Podcasts about packmatt73

  • 2PODCASTS
  • 29EPISODES
  • 44mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 14, 2019LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about packmatt73

Latest podcast episodes about packmatt73

InSecurity
LaColombe CEO Todd Carmichael: Yes… Coffee Really Is That Important

InSecurity

Play Episode Listen Later Aug 14, 2019 91:44


LaColombe CEO Todd Carmichael: Yes… Coffee Really Is That Important       "You know… this is, excuse me, a damn fine cup of coffee. I’ve had I can’t tell you how many cups of coffee in my life, and this… this is one of the best"    -- Special Agent Dale Cooper, Twin Peaks     When is the last time you went to work and saw no one drinking a cup of coffee?   Imagine a cybersecurity world where this is no lattes… no PSLs… no nitro cold brews… I know… I know… it’s totally science fiction and the stuff of nightmares.   LaColombe co-founder and CEO Todd Carmichael is here to allay those fears. When he isn’t revolutionizing the coffee world, he is putting in good works around the country and around the world. Whether it is assisting in rebuilding Haitian coffee farms or working in his area to help his local school district, Todd has a lot on his plate.   Did we mention that he holds the world record for the fastest solo trek across Antarctica to reach the South Pole? Yeah. He did that.   Now consider our real world…   What if I told you that US coffee drinkers consume about 3 cups a day on average…   What if I told you that the US coffee shop market did $45.4 BILLION in business 2018 with over 35,000 stores…   Did I mention that Pabst Blue Ribbon recently introduced Hard Coffee?   Yeah… Coffee really is that important   This week on InSecurity Matt Stephenson speaks with Todd Carmichael about a life long, globe spanning journey that includes trekking across Antarctica, a hand-restored sailboat, all 7 continents, a hand made, blown glass bong that revolutionized the coffee industry, helping to rebuild Haitian coffee farms and how he hacked the coffee industry because “America deserves a better cup of coffee.”   About Todd Carmichael Todd Carmichael’s passion to push the U.S. coffee scene forward, alongside his partner and co-founder JP Liberit, pushed La Colombe to the forefront of the ethical trade movement where they regularly dabble in new terrain, invent ground-breaking new brewing devices and beverages, such as the first ever Draft Latte. He is also the host of two Travel Channel series, Dangerous Grounds and Uncommon Grounds. A passionate crusader for social and ecological causes, Todd has a decades-long history of undertaking self-supported treks into challenging environments. He’s visited nearly half of the world’s countries, crossed large parts of the Sahara Desert on foot, as well as the Gobi Desert, Namib Desert, and others. He is also the first American to solo trek across Antarctica from the coast to the South Pole, establishing a world record speed of 39 days, 7 hours, and 49 minutes. Oh… and… in 2018, he was the 46th Coolest Dad in the world. Just saying… Married to singer songwriter Lauren Hart, the couple have expanded their family by adopting three beautiful girls and a baby boy from Ethiopia. Todd is also an author and contributor to the Huffington Post and Esquire Magazines.   About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV   Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come   Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

InSecurity
Parham Eftekhari: Is Government Cybersecurity Broken?

InSecurity

Play Episode Listen Later Aug 12, 2019 62:44


Parham Eftekhari: Is Government Cybersecurity Broken?     … the Internet is not something that you just dump something on. It's not a big truck. It's a series of tubes.  -- former Senator Ted Stevens, 2006   This photo… is not a photo of the internet… in case you were wondering.   Do we really want to trust that our elected officials have the slightest idea of what to do with regards to cybersecurity? Whether it is election meddling, attempts to hack voting facilities or data breaches of personnel records… this is territory that needs detailed research and expert analysis.   The current administration proposed an overall federal cybersecurity budget of $17.4 billion, which is an increase from the estimated $16.6 billion in fiscal 2019. Under this proposal, Civilian agencies overall would receive $7.79 billion which is roughly 1.5 percent below current levels.   If that number seems odd, that’s probably okay considering how much attention cybersecurity is attracting. However, it could have been worse, given the current administration’s general desire to trim civilian-agency spending. The White House is proposing to reduce overall non-defense spending by 5 percent.   With just a little bit of focus, we can discern that an agency was more likely to be proposed for an increase if it works on national security in some way. Cybersecurity efforts at the Departments of Energy, Justice and State all saw increases of over 7% or more.   Cyber programs at the Office of Personnel Management, which is under close scrutiny for how it protects the data of federal employees, saw a 4% increase to $47 million. You may recall the famous OPM data breach a few years back that put over 21 Million records into the wild   Oh… and… not for nothing… but it was Cylance that fixed that one…   In this episode of the InSecurity Podcast, Matt Stephenson welcomes ICIT Executive Director Parham Eftekhari for a chat about what is happening in Washington when it comes to American policies on Cybersecurity. We take a look at the key pillars of Technology, Budget, Lobbying/Partisan politics and Legislation. Wanna drain the swamp? Take a listen first.     About Parham Eftekhari       Parham Eftekhari (@icitorg) is the Executive Director of the Institute for Critical Infrastructure Technology (ICIT), the nation’s leading cybersecurity Think Tank whose mission is to improve the resiliency of the country’s 16 critical infrastructure sectors and empower generations of cybersecurity leaders. Leveraging 15 years of technology industry experience, Parham advises the world’s top public and private sector cybersecurity leaders, manages strategic alliances, executes business strategies, and builds meaningful thought leadership and educational programs.   Parham has organized, led or contributed to over 100 cybersecurity briefings and events at institutions including Congress, TEDx, C-SPAN and the World Bank, and regularly speaks to the media on cybersecurity issues.     About Matt Stephenson     Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV   Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come   Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!   Make sure you Subscribe, Rate and Review!

