POPULARITY
E&I Host: David Manz, Business Partnerships Manager, Facilities & InteriorsGuest: Max Henderson, Assistant Vice President of Digital Forensics and Incident Response, PonduranceMax Henderson, Assistant VP of Digital Forensics and Incident Response at Pondurance, pulls back the curtain on the escalating threats of ransomware and cyber extortion. With criminal enterprises becoming more organized and aggressive, Max emphasizes the critical need for proactive cybersecurity measures and comprehensive response plans. He reveals the alarming truth that even after ransoms are paid, stolen data often remains exposed. Discover essential advice on cyber insurance, real-time threat monitoring, and how to safeguard your institution from becoming the next target. Relevant Links:E&I's Pondurance ContractPondurance WebsiteCooperatively Speaking is hosted by E&I Cooperative Services, the only member-owned, non-profit procurement cooperative exclusively focused on serving the needs of education. Visit our website at www.eandi.org/podcast.Contact UsHave questions, comments, or ideas for a future episode? We'd love to hear from you! Contact Cooperatively Speaking at podcast@eandi.org. This podcast is for informational purposes only. The views expressed in this podcast may not be those of the host(s) or E&I Cooperative Services.
In the highly anticipated second installment of our Cybersecurity Chronicles series, join me and Max Henderson, a cybersecurity expert from Pondurance, as they delve even deeper into the ever-evolving landscape of digital security. In this episode, Max shares invaluable insights and real-world anecdotes, shedding light on the latest cyber threats, innovative defense strategies, and the importance of proactive measures in safeguarding against cyber attacks. Get ready for an engaging and informative conversation that demystifies the world of cybersecurity and empowers you to face the challenges of the digital age head-on. Whether you're a business owner, IT professional, or just curious about staying secure online, this episode is a must-listen for anyone navigating the complexities of the digital frontier.
Join us in this episode as we sit down with Max Henderson, AVP at Pondurance and expert in Digital Forensics & Incident Response. Max takes us on a journey through the intricate world of cybersecurity, unraveling the mysteries of digital forensics, incident responses, and shedding light on common cybersecurity incidents and emerging trends. Get ready for a riveting conversation as Max shares gripping case studies and war stories from his wealth of experience, providing invaluable insights into the ever-evolving landscape of cyber threats. Whether you're a seasoned professional or a cybersecurity enthusiast, this episode is a must-listen for anyone looking to navigate the complex realm of digital security.
Welcome to another episode on the Modern SaaS Finance Podcast hosted by David Appel, head of Software/SaaS at Sage Intacct. Joining us on todays episode, is Mike Melka, CFO at Pondurance. Mike is a highly committed, hands-on senior finance and operations executive with strong proficiency in value creation for high-growth private equity backed technology and services companies. Over the years in his career, he has helped build top-performing teams focused on accountability for results; develop and position early and mid-stage companies for successful exits. On this episode, Mike shares some insight from his wealth of experience on what a CFO needs to focus on when moving from $5M to $10M ARR, what you need to build the right finance team, and the metrics that matter to investors. Listen to the full episode for all the great insights shared! For more episodes on the Modern SaaS Finance, subscribe to our podcast channel on any major streaming platforms including Spotify, Apple Podcast, Google Podcast, Amazon Music, Audible, etc. If you are a SaaS finance leader or expert and will like to join our Modern SaaS Finance community, click here to request access. Explore more SaaS finance tips and best practices here
Apple M1 malware, upskilling tech staff, MDR cybersecurity with Pondurance, and more. North Korea's Lazarus APT targets Apple's M1 chip Court rules FCC is allowed to reassign 5.9 GHz bandwidth, killing V2X Which security bugs will be exploited? Researchers create an ML model to find out CDC to regain control of US hospital data after Trump-era seizure, chaos How to upskill tech staff to meet cybersecurity needs Pondurance CEO Doug Howard discusses Managed Detection & Response (MDR) cybersecurity Hosts: Curt Franklin and Brian Chee Guest: Doug Howard Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: hover.com/twit IRL Podcast UserWay.org/twit
Apple M1 malware, upskilling tech staff, MDR cybersecurity with Pondurance, and more. North Korea's Lazarus APT targets Apple's M1 chip Court rules FCC is allowed to reassign 5.9 GHz bandwidth, killing V2X Which security bugs will be exploited? Researchers create an ML model to find out CDC to regain control of US hospital data after Trump-era seizure, chaos How to upskill tech staff to meet cybersecurity needs Pondurance CEO Doug Howard discusses Managed Detection & Response (MDR) cybersecurity Hosts: Curt Franklin and Brian Chee Guest: Doug Howard Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: hover.com/twit IRL Podcast UserWay.org/twit
