Podcasts about security architecture

The protection of computer systems from theft or damage

  • 130PODCASTS
  • 175EPISODES
  • 33mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Jun 4, 2025LATEST
security architecture

POPULARITY

20172018201920202021202220232024


Best podcasts about security architecture

Latest podcast episodes about security architecture

Cybercrime Magazine Podcast
2025 State of Data Security. Latest Threats & More. Mike Thompson, Varonis.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 4, 2025 15:03


Mike Thompson is the Director, Cloud and Security Architecture at Varonis. In this episode, he joins host Paul John Spaulding to discuss Varonis' 2025 State of Data Security report, including the latest threats, how companies can stay protected, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.

ThePrint
CutTheClutter: India's security architecture, its evolution since 1962 War & how it differs from Pakistan's

ThePrint

Play Episode Listen Later May 1, 2025 21:35


#cuttheclutter Pakistan has a new National Security Adviser (NSA). In Episode 1652 of #CutTheClutter @ShekharGupta contrasts this with India's reconstitution of its National Security Advisory Board, involving balanced representation from the armed forces, police, and diplomacy; he also contextualises these developments within broader civil-military relations, offering insights into two sharply divergent security architectures in South Asia. --------------------------------------------------------------------------------------------- Link to 'Evolution of national security structures in Pakistan' by Nasir Hafeez https://www.jstor.org/stable/48529365 --------------------------------------------------------------------------------------------- Link to 'The Evolution of India's National Security Architecture' by P.S. Raghavan: https://idsa.in/system/files/jds/13-3-2019-evolution-of-india-national-security.pdf --------------------------------------------------------------------------------------------- Produced By: Mahira Khan

BlueDragon Podcast
S02E03 Cybersecurity Architecture in Azure - Graham Gold

BlueDragon Podcast

Play Episode Listen Later Apr 15, 2025 58:41


SUMMARYGraham Gold, co-author of the Microsoft Cybersecurity Architect Exam, discusses extensive background in IT, the relevance of cybersecurity architecture in cloud environments, and the evolving landscape of cybersecurity practices.Key topics include the importance of identity management, the challenges of hybrid cloud environments, and strategies for assessing and improving security in cloud applications.The conversation emphasizes the need for visibility, risk management, and a proactive approach to cybersecurity. Moreover Graham Gold discusses critical aspects of modern security architecture, emphasizing the importance of least privilege, segregation of duties, and the roles of SIEM and SOAR in enhancing security operations.He highlights the necessity of automation in security processes to keep pace with the rapid changes in cloud environments.The discussion also covers the state of security awareness in financial services, navigating compliance in the cloud, budgeting for security investments, and the shared responsibility model in cloud security.Finally, Graham provides insights on preparing for the SC-100 exam and his future endeavors in the field of security.CHAPTERS(00:00:00) INTRO (00:00:40) Introduction to Cybersecurity Architecture (00:03:57) Understanding Microsoft Certification Levels (00:05:52) The Relevance of Cybersecurity in Cloud (00:08:03) Shifts in Cybersecurity Architecture with Cloud (00:11:11) Identity as the New Perimeter (00:15:59) Challenges in Hybrid Cloud Environments (00:20:05) Making Sense of Data in the Cloud (00:24:57) Assessing Security in Cloud Environments (00:31:36) Implementing Defense in Depth Strategies (00:33:10) Understanding Least Privilege and Segregation of Duties (00:33:38) The Role of SIEM and SOAR in Security Architecture (00:36:01) Automation in Security Operations (00:38:36) The State of Security Awareness in Financial Services (00:40:39) Navigating Compliance in the Cloud (00:43:22) Budgeting for Security: Prioritizing Investments (00:50:38) The Shared Responsibility Model in Cloud Security (00:53:35) Preparing for the SC-100 Exam and Future Insights

InfosecTrain
What is Enterprise Security Architecture? | How Dose cybersecurity Architecture work in Enterprises

InfosecTrain

Play Episode Listen Later Mar 18, 2025 34:36


In this episode of the InfosecTrain podcast, we delve into the concept of Enterprise Security Architecture (ESA) and explore how cybersecurity architecture operates within organizations. ESA is a comprehensive framework that integrates security principles into an organization's overall architecture, aiming to protect data, systems, and networks from threats and vulnerabilities. Our experts discuss the core components of ESA, including preventive, detective, and corrective controls, and how these elements align with business objectives to enhance organizational goals.

The John Batchelor Show
Preview: Colleague Anatol Lieven looks ahead to a new European security architecture that may involve nuclear weapons and arms reduction. More

The John Batchelor Show

Play Episode Listen Later Mar 14, 2025 3:17


Preview: Colleague Anatol Lieven looks ahead to a new European security architecture that may involve nuclear weapons and arms reduction. More 1953 ATOMIC CANNON

ThePrint
CutTheClutter: Reading between the lines after Trump-Zelenskyy spat & the threat to Europe's security architecture

ThePrint

Play Episode Listen Later Mar 3, 2025 21:39


For decades, Europe has relied on cheap gas from Russia, cheap goods from China & free security from the US to maintain its position. But Trump 2.0 threatens to upend the entire system. In Episode 1616 of #CutTheClutter, ThePrint Editor-in-Chief Shekhar Gupta looks back at six weeks of tumult in world politics, Trump's maximalist stance, and what India needs to be wary of ahead of the Quad Leaders' summit.

Packet Pushers - Briefings In Brief
Tech Bytes: How Autodesk Modernized Its Network and Security Architecture with SASE (Sponsored)

Packet Pushers - Briefings In Brief

Play Episode Listen Later Nov 12, 2024 16:23


Today on the Tech Bytes podcast, sponsored by Palo Alto Networks, we talk with Palo Alto Networks customer Autodesk about how it migrated from SD-WAN and traditional remote access VPNs to SASE, or Secure Access Service Edge. We'll talk about the trends that drove Autodesk's migration and the results of their SASE adoption. Our guests... Read more »

ITSPmagazine | Technology. Cybersecurity. Society
Actionable Strategies to Prevent Data Breaches | A Conversation with Sarah Armstrong-Smith | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2024 16:41


Guest: Sarah Armstrong-Smith, Chief Security Advisor, MicrosoftOn LinkedIn | https://www.linkedin.com/in/sarah-armstrong-smithOn Twitter | https://twitter.com/sarahasmith75Host: Dr. Rebecca WynnOn ITSPmagazine  

InfosecTrain
Advanced Security Architecture Modelling: Integrating SOA, IoT, SCADA, and SABSA

InfosecTrain

Play Episode Listen Later Oct 18, 2024 44:33


In this Episode, InfosecTrain explore Advanced Security Architecture Modelling, focusing on integrating SOA (Service-Oriented Architecture), IoT (Internet of Things), SCADA (Supervisory Control and Data Acquisition), and the SABSA framework. Learn how these critical components work together to create robust security solutions for modern enterprises and industrial systems.

