 Demonstrator Aircraft Techstars Boulder kicks off ‘grand finale' with 5 local companies Colorado Inno Madness bracket down to last 4 companies Ibotta's expansion into enterprise should set it up for a successful IPO Best practices for securing Azure Active Directory Crafting a Successful Vulnerability Management Process Framework Key Components of a Robust Cloud Security Maturity Strategy Understanding Brute Force Attacks: The Persistent Threat in Cybersecurity Cyber Future Foundation and National Cybersecurity Center Announce the 9th Annual Cyber Future Summit in Colorado Springs, CO Job Openings: Cologix - Security Engineer II US Army Corps of Engineers - IT Specialist (Infosec/Network) City and County of Denver - Senior IT Security Analyst – Denver International Airport FirstBank Holding Company - IAM Systems Admin CableLabs - Principal IoT Security Architect US Bank - Information Security/Technology Risk Manager B of A - Information Security Identity and Access Management (IAM) Architect Prologis - Senior Analyst, IT Governance, Risk, and Compliance (GRC) Replicant - Staff Cloud Security Engineer Janus Henderson - Sr. IT Audit Manager Upcoming Events: This Week and Next: ISSA Denver - April Meeting (DTC and Downtown) - 4/10 ISSA Denver - Veterans SIG - 4/17 Denver OWASP - AppSec 2.0: Reimagine AppSec With Runtime Analysis - 4/17 ISACA Denver - Annual Meeting - 4/18 CSA Colorado - AWS token theft: Stolen identities and what to do about them - 4/18 Let's Talk Software Security - How can OffSec enhance your AppSec game? - 4/23 ISC2 Pikes Peak - April Meeting - 4/24 CO = Security - Security Leader Summit 1 - 4/26 ISACA Denver - Empowering Women in Tech: CISM Bootcamp by SheLeadsTech - 4/26-28 ISACA Denver - ISACA Technical Training: Alteryx Exploration (A Beginner Workshop) - 5/2 ISC2 Denver - Navigating the Cyber Landscape in Operational Technology (OT): Challenges, Threats, and Solutions - 5/8 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
In this episode of Unspoken Security (sponsored by ZeroFox), AJ Nash is joined by our first social media star...Gabrielle Hempel! Also known as LadyG on Twitter (@gabsmashh) - with over 100,000 followers - she also focuses on making the world a safer place as a Customer Solutions Engineer for LogRhythm.(NOTE: Gabrielle was actually recorded as AJ's second guest on Unspoken Security - way back in October! - but we saved her appearance until we built our own audience so we weren't just taking advantage of her following.)Gab and AJ have a fun and interesting conversation about Gabrielle's unusual path from working in an auto repair shop in Ohio - where she was almost stabbed! - to become an expert and influencer in cybersecurity. Gab shares how she grew from a shy child into a confident, powerful voice in cybersecurity, including some incredible stories of overcoming the opinions and assumptions of others. She learned how to assess risk and resolve conflicts in some dangerous real-world scenarios, and combined that with her incredible education (B.A., in Psychology, B.S. in Neuroscience, & MS in Global Security, Conflict, and Cybercrime from NYU).With all the things in her life - social media, public speaking, a cybersecurity career, and a family - Gab offers her lessons learned and advice (including the power of saying "no") to get closer to the work/life balance most people need to avoid burning out in an industry where it is so easy to do. AJ added some interesting insights and leadership tactics he's also used to help teammates maintain a more balanced life.This episode even had an additional special guest when AJ's dog Ryleigh couldn't resist meeting Gab! Ryleigh probably heard how much fun AJ and Gab were having and wanted to get some camera time, too.As always, the show wraps up with our guest revealing something that had, to this point, gone "unspoken." Download this episode to find out Gabrielle's secret because you will ABSOLUTELY want to give her (and probably AJ) a hard time after you hear this!
Chris: Co-founder, CEO, and CTO of RADICL, which is building an AI SOC analyst Was co-founder of LogRhythm, which sold to Thoma Bravo in a rumored billion dollar deal Check out the episode for our discussion on building with friends and family, collecting enough data to develop an effective AI SOC analyst, and what it took for him to take the leap to start his first company.
