POPULARITY
Join Ryan Kazanciyan, CISO at Wiz (previously Meta, Tanium, Mandiant), and Raaz Herzberg from Wiz for a discussion on core security challenges we saw in 2022 and what should be top of mind for companies and security teams as they head into 2023. This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/ Show Notes: https://securityweekly.com/csp101
What is the best way to approach cloud security as the cloud environment evolves and what should security leaders consider as they think about scaling their security? Join us to learn about how CISO of Wiz, Ryan Kazanciyan thinks about cloud security from a cloud-native perspective, what makes securing your cloud infrastructure so challenging, and what makes your cloud security posture “good”? This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/ Visit https://securityweekly.com/csp for all the latest episodes! Show Notes: https://securityweekly.com/csp93
On this week’s episode, we talk to cyber security company Tanium’s CEO Orion Hindawi and Chief Technology Officer, Ryan Kazanciyan, at their yearly conference, CONVERGE.Is it fair to label vendors as the snake oil of the cyber security industry? How can CISOs measure risk and present their findings to the board in a comprehensive way? Can companies really avoid having a weak link in their armour? What questions should organisations be asking when it comes to protecting themselves?Find out how Orion and Ryan responded and more on the episode.
We follow up lightly on Westworld Season 2. We give our overall feelings about the Solo movie. In our headlines we discuss the cancellation of Space TV's Innerspace sci-fi magazine show. We discuss the return of Michael Myers in Halloween, also what happened on Agents of Shield around the Avengers. Halston Sage has left the Orville. The new Spock actor and there are some new Eagle Moss Star Trek models. We cover the Star Trek: Discovery, Short Trek - Runaway. Mr. Robot's uses Kibana on the show. We discuss the Season 11 premier of Dr Who - spoiler free! This is Jaime's first ever viewing of Dr Who, leading to lengthy review of the Who lore. Watchlist: First Man, Netflix's Maniac, Supergirl.Links:InnerSpace cancelled at Space | TV, eh?Eaglemoss Reveals Several More STAR TREK Ship Models | TrekCore BlogJessica Szohr On Set Of The Orville As New Security Chief? — ...‘Star Trek: Short Treks' schedule set preceding ‘Star Trek: Discovery's' return – Star Trek: Age of DiscoveryHow Mr. Robot's Technical Consultant, Ryan Kazanciyan, used Kibana on the Show | ElasticManiacFirst Man - Official Trailer (HD) - YouTubeStar Trek: Discovery Season 2 NYCC Trailer | Rotten Tomatoes TV - YouTube
Ryan Kazanciyan is the Chief Security Architect at Tanium, and in his spare time worked as Technical Consultant for Mr. Robot alongside writer and producer Kor Adana. Why is Mr. Robot so unique in the quality of its on-screen hacks? How does one make a hack both real AND entertaining a technical and non-technical audience? Is there a lot of pressure knowing that Reddit will screenshot every frame and analyze it? All this and, how afraid should we be of our compromised computers?
"h4ndshake" (S2E7) shook up Mr. Robot like few previous episodes have. While the critical opinion seems split on how the show handled its latest reveal, one thing rings a bit false—the notion this was some unexpected "twist." This week we *had* to break down the big news, which raises more question than it answers (that's a good thing, btw). Looking forward, two of the show's tech advisors—Tanium's Andre McGregor and Ryan Kazanciyan—presented a webinar this week with plenty of behind the scenes info. Amid talk of their favorite hacks so far or how real Angela's hacking prowess is, they dropped a few hints about what might be coming in the final episodes of S2.
"h4ndshake" (S2E7) shook up Mr. Robot like few previous episodes have. While the critical opinion seems split on how the show handled its latest reveal, one thing rings a bit false—the notion this was some unexpected "twist." This week we *had* to break down the big news, which raises more question than it answers (that's a good thing, btw). Looking forward, two of the show's tech advisors—Tanium's Andre McGregor and Ryan Kazanciyan—presented a webinar this week with plenty of behind the scenes info. Amid talk of their favorite hacks so far or how real Angela's hacking prowess is, they dropped a few hints about what might be coming in the final episodes of S2. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Slides Here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Kazanciyan-Hastings/DEFCON-22-Ryan-Kazanciyan-Matt-Hastings-Investigating-Powershell-Attacks.pdf Investigating PowerShell Attacks Ryan Kazanciyan TECHNICAL DIRECTOR, MANDIANT Matt Hastings CONSULTANT, MANDIANT Over the past two years, we've seen targeted attackers increasingly utilize PowerShell to conduct command-and-control in compromised Windows environments. If your organization is running Windows 7 or Server 2008 R2, you've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!). This has created a whole new playground of attack techniques for intruders that have already popped a few admin accounts (or an entire domain). Even if you're not legitimately using PowerShell to administer your systems, you need to be aware of how attackers can enable and abuse its features. This presentation will focus on common attack patterns performed through PowerShell - such as lateral movement, remote command execution, reconnaissance, file transfer, etc. - and the sources of evidence they leave behind. We'll demonstrate how to collect and interpret these forensic artifacts, both on individual hosts and at scale across the enterprise. Throughout the presentation, we'll include examples from real-world incidents and recommendations on how to limit exposure to these attacks. Ryan Kazanciyan is a Technical Director with Mandiant and has ten years of experience in incident response, forensic analysis, and penetration testing. Since joining Mandiant in 2009, he has led incident response and remediation efforts for dozens of Fortune 500 organizations, focusing on targeted attacks, industrial espionage, and financial crime. He has also helped develop Mandiant's investigative methodologies, forensic analysis techniques, and technologies to address the challenges posed by skilled intruders in complex environments. Prior to his work in incident response, Ryan led and executed penetration tests for both private and public-sector clients. His background included red-team operations in Windows and Unix environments, web application security assessments, and social engineering. As a lead instructor and content author for Mandiant's incident response training, Ryan also regularly teaches classes for corporate security teams, federal law enforcement, and at industry conferences. Twitter: @ryankaz42 Matt Hastings is a Consultant with Mandiant, a division of FireEye, Inc. Based in the Washington D.C area, Matt focuses on enterprise-wide incident response, high-tech crime investigations, penetration testing, strategic corporate security development, and security control assessments; working with the Federal government, defense industrial base, financial industry, Fortune 500 companies, and global organizations. Twitter: @HastingsVT