Colorado = Security Podcast
267 - 10/1 - CJ Cox, COO at Black Hills Information Security

Colorado = Security Podcast

Play Episode Listen Later Oct 1, 2024 73:30


CJ Cox, Chief Operating Officer at Black Hills Information Security is our feature interview this week, interviewed by Frank Victory. News from Sundance Film, Valhallan, Red Canary, Optiv and a lot more. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week's news: Join the Colorado = Security Slack channel Boulder selected as 1 of 3 finalists to host Sundance Film Festival in 2027 Colorado adds a single Michelin-starred restaurant Houston-based esports company opens metro-area training center, plans more Five Colorado small businesses rank among U.S. Chamber's top 100 How Arvada became Colorado's quantum hub The CrowdStrike outage: Detection and defense in depth | Red Canary A Technological Revolution: How AI is Increasing Efficiency in Cybersecurity Top Five Budget-Friendly OT Networking Improvements for Small Manufacturers UCCS Day of Service – Community Cyber Hygiene Open House - National Cybersecurity Center Job Openings: Invenergy - Director, Cyber Security Programs Twilio - Director, Cybersecurity Counsel S&P Global - Head of Security Architecture & Engineering Moody's - VP-Cybersecurity Engineer (Cyber Investigations Manager) The Trade Desk - Sr. Manager, Global Security & Resilience Bank of America - Cloud Security Controls Deployment Specialist – Global Information Security Protiviti - Privacy Management Senior Consultant ZOLL - Information Security Architect Red Canary - Senior Threat Hunter Xcel Energy - Senior Regulatory Security Consultant Upcoming Events: This Week and Next: Secure World Denver - 10/10 ISSA COS - October Meeting - 10/15 Let's Talk Software Security - Is Pursuing CHANGE Essential in AppSec? - 10/15 CSA Colorado - October Meeting: Addressing Material Risks - 10/15 ISACA Denver - October Chapter Meeting (Online only): Auditing with AI - Demos - 10/17 Webinar: Cisco SCOR: Building a Strong Cybersecurity Foundation - 10/17 ISSA COS - October Mini Seminar - 10/19 ISC2 Pikes Peak - October Meeting - 10/23 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0

She Stands for Peace
Episode Forty-One: Supporting Women's Participation to Early Warning

She Stands for Peace

Play Episode Listen Later Sep 19, 2024 25:39


In this enlightening episode of She Stands for Peace, we delve into the critical role of African women in early warning systems for conflict prevention. We explore the intersection of natural disasters, conflict, and the need for gender-sensitive approaches to early warning mechanisms. With expert insights from Camlus Omogo, Director of IGAD's Conflict Early Warning and Response Mechanism, and Dr. Richard Munang, Head of UNEP's Climate and Early Warning Systems, we examine how women's participation is not only necessary but can significantly enhance the effectiveness of these systems.   Join us as we discuss the importance of inclusivity, the empowerment of women through socio-economic resilience, and the transformative potential of early action over early warning. As we approach the 25th anniversary of UNSCR 1325, we consider the progress made and the urgent priorities ahead to ensure women are integral to Africa's peace and security architecture.  Guests Camlus Omogo on Gender-Sensitive Early Warning Systems  Dr. Richard Munang on Climate Disasters and Empowering Women  Bintou Keita - The Effectiveness of Local Community Engagement in Early Warning Responses  Amb Bankole Adeoye - The African Peace and Security Architecture and the Role of Women   Looking Ahead: Strengthening Women's Participation in Peace Processes.  Tune in to discover the untapped potential of women in safeguarding peace and stability across the African continent, and learn how we can all contribute to a more secure future. Stand for peace with us on She Stands for Peace. 

Founders Podcast
Founders Podcast Season 6 Episode 6

Founders Podcast

Play Episode Listen Later Sep 10, 2024 44:21


In this episode, we're thrilled to welcome Evgeniy, a true innovator and leader in the cybersecurity world. Evgeniy's journey is nothing short of inspiring—starting on the technical frontlines as a firewall deployment engineer, he's now the Vice President of Architecture at the Herjavec Group. But his story doesn't stop there. As a father of four, including twins, Evgeniy has honed the art of staying calm under pressure, a skill that's served him well in his career.Evgeniy's passion for cybersecurity has led him to create not one, but two podcasts—one delving into the technical intricacies of Security Architecture, and the other, Cyber Inspiration, focusing on the business side of the industry. He's also co-founded a unique cybersecurity-focused ski and snowboard conference, blending his love for the industry with his personal interests.Now running his own cyber/media consulting services, Evgeniy brings a wealth of experience and a knack for making complex technical topics accessible to all. He's collaborated with businesses of all sizes, and he's currently writing a book on the importance of soft skills in the technical world. We're excited to dive into his journey, insights, and the wisdom he's gained along the way. Hosted on Acast. See acast.com/privacy for more information.

Delphi Talks
The Gaza War and the Future of the Middle East Security Architecture

Delphi Talks

Play Episode Listen Later Aug 26, 2024 54:30


How do we get back to the pre October 7th rapprochement of different actors in the region? How was the security architecture shaping up before Hamas's attack on Israel? What is the role of leadership and how the regional and  global security architectures intersect? How can the West “win” the global South from China, by bringing the two global conflicts of our time, Ukraine and Gaza, to a fair and sustainable resolution?Recorded at the Delphi Economic Forum in April 2024, this podcast presents an in-depth conversation on the future of Middle East security, featuring some of the top foreign policy and security experts of the region.  THE GAZA WAR AND THE FUTURE OF THE MIDDLE EAST SECURITY ARCHITECTUREEbtesam Al-Ketbi, President, Emirates Policy Center, UAEAhmed Aboudouh, Associate Fellow, Chatham House and Head of China Studies at Emirates Policy Center, UKDlawer Ala' Aldeen, President, Middle East Research Institute, IraqAbdullah Al Saud, Assistant Director General for Policy Planning, Ministry of Foreign Affairs, Saudi ArabiaModerator: Ivana Dragicevic, Journalist, N1 TV, Croatia

EVN Report Podcast
Examining the Context: America's Defense Diplomacy, Understanding Washington's Investment in Armenia's Security Architecture

EVN Report Podcast

Play Episode Listen Later Aug 8, 2024 42:23


In this episode of “Examining the Context” podcast, Dr. Nerses Kopalyan explains the concept of defense diplomacy to understand the strategic framework guiding America's increasing engagement with Armenia's security landscape.

ITSPmagazine | Technology. Cybersecurity. Society
Book | Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More | A Conversation with Evgeniy Kharam | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 7, 2024 27:51