Richard Mac Namee, Director of the Cybersecurity Center at MSU is our feature interview this week, interviewed by Frank Victory. News from DISH, Ping Identity, Broadcom, Coalfire, zvelo, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Migration to Colorado is on the decline, but here's where people are moving from Remote work on a slight decline in Colorado, nationally The world's fastest temporary internet service gets turned on in Denver Layoffs @ Dish, Ping & Broadcom Dish Network laying off hundreds in Colorado Denver-based Ping Identity goes through layoffs after merger with San Francisco company Broadcom lays off 184 Colorado employees following $69B VMware merger RADICL Adds $9 Million in Funding to Fortify Cyber Defenses of SMBs in Defense Industrial Base JeffCo Schools hacker demands money, threatens to release stolen data Navigating the AI security landscape: The federal push for responsible AI adoption The Role of AI in Social Engineering Colorado Publishes Universal Opt-Out Mechanism Shortlist Detecting Domain Name Abuse – Security Spotlight | LogRhythm Job Openings: Pax8 - Director of GRC Spectrum - VP, Information Security Engineering Vertafore - VP, Cybersecurity Zoll - Director, Information Security & Cyber Risk Connect for Health Colorado - Director of Cybersecurity Cloudflare - Director, Cybersecurity & IT Audit Darktrace - Cyber Security Technologist City and County of Denver - Senior Manager of Airport Security - Denver International Airport Sovrn - Privacy Ops Engineer Denver Water - IT Security Architect Upcoming Events: This Week and Next: ISC2 Pikes Peak - December Meeting: Holiday Lunch - 12/8 CSA Colorado/LIFT Holiday Party - 12/12 Annual ISSA & ISACA Holiday Party - 12/12 ASIS - Holiday Happy Hour & Board Nominations - 12/12 Let's Talk Software Security - Are Industry Security Controls Relevant? - 12/14 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Andrew Hollister of LogRhythm joins Dave to discuss the Shanghai National Police data exposure incident, and how whether or not we will know the full details of one of the largest data breaches in world history. Ben's story discusses a groundbreaking Wisconsin court case relating to files stored in Dropbox, while Dave revisits the legality of AI generated code as a copyrights storm may be brewing. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Ownership of AI-Generated Code Hotly Disputed A copyright storm may be brewing for GitHub Copilot Dropbox search was illegal Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you. Learn more about your ad choices. Visit megaphone.fm/adchoices
Darren Weiner, President of Cloud Security Alliance Colorado is our feature interview this week, interviewed by Frank Victory. News from Maxar, University of Colorado, Ping Identity, LogRhythm, Coalfire, Red Canary and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Colorado's first Michelin Star recipients announced 10 companies selected as finalists for Coolest Thing Made in Colorado contest Denver airport unveils plans for new walkable concourses (Renderings) Colorado aerospace giant being split in two, its CEO replaced and some employees laid off Colorado school ranks among top universities for startup founders MSU Denver cybersecurity program expands with the help of a new grant MFA Bombing Dismantled | Ping Identity Q3 2023 Analytic Co-Pilot Use Cases | LogRhythm A rundown of the OWASP top 10 for large language model applications SEC tells companies to “show their work” on cybersecurity - Red Canary Job Openings: Greenlight - VP, Security Thrivent - Director of Information Security BDO - Director, Privacy & Data Protection Gensler - Security Administrator - Senior Western Union - Information Security Architect Bank of America - Vulnerability Identification Senior Analyst Gogo Business Aviation - Senior Cybersecurity Analyst Honeywell - IT Security Engineering Manager CoBank - Senior Cloud Security Analyst Plante Moran - Cybersecurity Consultant - Entry Level (2024) Upcoming Events: This Week and Next: ISSA Denver - October Chapter Meetings - 10/11 Let's Talk Software Security - Is Threat Modeling Scalable? - 10/17 ISACA Denver - October Chapter Meeting: Fraud Lessons from a Reinvention Architect & Mindset Coach - 10/19 ISACA Denver - Fraud Lessons from a Reinvention Architect & Mindset Coach - 10/19 ISC2 Pikes Peak - October Meeting - 10/25 CSA Colorado - Fall Summit 2023 AI IN CYBERSECURITY: REVOLUTION AND RISKS - 10/25 ISSA Denver - Women and Whiskey - 10/25 ISACA Denver - Dark Web Investigations Workshop - 11/3 Let's Talk Software Security - What's Your Biggest Security Challenge? - 11/8 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
In this podcast episode, Multimedia Editor Jakub Lewkowicz talks about fundamental aspects of cybersecurity. We'll discuss the crucial steps organizations must take to enhance their security posture using it. His guest is Sally Vincent, senior threat research engineer at LogRhythm.
In this week's episode of "The Conference Room," we welcome LogRhythm's VP EMEA, Kev Eley, an industry veteran with nearly thirty years of experience in growing technology businesses across EMEA. Join us as we dive into a conversation about the challenges and intricacies of launching and growing technology businesses in Europe, including the impact of Brexit and the importance of understanding regional differences. KEY TAKEWAYS FROM THIS WEEK'S EPISODE 00:10:38: Kev emphasizes the constant innovation in the tech industry and the unique position cybersecurity professionals hold as the "good guys" in the battle against cyber threats. 00:11:20: He draws an analogy between the cybersecurity community and superheroes, highlighting the inspiring aspect of working to protect organizations and society from cyber threats. 00:12:17: Kev delves into the evolving landscape of cybersecurity, describing it as an ongoing arms race driven by political motivations, financial incentives for cybercriminals, and increasing digital reliance. 00:14:23: The conversation shifts to Kev's experience at TrapX and the challenges he faced while growing a non-European business in Europe. He explores the regional disparities and cultural differences within Europe that organizations must navigate. 00:15:40: Kev discusses the common approach of American organizations launching in Europe, often starting with the UK as a beachhead and expanding to other European regions. He acknowledges the complexity of managing regional disparities. 00:22:46: The impact of Brexit on businesses entering Europe is discussed. Kev highlights the advantages of the UK as a launchpad due to its language, cultural affinity, and mature market for cybersecurity. 00:29:15: Kev emphasizes the importance of hiring local talent when expanding into European regions. Understanding regional differences and the need for a global-fit product are critical for success. 00:34:00: The complexity of managing teams across different European countries is explored. While coaching principles remain consistent, understanding regional nuances in business conduct is essential. 00:38:03: Kev and Simon stress the importance of appreciating the subtleties and regional differences when launching a business in Europe. Hiring the right talent and understanding cultural nuances are keys to success. THIS WEEK'S GUEST - KEV ELEY Kev Eley is a seasoned industry professional with nearly three decades of experience in driving the growth of technology businesses across EMEA (Europe, the Middle East, and Africa). His impressive career includes notable positions at industry giants such as IBM and Microsoft, where he honed his expertise. Kev has also made significant contributions during his tenure at innovative cybersecurity companies like TrapX and Egress Software. Currently, he holds the prestigious role of Vice President for EMEA at LogRhythm, a global cybersecurity powerhouse. YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation consultancy Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people create consistent revenue through consistent lead generation. Get to know more about Simon at: Website: https://simonlader.com/ Salisi: www.salisi.com Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader The Conference Room is available on Spotify Apple Podcasts Amazon Music iHeartRadio And everywhere else you listen to podcasts!
