POPULARITY
Are We Ready for the Cybersecurity Wars? Paul Ferrillo, partner at Seyfarth Shaw and author of two books on cybersecurity, speaks with Richard Levick and Ian Lipner of LEVICK about lessons from past cyber incidents including Solar Winds, best practices, making recommendations for companies and wonders aloud if most publicly traded companies are ready when they get hacked.
The Tar Baby Crisis: Paul Ferrillo of McDermott Will speaks with cohosts Richard Levick and Ian Lipner on the crisis that just won’t go away and how sometimes, through lack of quick thinking and leadership, we act our way into a crisis. Paul refers to groundbreaking cyber journalist Brian Krebs who we had on the show recently. https://open.spotify.com/episode/0uX3hY2HwuYNWBAAXRkZuI
This evening on the Security Shit Show we're going to open the Pandora's box labeled 5G and see what's what with the technology, implementations, countries involved AND all the conspiracy theories surrounding it.With the ever-guiding lights provided by Evan Francen, Ryan Cloutier, CISSP and Rachel Arnold we'll see what we can come up with to dispel the rumors of brain frying, Covid-19 inducing, plant and bird killing technology.We'll address some of the actual challenges WITH 5G, thanks to some great conversations the other week with Paul Ferrillo and Dr. Rob Spalding, Brig Gen, USAF (Ret)We might even go down the rabbit hole of Body Area Networks, and how we can induce communication within the body… and NO that's not a 5G thing, but it's a reality we're working on…I'm sure our colleagues in China will come up in conversation given the bun fight between the US and that area of the world… we WILL address the technology giant that IS the Far East and what we can (or can't) do about it.Grab a drink and join us this evening for an engaging conversation about how we're screwed and should accept the simple fact technology's won and we're merely prawns in the digital age (or is it pawns?)
Resiliency with Paul Ferrillo, a partner at McDermott, Will & Emery and Ian Lipner, head of LEVICK’s cyber practice. Paul addresses the need to think differently, build redundancies and plan for resilience in an age when what can happen will happen.
Partner and Shareholder of Greenberg Traurig, Paul Ferrillo joins Episode #117 of Task Force 7 Radio to talk about what Board Members should be asking their CISO's, how they should prepare themselves for these discussions, and how often and for how long should these briefings last. Mr. Ferrillo detailed the state of the cyber security ecosystem in 2020, what does the conflict with Iran mean to Cyber Security professionals, and what companies can do to protect themselves from a rampant ransomeware epidemic. All this and much, much more on Episode #117 of Task Force 7 Radio.
Bubonic plague, influenza… spear phishing? In today’s episode, cyber risk strategist Chris "Dr. InfoSec" Veltsos and cybersecurity expert and attorney Paul Ferrillo return to the podcast to discuss whether spear phishing has reached epidemic proportions. They also tackle the importance of identity access management (IAM) solutions and the benefits of user behavior analytics (UBA). To learn more, check out the blog, “Identity is the New Perimeter” [https://ibm.co/2vsxUTZ] and read about IBM QRadar User Behavior Analytics [https://ibm.co/2Km4Brj].
Episode 9 of the "Deciphering Today's Cyber Headlines” series. For past episodes in this series, visit https://ibm.co/2rZ6gzt. Paul Ferrillo, Chris Veltsos and Mitch Mayne are back, and this time they're offering up a surprising solution to defend against cyberattacks: the organization's entire workforce. And yes, that includes YOU. RESOURCES: Listen to the “Five Data Types to Consider When Conducting a Risk Assessment” podcast: https://ibm.co/2C6T93v. Listen to the “Social Engineering 101: How to Hack a Human” podcast: https://ibm.co/2J1Kwu1. Listen to the complete "Deciphering Today's Cyber Headlines" podcast series: https://ibm.co/2rZ6gzt.