InSecurity
Chuck Brooks: Examining the Future

InSecurity

Play Episode Listen Later Jul 15, 2019 60:06


Chuck Brooks: Examining the Future I'm the operator With my pocket calculator I am adding And subtracting I'm controlling And composing By pressing down a special key It plays… Kraftwerk: Pocket Calculator, 1981 Computer World How about this for a picture of the present with a look to the future… What if I told you that chatbots will power 85 percent of customer service by 2020… McKinsey Global Institute did a study that found 20% of C-level executives claim to be using Machine Learning and/or Artificial Intelligence as a core part of their business. Our friends at IDC proclaimed that global spending on cognitive and AI systems is expected to reach $57.6 billion in 2021. And finally… as if we aren’t already tired of hearing about the IT skills gap… Forbes recently announced that the number of jobs requiring AI skills has grown 450% since 2013… Are we ready for the future? Hell… are we even ready for the present!?!?! Chuck Brooks has published over 180 articles about Cybersecurity, Artificial Intelligence, Homeland Security and the Internet of Things… among other things… He has written for some of the most important publications in the world including Forbes, The Hill and the MIT Sloan Blog. It is fair to say that Chuck has his eye on the future and has an idea or two about what needs to be done to secure it. In this week’s episode of InSecurity, Matt Stephenson proudly welcomes in Chuck Brooks for a look into his crystal ball to see what the future may hold for the world of technology and, by definition, cybersecurity. We look at AI, automation, IoT, Quantum Computing and even Ray Kurzweil’s thoughts on what is to come. Want to get weird? This week’s episode is for you. About Chuck Brooks Chuck Brooks (@ChuckDBrooks) is the Principal Market Growth Strategist of General Dynamics Mission Systems for Cybersecurity and Emerging Technologies. He is also Adjunct Faculty in the graduate Applied Intelligence Program at Georgetown University and teaches courses in risk management, homeland security and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn out of their 600 million members. He was named by Thompson Reuters as a “Top 50 Global Influencer in Risk, Compliance” and by IFSEC as the “#2 Global Cybersecurity Influencer” in 2018. He is also a featured contributor to Forbes, a Cybersecurity Expert for The Network at the Washington Post and Visiting Editor at Homeland Security Today. Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University and a Certificate in International Law from The Hague Academy of International Law. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Automox CEO Jay Prassl: Patch Your $#!%

InSecurity

Play Episode Listen Later May 31, 2019 52:05


Jay Prassl: Patch Your $#!% Are ALL of Your Apps and OSes up to date? Are you sure? How can you tell? An American Dental Association study in 2008 found that if you don’t brush your teeth you COULD DIE. The ADA recommends brushing your teeth twice a day for 4 minutes each time. What the hell does that have to do with anything? Stick around… According to Ponemon, nearly half of all companies they surveyed had suffered a breach. 57% of those companies were breached due to an unpatched vulnerability. A third of those companies KNEW they were vulnerable before the breach. The average company spends 321 labor hours a week managing their vulnerability response process. How’s that compare to spending 4 minutes, twice a day brushing your teeth? Starting to feel the connection there? In 2017, WannaCry affected over 200,000 machines in 150 countries over a weekend. The attack weapon was developed using NSA tools built to exploit Windows vulnerabilities. What I told you that Microsoft had released a patch for this vulnerability over a month before WannaCry hit? Speaking of Microsoft… our good friends at TripWire offer the following tell us that, in 2015, Microsoft alone issued 2804 patches. That’s roughly 56 patches every Tuesday… and that’s JUST Windows OS & applications Noodle on those numbers a bit… In this week’s episode of InSecurity, Matt Stephenson spoke with Automox CEO Jay Prassl about the role that patching plays in every business’s cybersecurity hygiene. He founded Automox based on one simple maxim: Patch Your $#!% When most of us think of key components in cybersecurity, we tend to think of things like ransomware attacks, security solutions that bog down your network or terrible things in TV and movies that sound technical but are actually ridiculous. What if you had a way to keep your network clean and up to date by doing something as simple and boring as keeping your Operating Systems and applications up to date… Take a walk with Jay Prassl and see what you think. About Jay Prassl Jay Prassl (@jprassl) is the Founder and CEO of Automox. Jay founded Automox founded to pursue a vision: the complete automation of endpoint configuration, patching, management and inventory. Prior to Automox, Jay led the marketing efforts at SolidFire. Before that, he was employee number five at LeftHand Networks, where he spent 10 years breaking new ground in the storage market with the company's distributed SAN solution. He led multiple parts of the LeftHand business through its acquisition by HP. Somehow… when not saving the world through his pursuit of cyber hygiene… Jay finds time to bike, swim and surf. Some of these hobbies are required by state law in order to live in Boulder, Colorado.  About Automox Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint and software, regardless of location, meets regulatory and operational security requirements. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Richard Stiennon: The IT Security Industry: A Complete History

InSecurity

Play Episode Listen Later Apr 29, 2019 57:46


Richard Stiennon: The IT Security Industry: A Complete History We here at InSecurity have a question… Why Hasn’t Anyone Catalogued the Entirety of the IT Security Industry? Why hasn’t the Cybersecurity industry gotten better at protecting all the things? There are SO many companies offering variations on existing solutions or brand new solutions… but the threats remain and the bad actors continue to be successful. Outside of The Internet… where can we go to get information on and analysis of the companies who are creating solutions that work? Can we learn where they came from? Have they been successful previously? If only we knew someone who could compile a compendium of all that is going on in the IT Security world… In this week’s episode of InSecurity, Matt Stephenson somehow managed to wrangle 60 minutes with industry legend Richard Stiennon. The take a walk through Richard’s work as author of multiple books on the threat of cyberwar, the role analysts play in the industry and his eye toward the future. His latest project is creating a Farmer’s Almanac of the entirety of Cybersecurity. It is such a fabulous idea, we’re kind of flummoxed as to how no one has done it yet. It is also such a breathtaking undertaking… we kind of understand why no one has done it yet. Come grab a seat with one of the greatest historians in all of the IT world and find out what is coming next! About Richard Stiennon Richard Stiennon (@stiennon) is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Secure Cloud Transformation: The CIO'S Journey, Surviving Cyberwar and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes and The Analyst Syndicate. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!

