POPULARITY
Guests: Malcolm Harkins, Chief Security & Trust Officer at Epiphany SystemsOn LinkedIn | https://www.linkedin.com/in/malcolmharkins/Robb Reck, Chief Trust and Security Officer at Red CanaryOn LinkedIn | https://www.linkedin.com/in/robbreck/Host: Matthew RosenquistOn ITSPmagazine
All links and images for this episode can be found on CISO Series If you're happy with your best practice of rotating passwords, that's great for you. Just don't lay your old-timey "rules for better security" on me boomer. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Robb Reck (@robbreck), CISO on sabbatical and co-founder Colorado=Security, a podcast and Slack community. Thanks to our podcast sponsor, VMware In this episode: Who is supposed to put “security” into the shifted left SDLC? What's the scarcest resource to a CISO? Is it headcount or money? What's the hardest part about being a CISO? How to choose the “best” best practices.
Jim and Jeff talk with Robb Reck, Chief Information Security Officer at Ping Identity, about the Solar Winds breach aka Solorigate, Zero Trust, and Identity Management Day 2021. Connect with Robb on LinkedIn here: https://www.linkedin.com/in/robbreck/ Robb's Colorado = Security Podcast: https://www.colorado-security.com/ Identity Management Day 2021: www.identitymanagementday.org Identiverse 2021: https://identiverse.com/ Connect with Jim and Jeff on LinkedIn here: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show at www.IdentityAtTheCenter.comand follow @IDACPodcast on Twitter. --- Send in a voice message: https://anchor.fm/identity-at-the-center/message
Comedy - Alex Wood and Robb Reck of Colorado=Security (www.colorado-security.com) join me in this episode. Starring Jason Jaques (@JasonJaquesTech)
Robb Reck, CISO at Ping Identity, joins ESW to discuss the current focus for some companies including , passwordless authentication, focus on customer identity, and zero trust acceleration during COVID. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode190
Robb Reck, CISO at Ping Identity, joins ESW to discuss the current focus for some companies including , passwordless authentication, focus on customer identity, and zero trust acceleration during COVID. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode190
This week, we talk Enterprise News, to talk about Why You Need Recorded Futures Ultimate Security Intelligence Kit, Securing the Multi-Cloud Environment through CSPM and SSPM, CyberKnight joins forces with Armis to bring agentless EDR to OT, IoT and ICS environments, Attivo Networks' enhanced EDN solution prevents attackers from seeing or exploiting production data, Check Point Infinity SOC is launched, and more! In our second segment, we welcome Scott DeLong, Chief Information Officer and Sr. Technology & Security Officer at Scott DeLong & Associates, to talk about Living Through a Ransomware Attack! In our final segment, we welcome Robb Reck, Chief Information Security Officer at Ping Identity, to discuss Trends in Enterprise Identity! Show Notes: https://wiki.securityweekly.com/ESWEpisode190 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we talk Enterprise News, to talk about Why You Need Recorded Futures Ultimate Security Intelligence Kit, Securing the Multi-Cloud Environment through CSPM and SSPM, CyberKnight joins forces with Armis to bring agentless EDR to OT, IoT and ICS environments, Attivo Networks' enhanced EDN solution prevents attackers from seeing or exploiting production data, Check Point Infinity SOC is launched, and more! In our second segment, we welcome Scott DeLong, Chief Information Officer and Sr. Technology & Security Officer at Scott DeLong & Associates, to talk about Living Through a Ransomware Attack! In our final segment, we welcome Robb Reck, Chief Information Security Officer at Ping Identity, to discuss Trends in Enterprise Identity! Show Notes: https://wiki.securityweekly.com/ESWEpisode190 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Foreign intelligence services attribute a recent cyberattack on an Iranian port to Israeli operators. EasyJet discloses a breach of passenger information. Verizon’s annual Data Breach Report is out, and it finds more errors than it does exploits. A look at the Dark Web during the pandemic. US authorities warn local law enforcement to watch for misinformation-driven telecom vandalism. Ben Yelin explains why the ACLU is suing Baltimore over a surveillance plane. Our guest is Robb Reck from Ping Identity on a recent CISO Advisory Council meeting regarding the sudden shift to working from home. And REvil is still offering celebrity dirt for sale...if they’ve actually got any. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/9/97
Fancy Bear is pawing at anti-doping agencies, again, suggesting more to come for the 2020 Tokyo Olympics. Johannesburg has declined to pay the Shadow Kill Hackers the money they demanded. Adwind jRAT has gotten a bit harder to detect. The US FCC is considering a measure that would prevent certain funds from being used to purchase Huawei or ZTE gear. Pwn2Own goes ICS. Georgia is hit by unknown hackers, and Magecart appears in an American Cancer Society website. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Robb Reck from Ping Identity with their research, 5 Steps to Improve API Security.
A US Defense Intelligence Agency analyst has been charged with leaking national defense information. Europol releases its 2019 Internet Organized Crime Threat Assessment. NSA Director Nakasone says the Agency’s Cybersecurity Directorate will first focus on protecting the Defense Industrial Base from intellectual property theft. CISA wants subpoena power over ISPs. And US companies are criticised for caving to Beijing's demands. Robert M. Lee from Dragos on regulations vs incentives when securing the electrical grid. Guest is Robb Reck from Ping Identity with results from their CISO Advisory Council’s new research on Securing Customer Identity. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_10.html Support our show
Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html Support our show
Recorded Future - Inside Threat Intelligence for Cyber Security
Our guest today is Robb Reck, chief information security officer at Ping Identity. With nearly 20 years of experience in IT security, compliance, and systems and networking, Robb has witnessed the evolution of the space. He shares his professional journey, his management style and philosophy when it comes to hiring, and where he sees the intersection of identity management and threat intelligence. We’ll hear about his role with Ping Identity, protecting the organization and its customers, and where he sees identity management and access control heading in the future, as sensitive data flows more freely between organizations, individuals, and third parties.
