POPULARITY
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion detection. And it all began at a time when people didn't understand the importance of cybersecurity. This is a story that many in the infosec community have already heard, but the lessons from Stoll's journey are still relevant. Katie Hafner gives us the background on this unbelievable story. Richard Bejtlich outlines the “honey pot” that finally cracked open the international case. And Don Cavender discusses the impact of Stoll's work, and how it has inspired generations of security professionals.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.
00:37: Richard Bejtlich's background in martial arts 08:39: Where does fascination with martial arts history comes from 18:08: What research on historical martial arts looks like 20:10: Preservation of antiquated methods in the present martial arts 26:15: The Ninja myth!!! 33:22: Cybersecurity 37:47: How hackers attack large corporations and the military 51:36: Craziest hacker attacks 57:52: Cyberwarfare 1:09:08: Answer to conspiration and desinformation fueling 1:13:38: How can people contact Richard?
On this episode of Moscow Mules and NOP Slides, we have Richard Bejtlich. Richard's go to drinks are water, OJ, and milk (with a cookie or brownie). Topics include: hockey, all things martial arts (history, styles, Bruce Lee), doing analysis and writing in late 1990s, Security and the One Percent, writing books, and much more! Dave drinks on a Saison from Cellar Works Brewing. Kyle sips on an Overplayed from HitchHiker Brewing out of a Sensei Leonardo glass from Hops-N-Art. Thank you to Richard for being a guest and the great conversation! We hope you enjoy. Please don't forget to subscribe! Follow us on Twitter @Mules909090. Disclaimer: The views and expressions of the guests and hosts are their own and not of their employers.
From working the help desk to becoming FireEye's Chief Security Strategist and founding his own company Kolide, Jason Meller has a wealth of experience to share about moving up the cybersecurity ladder. On today's episode, he discusses his security journey, including working one of the best help desk jobs of all time, bluescreening his friends in the Wild West days of the Internet and sharing advice for up-and-coming cybersecurity professionals.0:00 - Intro 2:22 - Pixar movie Soul and finding his "spark"6:40 - The Wild West of cybersecurity7:56 - Working at the best help desk ever12:13 - Becoming a cyber threat analyst18:02 - The importance of soft skills21:23 - Becoming a chief security strategist at FireEye24:38 - Working solo vs in a team25:55 - Adding a new superpower with your talents28:03 - Should you leave your job?31:10 - Exploring the psychology of security36:34 - Security veterans and mentorship40:30 - What is Kolide?44:30 - The new work/life balance of security46:40 - OutroHave you seen our new, hands-on training series called Cyber Work Applied? Tune in as expert Infosec instructors teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You'll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred, and more. And it's free! Click the link below to get started.– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/ – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastJason Meller is the CEO and founder of Kolide. Jason has dedicated his career to building products and tools that enable security experts to successfully defend western interests from sophisticated and organized global cyber threats. He started his security and product career at GE's elite computer incident response team, led by Richard Bejtlich (the father of modern network security monitoring). From there, Jason moved to the legendary Mandiant corporation (acquired by FireEye) quickly working his way up from an entry level analyst position to becoming the Chief Security Strategist. As Chief Security Strategist at FireEye, Jason was responsible for rapidly building products and services with an engineering strike team to facilitate and grow high-profile partnerships and key strategic initiatives.About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Mr. Richard Bejtlich is a martial arts practitioner and student of Brazilian Jiu-Jitsu at Team Pedro Sauer I don't want them thinking that they need to cut my head off in order to prove how good they are. I need a different sort of culture. Mr. Richard Bejtlich - Episode 498 When you thought as a kid that your friend is a ninja, you would want to become one as well. Mr. Richard Bejtlich's fascination with martial arts did not materialize until he was a cadet in the Air Force Academy. He started boxing and then got into judo, karate, and the rest is history. Mr. Bejtlich is a distinguished I.T. guy and he holds a lot of white belts on different disciplines. Listen to this episode if you want to know more about Mr. Richard Bejtlich's journey and how he ended up with a lot of white belts. Show Notes In this episode, we mentioned former guest Stephan Kesting, legend Bruce Lee, and the book A Killing Art by Alex Gillis
After entering the Air Force under a sense of obligation and duty, Richard Bejtlich to the rank of captain and specialized in Information Warfare before he could no longer ignore the inner voice telling him that he was on the wrong path. With great courage he left the stability of the military and carved out a highly successful career as a cybersecurity expert. Along the way he learned several lessons on the dangers of burnout and career fulfillment which he shares in this conversation. Check out Richard's Site Find out more about Nic's Coaching Program
Decipher Editor-in-Chief Dennis Fisher talks with Richard Bejtlich, a veteran security practitioner, consultant, and author, about his new role at Corelight, the evolution of network defense, and the difficulty of running complex incident response investigations.