Picking from the lessons learned during the COVID pandemic, the Singapore government is undertaking what it describes as a long-term healthcare reform describing the process as a pivotal phase of its transformation journey.The reform will see the government invest in information technology "focusing on mission-critical national systems for hospital billing, drug ordering and dispensation, and the maintenance of national medical databases."The success of this reform will require collaboration across different health providers and access to patient data is a crucial component. In today's PodChats for FutureCIO, we are joined by Leonardo Hutabarat, head of solutions engineering for APJ at LogRhythm, to talk about the opportunities and challenges governments, private organisations, healthcare providers and the public will face in the digitalisation of healthcare. 1. Healthcare reform, as in the case of Singapore, will entail the sharing of patient data between healthcare providers – both public and private. What challenges must the system overcome in this undertaking?2. What are some factors that will be crucial to the success of such an initiative? Can you cite any learnings from other governments that have implemented something similar?3. What needs to be done to build a robust data ecosystem and build citizen trust? 4. In recent years, healthcare systems have come under cyberattack. It is puzzling that despite spending US$17.35 billion in 2022 taking advantage of the latest in security solutions and services, healthcare organisations remain vulnerable. a. Why is this continuing to occur?b. How can healthcare institutions protect themselves from the risk of cyberattacks and safeguard sensitive patient data?5. For CIOs, CISOs and leadership at healthcare organizations – both private and public – any recommendations for getting buy-in and support from stakeholders?
In this podcast episode, Multimedia Editor Jakub Lewkowicz talks about a fundamental aspect of cybersecurity that often goes unnoticed: code sanitization. We'll discuss the crucial steps organizations must take to enhance their security posture using it. His guest is Sally Vincent, senior threat research engineer at LogRhythm.
News from Cherry Cricket, Ball Corp, Boom Supersonic, Casa Bonita, Optiv, Red Canary, SSO, zvelo, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel The Cherry Cricket Is Now Serving Its Iconic Burgers in Littleton TSA Testing Facial Recognition at Denver International Airport Ball Corp. eyes possible sale of aerospace business Boom Supersonic inches closer to legitimacy as doubts remain Casa Bonita eliminates tipping, going against service industry norm New Changes to the 2023 OWASP Top 10 API Security Risks When MFA isn't an option: The legacy of ROPC - Red Canary Top Benefits of single sign-on AI and Machine Learning in Cybersecurity LogRhythm Celebrates 20 Years of Empowering Security Teams to Ensure a More Secure Environment with Continued Quarterly Innovations | LogRhythm Job Openings: City of Lafayette - Senior Network and Security Administrator FirstBank - Info Security Analyst Proofpoint - Security Solution Analyst II KP - VP, Technology Risk Mgmt Maxar - Product Engineering Information Security Manager Olympus - Principal Product Cybersecurity Engineer Perforce - Head of Product Security FBI - Special Agent (cybersecurity background) Fastly - IAM Security Architect Microsoft - Principal Security Architect Upcoming Events: This Week and Next: ISSA Denver - July Meeting (DTC and Downtown) - 7/12 Let's Talk Software Security - Applying AI to AppSec - 7/18 CSA CO - July Meeting: Getting your hands dirty: Exploring Exploits with ChatGPT - 7/20 ISC2 Pikes Peak - July Meeting - 7/26 Colorado = Security Gives Back - Brent's Place Annual Block Party - 8/5 Colorado = Security 2023 Picnic View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
An accomplished investor, Rand Lewis is the Managing partner and co-founder of Delta-v Capital. Rand has invested in many well-known companies such as Zayo, Cloud Sherpa, LogRhythm, Iterable, Chegg and others. For over 24 years, Rand has been investing and hiring executives for portfolio companies and he's learned and observed a lot about what makes an executive a great leader and successful. In this episode, Rand discusses: He invests not only dollars, but real relationships with people Advice to current and emerging CEOs What makes a leader successful and how he finds it in candidates After earning an MBA from Northwestern, Rand was a consultant at McKinsey before joining Centennial Ventures. After a successful 10 year run with Centennial, he co-founded Delta-v that focuses on technology companies. Enjoy the show? Review us on iTunes- thanks! Thank you Jalan Crossland for lending your award-winning banjo skills to CXO Conversations.