Apple M1 malware, upskilling tech staff, MDR cybersecurity with Pondurance, and more. North Korea's Lazarus APT targets Apple's M1 chip Court rules FCC is allowed to reassign 5.9 GHz bandwidth, killing V2X Which security bugs will be exploited? Researchers create an ML model to find out CDC to regain control of US hospital data after Trump-era seizure, chaos How to upskill tech staff to meet cybersecurity needs Pondurance CEO Doug Howard discusses Managed Detection & Response (MDR) cybersecurity Hosts: Curt Franklin and Brian Chee Guest: Doug Howard Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: hover.com/twit IRL Podcast UserWay.org/twit
Apple M1 malware, upskilling tech staff, MDR cybersecurity with Pondurance, and more. North Korea's Lazarus APT targets Apple's M1 chip Court rules FCC is allowed to reassign 5.9 GHz bandwidth, killing V2X Which security bugs will be exploited? Researchers create an ML model to find out CDC to regain control of US hospital data after Trump-era seizure, chaos How to upskill tech staff to meet cybersecurity needs Pondurance CEO Doug Howard discusses Managed Detection & Response (MDR) cybersecurity Hosts: Curt Franklin and Brian Chee Guest: Doug Howard Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: hover.com/twit IRL Podcast UserWay.org/twit
In this episode, we asked Sean from Ohio to guest host with us. We talk CoSN, DC Comics, and we dig into Pondurance's Cybersecurity Checklist. Email us and vote for Eric, Mark, Pate, Bill, or Sean! Who will replace "that one guy"? Click HERE to read the F12 newspaper article we talked about. Buy our new shirt... "F12 != Hacking" https://tinyurl.com/f12gov Visit our sponsors Pondurance PDS Aruba SomethingCool.com
We are happy to have listener Bill as a special guest tonight. We get an overview of his school district that, as he puts it, "is in the middle of the woods in the Mark Twain National Forrest." As you can imagine that presents a few unique issues that other schools might not have to deal with, including an extended closure due to deer season. We also talk about puked on Chromebooks, Bill rebuilding his SCCM/Config Manager Server, a quick Erate update, and Josh has a weird Word issue. Click HERE to watch the Pondurance video Chris talked about. Buy our new shirt... "F12 != Hacking" https://tinyurl.com/f12gov Visit our sponsors Pondurance PDS Aruba SomethingCool.com
Cyber Incidents, Cybersecurity Insurance, and SMBs. Host Karl interviewed Ron Pelletier from Pondurance. Pondurance is a cybersecurity incident response organization. Ron is the original Founder of Pondurance, having started the company from his basement in 2008. Ron has over 25 years of cyber security advisory experience. He started his career as an officer in the US Army, followed by nine years with Big Four firm, EY. As a strong consensus builder and customer advocate, Ron is focused on evangelizing the Pondurance brand as well as customer success. There are many kinds of cyber attacks. What's the right incident response for each of these? What are the roles of monitoring as well as actual response? Additional Relevant Cyber insurance policy prices are skyrocketing due to the increase in ransomware attacks. With that higher price comes less coverage. Add to that, more companies are applying for cyber insurance than there is funding. When demand exceeds availability, you get increased rates, and that's happening universally. To better your chances for being approved for cyber insurance, it's best to know why companies are denied cyber insurance in the first place, how they can be better prepared for the application process, and what to do to prepare for the years to come. Landon would like to discuss preventive measures small businesses can take to address questions that cyber insurance carriers have added to their underwriting questionnaires, as well as simple and cost-effective ways for organizations to reduce your cyber risk. Links - http://www.pondurance.com -- -- -- Sponsor Note: Acronis Are you still relying on a frustrating patchwork of legacy solutions? Modernize your cybersecurity and data protection with Acronis Cyber Protect Cloud. It's a single solution that combines backup, anti-malware, and endpoint protection management. As an MSP, you can easily improve clients' security posture, eliminate complexity, and generate more recurring revenue. Learn more about Acronis Cyber Protect Cloud at https://Acronis.com. :-) , , ,,
Ron Pelletier, Founder & Chief Customer Officer, and Doug Howard, CEO of Pondurance, discuss cybersecurity and why preparation, empathy and teamwork should be at the core of every response plan.
In 2010, Doug Howard, CEO of managed detection and response company Pondurance, wrote a cybersecurity book called Security 2020 in which he and 50 leading experts made predictions about what cybersecurity would be like in 2020. They were correct on many different trends such as the recent impact of the COVID pandemic, the rise of botnets, exposing documents from famous pundits and nation state cyber warfare. There were also many other predictions that border on science fiction plots.