Guest: Evgeniy Kharam, Co-Founder, Security Architecture [@secarchpodcast]On LinkedIn | https://www.linkedin.com/in/ekharam/Website | https://www.softskillstech.ca/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of The Redefining CyberSecurity Podcast, host Sean Martin speaks with Evgeniy Kharam about the essential role of soft skills in the technology and cybersecurity sectors. While many discussions in this field tend to center on hard technical skills or the latest cyber threats, this episode shifts the focus to the often-overlooked soft skills that can drive success.Evgeniy Kharam, who is also an author and holds a key position in his company, shares insightful perspectives from his newly released book 'Architecting Success: The Art of Soft Skills in Technical Sales.' According to Evgeniy, effective communication and connection are foundational elements not just for sales engineers and teams, but for anyone working in any field, including cybersecurity. He notes that regardless of how advanced one's technical skills might be, the ability to connect with people, convey ideas clearly, and build lasting relationships is crucial.One of the primary points that Evgeniy discusses is the changing landscape for sales engineers. He mentions that the role has evolved significantly over the years. Previously, sales engineers primarily focused on giving demos and technical presentations. Today, they are expected to be deeply involved in the sales process, understand procurement intricacies, and effectively communicate technical merits and business values. HostSean Martin addresses the barriers that often exist within organizational cultures, where roles are tightly defined, and stepping outside of one's designated lane can be frowned upon. Evgeniy suggests that this old-school mentality needs to shift. Everyone in a company—from engineers to marketers and beyond—is involved in sales in some way. From making a strong first impression to ensuring clear and intentional communication, soft skills can enhance every aspect of organizational interaction.The duo also touches upon the importance of continuous self-improvement. Evgeniy advises that one of the best ways to practice soft skills is outside the workplace. Whether making a cashier smile or engaging in meaningful conversations with strangers, these efforts contribute to refining one's ability to connect and communicate effectively.Sean Martin concludes the episode by highlighting that everyone is, in essence, always selling something—whether it's a product, a service, or simply themselves. The more refined these soft skills, the better positioned anyone will be to achieve success in their respective fields. For those interested in taking a deeper dive into this topic, Evgeniy's book is a must-read, offering practical tips and strategies to help professionals hone their soft skills and, ultimately, architect success.About the BookIn today's crowded marketplace, technology alone isn't enough. Architecting Success equips sales professionals and anyone in tech and science to unlock their full potential through the power of soft skills.Architecting Success: The Power of Soft Skills in Technical Sales. Connect to Sell More is a practical guide for architects, sales professionals, and anyone in the technology and science sectors to enhance their effectiveness. The book begins by exploring the historical dynamics between sales and technical teams, emphasizing how soft skills can bridge the gap between these traditionally siloed groups. It highlights how focusing on mentoring, problem-solving, listening, teamwork, and empathy can connect to increase sales.Here is a call to action for technical sales professionals to embrace and cultivate their soft skills. By engaging and reflecting, readers can unlock their full potential and achieve personal and professional excellence in the competitive world of technical sales.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Book | Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More | A Conversation with Evgeniy Kharam | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Aug 7, 2024 27:51


Guest: Evgeniy Kharam, Co-Founder, Security Architecture [@secarchpodcast]On LinkedIn | https://www.linkedin.com/in/ekharam/Website | https://www.softskillstech.ca/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of The Redefining CyberSecurity Podcast, host Sean Martin speaks with Evgeniy Kharam about the essential role of soft skills in the technology and cybersecurity sectors. While many discussions in this field tend to center on hard technical skills or the latest cyber threats, this episode shifts the focus to the often-overlooked soft skills that can drive success.Evgeniy Kharam, who is also an author and holds a key position in his company, shares insightful perspectives from his newly released book 'Architecting Success: The Art of Soft Skills in Technical Sales.' According to Evgeniy, effective communication and connection are foundational elements not just for sales engineers and teams, but for anyone working in any field, including cybersecurity. He notes that regardless of how advanced one's technical skills might be, the ability to connect with people, convey ideas clearly, and build lasting relationships is crucial.One of the primary points that Evgeniy discusses is the changing landscape for sales engineers. He mentions that the role has evolved significantly over the years. Previously, sales engineers primarily focused on giving demos and technical presentations. Today, they are expected to be deeply involved in the sales process, understand procurement intricacies, and effectively communicate technical merits and business values. HostSean Martin addresses the barriers that often exist within organizational cultures, where roles are tightly defined, and stepping outside of one's designated lane can be frowned upon. Evgeniy suggests that this old-school mentality needs to shift. Everyone in a company—from engineers to marketers and beyond—is involved in sales in some way. From making a strong first impression to ensuring clear and intentional communication, soft skills can enhance every aspect of organizational interaction.The duo also touches upon the importance of continuous self-improvement. Evgeniy advises that one of the best ways to practice soft skills is outside the workplace. Whether making a cashier smile or engaging in meaningful conversations with strangers, these efforts contribute to refining one's ability to connect and communicate effectively.Sean Martin concludes the episode by highlighting that everyone is, in essence, always selling something—whether it's a product, a service, or simply themselves. The more refined these soft skills, the better positioned anyone will be to achieve success in their respective fields. For those interested in taking a deeper dive into this topic, Evgeniy's book is a must-read, offering practical tips and strategies to help professionals hone their soft skills and, ultimately, architect success.About the BookIn today's crowded marketplace, technology alone isn't enough. Architecting Success equips sales professionals and anyone in tech and science to unlock their full potential through the power of soft skills.Architecting Success: The Power of Soft Skills in Technical Sales. Connect to Sell More is a practical guide for architects, sales professionals, and anyone in the technology and science sectors to enhance their effectiveness. The book begins by exploring the historical dynamics between sales and technical teams, emphasizing how soft skills can bridge the gap between these traditionally siloed groups. It highlights how focusing on mentoring, problem-solving, listening, teamwork, and empathy can connect to increase sales.Here is a call to action for technical sales professionals to embrace and cultivate their soft skills. By engaging and reflecting, readers can unlock their full potential and achieve personal and professional excellence in the competitive world of technical sales.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Cyber Ranch Podcast
Practical Security Architecture with SABSA with Andrew Townley

The Cyber Ranch Podcast

Play Episode Listen Later Jul 24, 2024 38:01


Drew and Allan were skeptical about SABSA, as it is a model one CISO friend described as being "only good for a graduate student writing a paper!"  Another CISO pointed out that SABSA was designed long before modern engineering practices. Andrew Townley, a long-term SABSA consultant, on the other hand, gets straight to the practicality of it.  There is indeed an academic and theoretical foundation behind SABSA, but it is most definitely leveraged for one purpose -  to achieve desirable business outcomes. Drew and Allan ask: What is SABSA's purpose? Is Andrew's specific practically applied methodology a deviation from the official SABSA cannon? How can prove its effectiveness?  What are the practical business outcomes? Both Allan and Drew walk away with enough curiosity to dig into SABSA more. Note that Andrew several times also cites the work of Russell Ackoff, another academician who enjoyed a rather brilliant career as a business consultant - grounding his systems theory into meaningful business practicality. More on Russell Ackoff here: https://en.wikipedia.org/wiki/Russell_L._Ackoff  

WITneSSes
How to become a cyber security solution architect | Evgeniy Kharam

WITneSSes

Play Episode Listen Later Jul 4, 2024 18:23


Welcome, listeners! Join us today as we dive into a fascinating conversation with Evgeniy Kharam.   Evgeniy's journey is nothing short of remarkable. From his beginnings as a firewall deployment engineer to his current role as Vice President of Architecture at the Herjavec Group, he embodies resilience and leadership in cybersecurity.   As a father of four, including twins, Evgeniy brings a unique perspective on balancing personal and professional life.   His passion for cybersecurity led him to establish two podcasts—one focusing on technical Security Architecture and the other on business insights and cyber Inspiration. Evgeniy also moderates industry panels and interviews, and co-founded a cybersecurity-oriented ski and snowboard conference, integrating lifestyle with industry engagement.   Today, he runs his own cyber/media consulting services, helping clients navigate the complexities of cybersecurity with expertise honed over years in the field. Join us as Evgeniy Kharam shares his insights, experiences, and passion for cybersecurity, blending personal dedication with professional expertise to inspire and inform.   Visit his website here: https://www.security-architecture.org/

TNT Radio
Eric Schulze & Vijay Jaswal on Talking Tech with Alex Zaharov-Reutt - 08 June 2024

TNT Radio

Play Episode Listen Later Jun 8, 2024 56:04


GUEST 1 OVERVIEW: Eric has close to two decades of hands-on Security Architecture and Network Infrastructure experience, Eric joined Trend Micro in 2014 with "an extraordinary wealth of broad security-domain expertise that contributes to architecting IT Security Systems for numerous Fortune Global 500 companies." GUEST 2 OVERVIEW: As Chief Technology Officer for APJ, the Middle East and Africa, as well as Digital Evangelist and Value Pathfinder, Vijay leads a team of experts that, as IFS explains, empower organisations to become truly connected enterprises.