Episode 8 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Just in time for the US president's annual State of the Union address, Paul and Chris are back to deliver a cybersecurity state of the union. Listen now to discover why Paul is pessimistic, why Chis is optimistic, and what two pieces of advice they'd each give C-level executives planning for 2018. RESOURCES: Read Chris' blog on NACD’s 2018 Governance Outlook: https://ibm.co/2GpRIfn Read Chris' blog on the WEF's 2018 Global Risks Report: https://ibm.co/2GsgP16 Download the CyberAvengers' Playbook: http://bit.ly/2ylU65M Listen to other episodes in the "Deciphering Today's Cyber Headlines" podcast series: https://ibm.co/2rZ6gzt
In episode 9, Paul Ferrillo and Chris Veltsos conclude the “Take Back Control of Your Cybersecurity Now” podcast series with predictions about the future of cybersecurity. In addition to returning to some of their favorite subjects, such as cognitive computing and the NIST Cybersecurity Framework, they also share their thoughts on cloud security and the Internet of Things (IoT). For more insights from Paul and Chris, listen to their ongoing follow-up podcast series, “Deciphering the Cyber Headlines” [http://bit.ly/2wmLXZs]. You can also buy their book [http://amzn.to/2xZv2hS] as a perfect holiday gift for your favorite security practitioner.
In episode 8 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos talk metrics and reporting. Listen now to learn how to translate numbers into meaningful cyber risks that boards of directors will understand and feel confident to act on. Come back tomorrow for the final episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. You can also re-listen or find any episodes you missed at http://bit.ly/2B4ZyLY.
In episode 7 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos emphasize the importance of incident response. The goal of cybersecurity was once to build enough walls to keep out attackers, but in more recent years the focus has shifted to detecting bad guys already inside the network. This change has elevated the status of incident response teams and crisis management planning. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To learn more about the IBM X-Force Command Center, visit https://ibm.co/2AM5OHW.
In episode 6 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos offer recommendations for organizations looking to adopt the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To learn more about the NIST CSF and its five phases, visit bit.ly/2kUpWvo.
In episode 5 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos discuss why Watson for Cyber Security, with its ability to ingest and understand both structured and unstructured data, is a game changer in the fight against cybercrime. Come back next week for more episodes in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the IBM report on cybersecurity in the cognitive era mentioned during the episode, visit http://ibm.co/2lKQj7Q and to learn more about Watson for Cyber Security, visit https://ibm.co/2j7neEG.
In episode 4 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos give substance to buzzwords like artificial intelligence and machine learning and explain why cognitive solutions are a necessity in today's threat landscape. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the Forbes article mentioned during the podcast, visit http://bit.ly/2ll2b0Q. And to read Chris' 3-part blog series, "Getting Primed for the Cognitive Security Revolution," visit https://ibm.co/2zT9I26.
In episode 3 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos discuss how CISOs can be most effective in their internal communications with other C-suite members. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS. To read the IBM Institute for Business Value's study on securing the C-Suite, visit http://ibm.co/2jrGYVQ.
In episode 2 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos highlight the role that communication plays in security and offer recommendations for how to bridge the communications gap that too often exists between CISOs and boards of directors. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ book at http://amzn.to/2xZv2hS.
In episode 1 of the “Take Back Control of Your Cybersecurity Now” podcast series, Paul Ferrillo and Chris Veltsos share examples of today’s perilous threat landscape and build a case for why cybersecurity must be a key business priority. Come back tomorrow for the next episode in this 9-part series, and find Paul and Chris’ complete book at http://amzn.to/2xZv2hS.