We kick off season two by welcoming Richard Bejtlich onto the podcast. Richard spent the bulk of his career helping further the evolution of network security monitoring through stints at AFCERT, GE, and Mandiant. We talked about his career evolution, the future of computer network defense, the revolution of private intelligence, and how he almost became an astronaut.
Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Chris-Sistrunk-NSM-101-for-ICS.pdf NSM 101 for ICS Chris Sistrunk Sr. ICS Security Consultant, FireEye Is your ICS breached? Are you sure? How do you know? The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available. In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation will show how NSM should be part of ICS defense and response strategy, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS security program. Free tools such as Security Onion, Snort IDS, Bro IDS, NetworkMiner, and Wireshark will be used to look at the ICS environment for anomalies. It will be helpful if attendees have read these books (but they aren't required): The Cuckoo's Egg by Cliff Stoll, The Practice of Network Security Monitoring by Richard Bejtlich, and Applied Network Security Monitoring by Chris Sanders and Jason Smith. Chris Sistrunk is a Senior Consultant at Mandiant, focusing on cyber security for industrial control systems (ICS) and critical infrastructure. Prior to joining Mandiant, Chris was a Senior Engineer at Entergy (over 11 years) where he was the Subject Matter Expert (SME) for SCADA systems. He has 10 years of experience in SCADA systems with tasks such as standards development, system design, database configuration, testing, commissioning, troubleshooting, and training. He was the co-overseer of the SCADA, relay, and cyber security labs at Entergy for 6 years. Chris has been working with Adam Crain of Automatak on Project Robus, an ICS protocol fuzzing project that has found and helped fix many implementation vulnerabilities in DNP3, Modbus, and Telegyr 8979. Chris helped organize the first ICS Village, which debuted at DEF CON 22. He is a Senior Member of IEEE, Mississippi Infragard President, member of the DNP Users Group, and also is a registered PE in Louisiana. He holds a BS in Electrical Engineering and MS in Engineering and Technology Management from Louisiana Tech University. Chris also founded and organizes BSidesJackson, Mississippi's only cyber security conference. Twitter: @chrissistrunk https://www.facebook.com/chrissistrunk
Getting BSD:Order CD's online - choose one close to you - buy to support projectBook Store - Many books come with CDsLocal Users Group - Free CDs and InstallfestDownload ISO - http, ftp, mirrors, bittorrentNet Install CDInterview with Richard Bejtlich from www.taosecurity.com
In our fifty-ninth episode of the Steptoe Cyberlaw Podcast, Stewart Baker, Michael Vatis, Jennifer Quinn-Barabanov, and Maury Shenk discuss: China’s acknowledgement that it has a cyberwar strategy; the Judicial Conference Advisory Committee on Criminal Rules’ vote to amend Rule 41; automakers facing cybersecurity class action lawsuits; the UK’s plan to regulate bitcoin; Target’s $10 million settlement; and China’s effort to exclude US technology companies from its market. In our second half we have an interview with Richard Bejtlich, Chief Security Strategist at FireEye, adviser to Threat Stack, Sqrrl, and Critical Stack, and fellow at Brookings Institution. The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
Richard Bejtlich is Mandiant's Chief Security Officer. Prior to joining Mandiant, Mr. Bejtlich was the Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). He wrote The Tao of Network Security Monitoring, Extrusion Detection, and co-authored Real Digital Forensics. He currently writes for his blog TaoSecurity and teaches for Black Hat.
This show we have a special guest Richard Bejtlich, founder of TAO Security, who talks about his security blog and his book Real Digital Forensics (see link on cyberspeak page). Bret has a short show this week, Ovie is recovering from his Blackhat hangover (ok really he is working this weekend, but hangover sounds more interesting). Bret talks about BlackHat 2006, changes on the cyberspeak site, Kevin Mandia's SC Magazine article "What pill can I take for cyber insecurity?", and real time airport monitoring.