POPULARITY
Joining in this Meat and Potatoes podcast from Toronto, Canada is Rohit Sethi, CEO of Security Compass. In this interview, Sethi explains why most businesses are experiencing cyber attacks and teaches how businesses can shield themselves--and save money--by building their cybersecurity systems early. Outline of the show: 0:00 Introduction 2:00 Security Compass 6:45 Is speed the goal? 10:45 Security by design 13:00 Industry standards 15:45 Security breaches 21:40 Customer consultation 25:00 How do you achieve cyber security 32:00 Chief Product Security Officer 35:00 Upcoming for Security Compass 36:50 Please reach out! 37:15 Closing Show Links: https://www.securitycompass.com Apple Podcasts - https://podcasts.apple.com/us/podcast/meat-potatoes-podcast/id1262148655 Spotify Podcasts - https://open.spotify.com/show/4T9PSMVqgQNf7lCF3NdDgS?si=e0c6a92bc89e4fe7 Social: Twitter - https://twitter.com/siliconslopes Instagram - https://www.instagram.com/siliconslopes/ LinkedIn - https://www.linkedin.com/company/silicon-slopes/
Joining in this Meat and Potatoes podcast from Toronto, Canada is Rohit Sethi, CEO of Security Compass. In this interview, Sethi explains why most businesses are experiencing cyber attacks and teaches how businesses can shield themselves--and save money--by building their cybersecurity systems early. Outline of the show: 0:00 Introduction 2:00 Security Compass 6:45 Is speed the goal? 10:45 Security by design 13:00 Industry standards 15:45 Security breaches 21:40 Customer consultation 25:00 How do you achieve cyber security 32:00 Chief Product Security Officer 35:00 Upcoming for Security Compass 36:50 Please reach out! 37:15 Closing Show Links: https://www.securitycompass.com Apple Podcasts - https://podcasts.apple.com/us/podcast/meat-potatoes-podcast/id1262148655 Spotify Podcasts - https://open.spotify.com/show/4T9PSMVqgQNf7lCF3NdDgS?si=e0c6a92bc89e4fe7 Social: Twitter - https://twitter.com/siliconslopes Instagram - https://www.instagram.com/siliconslopes/ LinkedIn - https://www.linkedin.com/company/silicon-slopes/
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
Rohit Sethi from Security Compass joined the Technado team this week to talk about their platform to drive secure application development. Then, in Deja News, he gave his opinions on the new IoT cybersecurity law. In other news, the crew reported on the google services outage, Cloudflare and apple collaborating on a new internet protocol, CentOS Linux 8 shifting to CentOS Stream, new security measures for Microsoft 365, and the big nation-state attack on Solarwinds that FireEye discovered.
In today’s podcast, we hear that the US Attorney General has reported to Congress the results of Special Counsel Mueller’s investigation. The basic finding is that there’s no evidence of collusion with Russian influence operations. ISIS no longer holds any ground. Expect it back in cyberspace. LockerGoga ransomware hits two chemical plants. FEMA mishandles more than two-million disaster victims’ PII. Notes on Cyber 9/12. And there’s a squabble for YouTube subscribers. Robert M. Lee from Dragos on their recent purchase of Next Defense and the subsequent open-sourcing of their tools. Guest is Rohit Sethi from Security Compass on the PCI security framework. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_25.html Support our show
Application Security Requirements & Threat Management (ASRTM)is a great way to: • Lowering costs to build secure software • Making security measurable • Turning unplanned work into planned work • Freeing up time away from remediation, and into feature development • Having a single process that works with in-house, outsourced, and commercial software • Providing confidence that software is secure, when requirements are linked to verification In this chat with Rohit Sethi of Security Compass, we discuss ASRTM and how it helps DevOps teams, security teams and DevSecOps.
Application Security Requirements & Threat Management (ASRTM)is a great way to: • Lowering costs to build secure software • Making security measurable • Turning unplanned work into planned work • Freeing up time away from remediation, and into feature development • Having a single process that works with in-house, outsourced, and commercial software • Providing confidence that software is secure, when requirements are linked to verification In this chat with Rohit Sethi of Security Compass, we discuss ASRTM and how it helps DevOps teams, security teams and DevSecOps.
In today's podcast, we hear that NSA says it warned its French counterparts about Russian cyber ops targeting France's elections. Next up for Fancy Bear? Probably German elections, but in the meantime there's also some phishing with zero-days. The NSA Director also advocates calling out Russia for bad behavior in cyberspace, and says that US Cyber Command is ready and able to hold targets at risk, so deterrence and retaliation are available options. Microsoft, Adobe, and Cisco issued significant patches yesterday. Accenture Labs' Malek Ben Salem shares results from their security survey. Rohit Sethi from Security Compass outlines managing application security. And President Trump has told the FBI Director, "you're fired."
Synopsis Over the past year and a half of so, I've been pushing hard to change the paradigm around secure software - specifically the testing aspect of it to incorporate a much heavier emphasis on quality assurance. That conversation spilled over into an OWASP conversation, which lead Glenn, Rohit and I to sit down and record this conversation we had - as we appear to be of like mind. While it's not trivial to incorporate security testing into quality assurance, it's not impossible, and in fact, more practical than you may think. In this segment we discuss what security testing in a QA team looks like, how it's potentially split up, and whether we can really and truly make it work. Glenn provides his practical perspective being an implementer of this methodology, while Rohit and I provide an across-the-industry discussion and commentary. I think you'll find this podcast episode fascinating, especially if you're struggling with the QA/Security relationship. Guests Rohit Sethi - VP Product Development at SD Elements (http://www.sdelements.com)Rohit Sethi is a specialist in building security controls into the software development life cycle (SDLC). Rohit is a SANS course developer and instructor on Secure J2EE development. He has spoken and taught at FS-ISAC, RSA, OWASP, Shmoocon, CSI National, Sec Tor, Infosecurity New York and Toronto, TASK, the ISC2's Secure Leadership series conferences, and many others. Mr. Sethi has written articles for Dr. Dobb's Journal, TechTarget, Security Focus and the Web Application Security Consortium (WASC), and he has been quoted as an expert in application security for ITWorldCanada and Computer World. He also leads the OWASP Design Patterns Security Analysis project. Glenn Leifheit - Lead Information Security Consultant at FICO (http://www.fico.com)Glenn Leifheit, CISSP, CSSLP is a Senior Security Architect at FICO. He has worked in developing, managing, architecting and securing large scale applications for over 15 years. His day is spent rolling out an Enterprise secure software development lifecycle and managing PCI requirements as well as secure software reviews. Glenn is active in the Technology community as the Co-Chair of (ISC)2 Application Security Advisory Board, President of TechMasters Twin Cities, as an active member of IASA (International Association of Software Architects) and OWASP (Open Web Application Security Project) as well as a regional speaker evangelizing secure software. Glenn's blog is located at www.glennleifheit.com. Links No links for this podcast...