Investors make their money seeing things others don’t. Making big bets based on both digging into painstaking detail and their ability to forecast what will happen many years into the future. In this 5th and (almost!) final episode of our series on public cloud security, we get deep into the mind of Bucky Moore from Kleiner Perkins to learn how the flow of funding is both responding to and shaping our industry’s transformation from protecting our own data centers to renting them from others.Bucky begins by laying down our mile marker in the global cloud journey, answering the eternal question of “Are we there yet?” with a clear answer of “Not even close.” We follow these remarks to a walk through the different corners of the cyber security industry to see how they’re keeping pace. While many fail to impress, one of the legacy behemoths stands out from the pack as having impressively galvanized their business to meet the cloud challenge.Setting companies aside, Bucky, Jack & Dave identify what technologies are the likely casualties are long-term cloud transition followed by a look at the obvious new areas to invest. Bucky describes a few more obscure tech opportunities he and Kleiner Perkins are watching that may produce a surprise hit in the future.We explore the eye-popping amount of money raised by managed security services companies in 2020 such as Arctic Wolf, Deep Watch & Pondurance and how they differ from the not-so-glamorous past of the MSSP market. Our discussion explains the hidden forces driving the new managed services opportunity and how we think it will play out over the years ahead.If you’re looking to understand the insanely high valuations of companies like Snowflake and CrowdStrike-- or wondering what a SPAC is-- Bucky weighs in on these topics as well as we also dive into the surprise investing frenzy of 2020. Spoiler alert: it has a lot to do with both money and investors having no better places to go.
In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scraping adtech. Google and Facebook get, if not a haircut, at least a trim, in EU and US courts. And some animadversions concerning digital courtship displays. Dr. Charles Clancy from VA Tech’s Hume Center on updates to the GPS system. Guest is Landon Lewis from Pondurance on balancing AI and human intelligence. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_20.html Support our show
Today's featured interview is with Lewie Wilkinson, senior integration engineer at Pondurance. Pondurance helps customers improve their security posture by providing a managed threat hunting and response solution, including a 24/7 SOC. Lewie joined me via Skype to talk a lot about a topic I'm fascinated with: incident response! I had a slew of questions and topics I wanted to discuss, including: Fundamentals of threat hunting What is threat hunting? What are the fundamentals to start mastering? How can someone start developing the core skills to get good at it? How can sysadmins/network admin, who have a busy enough time already just keeping the digital lights on, handle the mounting pressure to also shoulder security responsibilities as part of their job duties? What training/cert options are good to build skills in threat hunting? Lets say you know one of your users has clicked something icky and you suspect compromised machine/creds. You pull the machine off the network and rebuild it. How do you know that you've found/limited the extent of the damage? Are attackers on networks typically wiping logs on systems as the bounce around laterally? Anything to add to the low-hanging hacker fruit list? Why is it so critical to not just have logs, but have verbose logs with rich data you need in an investigation? When does it make sense to outsource some security responsibilities to a third party? Learn more about Pondurance at their Web site and Twitter.
What is a red team? How does it differ from a penetration tester's day-to-day? How do red teams stay sharp? How do they stay motivated? These are a few of the questions I seek to have answered by Curtis Brazzell, a managing Security Consultant at Pondurance. It's a great interview and sheds light on the difference between red teaming and penetration testing.Some links of interest: Curtis' Twitter: https://twitter.com/CurtBraz Curtis' LinkedIn Profile: https://www.linkedin.com/in/curtisbrazzell/ Pondurance Website - https://www.pondurance.com/ We have a new store! Come check out the various Purple Squad Security goods you can buy to share your following and help the show. From stickers to mugs, we have a few items up for sale:https://purplesquadsec.com/storeWant to reach out to the show? There's a few ways to get in touch! Purple Squad Security's Twitter: @PurpleSquadSec John's Twitter: @JohnsNotHere John's Mastodon: https://infosec.exchange/@JohnsNotHere Podcast Website: purplesquadsec.com Patreon - https://www.patreon.com/purplesquadsec Sign-Up for our Slack community: https://signup.purplesquadsec.com Thanks for listening, and as always, I will talk with you all again next time.Find out more at http://purplesquadsec.com
Get insight into what it takes to be a successful Red Team member in this chat with Curtis Brazzell, managing security consultant at Pondurance.
This talk will explore the enormous threat landscape presented by the IoT ecosystem and examine the state of IoT security with a bit of humor. We will look at everything from individual devices, to conceptual challenges, as well as potential solutions to the most challenging security question we have ever had to answer. About the speaker: Jason is Sr. Integration Engineer and has worked in related roles for 9 years since graduating from Purdue University with a BS in Computer Science in 2009. Prior to joining Pondurance, Jason worked as a defense contractor in the Washington D.C. area and was a NASA intern while attending Purdue. Jason loves the challenges brought forward by a career in cyber security and working to secure national infrastructure. Outside of cyber security, Jason considers himself a maker with a particular passion for educational technology, an amateur cartographer, an urban enthusiast and is fascinated by aerospace engineering and everything related space exploration. Jason also enjoys playing soccer and basketball as well as rooting for the Colts, Pacers, Caps and Blues! Jason is excited to be back in Indy and to be part of the rising Indy tech community!