InSecurity
Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future

InSecurity

Play Episode Listen Later Apr 15, 2019 57:57


Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future   I have absolute control of the record. The thing was, you’re not supposed to touch the middle of the vinyl. DJs are going to hate you. People are going to hate you. You’re going to ruin these records. I decided… that this… was the only way to do this.  -- Grandmaster Flash   Let’s push the talk about hacking shall we? Hacking is about finding the vulnerable spots in any systems and making your own choices about how to improve that system... rarely with the permission of the system’s owners. Viewed through that prism, Hip-Hop has always been about hacking. Hacking was running 1000 feet of extension cord to a public outlet in order to have a Battle in the park. Hacking was a DJ talking over a record at a club. Hacking was Kool Herc throwing a party at 1520 Sedgwick Ave in the Bronx and not playing disco or pop music. Hacking was Grandmaster Flash touching the middle of the vinyl. Hacking is rhyming with Orange. Dr Roy Christopher has spent a lifetime listening to, researching, teaching and loving Hip-Hop. In this week’s episode of InSecurity, Matt Stephenson digs into the crates with Roy about how Hip-Hop hacked the world to become one of the most significant drivers of modern culture. This will likely be the first podcast you listen to this week featuring steganography, Li’l Pump and John Baptist Porta’s 1558 book series Magia naturalis Do we even need to go on…?     Dead Precedents: How Hip-Hop Defines the Future, uses the concerns and conceits of cyberpunk to thoughtfully remap hip-hop's spread from around the way to around the world. Its central argument is that the cultural practices of hip-hop culture are the blueprint to the 21st century, and that an understanding of its appropriation of language and technology is an understanding of the now. This book is about is the many ways that the foundations of hip-hop appropriation--allusions and creative language use, as well as technology and sampling--inform the new millennium.  -- www.roychristopher.com About Roy Christopher Roy Christopher (@RoyChristopher) marshals the middle between Mathers and McLuhan… He’s a self-described aging BMX and skateboarding zine kid. That’s where he learned to turn events and interviews into pages with staples. He has written about music, media, and culture for everything from magazines and blogs to journals and books. His current book, Dead Precedents: How Hip-Hop Defines the Future, is an Amazon Best Sller. Roy holds a Ph.D. in Communication Studies from the University of Texas at Austin. He is currently a Visiting Assistant Professor at the University of Illinois-Chicago and a member of the Adjunct Faculty at Loyola University Chicago Disinformation has referred to Roy as “One of the Internet’s leading interviewers of subculture and new-science icons.” Oh… as a child, he solved the Rubik’s Cube competitively. How bout that? About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Jeremiah Cornelius: What Happens when you Assume Virtual Security?

InSecurity

Play Episode Listen Later Apr 8, 2019 50:52


Jeremiah Cornelius: Virtualization… the Trend Has Become the Standard Do you belive that my being stronger or faster has anything to do with my muscles in this place? You think that's _air_ you're breathing now? Today’s question: What Happens when you Assume Virtual Security? Virtual Machines were originally created to solve the problems of managing PC systems with mostly Windows operating systems, as a replacement for more resilient and fault tolerant technology that Intel PCs were replacing in enterprise computing. Things have evolved significantly since then. With great technology comes great security risk… what can we do to mitigate that risk and protect that virtual reality? In this week’s episode of InSecurity, Matt Stephenson digs deep into the weeds of the virtual world with industry legend Jeremiah Cornelius. They talk about what’s easy and what’s hard about securing data in virtual environments. Stick around… you may learn something before their through. About Jeremiah Cornelius Jeremiah Cornelius has been an information security professional since 1995, and was previously Executive Security Advisor and Technology Specialist for Microsoft, facilitating technical relationships with CSO's for Silicon Valley's largest Internet commerce and online media enterprises. Jeremiah's prior experience covers support of development and Internet systems security, defensive technical controls, vulnerability assessment and identifying platform and infrastructure security risks. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Kip Boyle: Beware the Cyber-Cooties… Risk Travels

DirtySecurity

Play Episode Listen Later Apr 3, 2019 31:26


DirtySecurity: Kip Boyle: Beware the Cyber-Cooties… Risk Travels We all think we are working hard to protect our data inside our corporate networks. But are we putting the same time and effort into protecting ourselves outside those walls? Risk doesn’t stop at the exit. Once those cyber-cooties get on you, they will travel with you everywhere you go. In this week’s episode of DirtySecurity, Edward Preston sits down with Kip Boyle, Founder and CEO at Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They chat about cyber-hygeine, the ways that risk travels beyond the walls of your corporate network and how public wi-fi is similar to a less than clean municipal swimming pool. About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. s Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

InSecurity

Play Episode Listen Later Mar 4, 2019 43:07


Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense Is a Terminator T-800 an endpoint? Is Voltron an endpoint? Could we have prevented a lot of damage to the Earth if Tony Stark had just installed a BlackBerry Cylance endpoint protection solution on the Iron Legion? In this week’s episode of InSecurity, Matt Stephenson chats with BlackBerry CTO Charles Eagan and BlackBerry Cylance CPO Eric Cornelius... two people charged with leading the charge to combine BlackBerry and Cylance into a security solution that will protect every Thing under the sun. Take a walk with them as Matt finds out what the future holds now that BlackBerry and Cylance have come together. If you are in San Francisco for RSA, make sure to come say hello to Charles, Eric, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm.  Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities. Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by.  About Charles Eagan Charles Eagan is the Chief Technology Officer for BlackBerry. In this role, Charles oversees the standardization and integration of all company products and is responsible for the advancement of new technologies and partnerships, with an emphasis on defining BlackBerry’s Enterprise of Things platform as well as driving innovation within emerging markets. Charles was previously the Global Head of Electronics at Dyson Ltd (U.K.), focused on IoT device deployment. Prior to that he served as BlackBerry’s Global Head of Device Software, and spearheaded development of the BlackBerry 10 operating system and the transition to secure Android. Charles was formerly Vice President of Engineering for QNX Software, where he concentrated on the automotive and embedded markets. He also worked at Cisco and directed development of the seminal CRS-1 carrier routing system. Charles is a noted speaker, thought leader and IoT expert who has been at the forefront of new frontiers in digital connectivity for over three decades. He graduated with honors from the University of Waterloo (Canada) with a bachelor’s degree in applied mathematics and electrical engineering minor. About Eric Cornelius   Eric Cornelius is the Chief Product Officer at Blackberry Cylance. In this role, Eric drives product and innovation. Previously Eric served as VP of Innovation, Director of Critical Infrastructure/ICS and Technical Director of Incident Response/Critical Infrastructure at Cylance. Eric brings this wealth of knowledge and long history as a security practitioner, consultant, trusted advisor and product builder to his work in elevating our product development initiatives, and to leading our product management and corporate development teams. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2  GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review! 