Chelsea Kelleher, Privacy & Security Attorney is our feature interview this week, interviewed by Janelle Hsia. News from Fluid Truck, Guild, Red Canary, Ping Identity, LogRhythm, Optiv and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Why Denver barely made the top 100 'Best Places to Live' Two Coors Field bars become first to use biometrics in age ID Fast-growing Denver company strikes deal with Lyft to help it electrify its services Denver-based education tech firm Guild eliminates 172 jobs How 4 Colorado companies are innovating with generative AI Train hard for an easy battle: Introducing Readiness Exercises Blockchain and Sidechains in the Age of Decentralized Identity Starting your Zero-Trust Journey | LogRhythm Privacy Concerns Are Not Just for Goliath Anymore Job Openings: Ledgent Technology - Director of Cyber Security S&P Global - Associate Director, Security Automation US Bank - Senior Technology Risk Manager, Corporate and Wealth Management Technology Visa - Sr. Cybersecurity Engineer - Applied Cryptography Western Union - Senior Information Security Engineer RTD - Manager, Cybersecurity Operations DISH Network - Information Security Risk & Compliance Manager Stripe - Program Manager, Security Risk Management Paylocity - Director Information Security Operations Plante Moran - Managed IT Consultant – Entry Level (2023) Upcoming Events: This Week and Next: LIFT - Splunk Game-fest: Come play O11Y your favorite games! - 6/14 Let's Talk Software Security - Software Security Training & Education - 6/23 ISC2 Pikes Peak - June Meeting - 6/28 LIFT - Mentorship Hike - 6/28 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
CosmicEnergy is OT and ICS malware from Russia, maybe for red teaming, maybe for attack. Updates on Volt Typhoon, China's battlespace preparation in Guam and elsewhere. In the criminal underworld, Legion malware has been upgraded for the cloud. Johannes Ullrich from SANS examines time gaps in logging. Our guest is Kevin Kirkwood from LogRhythm with a look at extortion attempts and ransomware. And Atlantic hurricane season officially opens next week: time to batten down those digital hatches. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/102 Selected reading. COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant) People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Advisory) Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft) China hits back at 'the empire of hacking' over Five Eyes US cyber attack claims (ABC) Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker (Cado) Legion Malware Upgraded to Target SSH Servers and AWS Credentials (Hacker News) CISA Warns of Hurricane/Typhoon-Related Scams (Cybersecurity and Infrastructure Security Agency CISA)
Larisa Thomas, CISO at Nox Health is our feature interview this week. News from Bandimere, Orbit Fab, Maxar, True Anomaly, Red Canary, Coalfire, Zvelo, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Bandimere Speedway leaving Morrison location after 2023 Colorado becomes 1st state to pass "right to repair" law for farmers Colorado space 'gas station' startup lands millions in venture backing, plans significant expansion Private equity firm closes $6.4 billion deal to acquire Maxar Technologies Colorado to launch seed grants to jumpstart quantum tech industry Colorado Space Force veterans launch startup to prepare US military for space warfare Red Canary Announces Readiness Introducing: Red Canary Mac Monitor Coalfire recognition from Cyber Defense Magazine Zvelo - Phishing Detection in Depth LogRhythm Announces Partnership with Zscaler to Address Cloud Access Security Challenges Faced by the Modern SOC Job Openings: Jeffco Public Schools - Executive Director - Enterprise Architecture, Information Security and Identity BI Incorporated - Senior Security Engineer Ring Central - Security Trust Data Analyst DISH - Security Threat Response Manager Frontier Airlines - Engineer, Application & Cloud Security Banner Health - Cybersecurity IAM Architect Remote HSS - Biomedical Device Network & Security Field Technician Avanade - Global Security Advisory Lead Block - Vulnerability Research Analyst Workday - Principal Cybersecurity Engineer – Analytics and Automation Upcoming Events: This Week and Next: ASIS Denver - NEXT: YOUR DIGITAL PROFILE WITH KERRI SUTHERLAND - 5/2 ISSA Denver - May Chapter Meeting "How cyber insurance drives C-Suite decisions around IT strategy, infrastructure, and planning" - 5/10 OWASP Denver - Back to Basics - How to Mature your Security Program - 5/10 Let's Talk Software Security - Software Security: What are we missing?? - 5/12 ISSA C.Springs - May Chapter Meeting - 5/16 ISACA Denver - May Meeting (Virtual) - 5/18 CSA Colorado - May Meeting, "The Future of Cloud Security: Embracing CNAPP to Protect Cloud-Native Applications" - 5/18 ISSA C.Springs - Mini Seminar - 5/20 ISSA Denver - Cybersecurity Is Not A Game? - 5/25 RMISC - 6/7-9 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
CISA recently announced critical guidance on threats against organizations using certain forms of multi-factor authentication. The agency urged all organizations to implement phishing-resistant MFA controls in order to prevent phishing and increasingly automated and sophisticated attacks on authentication processes. With so many phishing attacks targeting credentials to be used in a later campaign, more organizations are getting the hint that they need to have MFA in place for at least those users with access to critical resources and/or valuable data, if not everyone. However, what happens when the threat actor has the credentials but doesn't have the additional forms of authentication? I invited Sally Vincent, Threat Research Senior Engineer at LogRhythm to join me on Tech Talks Daily. Listen in as we discuss how organizations can identify unusual authentication activity and explore mitigation strategies to stay ahead of phishing attacks.
2023 is already here? This seems impossible. News from Casa Bonita, CommonSpirit, Red Canary, LogRhythm and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Netflix's “Inside Job” exposes naked truths of Blucifer and DIA conspiracy theories Casa Bonita to open in May What's in a domain name? Colorado may spend $2 million to switch to .gov. Colorado startups raised $5.7B in 2022. Here were the largest deals. There's a shortage of cybersecurity workers, and these girls aspire to fill the gap Colorado Releases Revised Privacy Rules CommonSpirit Health ransomware attack exposed data of 623,000 patients Google Workspace account takeover protection Capture the flag - February 21st - National Cybersecurity Center 2023 Cybersecurity Predictions - LogRhythm Job Openings: Colorado Secretary of State - Chief Information Security Officer Frontier Airlines - Sr Manager, IT Governance, Risk & Compliance Denver Health - IS Security Analyst III Ibotta - Senior Information Security Analyst DISH - GRC Information Security Business Partner Western Union - Group Leader, Cyber Security Engineering Degreed - Information Security Officer Spectrum - Director, Identity & Security Sierra Space - Cybersecurity Analyst III Upcoming Events: This Week and Next: CSA Colorado - January Meeting, Where are you today in the email maturity model curve? - 1/17 ISSA C.Springs - January Chapter Meeting - 1/17 ISACA Denver - January Meeting (Virtual) - 1/19 Let's Talk Software Security - AppSec Regulation, Frameworks, and Compliance - 1/20 ISSA C.Springs - January Mini Seminar - 1/21 ISC2 Pikes Peak - January Meeting - 1/25 Colorado Springs - Cybersecurity First Friday - 2/3 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Andrew Hollister of LogRhythm joins Dave to discuss the Shanghai National Police data exposure incident, and how whether or not we will know the full details of one of the largest data breaches in world history. Ben's story discusses a groundbreaking Wisconsin court case relating to files stored in Dropbox, while Dave revisits the legality of AI generated code as a copyrights storm may be brewing. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Ownership of AI-Generated Code Hotly Disputed A copyright storm may be brewing for GitHub Copilot Dropbox search was illegal Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you.