Episode 7 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. October 2017 was a scary month for cybersecurity — and Halloween was the least of it. In light of recent attacks like Bad Rabbit, Paul and Chris chose the theme of "changing the game" for this month's podcast. Listen now to learn how businesses like yours can change the dynamic to one where cybersecurity is a business priority rather than an IT afterthought. RESOURCES: Read Chris' blog on the Global State of Information Security Survey 2018 from PwC: https://ibm.co/2zBtbDl Download the CyberAvengers' Playbook: http://bit.ly/2ylU65M Listen to the complete "Deciphering Today's Cyber Headlines" podcast series: https://ibm.co/2rZ6gzt
Episode 6 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. October is National Cyber Security Awareness Month (NCSAM), and this podcast kicks off 4 weeks of Security Intelligence content [https://ibm.co/2hKTBuZ] dedicated to the role we all play in making the internet safer. Listen now to hear a spirited discussion on the various themes of this year's NCSAM campaign, including "Cybersecurity in the Workplace is Everyone’s Business" and "Protecting Critical Infrastructure From Cyber Threats." You'll learn how Chris uses peer pressure to encourage good online habits among his colleagues and why Paul sees a bright future for machine learning. RESOURCES: Learn more about National Cyber Security Awareness Month: http://bit.ly/2g7RzBL Download the CyberAvengers' Playbook: http://bit.ly/2ylU65M Read the 'State of Cybersecurity in Small and Medium-sized Businesses' report from Ponemon Institute: http://bit.ly/2g6v00b Follow @IBMSecurity on Twitter for daily NCSAM updates: http://bit.ly/2xQVHxI
Episode 5 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Summer is meant to be a time for blockbuster movies and TV spectaculars, but were hackers the big winner of the 2017 season? In this podcast, Paul and Chris discuss the media hacks of the past few months, emphasizing the role played by third-party vendors. To learn more about how identity and access management solutions can help protect your sensitive data, read the IBM white paper: https://ibm.co/2wWPyiZ. And for more great insights from Paul and Chris, listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [bit.ly/2p0OC7G] or download their e-book of the same name [http://amzn.to/2xZv2hS].
Episode 4 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Paul and Chris are back this month to talk about the recent targeting of nuclear plants and other energy facilities by cybercriminals. While critical infrastructure systems do face some unique security challenges, many of the lessons learned from these attacks can be applied to other industries as well. For more information on the X-Force Command Center, watch this video [http://bit.ly/2uFeyMr] and read the blog, “Crisis Leadership: The Missing Link in Cyberattack Defense” [https://ibm.co/2uCEeK9]. Looking for more security insights from Paul and Chris? Listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [bit.ly/2p0OC7G] or download their e-book of the same name [http://amzn.to/2xZv2hS].
Episode 3 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Cybercrime is now a full-fledged industry and, like any other successful business, it won't be disappearing any time soon. Listen to this podcast to gain a better understanding of why businesses continue to underinvest in cybersecurity even in the face of increasingly sophisticated and widespread attacks. For more security insights from Paul and Chris, listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [http://bit.ly/2p0OC7G] or download their e-book of the same name [http://amzn.to/2xZv2hS]. We also invite you to download the Ponemon Institute 2017 Cost of Data Breach Global Study: https://ibm.co/2sMJGbz.
Episode 2 of the monthly "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" series. Why did WannaCry hit so hard, what could have made it even worse and, at least as important, what can companies do now to prepare for the nearly inevitable next round of attacks? Listen to this podcast to discover why basic endpoint hygiene and network maintenance must form the cornerstone of any security program, even in this era of new cognitive technologies. RESOURCES: - Listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [bit.ly/2p0OC7G] or download the e-book of the same name [http://amzn.to/2xZv2hS] - Download the "A Day in the Life of a Cyber Security Pro" white paper from EMA: http://bit.ly/2seSyDE - Read the blog, "How Basic Endpoint Patching Helps Protect Against Ransomware and Other Attacks" on SecurityIntelligence.com: https://ibm.co/2qzYVjz - Download the "Rewriting the Rules of Patch Management with IBM BigFix" white paper from IBM: https://ibm.co/2ryhREC
If you enjoyed the "Take Back Control of Your Cybersecurity Now" podcast series that concluded earlier this spring, you won’t want to miss this monthly follow-up series, "Deciphering Today's Cyber Headlines with Mitch Mayne, Paul Ferrillo and Chris Veltsos" In this premiere episode, they discuss the scourge of ransomware and the importance of endpoint security. For even more security insights from Paul and Chris, listen to the complete "Take Back Control of Your Cybersecurity Now" podcast series [http://bit.ly/2p0OC7G] or download their e-book of the same name [http://amzn.to/2xZv2hS]. We also invite you to learn more about IBM BigFix Detect by watching the on-demand webinar, "Let IBM BigFix Detect Take You Beyond Next Generation Endpoint Security" [https://ibm.co/2oSPjV7] or visiting https://ibm.co/2pDxnxd.
If you've enjoyed listening to the "Take Back Control of Your Cybersecurity Now" podcast series over the past 8 weeks and learning about topics like cognitive computing, the NIST CyberSecurity Framework and incident response, you definitely will not want to miss this 9th and final episode. In a fitting conclusion to the series, Paul Ferrillo and Chris Veltsos offer their predictions for the future of cybersecurity. If you haven't done so already, please download Paul and Chris' complete book at bit.ly/2k9Fboi and also go back and listen to any podcast episodes you may have missed. Thanks for listening!