InSecurity
Rick Holland: Analysts Make the Best CISOs

InSecurity

Play Episode Listen Later Feb 25, 2019 45:24


Rick Holland: Analysts Make the Best CISOs In this week’s episode of InSecurity, Matt Stephenson has a chat with Rick Holland, CISO at Digital Shadows. Rick took a unique path to the CISO role, following a distinguished career as an analyst at Forrester. They touch on a myriad of subjects including Rick’s Security and Risk Playbook for CISOs Rick Holland is hard to miss online. You can hear him regularly on the Award Winning podcast ShadowTalk. He also blogs regularly and will get up to some mishceif on Twitter.  If you are heading to RSA San Francisco, make sure to come and say hello to Rick, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm. Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities. Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by.  About Rick Holland Rick Holland (@rickhholland) is the CISO and Vice President of Strategy at Digital Shadows. Rick has more than 15 years’ experience working in information security. Before joining Digital Shadows, he was a vice president and principal analyst at Forrester Research, providing strategic guidance on security architecture, operations, and data privacy. Rick also served as an intelligence analyst in the US Army. He is currently the co-chair of the SANS Cyber Threat Intelligence Summitand holds a B.S. in business administration from the University of Texas, Dallas. Rick regularly speaks at leading security conferences across the globe and has been interviewed by industry and business media including BBC News, CNN, Dark Reading, Motherboard, NPR, The Register and Wall Street Journal. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Greg Silberman: Keep Ya Nose Out My Business

InSecurity

Play Episode Listen Later Feb 19, 2019 54:06


Greg Silberman: Keep Ya Nose Out My Business   Are the neighbors watching? Is the mail man watching me And I don't feel safe anymore Oh what a mess! I wonder who's watching me now Who? The I.R.S.?!?!       -- Rockwell, Somebody’s Watching Me, 1984 Privacy is fundamentally about the ethical and responsible handling of personal data - from initial collection to eventual deletion. It is about understanding the context under which data is shared, providing people choices over how their data is used, and it's about respecting the individual. Many in information security often confuse the goals of privacy and security, or believe that privacy is about secrecy. Put simply, privacy is why security is done and security is how privacy is achieved. It is easy to have security without privacy, but impossible to have privacy without security. In this week’s episode of InSecurity, Matt Stephenson takes a walk with Greg Silberman. Greg is the Chief Privacy Officer at Cylance and knows a thing or two about data privacy at the corporate, user and individual levels. Since the implementation of GDPR, coutries around the world are considering or implementing their own data privacy laws, with varying degrees of success. In the United States, we are about to see California lead with way with 2020’s California Consumer Protection Act. How will this impact business? What will it do to your favorite social media platforms? Will it affect you personally?  Come hear what Greg has to say. We won’t tell anyone About Greg Silberman Greg Silberman (@gpsilberman) is the Chief Privacy Officer and Vice President of Legal Affairs at Cylance. As Chief Privacy Officer, Greg oversees the implementation and enforcement of practices that manage data in accordance with the Cylance’s Privacy Principles with respect to employee and customer privacy. Greg has over 20 years’ experience working with companies to develop solutions to address complex business and legal issues at the intersection of intellectual property, privacy, and information security. Prior to joining Cylance in 2016, he was a partner in the Cybersecurity, Privacy, and Data Protection practice group in the Silicon Valley office of Jones Day. Earlier in his career, Greg served as Intellectual Property Counsel at Lawrence Berkeley National Laboratory.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as   ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

DirtySecurity
Gabe Deale: Building a Sales Engineering Team to Save the World

DirtySecurity

Play Episode Listen Later Feb 13, 2019 25:08


Gabe Deale: Building a Sales Engineering Team to Save the World On this week’s episode of DirtySecurity, Edward Preston chats with Cylance Worldwide VP of Sales Engineering Gabe Deale. Edward and Gabe talk about a wide variety of subjects, ranging from the SE role in securing healthcare data to building an engineering team to phlebotomy… seriously… phlebotomy. What does that have to do with cybersecurity? Tune in and find out! About Gabe Deal Gabe Deal(@Gdealio) has spent over 18 years in the channel and developing startups. Most notably 10 of those years were spent serving as a consultant, an SE and ultimately in a leadership capacity to build out both the pre-sales engineering and national technology solutions consulting practices for Accuvant (now Optiv Security). The channel provided a unique vantage point from which to watch the industry evolve. In 2013, it was clear that big-data analytics and machine-learning were going to change the way we think about solving some of our most challenging security problems. He joined the Cylance team in 2014, where he’s been rapidly expanding the worldwide sales engineering team ever since. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2  GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
John Strand: How Does Defence in Depth Look Today?

InSecurity

Play Episode Listen Later Feb 11, 2019 56:13


John Strand: How Does Defence in Depth Look Today? “Our main goal is not to prove that we can hack into a company but to help the customer deveop a series of on point solutions and technologies that will improve the overall security of the company. Testing should never be adversarial, but collaborative”  -- John Strand In this week’s episode of InSecurity, Matt Stephenson sits down with John Strand. John is the owner of Black Hills Information Security. If you aren’t familiar, you may want to check out their Sacred Cash Cow Tipping webcast to learn why security love and fear BHIS. Take a walk with us on this one… Matt and John dig into hosted firewalls, Powerman 5000, types of Artificial Intelligence, Joe Vs the Volcano and a few other relevant topics. You are definitely going to want to catch this episode… About John Strand John Strand(@strandjs) is a senior instructor with the SANS Institute. He teaches SEC504: Hacker Techniques, Exploits, and Incident Handling; SEC560: Network Penetration Testing and Ethical Hacking; SEC580: Metasploit Kung Fu for Enterprise Pen Testing; and SEC464: Hacker Detection for System Administrators. John is the course author for SEC464: Hacker Detection for System Administrators and the co-author for SEC580: Metasploit Kung Fu for Enterprise Pen Testing. John is also the owner of Black Hills Information Security, a company specializing in penetration testing and security architecture services. He feels strongly that education is how the world of information security will change for the better and spends a considerable amount of time teaching and presenting around the world. He has presented for the FBI, NASA, the NSA, DefCon and is a frequent guest on Enterprise Security Weekly. In his spare time he writes loud rock music and makes various futile attempts at fly-fishing. There’s a reason the name Black Hills Information Security puts security vendors on notice… check out their webcasts and podcasts to find out why. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Rob Bathurst: Is It Even Possible to Secure Connected Medical Devices?