Spring Office Hours
S3E17 - Spring Security Architecture Principals

Spring Office Hours

Play Episode Listen Later May 7, 2024 59:04


Join Dan Vega and DaShuan Carter for the latest updates from the Spring Ecosystem. In this episode we are joined by a special guest, Daniel Garnier-Moiroux, a Senior Software Engineer at Broadcom. We will discuss his upcoming talk at Spring I/O on Spring Security Architecture Principals. Learn more about how to get started with Spring Security. Participate in our live stream to ask questions, or catch the replay on your preferred podcast platform.Show NotesSpring I/O 2024Spring Security Architecture PrincipalsA Spring Developers Guide to navigating the frontend landscapeSpring Security DocumentationWhat's new In Spring Security 6.3Daniel Garnier-Moiroux

The CyberWire
Iran's covert cyber operations exposed.

The CyberWire

Play Episode Listen Later Apr 24, 2024 42:18


The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President's desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden's liquor stores bare.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guests Learning Layer On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K's comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes: Cryptographic life cycle Cryptographic method Public key infrastructure (PKI). Industry Voices On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs & CIOs are experiencing today, and how they can improve their cyber readiness.  Selected Reading Rewards Up to $10 Million for Information on Iranian Hackers (GB Hackers) Congress passes bill that could ban TikTok after years of false starts (Washington Post) Russian hackers claim cyberattack on Indiana water plant (The Record) Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users (SOCRadar® Cyber Intelligence Inc.) Global attacker median dwell time continues to fall (Help Net Security) New Password Cracking Analysis Targets Bcrypt (SecurityWeek) North Korean Hackers Target Dozens of Defense Companies (Infosecurity Magazine) ​​Hackers hijack antivirus updates to drop GuptiMiner malware (Bleeping Computer) Sweden's liquor shelves to run empty this week due to ransomware attack (The Record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Really? no, Really?
Understanding TikTok – Should it Stay, or Should it Go?

Really? no, Really?

Play Episode Listen Later Mar 19, 2024 33:57 Transcription Available


This episode is all about trying to figure out if TikTok - the video hosting platform owned by the Chinese company Byte Dance should be banned or not. Over 70% of young Americans use TikTok, which critics claim is spying on, manipulating, and spreading misinformation to its users. But is TikTok any different than Meta, Google, or X? Our guest's answer may surprise you… Really, no really! Bruce Schneier is a cryptographer, computer security professional, privacy specialist, who has been writing about security issues since 2004 and is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation and AccessNow; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc. IN THIS EPISODE: Surveillance as a business model is 100% legal. Breaking down the types of information companies are collecting, and what they're doing with it. Why does China want to know about our affinity for puppy videos? Social Media's ability to manipulate is greater than you might think. Russia and China's preferred platform for transmitting misinformation is…? (Spoiler Alert: It's not TikTok) Facebook has data on you… even if you aren't on Facebook-RnR! Data Privacy is a national security issue, but not treated like one. The European Union leads the world in protecting data privacy. The unsettling future of A.I. and personal data surveillance. Cougar hemorrhoids? Googleheim: What you are missing… if you're NOT on TikTok! *** FOLLOW BRUCE: Bruce's Blog: Schneier.com X: @schneierblog Facebook: Bruce Schneier *** FOLLOW REALLY NO REALLY: www.reallynoreally.com Instagram YouTube TikTok Facebook Threads XSee omnystudio.com/listener for privacy information.

Topping Talks
Lester Nichols Director Security/Architecture VP Cybersecurity Operations JP Morgan Chase Ep. 30

Topping Talks

Play Episode Listen Later Mar 12, 2024 67:26


Topping interviews Lester Nichols who is the Director of Security Architecture/VP of Cybersecurity Operations of JPMorgan Chase. Tune in to learn about Lester's fascinating journey from using technology to find a accounting scam to working at the U.S Department of Defense to getting a role at one of the largest and most established banks in the financial industry. Also learn about Lester's hobbies from writing cybersecurity books to teaching, volunteering for rescue victim at Caleb house which helps locate and rescue women and children, and much more.Check out Lester's Book Here https://www.secdoc.tech/cybersecurity-architects-handbook-in-the-wild/Topping Talks is Sponsored by Topping Technologies & ExpressVPN. Protect your online privacy https://www.xvuslink.com/?a_fid=toppi... also if your business needs IT assistance you can reach Topping Technologies at sales@toppingtechnologies.com FollowTopping on Twiitter-https://twitter.com/NicTopping

What I Did Next
Amr Moussa

What I Did Next

Play Episode Listen Later Mar 5, 2024 30:07


His Excellency Amr Moussa has had a distinguished career in the world of international diplomacy and cooperation. He served as the Ambassador of Egypt to India for 3 years in 1983, he was the Permanent Representative of Egypt to the UN in 1990, he was the Foreign Minister of Egypt for 10 years until 2001, when he became Secretary-General of the League of Arab States.  He continues to leave an impact today as an elected member of the Panel of the Wise, a critical pillar of the Peace and Security Architecture of the African Union, and as Chairman of the High-Level Advisory Council to the High Representative for the United Nations Alliance of Civilizations or UNAOC. This episode was brought to you by EFG Holding, a trailblazing financial institution with a Universal Bank in Egypt and the leading investment bank in the Middle East and North Africa (MENA). Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
How I Learned to Stop Worrying and Build a Modern Detection & Response Program | A Black Hat Europe 2023 Event Coverage Conversation with Allyn Stott

