Podcast appearances and mentions of ryan kazanciyan

  • 8PODCASTS
  • 9EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 5, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ryan kazanciyan

Latest podcast episodes about ryan kazanciyan

Crying Out Cloud
Navigating Hyper Growth, AI Impact, and Mandiant Memories - Special Guest: Ryan Kazanciyan

Crying Out Cloud

Play Episode Listen Later Aug 5, 2024 37:30


CISO Stories Podcast
CSP #101 - Security Top of Mind: Key Learnings from 2022 & Thoughts on 2023 - Ryan Kazanciyan

CISO Stories Podcast

Play Episode Listen Later Dec 20, 2022 25:21


Join Ryan Kazanciyan, CISO at Wiz (previously Meta, Tanium, Mandiant), and Raaz Herzberg from Wiz for a discussion on core security challenges we saw in 2022 and what should be top of mind for companies and security teams as they head into 2023. This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/  Show Notes: https://securityweekly.com/csp101

CISO Stories Podcast
CSP #93 - Approaching Cloud Security from a Cloud-Native Perspective - Josh Dreyfuss

CISO Stories Podcast

Play Episode Listen Later Oct 25, 2022 20:57


What is the best way to approach cloud security as the cloud environment evolves and what should security leaders consider as they think about scaling their security? Join us to learn about how CISO of Wiz, Ryan Kazanciyan thinks about cloud security from a cloud-native perspective, what makes securing your cloud infrastructure so challenging, and what makes your cloud security posture “good”? This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/ Visit https://securityweekly.com/csp for all the latest episodes! Show Notes: https://securityweekly.com/csp93

Cracking Cyber Security Podcast from TEISS
Are we investing too much in cyber security?

Cracking Cyber Security Podcast from TEISS

Play Episode Listen Later Feb 1, 2019 16:45


On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE.Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can companies really avoid having a weak link in their armour? What questions should organisations be asking when it comes to protecting themselves?Find out how Orion and Ryan responded and more on the episode.

Spockcast - a Star Trek Discovery podcast
Episode 27: Who Are You?

Spockcast - a Star Trek Discovery podcast

Play Episode Listen Later Oct 14, 2018 76:53


We follow up lightly on Westworld Season 2. We give our overall feelings about the Solo movie. In our headlines we discuss the cancellation of Space TV's Innerspace sci-fi magazine show. We discuss the return of Michael Myers in Halloween, also what happened on Agents of Shield around the Avengers. Halston Sage has left the Orville. The new Spock actor and there are some new Eagle Moss Star Trek models. We cover the Star Trek: Discovery, Short Trek - Runaway. Mr. Robot's uses Kibana on the show. We discuss the Season 11 premier of Dr Who - spoiler free! This is Jaime's first ever viewing of Dr Who, leading to lengthy review of the Who lore. Watchlist: First Man, Netflix's Maniac, Supergirl.Links:InnerSpace cancelled at Space | TV, eh?Eaglemoss Reveals Several More STAR TREK Ship Models | TrekCore BlogJessica Szohr On Set Of The Orville As New Security Chief? — ...‘Star Trek: Short Treks' schedule set preceding ‘Star Trek: Discovery's' return – Star Trek: Age of DiscoveryHow Mr. Robot's Technical Consultant, Ryan Kazanciyan, used Kibana on the Show | ElasticManiacFirst Man - Official Trailer (HD) - YouTubeStar Trek: Discovery Season 2 NYCC Trailer | Rotten Tomatoes TV - YouTube

Hanselminutes - Fresh Talk and Tech for Developers
Mr. Robot Disassembled with Ryan Kazanciyan

Hanselminutes - Fresh Talk and Tech for Developers

Play Episode Listen Later Feb 15, 2018 33:21


Ryan Kazanciyan is the Chief Security Architect at Tanium, and in his spare time worked as Technical Consultant for Mr. Robot alongside writer and producer Kor Adana. Why is Mr. Robot so unique in the quality of its on-screen hacks? How does one make a hack both real AND entertaining a technical and non-technical audience? Is there a lot of pressure knowing that Reddit will screenshot every frame and analyze it? All this and, how afraid should we be of our compromised computers?