DirtySecurity

Play Episode Listen Later Feb 6, 2019 17:52


Rob Bathurst: Is It Even Possible to Secure Connected Medical Devices? Global spending on Medical IoT has exploded. In 2015, research showed it at $5 Billion. Current projections for 2020 state that Medical IT spending will top $20 Billion. McKinsey predicts the IoT market will be worth $581 Billion for Industrial Control Technology by 2020 Connected medical devices and other IoT embedded systems are big targets for criminal organizations looking to capitalize on any weakness in their security. But it’s not just criminals. Connected devices are attractive targets for a variety of bad actors including nation states who are looking for any weak spot to gain entrance into networks and cause chaos On this week’s episode of DirtySecurity, Edward Preston sits down with Cylance the Worldwide Managing Director of Healthcare Rob Bathurst. Rob addresses the unique challenges that Healthcare providers face in protecting their medical devices. With the rise of connected devices and IoT in healthcare, there are more vulnerable points than ever that must be secured and protected. About Rob Bathurst Rob Bathurst is the Worldwide Managing Director of Healthcare at Cylance. Rob also serves as the General Manager of CypherFrame. With over 16 years in information technology and cybersecurity leadership, Rob is a recognized expert in embedded systems and strategic information security spaces and is often requested as an executive advisor and consultant. Prior to Cylance, Rob was the senior technical advisor for emerging threats to healthcare at the Mayo Clinic where he started and built the technical vulnerability assessment team and in-house medical device testing program. In his executive capacity, Rob has led and overseen engineering and security services for multiple Fortune 100 clients in everything from automotive to healthcare.  About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit:  ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Stephanie Domas: Maybe Your Pacemaker Can’t Kill You

InSecurity

Play Episode Listen Later Feb 4, 2019 47:42


Stephanie Domas: Maybe Your Pacemaker Can’t Kill You  Being a CISO for a large healthcare organization has a degree of difficulty that will give you a headache. For a second… forget about the fact that hospitals are here to heal, cure and research. Take a cold, clinical look just at the medical technology involved in a hospital Let’s look at one Healthcare org as an example: The Mayo Clinic has 25,000 networkd medical devices More than 6,000 unique makes and models Industry Best Practices states that each device should have A unique 20 character password For every employee On every device A system that locks users out after 10 minutes of inactivity A new passwords every 30 days Mayo Clinic has 63,000 doctors, and allied health staff Do the math... That’s around 19,000,000,000 passwords to be entered. And that’s assuming no one is automatically logged out after 10 minutes of inactivity. In the healthcare industry, inefficiency can cost lives. But so can a lack of security. In this week’s episode of InSecurity, Matt Stephenson talks with Stephanie Domas. Stephanie is the Vice President of Research & Development at MedSec. Her job is to oversee the design and manufacture of connected medical device solutions that save lives, but are also secure. File this one under “be careful what you wish for.” About Stephanie Domas Stephanie Domas is a driven leader and respected industry authority in healthcare, and device cybersecurity. Her passion for cybersecurity, secure product design, and healthcare has earned her industry recognition and presentations at dozens of cybersecurity and healthcare conferences.  In her current role as Vice President of Research & Development at MedSec she leads business strategy, engineering and research teams to deliver service and product offerings that help the Healthcare community meet the unique challenges of cybersecurity in medical devices. Her current focus is leading product cyber security teams, software development teams, and business strategy for a wide range of services and product offerings, along with implementing security governance programs into quality systems and design process Stephanie has presented security talks at some of the most important events in the world, including Black Hat, DEFCON, DerbyCon and a myriad of notable Healthcare conferences. Make sure to check out Stephanies Ted Talk: Protecting Medical Devices from Cyberharm  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV  Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.  Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Steve Mancini: Tip Toe through a Corporate Security Minefield with a CISO

DirtySecurity

Play Episode Listen Later Jan 30, 2019 27:39


Steve Mancini: Tip Toe through a Corporate Security Minefield with a CISO When was the last time you changed any of your passwords? Have you ever accidentally sent or received sensitive corporate information? Ever walk away from your computer without locking the screen? Seems like simple stuff… However, if you are the Deputy CISO of a cybersecurity company, it is your job to make sure that your co-workers are all maintaining the highest levels of operational security. On this week’s episode of DirtySecurity, Edward Preston takes a stroll with with Cylance Deputy Chief Information and Security Officer Steve Mancini. Steve walks Edward through many of the minefields a CISO must face in order to protect a company. Threats always come from the outside, but sometimes the biggest dangers are not malicious, as they come from within. Is training the answer? Is changing the corporate culture the right way to go? Tune in and find out!   About Steve Mancini Steve Mancini currently serves as the Deputy Chief Information Security Officer at Cylance, where he and his team focus on risk management, security strategy, operational security, and incident response for the company. Steve worked for seventeen years at Intel, where he established programs around security community outreach, threat intelligence, APT response, and emerging threat analysis. Outside of work he co-chairs efforts to formalize a threat intelligence sharing policy framework (IEP), contributes to several working groups through the CEB CISO Coalition, and serves on the program committee for some of his favorite security conferences. This may or may not be Steve’s actual photo. What do you want from us? He’s a Deputy CISO… security is his business! About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Bill Strub: Durability among MSPs in Cybersecurity