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 22, 2023 35:16


Guest: Allyn Stott, Senior Staff EngineerOn LinkedIn | https://www.linkedin.com/in/whyallyn/On Twitter | https://twitter.com/whyallynOn Mastodon | https://infosec.exchange/@whyallynAt Black Hat Europe | https://www.blackhat.com/eu-23/briefings/schedule/speakers.html#allyn-stott-42433____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________Episode NotesIn this episode of the ITSPmagazine On Location Event Coverage series, host Sean Martin engages in a thought-provoking conversation with guest Allyn Stott, a seasoned cybersecurity professional and senior staff engineer. The discussion orbits around the challenges and solutions in building a modern detection response program.Allyn shares his unique perspective on why blue teams often fail. He suggests that the failure is not due to a lack of technical skills, but rather a lack of a broader strategy and understanding of the overall detection response program. He emphasizes the importance of integrating the detection response team into broader business conversations, thereby fostering a more holistic approach to managing risk.The conversation also explores the role of threat intelligence and the need for continuous learning and adaptation in the face of evolving threats. Allyn underscores the importance of understanding the business's actual risk and aligning the detection response program accordingly.Allyn also shares his experience in creating a framework to help teams understand their current capabilities and how to evolve towards a more effective detection response program. This framework, he suggests, can help prioritize work within the program and provide a roadmap for reporting out.This episode is a treasure trove of insights for CISOs, managers, directors, and builders in the cybersecurity field. It provides a roadmap for identifying skill sets, prioritizing work within the program, and reporting out, all crucial elements in building a modern detection response program.The conversation is a blend of practical advice and philosophical musings on the nature of cybersecurity, making it a must-listen for anyone interested or practicing in the field.About Allyn's Black Hat Europe 2023 Session, 'How I Learned to Stop Worrying and Build a Modern Detection & Response Program': You haven't slept in days. Pager alerts at all hours. Constant firefights. How do you get out of this mess? This talk gives away all the secrets you'll need to go from reactive chaos to building and running a finely tuned detection & response program (and finally get some sleep).Gone are the days of buying the ol' EDR/IDS/NGAV combo, throwing some engineers on an on-call rotation, and calling it your incident response team. You need a robust and comprehensive detection and response program to fight modern day attackers. But there are a lot of challenges in the way: alert fatigue, tools are expensive, hiring talent is impossibly difficult, and your current team is overworked from constant firefights.How do you successfully build a modern detection and response program, all while riding the rocket of never ending incidents and unforgiving on-call schedules?This talk addresses the lack of a framework, which has led to ineffective, outdated, and after-thought detection and response programs. At the end of this talk, you will walk away with a better understanding of all the capabilities a modern program should have and a framework to build or improve your own.* How worrying can be a superpower* Why blue teams fail* The framework I've developed for building a detection and response program____________________________ResourcesHow I Learned to Stop Worrying and Build a Modern Detection & Response Program: https://www.blackhat.com/eu-23/briefings/schedule/#how-i-learned-to-stop-worrying-and-build-a-modern-detection--response-program-34241A Security Newsletter with a Cute Cat: https://www.meoward.co/subscribeLearn more about Black Hat Europe 2023: https://www.blackhat.com/eu-23/____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelBlack Hat Europe 2023 playlist:

Redefining CyberSecurity
How I Learned to Stop Worrying and Build a Modern Detection & Response Program | A Black Hat Europe 2023 Event Coverage Conversation with Allyn Stott

Redefining CyberSecurity

Play Episode Listen Later Nov 22, 2023 35:16


Guest: Allyn Stott, Senior Staff EngineerOn LinkedIn | https://www.linkedin.com/in/whyallyn/On Twitter | https://twitter.com/whyallynOn Mastodon | https://infosec.exchange/@whyallynAt Black Hat Europe | https://www.blackhat.com/eu-23/briefings/schedule/speakers.html#allyn-stott-42433____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________Episode NotesIn this episode of the ITSPmagazine On Location Event Coverage series, host Sean Martin engages in a thought-provoking conversation with guest Allyn Stott, a seasoned cybersecurity professional and senior staff engineer. The discussion orbits around the challenges and solutions in building a modern detection response program.Allyn shares his unique perspective on why blue teams often fail. He suggests that the failure is not due to a lack of technical skills, but rather a lack of a broader strategy and understanding of the overall detection response program. He emphasizes the importance of integrating the detection response team into broader business conversations, thereby fostering a more holistic approach to managing risk.The conversation also explores the role of threat intelligence and the need for continuous learning and adaptation in the face of evolving threats. Allyn underscores the importance of understanding the business's actual risk and aligning the detection response program accordingly.Allyn also shares his experience in creating a framework to help teams understand their current capabilities and how to evolve towards a more effective detection response program. This framework, he suggests, can help prioritize work within the program and provide a roadmap for reporting out.This episode is a treasure trove of insights for CISOs, managers, directors, and builders in the cybersecurity field. It provides a roadmap for identifying skill sets, prioritizing work within the program, and reporting out, all crucial elements in building a modern detection response program.The conversation is a blend of practical advice and philosophical musings on the nature of cybersecurity, making it a must-listen for anyone interested or practicing in the field.About Allyn's Black Hat Europe 2023 Session, 'How I Learned to Stop Worrying and Build a Modern Detection & Response Program': You haven't slept in days. Pager alerts at all hours. Constant firefights. How do you get out of this mess? This talk gives away all the secrets you'll need to go from reactive chaos to building and running a finely tuned detection & response program (and finally get some sleep).Gone are the days of buying the ol' EDR/IDS/NGAV combo, throwing some engineers on an on-call rotation, and calling it your incident response team. You need a robust and comprehensive detection and response program to fight modern day attackers. But there are a lot of challenges in the way: alert fatigue, tools are expensive, hiring talent is impossibly difficult, and your current team is overworked from constant firefights.How do you successfully build a modern detection and response program, all while riding the rocket of never ending incidents and unforgiving on-call schedules?This talk addresses the lack of a framework, which has led to ineffective, outdated, and after-thought detection and response programs. At the end of this talk, you will walk away with a better understanding of all the capabilities a modern program should have and a framework to build or improve your own.* How worrying can be a superpower* Why blue teams fail* The framework I've developed for building a detection and response program____________________________ResourcesHow I Learned to Stop Worrying and Build a Modern Detection & Response Program: https://www.blackhat.com/eu-23/briefings/schedule/#how-i-learned-to-stop-worrying-and-build-a-modern-detection--response-program-34241A Security Newsletter with a Cute Cat: https://www.meoward.co/subscribeLearn more about Black Hat Europe 2023: https://www.blackhat.com/eu-23/____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelBlack Hat Europe 2023 playlist:

Salesforce Architecture Talk
S1E6 Domain 2: Security Architecture with Gourav Sood & Satya Awadhare

Salesforce Architecture Talk

Play Episode Listen Later Nov 10, 2023 70:36


S1E6 Domain 2: Security Architecture with Gourav & Satya. In this episode we have covered one of the critical domains (i.e. Security) of the prep to focus on the different aspects of security on Platform.

Leaders In Tech
Creating a Culture of Success: A Leader's Duty

Leaders In Tech

Play Episode Listen Later Oct 16, 2023 55:19


In today's rapidly evolving digital landscape, there is often an apprehension towards new technology, as many people fear the unknown. However, it is vital to embrace a different perspective, one embodied by forward-thinkers like Genaro Liriano, the Director of Technology Operations Risk Management at CIBC. Instead of succumbing to fear, Genaro advocates for an approach that encourages learning and understanding of new technology. He believes that the essence of innovative technology lies in its potential to enhance and improve our lives. By gaining knowledge about these advancements, we can harness their power to solve problems, drive efficiency, and ultimately, make the world a better place. This mindset of curiosity, exploration, and adaptability can help us navigate the ever-changing technological landscape with confidence and optimism, rather than trepidation.Here's more about Genaro LirianoI am an Information Systems Security Professional with over 24 years experience in various aspects of Information Technology Management, devising strategic initiatives in the Information Systems Security realm. Helping Enterprises Manage and Govern through various regulatory requirements and industry standards such as: OSFI, FFIEC, PIPEDA,PCI DSS, etc.Hands on experience on various security controls such as: PKI, ATM Security, Security Operations, Management, Infrastructure and Operations, Network Security, End Point Security, Security Architecture, Online Banking, Mobile Banking, Online Banking for Business.Other skills: Customer Service, Voice-Over, Public SpeakingBroadcasting.