Welcome back to Titans of Customer Engagement, A Customer Experience Podcast proudly presented by Khoros. This week we sit down with Matthew Cowan, Community and Knowledge Manager for LogRhythm. After a successful community relaunch, Matthew's recent work focuses on marrying community function and experience through a series of projects to streamline customer enablement. Here's a sneak peek into the episode Balancing workloads to keep the lights on with the need for improvements in community. Using feedback to understand what customers are searching for on your community. Making progress on long-term projects while making incremental improvements. Key takeaways for organizations that may be considering revamping or relaunching their community. Connect with the brightest leaders and practitioners of Digital Customer Engagement by joining Atlas today! To hear more interviews like this one, subscribe to Titans of Customer Engagement on your favorite podcast platform. Apple Podcasts Spotify Amazon Google Podcasts
Dustin Lehr, Senior Director of Platform Security at FiveTran, and co-founder at Katilyt Security is our feature interview this week. News from Karman+, CyberGRX, Swimlane, Red Canary, LogRhythm, Lares, and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Several big-budget films, TV shows are either currently filming in Colorado or will be soon Dutch asteroid mining company to relocate to Denver in a win for Colorado's space industry Meet the newest cohort of the Denver-based Techstars Workforce Development Accelerator Tech workers 'rejecting' return to office, Denver company's survey finds 17 Colorado companies rank on Deloitte's list of fastest-growing tech businesses Red Canary Provides First-Ever MITRE Engenuity™ ATT&CK® Evaluations for Managed Services Swimlane Ranked Among the Top 25 Fastest-Growing Cybersecurity Companies Deep-Dive Analysis of Multi-Factor Authentication Request Generation Attacks Choosing the Right Application Security Assessment Company Holland & Hart CISO Joe McComb Named 2022 Top Global CISO by Cyber Defense Magazine Job Openings: Uplight - Product Security Engineer Weld County - CISO Vertafore - VP of Information Security CommonSpirit Health - Director IT Cybersecurity Kaiser Permanente - Senior Director, Cyber Risk Defense Western Union - Senior Information Security Analyst Denver Health - IS ANALYST SECURITY III DISH Networks - GRC Information Security Business Partner Flexential - Compliance Specialist FBI - Special Agent: Cybersecurity/Technology Background Upcoming Events: This Week and Next: ISC2 Pikes Peak - Annual Chapter Meeting - 12/9 ISSA & ISACA - Holiday Party - 12/13 Let's Talk Software Security - Practicing Security Within Company Culture - 12/16 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Renegade Thinkers Unite: #2 Podcast for CMOs & B2B Marketers
We have lofty expectations for our MarTech stacks. They're meant to automate marketing processes to clear the way for more big thinking. To keep a clean and accurate tracker of every customer and prospect in the system. To prove to the org that marketing is contributing to growth. But this isn't always the reality, and B2B businesses often find themselves with too much tech, not enough staff, and dirty data that focuses on the wrong metrics. Avoid these woes by listening to this episode with Mike McKinnon, VP of Global Revenue Operations at LogRhythm and author of The Marketing Operations Handbook (which you should get your hands on ASAP). This conversation comes from a CMO Huddles Bonus Huddle (re: a private Q&A), and answers all your questions about budgeting for MarTech, the intersection of Marketing Ops and Rev Ops, proving marketing's value, and more. It just skims the surface of what top B2B CMOs of today are solving together at CMO Huddles... To learn more about our guest pass program, visit https://cmohuddles.com/guest-pass For full show notes and transcripts, visit https://renegade.com/podcasts/ To learn more about CMO Huddles, visit https://cmohuddles.com/
Julie Chickillo, VP and Head of Security at Guild Education is our feature interview this week interviewed by Courtney Chenault. News from Red Robin, Frontier Airlines, IMA Financial Group, Scythe Robotics, DEN, LogRhythm, Red Canary, Cloudrise and a lot more. Make sure to join us at the Colorado = Security picnic on 8/20! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Red Robin names former Torchy's Tacos leader as new CEO Denver leaders say $2B in projects are underway downtown amid record office vacancy Fresh off Spirit's merger rejection, Frontier boasts about carrier's surging growth Denver-based insurance brokerage makes first transaction using blockchain Scythe Robotics wants to build automated mowers at a new Longmont factory Confirmed: Atlanta reclaims ‘world's busiest' title as US airports dominate top 10 rankings Experimenting with Web3: How Denver-area companies are using NFTs LogRhythm Announces Strategic Expansion of Executive Leadership Team Better know a data source: Logon sessions Cloudrise announces $10M in total funding Job Openings: Bank of America - SOC Level 1 Analyst - Cyber Security Defense State of Colorado - Director, Security Risk Compliance (remote from anywhere in CO) Ibotta - Senior Information Security Analyst Deloitte- Cybersecurity Ransomware Readiness Reporting Analyst Lumen - Sr. Lead Information Security Engineer/Vulnerability Assessment LogRhythm - Deputy CISO Charles Schwab - Manager, IT Audits and SOX Compliance Vail Resorts - Director of IT Security Operations & Engineering Modivcare - Security Operations Analyst I RTD - Analyst, Information Systems Risk Upcoming Events: This Week and Next: Denver ISSA - Privacy Special Interest Group Meeting - 8/10 C.Springs ISSA - August Meeting - 8/16 OWASP Denver/Boulder - August meeting, "Insiders Guide to Mobile AppSec with OWASP MASVS" - 8/17 Let's Talk Software Security! - Making the Business Case for Software Security - 8/19 Colorado = Security Picnic - 8/20 ISSA Denver - August Meeting, "Cybersecurity Is Like a Game of Poker" - 8/24 ISC2 Pikes Peak - August Meeting - 8/24 ISSA C.Springs - Security +/Ce training class - 9/10 (1 of 3) View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Our guest on the Sales Code Leadership Podcast this week is, Kev Eley.Kev is a sales leader and business development expert with over 25 years' experience in the software industry (specialising in the cyber security industry in the last 14 years). He currently works at LogRhythm with previous spells at IBM, Microsoft, TrapX and Egress. He cares deeply about people and performance – in particular the steps required in order to create high performing teams – and is very focused on coaching and assisting his team members to over-achieve on their goals. He is passionate about both business growth and customer and partner success - ensuring the teams he leads are organised appropriately to deliver a great customer experience - exceeding requirements and expectations.In his recent career at LogRhythm, Kev was the WW Sales Leader MVP FY21 (leading the top performing region in LogRhythm) and as an individual contributor, was a 4x WW International Sales MVP (the top salesperson in international markets). Outside of work, he is married with 2 children and a rather noisy pet Schnauzer called Deacon.Thank you, Kev for an enjoyable and insightful conversation about sales, teams and leadership in the tech sector.