DirtySecurity

Play Episode Listen Later Jan 24, 2019 19:08


Bill Strub: Durability among MSPs in Cybersecurity Your Inbox, voice-mailbox and social media feeds (aka unfiltered research pages) …  are filling up everyday with spam and junk from companies trying to tell you that the aliens from Saturn’s 3rd moon are about to attack and your organization clearly do not have the best security posture. To compound the problem… many of the claims in the junk are true… or at least contain a nugget of truth  3rd party Consultants, Resellers, Managed Security Service Providers … what does it take to be durable among so many other vendors in the cybersecurity space? Do you have to get lucky?  Do you have to find one magical product or servic? What is the secret? On this week’s episode of DirtySecurity, Edward Preston chats with Navilogic Co-Founder Bill Strub on the appeal of founding a new organization in an ever-crowding cybersecurity industry. They also take a look at the work Navilogic is doing to with some new and exciting young companies you may not have heard so much about and why new and/or different approaches work better for Navilogic’s customers. About Navilogic NaviLogic offers managed and co-managed services and technologies to help their clients take control of their risk and compliance, drive efficiency, and use actionable insights to enable effective decisions. About Bill Strub Bill Strub is the co-founder of Navilogic. He is a dynamic and strategic IT security leader and consulting executive with more than 20 years of accomplishment in growing and expanding businesses. He is an entrepreneur and business leader with success integrating strategies, innovations, technologies, and personnel to build successful teams. Prior to co-founding NaviLogic in 2014, Bill was Director of Strategic Alliances for Qualys, a cloud security and compliance services firm. Before that, Mr. Strub co-founded and served as Vice President of Service Offerings for Accuvant (now Optiv Security). While at Accuvant, Bill played a leading role in building one of the largest, most well-respected information security providers in the United States. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management  Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html  iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review! and compliance services firm. Before that, Mr. Strub co-founded and served as Vice President of Service Offerings for Accuvant (now Optiv Security). While at Accuvant, Bill played a leading role in building one of the largest, most well-respected information security providers in the United States. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better. Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem

InSecurity

Play Episode Listen Later Jan 21, 2019 55:05


Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future. In this week’s episode of InSecurity, Matt Stephenson chats with Kip Boyle, Founder and CEO at  Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They discuss the tools and processes a business will need to  mitigate cyber risk and online threats. Kip has developed a 5-Principle approach that will help safeguard your business from cyber attacks.  Fire Doesn’t Innovate The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks About Kip Boyle Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI). Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI. Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook.  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.   Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  Make sure you Subscribe, Rate and Review!

DirtySecurity
Ramita Sawhney: You Build the Things; MSSPs Will Secure Your Data

DirtySecurity

Play Episode Listen Later Jan 16, 2019 18:06


Ramita Sawhney: You Build the Things; MSSPs Will Secure Your Data According to SecurityBoulevard.com, more Managed Service Providers will partner up with Managed SecurityService Providers in 2019 than ever before. This can be great news for the enduser. A good MSSP will handle their data security allowing the enduser to focus on their business. But what about the companies who make the security solutions? This can be a tricky situation, as they need to develop their solutions to fit the needs of the MSSP, the MSP and the enduser. Who would be crazy enough to sign up for a gig that includes this many variables? On this week’s episode of DirtySecurity, Edward Preston chats with Cylance Senior Product Manager Ramita Sawhney to find out what, exactly, is involved in evolving a security solution from an enterprise model to one who plays well in the MSSP world. About Ramita Sawhney   Ramita Sawhney is a Technical Product Management leader with expertise in building enterprise software in cybersecurity, primarily responsible for development of cloud console, RESTful APIs, and strategic partner integrations. She has extensive experience and passion for building products from ideation to launch through all phases of product development, including market research, competitive analysis, user requirements, UI/UX design, development, beta testing and go-to-market.  About Edward Preston Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record

InSecurity

Play Episode Listen Later Jan 14, 2019 45:34


Dave Bittner: The Cyberwire is the Cybersecurity Paper of Record “Were it left to me to decide whether we should have a government without newspapers, or newspapers without a government, I should not hesitate a moment to prefer the latter.” Thomas Jefferson(before he became president) “Nothing can now be believed which is seen in a newspaper. Truth itself becomes suspicious by being put into that polluted vehicle.” Thomas Jefferson(While serving 2ndterm as president) Odds are, if you are affiliated with cybersecurity in any way, you have been touched by The Cyberwire. They are a cyber security-focused news service which is viewed as a trusted, independent voice in the world of news swirling around cybersecurity. Cyberwire delivers accessible and relevant information by working hard to separate the signal from the noise in an industry overloaded with information and competing messages  As our world gets more connected with each new wired device, each new piece of IoT, we need to understand how to protect these things, and by extension, ourselves. In this week’s episode of InSecurity, Matt Stephenson chats with Dave Bittner about Cybersecurity in the year that was and the year to come. They also quote Albert Brooks, discuss octopus eyeballs and debate the merits of Vinyl LPsand cassettescompared to digital music and streaming. You’re not going to want to miss this one… About Dave Bittner Dave Bittner(@bittner) is  the Producer and host of the CyberWire DailyPodcast, the top-ranking daily cybersecurity podcast in the world according to iTunes. In addition his duties as host of the CyberWire podcast, he also hosts the Hacking Humans&Recorded Futurepodcasts. Bittner has over twenty years experience in digital media, video and television production and interactive technology. He has developed award winning interactive training programs for a variety of industries, and produced countless corporate, industrial and broadcast programs as co-owner of Pixel Workshop. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

DirtySecurity
Doris Yang: It Takes a Village to Raise a Security Solution

DirtySecurity

Play Episode Listen Later Jan 9, 2019 30:56


Doris Yang: It Takes a Village to Raise a Security Solution “Trust the process”  -- Several people associated with the Philadelphia 76ers Most of you are probably aware that developing, testing and releasing a successful and useful software is not a one person job. There may be a visionary who sparks the initial idea, but there is an, at times, arduous process to develop the idea, write the code, test the solution and get it to market in a timeframe that makes it useful to its target market. We all know the role that developers and engineers play in this process, but we may not be as educated on a team who plays a key role… Product Management. On this week’s episode of DirtySecurity, guest host Matt Stephenson chats with Cylance Senior Director of Product Management Doris Yang. Doris explains what it means to be a Product Manager and the role PM plays in the development process. She also digs into Cylance’s Product Management process as well as the role AI can play in the future. About Doris Yang Doris Yangis a Senior Director of Product Management at Cylance where she plays a pivotal role in defining the development and evolution of the CylancePROTECT solution. Before joining Cylance, Doris held senior product management and engineering positions at Vectra Networks, Palo Alto Networks and Symantec. It’s safe to say she has a pretty good idea of how to bring a good security solution to market. About Matt Stephenson (Fill in) DirtySecurity host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come About Edward Preston Edward didn’t host this episode, but this is his show, so we need to make sure you know what’s up. Edward Preston(@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management Every week on the DirtySecurity Podcast, Edward Preston chats with Cylance’s best and brightest about what is happening in the world of Cybersecurity and the work Cylance is doing to make things better.  Each episode shines a spotlight on the people of Cylance and the work they do with our technology and consulting services to clean up the often dirty world of the data center. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Sara Lofgren: What the Hell does IoT Even Mean?