ThePrint
ThePrintPod: Hamas attack on Israel has 26/11 parallels. India must upgrade the security architecture

ThePrint

Play Episode Listen Later Oct 13, 2023 6:49


Government of India has yet to define its anti-terror policy; the home minister merely saying that our approach should be “ruthless” is not enough.----more----Read full article here: https://theprint.in/opinion/hamas-attack-on-israel-has-26-11-parallels-india-must-upgrade-the-security-architecture/1801517/

Identity At The Center
#236 - Identity Week America 2023: Ian Glazer & Steve Hutchison

Identity At The Center

Play Episode Listen Later Oct 6, 2023 67:36


In this episode of the Identity at the Center Podcast recorded live at the Identity Week America 2023 conference, Jeff is joined by guest co-host Ian Glazer of Weave Identity and Steve Hutchison, Director of Security Architecture at the Mitsubishi Bank of Tokyo. The main topics discussed include Hutch's entry into the field of identity and his role as a director of security architecture, his involvement with IDPro along with Ian, the panels at Identity Week America, the latest happenings with Ping and ForgeRock, predictions for big acquisitions, the direction of Microsoft Entra, and the current buzz surrounding IDPro, including a discussion on the upcoming CIAM BOK article written by Ian. The episode concludes on a lighter note with Hutch educating us about Dungeons & Dragons. Connect with Hutch: https://www.linkedin.com/in/sehutchinson/ Connect with Ian: https://www.linkedin.com/in/iglazer/ Weave Identity: https://weaveidentity.com/ IDPro: https://idpro.org/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.

PolicyCast
AI can be democracy's ally—but not if it works for Big Tech

PolicyCast

Play Episode Listen Later Sep 20, 2023 43:53


Kennedy School Lecturer in Public Policy Bruce Schneier says Artificial Intelligence has the potential to transform the democratic process in ways that could be good, bad, and potentially mind-boggling. The important thing, he says, will be to use  regulation and other tools to make sure that AIs are working for us, and just not for Big Tech companies—a hard lesson we've already learned through our experience with social media. When ChatGPT and other generative AI tools were released to the public late last year, it was as if someone had opened the floodgates on a thousand urgent questions that just weeks before had mostly preoccupied academics, futurists, and science fiction writers. Now those questions are being asked by many of us—teachers, students, parents, politicians, bureaucrats, citizens, businesspeople, and workers. What can it do for us? What will it do to us? Will it take our jobs? How do we use it in a way that's both ethical and legal? And will it help or hurt our already-distressed democracy? Schneier, a public interest technologist, cryptographer, and internationally-known internet security specialist whose newsletter and blog are read by a quarter million people, says that AI's inexorable march into our lives and into our politics is likely to start with small changes, like AI helping write policy and legislation. The future, however, could hold possibilities that we have a hard time wrapping our current minds around—like AI entities creating political parties or autonomously fundraising and generating profits to back political candidates or causes. Overall, like a lot of other things. it's likely to be a mixed bag of the good and the bad.Bruce Schneier is a Lecturer in Public Policy at the Harvard Kennedy School, a faculty affiliate at the Ash Center for Democratic Governance and Innovation at HKS, a fellow at the Berkman-Klein Center for Internet and Society at Harvard University. An internationally renowned security technologist, he has been called a "security guru" by the Economist and is the New York Times best-selling author of 14 books—including A Hacker's Mind—as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and blog “Schneier on Security” are read by over 250,000 people. Schneier is a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.Ralph Ranalli of the HKS Office of Public Affairs and Communications is the host, producer, and editor of HKS PolicyCast. A former journalist, public television producer, and entrepreneur, he holds an AB in Political Science from UCLA and an MS in Journalism from Columbia University.PolicyCast is co-produced by Susan Hughes. Design and graphics support is provided by Lydia Rosenberg, Delane Meadows and the OCPA Design Team. Social media promotion and support is provided by Natalie Montaner and the OCPA Digital Team.  

ITSPmagazine | Technology. Cybersecurity. Society
Brewing Cyber Confidence for Back-to-School | A Conversation with Dr. Ryan Ko | Musa Cybercafe Podcast with Mansi Thakar

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 8, 2023 36:11


Hacker Valley Studio
What Is Security Architecture?

Hacker Valley Studio

Play Episode Listen Later Jun 6, 2023 15:40


In this episode of Hacker Valley Studio, Ron and Chris take a deep dive into all things Security Architecture and the essential skills you need to thrive in your role. Ron shares insights from his personal journey into security architecture as well as his expert advice on how to break in and stand out in the field. Links: Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Impactful Moments: 01:22 - What is Security Architecture? 03:04 - Day in the life of a security architect 04:01 - Different types of security architects 06:01 - Ron's journey into security architecture 07:49 - What skills do you need? 08:40 - Join our community! 09:21 - Ron's best practices 10:24 - Finding the right solutions 11:36 - What is the salary potential? 12:59 - How to stand out 13:52 - Advice for those breaking into the field  

CiscoChat Podcast
S4 E5: Talking Offensive Security with Lurene Grenier

CiscoChat Podcast

Play Episode Listen Later May 23, 2023 24:33


When it comes to battling cybersecurity attackers, Lurene Grenier is all about offense. As Director of Security Architecture at Cisco Talos, she has spent her career analyzing state-sponsored actor trends, writing detection to block those threat actors, and in general, educating users and administrators on how to deploy the most robust security solutions. Lurene joins AB for a great conversation on a variety of topics, from offensive security to infrastructure vulnerabilities to her passion for playing guitar.

Cisco TechBeat
S4 E5: Talking Offensive Security with Lurene Grenier

Cisco TechBeat

Play Episode Listen Later May 20, 2023 24:33


When it comes to battling cybersecurity attackers, Lurene Grenier is all about offense. As Director of Security Architecture at Cisco Talos, she has spent her career analyzing state-sponsored actor trends, writing detection to block those threat actors, and in general, educating users and administrators on how to deploy the most robust security solutions. Lurene joins AB for a great conversation on a variety of topics, from offensive security to infrastructure vulnerabilities to her passion for playing guitar.