Our guest today is Robb Reck, chief information security officer at Ping Identity. With nearly 20 years of experience in IT security, compliance, and systems and networking, Robb has witnessed the evolution of the space. He shares his professional journey, his management style and philosophy when it comes to hiring, and where he sees the intersection of identity management and threat intelligence. We'll hear about his role with Ping Identity, protecting the organization and its customers, and where he sees identity management and access control heading in the future, as sensitive data flows more freely between organizations, individuals, and third parties.
In today’s podcast, an arrest has been made in #hackerangriff: a student in the German state of Hessen. The US begins a campaign to heighten businesses’ awareness of cyber espionage. Observers see a coming “cyber cold war,” with China on one side and a large number of other countries on the other. Facebook is following a widening investigation into the use of inauthentic accounts, ads, and sites in recent US elections. WikiLeaks’ lawyers tell news media to stop defaming the organization and its founder. Emily Wilson from Terbium Labs on the nine lives of a credit card. Guest is Robb Reck from Ping Identity on NIST password guidance. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_08.html Support our show
In today's podcast we hear that the US FBI and DHS warn that RDP exploitation is up. Facebook's breach exhibits the tension between swift disclosure and sound incident response. A look at slow-rolled disclosure. Google draws criticism for some content it hosts. North Korea's Reaper Group never missed a beat. Citizen Lab says Saudi Arabia is spying on at least one prominent dissident who's a permanent resident in Canada. Nepal's airport is hacked, apparently for the lulz. Joe Carrigan from JHU ISI on Android password managers being vulnerable to malicious apps. Guest is Robb Reck from Ping Identity on recently published white papers from the CISO Advisory Council. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_02.html Support our show
In this episode: Vance Brown and Hannah Parsons of the National Cybersecurity Center, is our feature interview this week. News from: Great American Beer Fest, Techstars, Western Union, Arrow Electronics, Adobe, Marketo, Optiv, root9B, Intelisecure, Virtual Armor, Red Canary, Ping Identity, Zvelo, CenturyLink and a lot more! Want a beer? You’re in the right place People are drinking an awful lot of beer in Denver this week. I-70 is a good place for driving without drivers. What? Techstars, Western Union and Arrow are all looking to innovate. Marketo gets paid. Colorado has 4 top MSSPs. Stories from Red Canary, Ping Identity and Zvelo. And CenturyLink gets a new CSO. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com Local security news: Join the Colorado = Security Slack channel Colorado brewers win 30 medals at Great American Beer Festival Inrix ranks Colorado's Interstate 70 among top U.S. routes for driverless truck deployment Techstars and Western Union team up for new innovation accelerator Arrow Electronics to build 'Colorado Open Lab' in headquarters to advance smart city technology Adobe to buy Marketo for $4.75 billion in largest acquisition to date Top 100 MSSPs Red Canary blog: Detecting MSXSL Abuse in the Wild The Burden of State Data Privacy Laws: A Q&A with Robb Reck from Ping Identity Zvelo blog: What is Malicious Cryptocurrency Mining? | History and Prevention CenturyLink hires former Apple executive as new security chief Job Openings: Ping Identity - Cloud Security Architect Ping Identity - Product Security Engineer Ping - NOC/SOC Manager (SRE Manager, Cloud Operations) Journey - Cryptographic Software Engineer Journey - Security Architect Splunk - Security Markets Specialist Zillow - IT Compliance Analyst Western Union - Senior Manager, Information Security Incident Response FireEye - Principal Penetration Tester- Red Team RiverPoint - IT Security Manager Transamerica - Manager, IT and Info Security Risk Management Upcoming Events: This Week and Next: C-Suite Awards Celebration 2018 - 9/25 GDPR Meetup - Encryption for GDPR Compliance, Fact and Fiction - 9/25 NCC - Cyber for Executives - 9/26 SecureSet - Capture the Flag - 9/28 Secureset - Expert Series: Chris Martinez - 10/4 Lockton Mountain West Cyber Day - 10/4 Colorado Springs Cybersecurity - First Friday - Cybersecurity Social & Mixer - 10/5 Other Notable Upcoming Events SecureWorld Denver - 10/31-11/1 CTA - Apex Awards - 11/7 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
A robust security control architecture can improve business agility and overcome the “drag coefficient” on business velocity created by users and/or business processes being impeded by high-friction security controls, which in the tong-term can result in systemic business risk. In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Robb Reck (@robbreck) as they delve into the subject of security friction within organizations and how to overcome obstacles to success.
Colorado = Security (https://www.colorado-security.com/) . Rob is the Chief Information Security Officer at ISSA Denver (http://denver.issa.org/) , the largest ISSA chapter in the world. Alex is the Chief Information Security Officer for University of Denver (http://universitycollege.du.edu/ict/degree/masters/information-systems-security-online/degreeid/402) . In this episode we discuss volunteering in the cyber security community, the local Denver security community, security leadership, recruiting outside of traditional, the importance of IR planning, selling security within an organization, and so more. (https://www.colorado-security.com/) Where you can find Rob: LinkedIn (https://www.linkedin.com/in/robbreck/) Twitter (https://twitter.com/robbreck) Blog (https://inforeck.wordpress.com/) Where you can find Alex: LinkedIn (https://www.linkedin.com/in/alexbwood/) Twitter (https://twitter.com/abwoodrow)