New Trends in Litigation & Accountability in Cyber Crime Incidents: James Carder, Chief Security Officer & Vice President of Labs at LogRhythm speaks with host Richard Levick of LEVICK about the rise in ransomware and the increased life and death risks of recent cyber-attacks. Discussing recent events at hospitals where deaths occurred after cybercrimes, he shares best practices, prophylaxis and other insights from lessons learned in the recent Log4j attack, Solar Winds, Colonial Pipeline, TJX and other attacks. With more lawsuits likely in the coming months, what can companies do to be prepared and how should they respond?
LogRhythm recently released a report on 'Security and the C-Suite: Making: Security Priorities Business Priorities'. In the report, they evaluated the influence of security leaders in enterprise organizations. LogRhythm Chief Security Officer and VP of R&D James Carder joins the episode to give his expert insights into the topic. Read the report at https://logrhythm.com/making-security-priorities-business-priorities.
In the wake of major breaches over the last few months, organizations across industries are re-evaluating their cybersecurity strategies, with many realigning priorities to ensure their security team and technology solutions can meet the needs of an evolving threat landscape. Mark Logan, CEO of LogRhythm, talks about the importance of the CSO reporting directly to the CEO. Mark explains why this reporting structure demonstrates the value a company places on cybersecurity as an enabler of business performance at a time when cyber breach headlines are top of mind for the public and maintaining trust is crucial. Cybersecurity is now a board-level initiative for all companies, not just those in the software and security spaces. We talk about why enterprises that do not get on board with this shift in organizational structure that brings CSOs to the forefront could lose out on key talent. Perhaps more concerningly, they also stand to see a weakening of consumer trust and business value, especially if the organization ultimately experiences a damaging breach because security was not prioritized. Mark discusses how this reporting structure fosters trust among consumers and future business partners that security and data privacy are taken seriously and given the highest priority within the company. Podcast Sponsor Download Hirect, the free app is trusted by 10,000+ startups who chat directly with ideal candidates and accelerate their hiring process 10x faster than traditional ways.
News from DEN, Grange Hall, Guild Education, Boom, TTEC, Coalfire, Red Canary, Ping Identity, LogRhythm and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Denver International Airport's security lines have been bananas lately. Here's why. $233 million Colorado Convention Center expansion finally underway Grange Hall Opens in Greenwood Village Two Denver companies land on LinkedIn's list of top 50 US startups TTEC Resolves Cyber Attack On Technology Systems | Nasdaq Coalfire Appoints Michael J. Sullivan to Board Intelligence Insights: September 2021 Ping Identity Survey Finds Greater Appetite for Password Alternatives That Make Login Easy and Prioritize Privacy Detecting AWS Unauthenticated Cross-Account Attacks Job Openings: Red Canary - Product Security Engineer Red Canary - IT Support Manager Graebel - Chief Information Security and Privacy Officer Splunk - Director of Risk Management Color - Director of Information Security & GRC Western Union - Manager, Information Security Western Governors University - Manager, IT Security Operations Ping Identity - Senior GRC Specialist Prologis - Cloud Security Engineer Grand Rounds Health - Privacy Manager Upcoming Events: This Week and Next: SecureSet - [Virtual] Intro to Social Engineering - 9/28 ISSA Denver - DISH Job Fair - 9/30 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
The Evolving Discipline of Cybersecurity: James Carder, Chief Security Officer and Vice President of Labs at LogRhythm, a world leader in NextGen SIEM - Security Information and Event Management, speaks with co-hosts Richard Levick and Ian Lipner of LEVICK about the ever evolving cyber hygiene required in a time of sophisticated bad cyber actors; the latest thinking on ransomware; prophylactic best practices, the unique needs of law firms and legal departments and how to prepare for the threats ahead.