Are you a CISO who's struggling to translate your latest metrics report into a meaningful update that your board will understand and act on? If so, this 8th episode of the "Take Back Control of Your Cybersecurity Now" podcast series is just what you need. Listen now as featured speakers Paul Ferrillo and Chris Veltsos discuss the value of metrics and dashboards and how they can best be used to communicate cyber risk. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To read the IBM Institute for Business Value report on cognitive security that's mentioned during the episode, visit ibm.co/2lKQj7Q.
Following up on their discussion of the NIST Cybersecurity Framework in last week’s podcast, in this episode Paul Ferrillo and Christophe Veltsos take a closer look at incident response. Whereas the goal of cybersecurity was once to build enough layers and walls to keep out attackers, in more recent years companies have shifted their focus to detecting bad guys already inside their systems and then responding as quickly and as accurately as possible. This new mentality has elevated the status of incident response teams and crisis management planning, which Ferrillo and Veltsos describe as critically important. To download Paul Ferrillo and Chris Veltsos' complete book, "Take Back Control of Your Cybersecurity Now," please visit bit.ly/2k9Fboi. To learn more about the five phases of the NIST CSF (identify, protect, detect, respond, recover), visit bit.ly/2kUpWvo.
This episode of the ‘Take Back Control of Your Cybersecurity Now’ podcast focuses on the National Institute of Standards and Technology (NIST) and offers recommendations for organizations looking to adopt the latest version of its Cybersecurity Framework (CSF). To download Paul Ferrillo and Chris Veltsos' complete book, visit bit.ly/2k9Fboi. To learn more about the NIST CSF, visit http://bit.ly/2kUpWvo.
After broadly discussing the capabilities and benefits of cognitive security in our previous episode (http://ibm.co/2lIP6Pa), this week the "Take Back Control of Your Cybersecurity Now" podcast looks more closely at IBM Watson. Listen now to learn how the ability to ingest and understand both structured and unstructured data sets Watson apart from other cybersecurity solutions. To download Paul Ferrillo and Chris Veltsos' complete book, visit bit.ly/2k9Fboi. To read the IBM report on cybersecurity in the cognitive era that's mentioned during the episode, visit http://ibm.co/2lKQj7Q.
This fourth episode of the "Take Back Control of Your Cybersecurity Now" tackles one of today's hottest topics: cognitive security. Featured guests Paul Ferrillo and Christophe Veltsos give substance to buzzwords like artificial intelligence and machine learning and then go on to explain why cognitive solutions are necessary in the current threat landscape. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To read the Forbes article mentioned during the podcast, visit http://bit.ly/2ll2b0Q.
To run an effective organization, all members of the C-suite must work together toward common business goals. In this episode of the "Take Back Control of Your Cybersecurity Now" podcast series, featured guests Paul Ferrillo and Christophe Veltsos discuss how CISOs can be most effective in their internal communications with other C-suite members. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. To read the IBM Institute for Business Value's study on securing the C-Suite, visit http://ibm.co/2jrGYVQ.
In this second episode of the "Take Back Control of Your Cybersecurity Now" podcast series, featured guests Paul Ferrillo and Christophe Veltsos highlight the role that communication plays in security and offer recommendations for how to bridge the communications gap that too often exists between CISOs and boards of directors. To download Ferrillo and Veltsos' complete book, visit bit.ly/2k9Fboi. If you missed it you can also listen to Episode 1 of this series at http://ibm.co/2jme8EF, and don't forget to come back next week for Episode 3.
In their recently released book, “Take Back Control of Your Cybersecurity Now,” Paul Ferrillo and Christophe Veltsos illustrate today’s perilous threat landscape and build a convincing case for why cybersecurity must be a key business priority. This exclusive podcast series will feature Ferrillo and Veltsos discussing some of the most important topics in their book. In this first episode they explain why they wrote the book and introduce some of the challenges faced by today's CISO. To download the complete book, visit http://bit.ly/2k9Fboi, and don't forget to come back next week for Episode 2.