Secure Ventures with Kyle McNulty
Oak9: Aakash Shah on Modern Security Architecture Design and Security as Code

Secure Ventures with Kyle McNulty

Play Episode Listen Later Apr 18, 2023 39:27


Aakash: CTO and co-founder at Oak9, helping organizations build secure architecture models using security as code blueprints Previously a security architect for major healthcare and health insurance companies such as Blue Cross Blue Shield Feature speaker at RSA 2023 talking about the security as code construct Check out the episode for our conversation about the importance of security architecture as opposed to just security configurations and the value stemming from secure cloud infrastructure blueprints.oak9.io

The Irish Tech News Podcast
Is the Future Secure? Insights with Bruce Schneier

The Irish Tech News Podcast

Play Episode Listen Later Apr 16, 2023 56:37


Is the Future Secure?  This week on The Futurists we get into the future of cybercrime and personal security in the smart world with renowned “security guru” Bruce Schneier. The author of over a dozen books (his latest bestseller being “A Hacker's Mind”), Lecturer on Public Policy at Harvard Kennedy School, Congressional advisor and Media personality. Will AI and Quantum kill passwords? How secure will your DNA records be? The answers might surprise you About Bruce Schneier Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of over one dozen books—including his latest, A Hacker's Mind—as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation and AccessNow; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc. Brett King is a world-renowned entrepreneur, futurist, speaker, international bestselling author, and media personality. China's President Xi Jinping cited his book Augmented: Life in the Smart Lane on the topic of Artificial Intelligence in his 2018 national address; the same book that was listed as a Top 10 non-fiction book in North America. In 2019 his book Bank 4.0 was awarded the Top Book by a Foreign Author in Russia for that year. n and innovation. In his professional capacity, Mr. Tercek is a seasoned business executive with deep expertise in digital media and internet services. He is a prolific creator of interactive programs and products. He has designed and launched successful consumer experiences on every digital platform, including digital television, game consoles, broadband Internet, and mobile networks. In 2021, Mr. Tercek was recognized as the Humanitarian of the Year by the Media Excellence Awards for his leadership in designing and launching COVID SMART™, an interactive training program designed to keep workers safe on the job during the pandemic.

No Name Podcast
No Name Podcast with Bruce Schneier

No Name Podcast

Play Episode Listen Later Mar 27, 2023 66:55


Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of over one dozen books — including his latest, A Hacker's Mind — as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation and AccessNow; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Architecture Insights
The security architecture shift that sets you free

Architecture Insights

Play Episode Listen Later Mar 21, 2023 8:33


Most people don’t really know it, but there’s actually two types of “security architect” out there, and the fact that you only know about one could not only be limiting your own career as a security architect, it might also be unintentionally sabotaging your organization’s entire security program. In this episode, I talk about the […] The post The security architecture shift that sets you free appeared first on Archistry.

Inside The War Room
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

Inside The War Room

Play Episode Listen Later Feb 18, 2023 28:36


Links from the show:* A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back* Visit Bruce's site* Follow Bruce on Twitter* Follow Ryan on Twitter* Support the showAbout my guest:Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of over one dozen books—including his latest, We Have Root—as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation and AccessNow; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc. Get full access to Dispatches from the War Room at dispatchesfromthewarroom.substack.com/subscribe

Cybercrime Magazine Podcast
Microcast: History of Hacking. Bruce Schneier, Security Technologist and Cryptographer.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 15, 2023 1:36


Bruce Schneier is a public-interest technologist, working at the intersection of security, technology, and people. He's been writing about security issues on his blog since 2004, and in his monthly newsletter since 1998. He's a fellow and lecturer at Harvard's Kennedy School, a board member of EFF, and the Chief of Security Architecture at Inrupt, Inc., the company delivering Sir Tim Berners-Lee's (inventor of the World Wide Web) original vision of a web of shared benefit, for everyone. This microcast is a short version of our full interview with Schneier, which you can listen to at https://soundcloud.com/cybercrimemagazine/history-of-hacking-bruce-schneier-security-technologist-and-cryptographer

Infoblox ThreatTalk
A SANS Author Interview: A DNS Security Architecture as a SecOps Force Multiplier

Infoblox ThreatTalk

Play Episode Listen Later Feb 8, 2023 32:24


Leveraging your DNS architecture can be a much more effective and efficient approach to securing critical business services than relying on DNS security features in a firewall or web gateway. This episode of ThreatTalk will review a new SANS paper on this topic with author John Pescatore, SANS Director of Emerging Security Trends and guest Cricket Liu, Infoblox Chief DNS Architect. Join host Bob Hansmann and his guests to understand how you can use DNS for more than just a phone book.Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.

Keen On Democracy
A Hacker's Mind: Bruce Schneier on how the powerful bend society's rules and how to bend them back

Keen On Democracy

Play Episode Listen Later Feb 7, 2023 28:42


In this KEEN ON episode, Andrew talks to A HACKER'S MIND author Bruce Schneier about how the powerful have learnt to hack society rules and why we need to learn to outhack the hackers. Bruce Schneier is an internationally renowned security technologist, called a “security guru” by The Economist. He is the author of over one dozen books—including his latest, A HACKER'S MIND —as well as hundreds of articles, essays, and academic papers. His influential newsletter “Crypto-Gram” and his blog “Schneier on Security” are read by over 250,000 people. He has testified before Congress, is a frequent guest on television and radio, has served on several government committees, and is regularly quoted in the press. Schneier is a fellow at the Berkman Klein Center for Internet & Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation and AccessNow; and an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc. Name as one of the "100 most connected men" by GQ magazine, Andrew Keen is amongst the world's best known broadcasters and commentators. In addition to presenting KEEN ON, he is the host of the long-running How To Fix Democracy show. He is also the author of four prescient books about digital technology: CULT OF THE AMATEUR, DIGITAL VERTIGO, THE INTERNET IS NOT THE ANSWER and HOW TO FIX THE FUTURE. Andrew lives in San Francisco, is married to Cassandra Knight, Google's VP of Litigation & Discovery, and has two grown children. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cloud Security Podcast by Google
EP105 Security Architect View: Cloud Migration Successes, Failures and Lessons

Cloud Security Podcast by Google

Play Episode Listen Later Jan 23, 2023 28:45


Guest: Michele Chubirka, Senior Cloud Security Advocate, Google Cloud Topics: We are here to talk about cloud migrations and we are here to talk about failures. What are your favorites? What are your favorite cloud security process failures?  What are your favorite cloud security technical failures?  What are your favorite cloud security container and k8s failures? Is "lift and shift" always wrong from the security point of view?  Can it at least work as step 1 for a full cloud transformation?  Resources: “Automate and/or Die?” (ep3) “More Cloud Migration Security Lessons” (ep18) “The Magic of Cloud Migration: Learn Security Lessons from the Field” (ep55) “Preparing for Cloud Migrations from a CISO Perspective, Part 1” (ep5) “Cloud Migrations: Security Perspectives from The Field”  (ep33) "Dune" by Frank Herbert "The Science of Organizational Change"  by Paul Gibbons  "Servant Leadership: A Journey into the Nature of Legitimate Power and Greatness"  by Robert K. Greenleaf "Finding the Sweet Spot for Change" State of Devops (DORA) Report 2022