robots reddit tanium technical consultant disassembled chief security architect kor adana ryan kazanciyan
Decrypted, Ars Technica's TV podcast
Looking forward after the "h4ndshake" shake-up (Mr. Robot S2)

Decrypted, Ars Technica's TV podcast

Play Episode Listen Later Aug 20, 2016 15:54


"h4ndshake" (S2E7) shook up Mr. Robot like few previous episodes have. While the critical opinion seems split on how the show handled its latest reveal, one thing rings a bit false—the notion this was some unexpected "twist." This week we *had* to break down the big news, which raises more question than it answers (that's a good thing, btw).  Looking forward, two of the show's tech advisors—Tanium's Andre McGregor and Ryan Kazanciyan—presented a webinar this week with plenty of behind the scenes info. Amid talk of their favorite hacks so far or how real Angela's hacking prowess is, they dropped a few hints about what might be coming in the final episodes of S2. 

Decrypted, Ars Technica's TV podcast
Looking forward after the "h4ndshake" shake-up (Mr. Robot S2)

Decrypted, Ars Technica's TV podcast

Play Episode Listen Later Aug 20, 2016 15:53


"h4ndshake" (S2E7) shook up Mr. Robot like few previous episodes have. While the critical opinion seems split on how the show handled its latest reveal, one thing rings a bit false—the notion this was some unexpected "twist." This week we *had* to break down the big news, which raises more question than it answers (that's a good thing, btw).  Looking forward, two of the show's tech advisors—Tanium's Andre McGregor and Ryan Kazanciyan—presented a webinar this week with plenty of behind the scenes info. Amid talk of their favorite hacks so far or how real Angela's hacking prowess is, they dropped a few hints about what might be coming in the final episodes of S2.  Learn more about your ad choices. Visit podcastchoices.com/adchoices

DEF CON 22 [Materials] Speeches from the Hacker Convention.
Ryan Kazanciyan and Matt Hastings, Investigating PowerShell Attacks

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Play Episode Listen Later Dec 13, 2014


Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kazanciyan-Hastings/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly utilize PowerShell to conduct command-and-control in compromised Windows environments. If your organization is running Windows 7 or Server 2008 R2, you've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!). This has created a whole new playground of attack techniques for intruders that have already popped a few admin accounts (or an entire domain). Even if you're not legitimately using PowerShell to administer your systems, you need to be aware of how attackers can enable and abuse its features. This presentation will focus on common attack patterns performed through PowerShell - such as lateral movement, remote command execution, reconnaissance, file transfer, etc. - and the sources of evidence they leave behind. We'll demonstrate how to collect and interpret these forensic artifacts, both on individual hosts and at scale across the enterprise. Throughout the presentation, we'll include examples from real-world incidents and recommendations on how to limit exposure to these attacks. Ryan Kazanciyan is a Technical Director with Mandiant and has ten years of experience in incident response, forensic analysis, and penetration testing. Since joining Mandiant in 2009, he has led incident response and remediation efforts for dozens of Fortune 500 organizations, focusing on targeted attacks, industrial espionage, and financial crime. He has also helped develop Mandiant's investigative methodologies, forensic analysis techniques, and technologies to address the challenges posed by skilled intruders in complex environments. Prior to his work in incident response, Ryan led and executed penetration tests for both private and public-sector clients. His background included red-team operations in Windows and Unix environments, web application security assessments, and social engineering. As a lead instructor and content author for Mandiant's incident response training, Ryan also regularly teaches classes for corporate security teams, federal law enforcement, and at industry conferences. Twitter: @ryankaz42 Matt Hastings is a Consultant with Mandiant, a division of FireEye, Inc. Based in the Washington D.C area, Matt focuses on enterprise-wide incident response, high-tech crime investigations, penetration testing, strategic corporate security development, and security control assessments; working with the Federal government, defense industrial base, financial industry, Fortune 500 companies, and global organizations. Twitter: @HastingsVT