Our feature interview this week is with Nigel Thompson, VP Product Marketing at BlackBerry. News from Air France, Lumen, Colorado OEDC, Husch Blackwell, Quantum Metric, Centura Health, CISOs Connect, Zvelo, LogRhythm, Red Canary, and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Why Denver jumped to the top of Air France's list of new destinations Denver real estate: Median home price hits record, but could bidding wars be cooling? Lumen reportedly considering sale of its consumer operations for $5 billion Colorado offers $20M to draw 4 companies looking to add 1,000 jobs in state Colorado Privacy Act Signed Into Law Quantum Metric Appoints Reza Zaheri as Chief Information Security Officer to Advance Industry Standard for Data Security Q&A with Centura Health VP/CISO Sanjeev Sah: “We have to be balanced in our approach.” CISOs Connect™ Announces Winners of Inaugural CISOs Top 100 CISOs (C100) Recognition LogRhythm Recognized as a Leader in Gartner 2021 Magic Quadrant for Security Information and Event Management Report for the Ninth Consecutive Time Malicious Office Documents: What is Old is New Again Atomic Red Team adds tests for cloud and containers Job Openings: Drata - Compliance Manager Ovintiv - IT Security Analyst Pulte Financial Services - Information Security Intern Zoom - Senior Privacy Analyst CyberGRX - Security Risk Analyst Lumen - Product/Software Development /Security - Senior Lead Information Security Engineer NREL - Information Systems Security Manager (ISSM) - Manager II Denver International Airport - Senior IT Security Analyst Graebel Companies - Chief Information Security and Privacy Officer South Metro Fire Rescue - SENIOR SYSTEMS AND INFORMATION SECUTRITY ANALYST Upcoming Events: This Week and Next: ISSA C.Springs - July Meeting - 7/20 Data Connectors - Denver Virtual Cybersecurity Summit - 7/22 ISSA C.Springs - July Mini Seminar - 7/24 ISC2 Pike's Peak - July Hybrid Meeting - 7/28 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Our feature interview this week is Cody Cornell, co-founder & Chief Strategy Officer at Swimlane. News from Hershey, Lily Sweets, Intueat, EverCommerce, FileInvite, Cloudrise, Swimlane, Coalfire, LogRhythm and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Hershey's spends $425 million buying Colorado snack company Colorado has the third-most popular convention center in U.S., according to new ranking Personal chef platform grows as Denverites host dinner parties again Denver-based EverCommerce announces pricing of IPO, begins trading on Nasdaq Why this New Zealand tech startup chose Denver for its US HQ Cloudrise Closes Seed Round of Funding Swimlane : Becomes System of Record for Cybersecurity with Latest Release What is FedRAMP+? Cybersecurity and the water supply: managing a growing risk worldwide Job Openings: Kaiser Permanente - Sr. Program Manager, Cyber Security, Vulnerability Management Cobalt.io - Security Program Manager Xerox - vCISO/Fractional CISO Denver Water - IT Security Analyst Centura Health - Security Engineer Senior Sigma Computing - Head of Information Security Ibotta - Security Architect JumpCloud - Security Engineer Incident Response Dish Network - Wireless Security Architect Upcoming Events: This Week and Next: Cyber Mountain C.Springs - Hybrid First Friday - 7/9 ISSA Denver - July meeting - 7/14 Secure Software Development Lifecycles [SSDLC] - 7/16 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Our feature interview this week is a recap of the Identiverse keynote panel with Mike Benjamin (from Lumen), Alex Weinert (from Microsoft) and our own Alex Wood. News from Africa Adventure Consultants, Canoosh, Valyant AI, EverCommerce, GrayLog, VirtualArmour, Phylum, Ping Identity, Red Canary and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel One of the world's top safari operators is based in Denver. Here's how it survived months without revenue. A Colorado family was so into board games, they made their own Denver AI startup steps up amid a growing restaurant labor shortage Denver unicorn sets IPO pricing, could be valued up to $3.46 billion Tech firm led by ex-LogRhythm boss raises $18M Series B funding round Evergreen Services Group to Enter MSSP Market with Agreement to Acquire VirtualArmour Ping Identity Announces the Acquisition of SecuredTouch to Accelerate Identity Fraud Capabilities Phylum Closes $4.5M in Seed Funding and Comes Out of Stealth Mode Ping Identity puts users in control of their identity with New Personal Identity Solution 500 security leaders reveal what worries them most and why Job Openings: CommonSpirit Health - System Vice President - Cybersecurity Transformation S&P Global - Director, Data Security Architecture Poly - Sr. Manager of Enterprise Security Cleerly - Senior Manager Information Security Denver Center for the Performing Arts - Information Security Manager University of Colorado - Security Operations Manager Cushman & Wakefield - Security Strategy and Operations Senior Manager State of Colorado - Manager of Identity and Access Management (IAM) Colorado School of Mines - Security Analyst Incident Response Berkshire Hathaway Homestate Companies - Senior Cyber Security Engineer Upcoming Events: This Week and Next: Cyber Mountain C.Springs - Hybrid First Friday - 7/9 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Gartner defines the Internet of Things (IoT) as a network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.But today's IoT is very different from the IoT of a few decades back. IoT today is no longer just about backend systems with the goal of operational improvement. There are now IoT projects with business objectives for improving revenue and customer experience. As enterprises embed more IoT into front and backend processes, security needs to be revisited taking into consideration IoT digital fingerprints.The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the “attack surface” is much larger. Joanne Wong, Vice President, International Markets, LogRhythm, shares her views on what it takes to secure the Enterprise Internet of Things.1. Please define security as it relates to the Internet of Things.2. Just how vulnerable are IoT devices to attacks?3. What makes IoT risks different from that of typical IT systems?4. IoT devices have been in enterprises since 2004 (BYOD). Are we saying in the 17 years since IoT was introduced into the enterprise, IT has not done much to improve the security of IoT devices as used behind the enterprise firewall? 5. For the CIO or CISO to commit to securing IoT devices in the enterprise, what needs to happen?6. Are conventional IT security solutions compatible with IoT? 7. What should enterprises look for when it comes to security solutions to address IoT devices in the network?