Firewalls Don't Stop Dragons Podcast

I can't believe I've been doing this for 300 weeks - almost 6 years now! And returning for his 3rd "podcentennial" episode is world-renowned security guru Bruce Schneier! Today we'll discuss hacking - not just in the realm of computers, but in legal, political, social and economic spaces. And then we'll talk about how artificial intelligence and computer automation are starting to play a significant role in hacking all of these realms. Computers and AI expand the scope, scale and speed of hacking and we're honestly not prepared for it. To celebrate the 300th episode and the coming release of the 5th edition of my book, today I'm kicking off a big giveaway with lots of prizes and a killer promotion for patrons on Patreon! (See below for links.) Bruce Schneier is an internationally renowned technologist and security guru. He is the author of over one dozen books, including his latest, A Hacker's Mind, due out in February, I believe. He has testified before Congress and has served on several government committees and corporate boards, written many seminal papers, has a very popular blog called Crypto-Gram, and last but not least, Bruce is the Chief of Security Architecture at Inrupt.  Further Info 300th episode promotion: https://firewallsdontstopdragons.com/enter-to-win-300th-podcast-giveaway/ Patron promotion: https://www.patreon.com/posts/december-patron-75151773 The Coming AI Hackers: https://www.schneier.com/academic/archives/2021/04/the-coming-ai-hackers.html  A Hacker's Mind book: https://www.schneier.com/books/a-hackers-mind/  Give the gift of security & privacy: https://firewallsdontstopdragons.com/give-the-gift-of-security-and-privacy/ Check out my Best & Worst Gifts Guide for 2022: https://firewallsdontstopdragons.com/best-worst-gifts-2022/ The Coming AI Hackers: https://www.schneier.com/academic/archives/2021/04/the-coming-ai-hackers.html  A Hacker's Mind book: https://www.schneier.com/books/a-hackers-mind/  The Trolley Problem: https://en.wikipedia.org/wiki/Trolley_problem  Gödel's incompleteness theorems: https://en.wikipedia.org/wiki/G%C3%B6del's_incompleteness_theorems  Subscribe to the newsletter: https://firewallsdontstopdragons.com/newsletter/new-newsletter/ Check out my book, Firewalls Don't Stop Dragons: https://www.amazon.com/gp/product/1484261887  Become a Patron! https://www.patreon.com/FirewallsDontStopDragons  Donate directly with Monero! https://firewallsdontstopdragons.com/contact/  Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-Speaker Generate secure passphrases! https://d20key.com/#/  Table of Contents Use these timestamps to jump to a particular section of the show. 0:00:31: Interview preview 0:02:29: Interview start 0:03:13: How does hacking differ from inventing or just cheating? 0:07:14: What is artificial intelligence and when will it be like teh sci-fi version? 0:11:32: Do we have to worry about AI replacing us or taking over? 0:13:57: Can we program human values into AI systems? 0:18:09: Why are reward and goal alignment so crucial for AI? 0:20:28: Will we ever implicitly trust AI if we can't explain its answers? 0:25:37: Do we put too much trust in some AI systems? 0:27:59: How might AI systems be used to hack financial or political systems? 0:33:26: Can we govern AI systems with human laws? 0:36:40: Are non-computer systems more susceptible to hacks due to uncodified norms? 0:42:41: Can AI think outside the box if it doesn't understand the box? 0:48:05: How does terrorism hack our brains and how do we prevent that? 0:53:35: What are some Utopian possibilities for AI? 0:55:08: How do we get more public interest technologists? 0:56:28: Interview wrap-up 0:58:19: 300th podcast giveaway! 1:01:49: Patron promotion!

Cloud Security Podcast
THIS IS MY Cloud SECURITY ARCHITECTURE - Azure Security Best Practices - Part 2

Cloud Security Podcast

Play Episode Listen Later Sep 25, 2022 64:04


Azure Cloud Security Architecture (Day 0) ,Custom Azure Role definitions, Azure Privilege Access Management etc can be complex to build. Continuing from part 1 In the part 2 of our This is My Cloud Security Architecture Series Episode we have Sai, a Cloud Security Architect walking us through how to start with an Azure Security Architecture on Day 0 of your Cloud Security Architect role. Part -2 of the episode will go into Day 1+ of managing and scaling what we have created in Day 0. This episode is better on video - YouTube Link - Part 2 Part 1 of the This is My Cloud Security Architecture Series is here - YouTube Link - Part 1 Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: Sai Gunaranjan (Sai's Linkedin) Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy

Cloud Security Podcast
Azure Security Best Practices - THIS IS MY Cloud SECURITY ARCHITECTURE - Azure

Cloud Security Podcast

Play Episode Listen Later Sep 12, 2022 55:37


Azure Cloud Security Architecture, Azure Policies can be complex to build. In the part 1 of our This is My Cloud Security Architecture Series Episode we have Sai, a Cloud Security Architect walking us through how to start with an Azure Security Architecture on Day 0 of your Cloud Security Architect role. Part -2 of the episode will go into Day 1+ of managing and scaling what we have created in Day 0. This episode is better on video - YouTube Link Cloud Security Meetup NYC - Cloud Security Meetup NewYork - Tech Fashion Theme Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: Sai Gunaranjan (Sai's Linkedin) Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy

Aiming For The Moon
"Hacking" the Legal System: Dr. Bruce Schneier (World-renowned Security Expert and Blogger)

Aiming For The Moon

Play Episode Listen Later Sep 11, 2022 27:19


Ethical hacking is essential in the tech world as it exposes the holes and bugs in systems before bad people can use them. This same mindset can be applied to the legal system in order to “hack” it before "black hat" hackers exploit the problems. In this episode, Dr. Bruce Schneier (full bio below) explains this philosophy and the steps to apply it.Topics:What are public-interest technologists? Hacking the legal systemPractical hackingThe Big Tech monopoly Survialence CapitalismWhat can the next generation do?What books have had an impact on Dr. SchneierWhat advice Dr. Schneier has for teenagersBruce Schneier is an internationally renowned security technologist, called a "security guru" by the Economist. He is the New York Times best-selling author of 14 books -- including Click Here to Kill Everybody -- as well as hundreds of articles, essays, and academic papers. His influential newsletter, Crypto-Gram, and blog, Schneier on Security, are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC andVerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.Socials! -Lessons from Interesting People substack: https://taylorbledsoe.substack.com/Website: https://www.aimingforthemoon.com/Instagram: https://www.instagram.com/aiming4moon/Twitter: https://twitter.com/Aiming4MoonTaylor's Blog: https://www.taylorgbledsoe.com/YouTube: https://www.youtube.com/channel/UC6-TwYdfPcWV-V1JvjBXk

Cloud Security Podcast
Azure Cloud Security Architecture

Cloud Security Podcast

Play Episode Listen Later May 25, 2022 40:52


In this episode of the Virtual Coffee with Ashish edition, we spoke with Sai Gunaranjan (Sai's Linkedin) Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: Sai Gunaranjan (Sai's Linkedin) Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy

The Changelog
Schneier on security for tomorrow's software

The Changelog

Play Episode Listen Later May 20, 2022 75:12 Transcription Available Very Popular


This week we're talking with Bruce Schneier — cryptographer, computer security professional, privacy specialist, and writer (of many books). He calls himself a “public-interest technologist”, a term he coined himself, and works at the intersection of security, technology, and people. Bruce has been writing about security issues on his blog since 2004, his monthly newsletter has been going since 1998, he's a fellow and lecturer at Harvard's Kennedy School, a board member of the EFF, and the Chief of Security Architecture at Inrupt. Long story short, Bruce has credentials to back up his opinions and on today's show we dig into the state of cyber-security, security and privacy best practices, his thoughts on Bitcoin (and other crypto-currencies), Tim Berners-Lee's Solid project, and of course we asked Bruce to share his advice for today's developers building the software systems of tomorrow.