InSecurity

Play Episode Listen Later Dec 21, 2018 32:37


InSecurity Podcast: Sara Lofgren: What the Hell does IoT Even Mean? An 80s keypad stuck on a 60s computer system. Take two things that work and nail them together Sam “The Falcon” Wilson Ultimate Galactus Trilogy– Warren Ellis IOT: even the name has different meanings to different people. While people in technology know that IOT stands for “Internet of Things,” what counts as a thing? IOT adoption is ramping faster than home PC or WWW adoption did. The small price tag, stand-alone nature, ease-of-use, and business value of IOT make it appealing to both individuals and industry. With any new technology, utility always proceeds security. So unsurprisingly, security is currently the biggest hurdle to adoption - or as some technologists joke, “there is no 'S' in IOT”. In this week’s episode of InSecurity, Matt Stephenson chats with Sara Lofgren about the present state and future of the Internet of Things. As discrete network boundaries continue to dissolve, the web of connected things will continue to grow and be increasingly vulnerable. These always connected, diverse, and limited-function devices will need a bold and visionary security solution that does not require human interaction. Sara wants to make sure that we are doing the needful to protect the Things, the Data and ourselves… About Sara Lofgren Sara Lofgren is the Channel Sales Engineering Manager at Cylance. She has been working in computer security for over a decade, with focus on solving enterprise security problems through the union of technology, people, and processes. Besides malware, her other main areas of interest include privacy, cryptography, and technology regulations. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
The White Company: Inside the Operation Shaheen Espionage Campaign

InSecurity

Play Episode Listen Later Nov 12, 2018 46:17


InSecurity Podcast: The White Company: Inside the Operation Shaheen Espionage Campaign The tumultuous inner-drama of Pakistan has been keeping foreign heads of state awake at night for much of the country’s 70-year history. That’s because Pakistan’s story has been one of contradictions. It has enjoyed peaceful civilian rule, but also violent military coups. It has been a key counterterrorism partner in Afghanistan, but also an accused sponsor and enabler of terrorists. It has been outwardly focused on deterring its rival India, but also inwardly focused on managing domestic separatist and terrorist threats. It has been the home of more than 100 nuclear weapons, but also the most notorious terrorist in history, Osama bin Laden. At the heart of Pakistan’s curious and contradictory history has been its military, whose outsized in uence in Pakistani a airs has made it a key actor at home and abroad, playing roles both highly visible and long hidden. Today, the Pakistani military is at the center of shifting geopolitical alliances — and a sustained cyber espionage campaign. Cylance calls this campaign Operation Shaheen, a reference to the Shaheen Falcon which stands as the symbol of the Pakistani Air Force — the branch of the Pakistani military repeatedly referenced in this campaign’s phishing lures. In today’s episode of InSecurity, Matt Stephenson talks with Cylance Advisory Board Member Ryan Smith and Cylance Directors of Threat Intelligence Jon Gross and Kevin Livelli. Their research team unravel the mystery of a campaign in which traditional approaches to analysis, focused primarily on the malware and infrastructure, yielded few clues and misleading assumptions; however, a comprehensive breakdown of the exploit and shellcode revealed insights into a threat actor whose unique way of cobbling together tools may ultimately lead to their unmasking.   About Ryan Smith Ryan Smith is a member of the Cylance Advisory Board. Prior to that, he was the Vice President of Research at Cylance, where he lead teams performing both internal and external research. He has spent the last decade leading such teams for consulting, product, and fortune 50 organizations. As an individual contributor, Ryan has discovered and exploited highly impactful vulnerabilities in widely deployed client and server software. His interests include reverse engineering, exploitation, vulnerability discovery, analysis algorithms, and magnets. He has spoken at international conferences and is a two-time Pwnie Award winner for best server and client bugs. About Jon Gross Jon Gross is a Director of Threat Intelligence at Cylance. Other than that… he doesn’t tell us much   About Kevin Livelli Kevin Livelli is Director of Threat Intelligence at Cylance, where he conducts long-term, complex investigations with the Research and Intelligence team. His work there follows ten years at 60 Minutes, where his investigative reporting and analysis were recognized with Peabody and Emmy awards. Before that, Livelli supervised investigations at the nation’s largest independent police oversight agency. A graduate of Dartmouth, he earned master's degrees from Trinity College Dublin and Columbia University.   About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
HuntSource is working hard to fill the Cybersecurity skills gap

InSecurity

Play Episode Listen Later Nov 5, 2018 47:11


HuntSource is working hard to fill the Cybersecurity skills gap Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe. Over two thirds of all network compromises are not discovered for months The average cost to a business for each record lost to a data breach is $148 3.5 million cybersecurity job vacanciesby 2021 These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present? Have you heard some of this before? We hope you enjoyed last week’s tribute to Orson Welles and our CyberWar of the Worldpodcast. Now let’s get serious and have an in depth discussion about the Cybersecurity Skills gap…. In today’s episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day.  About Huntsource Huntsourceseeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything. Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe. About Matt Donato Matt Donatois the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business. About Jack Hall Jack Hallis the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences. About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as  ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!

InSecurity
Susan Etlinger on The Ever Expanding Role of Artificial Intelligence

InSecurity

Play Episode Listen Later Aug 19, 2018 37:56


From Amazon Echo to self-driving cars to Norman, the Psychopathic AI… the Artificial Intelligence diaspora appears to be growing as diverse as humanity itself. Are we good with that?   Susan Etlinger joins Matt Stephenson on the InSecurity podcast to dig into the business ramifications of the ever-increasing presence Artificial Intelligence in the data center. Susan is an industry analyst focusing on industry trends related to the impact of emerging technologies on organizations and individuals. Susan specializes in business strategies related to artificial intelligence, data science, analytics and digital ethics.   In this episode of Insecurity, Susan calms Matt's irrational fears of the potential of AI while illuminating the exciting present and future of Artificial Intelligence and Machine Learning. We'll take a look at what is happening in "The Enterprise" and why AI experiments like Microsoft's Tay and MIT's Norman can provide value. Given that Susan was recently named among 100 #AI Influencersby US AI, she is among the most qualified among us to lead this conversation.  About Susan Etlinger Susan Etlinger(@setlinger), an industry analyst at Altimeter Group, is a globally recognized expert in digital strategy, with a focus on artificial intelligence, big data, AI ethics and big data. Susan conducts independent research and has authored many reports that are available to the public. Susan works with Global 2000 clients to assess the impact of AI and related technologies on business, and identify use cases, opportunities, risks and organizational structure and culture. She also works with technology vendors to refine product road maps and strategies based on her independent research.  About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2  GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
InSecurity Podcast: Steve Snyder on the past, present and future of currency