Travis Good, CEO & Founder at Haekka is our guest this week. News from Opopop, DISH, Newmont, System76, LogRhythm, Coalfire, Red Canary, and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Stealthy Denver popcorn startup emerges with $5M funding and first product Denver worker burnout at all time high Denver startup building 'Postmates for staging' homes raises $3M seed round 2 Colorado companies make big jumps in Fortune 500 rankings Colorado Legislature Passes Colorado Privacy Act Launch Configurable Keyboard | System76 Top 8 Benefits of a Remote Internship at LogRhythm What you need to know: Transitioning CSA STAR for Cloud Controls Matrix 4.0 Testing Linux runtime threat detection tools Job Openings: Vail Resorts - Dir - IT - Security CoBank - Security Manager- Threat Management Charles Schwab - Senior Manager, Security Premier Members Credit Union - Information Security Manager Oracle - Development Security Manager Netskope - Sr. Product Security Engineer SCL Health - IT Risk Analyst Coinbase - Product Manager, Security Engineering Guild Education - Senior Information Security Analyst Boulder Valley School District - Information Technology Security Specialist Upcoming Events: This Week and Next: C=S Poker Night - 6/15 CSA Colorado - June Meeting - 6/15 ASIS - PROPAGANDA AND EXTREMISM TODAY - 6/17 Denver IAM User Group - Embracing Disruption & Identity Proofing - 6/17 ISC2 Pikes Peak - June Hybrid Meeting - 6/23 Denver Splunk Meetup - Increasing value and managing costs with Splunk DSP and Workload pricing - 6/23 (at Wynkoop!) View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Tego Cyber Inc. Discusses its Solution to Mounting Cybersecurity Threats in Audio Interview with SmallCapVoice.com AUSTIN, Texas (June 1, 2021) -- SmallCapVoice.com (“SCV”) announces the availability of a new interview with Shannon Wilkinson, co-founder and CEO of Tego Cyber Inc. (OTCQB: TGCB), to discuss how the Company's cyber threat intelligence application captures exponential growth opportunity within the $170 billion global cyber security market. Tego's innovative intelligence platform reduces risk, prevents cyber-attacks, and protects intellectual property and data. Given the heightened frequency and severity of security breaches in recent years, Tego addresses a market hungry for proactive solutions that stay ahead of criminal attacks. Speaking with SCV's Stuart Smith, Wilkinson described the tactical history of Tego and how its corporate structure enables the Company to advance its platform and deliver scalable solutions. “We're really filling the gap and ending some of the frustrations that are out there for cyber intelligence,” she stated. “We purpose-built the company to go public from the very get-go in order to help fund research and development of our platform through getting friends and family involved in the company.” According to Accenture, the average cost of a malware attack on a company is $2.6 million. Dismal to this statistic is that it typically takes organizations 206 days to realize they're even under attack. In the interview, Wilkinson offered a deeper dive into the magnitude of cybercrime in modern business. “It's staggering, and of course through the pandemic we've seen an exponential rise in cybercrime,” she stated, referring to a report that cybercrime has increased 300% since the start of the COVID pandemic. For Tego, this creates a wealth of opportunity in the emerging cyber threat intelligence market, which is growing at twice the rate of the overall cybersecurity market, Wilkinson noted. The Tego Threat Intelligence Platform (TTIP) collects disparate, vetted threat data from different sources and utilizes a proprietary process to compile, analyze and deliver data to an enterprise in a timely, informative and relevant manner. The first version of the platform will integrate with the widely accepted SPLUNK platform while future versions will incorporate with other established SIEM systems and platforms such as Elastic, IBM QRadar, AT&T Cybersecurity, Exabeam and LogRhythm. What makes the TTIP especially unique is that it provides specific details – the who, what, when and where - to quickly identify and enable appropriate action against the threat. “We take the very important step of adding context and adding additional information that security operations teams need,” said Wilkinson. “That's something that's missing from a lot of threat intelligence platforms, is that context, the information that the special operations teams need when an incident occurs.” The CEO then explained how Tego integrates into an enterprise's existing platform to increase efficiency and the return-on-investment of the cybersecurity tools the enterprise currently uses, and then discussed the Company's scalability and experience of the main drivers of its leadership team. “Technology within a company is great, but without a good management team behind it, the company will struggle,” she said. “That's one of the reasons why at Tego we decided that we needed to have a strong management team with a good network and a lot of experience in the industry.” The interview also highlighted Tego's accelerated path toward revenue and profitability – with licensing tagged at $75,000 per license per year – as well as its ability to build a sustainable and scalable business model. “One of the nice things is that we're not having to go out and create a customer base, but we're building on top of existing customer bases,” Wilkinson told Smith. “That makes our sales and marketing strategy a li...
Mike Kalac, CISO at Paymentus is our guest this week, interviewed by Jason Jaques. News from Pit Liquor, Boom Supersonic, Ball Corp, LogRhythm, Swimlane, Red Canary and a lot more! Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week’s news: Join the Colorado = Security Slack channel This Colorado natural deodorant startup is using liquor to snuff out odor Red Rocks concerts to return to full capacity on June 21 So long Stapleton, hello Central Park: Denver City Council cements neighborhood name change Boom Supersonic aims to fly 'anywhere in the world in four hours for $100' Iconic Pikes Peak Cog Railway set to reopen this week after $100 million in repairs Ball Corporation Brings Ball Aluminum Cup™ to Major Retailers in all 50 States Cybersecurity analysts a pressing need for Front Range’s growing high-tech industry LogRhythm and Zscaler Partner to Streamline Website Access Control Swimlane | Why You Need a True SOAR Solution for Your Business Needs,… Tales from decrypt: Differentiating decryptors from ransomware Job Openings: Gates - VP of IT Security (CISO) Western Union - Cyber Security Senior Engineer, Application Defense Zoom - Security Investigator Guild Education - Senior Information Security Analyst Aegon - Senior Global Security Operations Center Analyst - Tier II-1 NREL - Chief Cybersecurity Engineer Bestow - Senior Information Security Analyst Visa - Senior Cybersecurity Engineer TTEC - Information Security Engineer Presidio - Engineer, Cyber, Cloud Security Upcoming Events: This Week and Next: ISC2 Pikes Peak - May Meeting - 5/26 ISSA C.Spring - CISSP Training (1 of 6) - 6/5 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
James Carder, CSO at cybersecurity provider LogRhythm, joins the podcast to talk about recent ransomware attacks against critical infrastructure.