InSecurity

Play Episode Listen Later Aug 2, 2018 51:28


InSecurity Podcast: Steve Snyder on the past, present and  future of currency Fortnite and Bitcoin and Dollars OH MY! What makes real money... REAL? What if I told you a man named Matthew Mellon owned a cache of Ripple that at one point was valued at over $1 BILLION and was still worth over $500 MILLION at the time of his unexpected death Mellon claimed to have kept the digital keys to his Ripple wallet locked in cold storage in other people's names at various locations around the US What does the family of the deceased do in a situation like this? What does anyone do with the notion of hundreds of millions of dollars in value that is locked away and utterly inaccessible? What the hell is Ripple anyway? In this episode of the InSecurity Podcast, Steve Snyder joins Matt Stephenson and Edward Preston for a look into the fact, fiction and myth of crypto-currencies. And just to make things a bit weirder… we’re also going to talk about weapon skins that are trading for $50,000 inside games. FIFTY. THOUSAND. DOLLARS. Noodle on that for a minute… About Steve Snyder Steve Snyderis a member of Bradley’s Banking and Financial Services and Cybersecurity and Privacyteams. He leverages his industry experience as a network engineer and cyber risk manager to assist clients matters related to data protection arising from emerging technologies. Steve is a thought leader in privacy and data security and routinely writes and speaks on cybersecurity topics.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come  About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Hiep Dang & Edward Preston introduce Cylance Smart Antivirus

InSecurity

Play Episode Listen Later Aug 1, 2018 36:26


InSecurity Podcast: Why is Cylance entering the consumer market? What if I told you that 67% of workers use their own personal devices while at work 37% of US workers telecommute What if you asked me “why should I care?” Cloud-based solutions (Office365, DropBox, Box, Trello, Atlassian, etc) allow employees to access corporate assets from personal devices Employees can connect USB thumb drives to personal devices infected with malware, then plug them into a company device Employees can access corporate email on personal devices Telecommuters can VPN into work from a personal device Cached credentials from employees logging into company assets from a personal device could be stolen by malware Web-cam enabling malware on a personal device could spy on and compromise employees The virtual borders of a Corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employee’s home networks have become blurred. CISOs and their Security Teams have a difficult time controlling their security risk and exposure from cybersecurity threats originating from employee’s homes. Think you’ve got the kind of security solution in place you need to protect your network from not just the bad guys, but hard-working employees? In this episode of the InSecurity Podcast, Hiep Dang and Edward Preston join Matt Stephenson to introduce Cylance’s new baby… Cylance Smart Antivirus. Hiep and Edward will explain how Cylance is bringing their groundbreaking, enterprise security solutions to the home user. About Hiep Dang Over 14 years ago, Hiep Dang (@Hiep_Dang) serendipitously turned a casual curiosity in computer forensics and viruses into a full time professional career in the cyber-security industry. His journey has given Hiep a spectrum of experiences from burgeoning startups to Fortune 500 companies while solving deep technical to abstract business problems. Hiep’s sweet spot is product management because it is at the intersection of product strategy and technical execution. During the day, he geeks out on building innovative security products and at night Hiep teaches Kung Fu. About Edward Preston Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management.  About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste  

InSecurity
InSecurity Podcast: Katie Moussouris answers the question… Should the pursuit of coding perfection always include Bug Bounties?

InSecurity

Play Episode Listen Later Jul 30, 2018 44:47


InSecurity Podcast: Katie Moussouris answers the question… Should the pursuit of coding perfection always include Bug Bounties? What if I told you that the industry average is 15-50 bugs per 1000 lines of code? You may not care if you’re creating a Word doc. What if you are in charge of launching the latest SpaceX rocket? What if you are Lewis Hamilton driving for Mercedes Formula 1 and a software glitchcauses you to lose a 3 second lead at the Australian Grand Prix? What if you are a general in charge of military forces using tools that include the same software I can buy on Amazon or Ali Baba? With so much of our world now driven by software, everything is on the line: money, property, lives. Perfection is never going to be an option, but it is fair to say that we need to be as close to perfect as possible No small feat… and no pressure on folks like today’s guest Katie Moussouris joins Matt Stephenson on the InSecurity podcast to talk about bugs and bug bounties and the impact they can have on security and privacy. Katie is an industry legend perhaps best known for creating Microsoft’s first Bug Bountyprogram in 2013. In this episode of the InSecurity Podcast, Katie Moussouris breaks it down for Matt Stephenson. Who needs a bug bounty? Is a bug bounty program even appropriate for a company? There are risks in every question and every answer. About Katie Moussouris Katie Moussouris(@k8em0) is the founder and CEO of Luta Security, specializing in helping businesses and governments work with hackers to better defend themselves from digital attacks.  She is a noted authority on vulnerability disclosure & bug bounties, advising companies, lawmakers, & governments on the benefits of hacking& security. Katie is a hacker - first hacking computers, now hacking policy & regulations. About Matt Stephenson Insecurity Podcast hostMatt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before. Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. To hear more, visit: ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

InSecurity
Pete Herzog on Teaching Kids to Hack

InSecurity

Play Episode Listen Later Jul 16, 2018 33:04


What if I told you that we could save the world be teaching kids to hack early in life? Pete Herzog thinks that might be the way to go. Is he right? The word “hacking” has reached an almost mystical status for those outside the true hackerverse. Pete Herzog wants to teach young people the skills involved with hacking in order to provide them with the additional tools that come along with those skills.  As a third generation of hackers enters the workplace, there are questions to be discussed… Why is hacking relevant today? Is hacking a bad thing? What does hacking even mean? In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Pete Herzog, co-founder of ISECOM and Hacker High School. Pete is one of the leading voices encouraging today’s young people to learn how to hack. We’ll dig into these questions about hacking and what it means to be a hacker in the modern world of Cybersecurity.