Podcasts about security innovation

  • 58PODCASTS
  • 70EPISODES
  • 35mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Dec 10, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about security innovation

Latest podcast episodes about security innovation

ITSPmagazine | Technology. Cybersecurity. Society
Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon Wijckmans

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 10, 2024 33:21


In a recent episode of Brand Story, Simon Wijckmans, founder and CEO of c/side, discussed the critical need to secure third-party scripts on websites, a frequently overlooked aspect of cybersecurity. Drawing on his experience with companies like Cloudflare and Vercel, Wijckmans outlined why traditional methods fall short in addressing dynamic threats and how c/side is redefining client-side security.Third-party scripts—commonly used for analytics, marketing, and chatbots—are vital for website functionality but come with inherent risks. These scripts operate dynamically, allowing malicious actors to inject harmful code under specific conditions, such as targeting particular users or timeframes. Existing security approaches, such as threat feeds or basic web crawlers, fail to detect these threats because they often rely on static assessments. As Wijckmans explained, these limitations result in a false sense of security, leaving businesses exposed to significant risks.C/side provides a proactive solution by placing itself between users and third-party script providers. This approach enables real-time analysis and monitoring of script behavior. Using advanced tools, including AI-driven analysis, c/side inspects the JavaScript code and flags malicious activity. Unlike other solutions, it offers complete transparency by delivering the full source code of scripts in a readable format, empowering organizations to investigate and address potential vulnerabilities comprehensively.Wijckmans stressed that client-side script security is an essential yet underrepresented aspect of the supply chain. While most security tools focus on protecting server-side dependencies, the browser remains a critical point where sensitive data is often compromised. C/side not only addresses this gap but also helps organizations meet compliance requirements like those outlined in PCI-DSS, which mandate monitoring client-side scripts executed in browsers.C/side's offerings cater to various users, from small businesses using a free tier to enterprises requiring comprehensive solutions. Its tools integrate seamlessly into cybersecurity programs, supporting developers, agencies, and compliance teams. Additionally, c/side enhances performance by optimizing script delivery, ensuring that security does not come at the cost of website functionality.With its innovative approach, c/side exemplifies how specialized solutions can tackle complex cybersecurity challenges. As Wijckmans highlighted, the modern web can be made safer with accessible, effective tools, leaving no excuse for neglecting client-side security. Through its commitment to transparency, performance, and comprehensive protection, c/side is shaping a safer digital ecosystem for businesses and users alike.Learn more about c/side: https://itspm.ag/c/side-t0g5Note: This story contains promotional content. Learn more.Guest: Simon Wijckmans, Founder & CEO, c/side [@csideai]On LinkedIn | https://www.linkedin.com/in/wijckmans/ ResourcesLearn more and catch more stories from c/side: https://www.itspmagazine.com/directory/c-sideAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon Wijckmans

Redefining CyberSecurity

Play Episode Listen Later Dec 10, 2024 33:21


In a recent episode of Brand Story, Simon Wijckmans, founder and CEO of c/side, discussed the critical need to secure third-party scripts on websites, a frequently overlooked aspect of cybersecurity. Drawing on his experience with companies like Cloudflare and Vercel, Wijckmans outlined why traditional methods fall short in addressing dynamic threats and how c/side is redefining client-side security.Third-party scripts—commonly used for analytics, marketing, and chatbots—are vital for website functionality but come with inherent risks. These scripts operate dynamically, allowing malicious actors to inject harmful code under specific conditions, such as targeting particular users or timeframes. Existing security approaches, such as threat feeds or basic web crawlers, fail to detect these threats because they often rely on static assessments. As Wijckmans explained, these limitations result in a false sense of security, leaving businesses exposed to significant risks.C/side provides a proactive solution by placing itself between users and third-party script providers. This approach enables real-time analysis and monitoring of script behavior. Using advanced tools, including AI-driven analysis, c/side inspects the JavaScript code and flags malicious activity. Unlike other solutions, it offers complete transparency by delivering the full source code of scripts in a readable format, empowering organizations to investigate and address potential vulnerabilities comprehensively.Wijckmans stressed that client-side script security is an essential yet underrepresented aspect of the supply chain. While most security tools focus on protecting server-side dependencies, the browser remains a critical point where sensitive data is often compromised. C/side not only addresses this gap but also helps organizations meet compliance requirements like those outlined in PCI-DSS, which mandate monitoring client-side scripts executed in browsers.C/side's offerings cater to various users, from small businesses using a free tier to enterprises requiring comprehensive solutions. Its tools integrate seamlessly into cybersecurity programs, supporting developers, agencies, and compliance teams. Additionally, c/side enhances performance by optimizing script delivery, ensuring that security does not come at the cost of website functionality.With its innovative approach, c/side exemplifies how specialized solutions can tackle complex cybersecurity challenges. As Wijckmans highlighted, the modern web can be made safer with accessible, effective tools, leaving no excuse for neglecting client-side security. Through its commitment to transparency, performance, and comprehensive protection, c/side is shaping a safer digital ecosystem for businesses and users alike.Learn more about c/side: https://itspm.ag/c/side-t0g5Note: This story contains promotional content. Learn more.Guest: Simon Wijckmans, Founder & CEO, c/side [@csideai]On LinkedIn | https://www.linkedin.com/in/wijckmans/ ResourcesLearn more and catch more stories from c/side: https://www.itspmagazine.com/directory/c-sideAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Breaking Badness
DNS Gone Rogue & DARPA's Cyber Puzzle: Lessons in Security Innovation

Breaking Badness

Play Episode Listen Later Dec 7, 2024 32:26


In this episode of Breaking Badness, we dive into two fascinating stories shaping the cybersecurity landscape. First, we unpack the case of Gabriel Koo and his surprising acquisition of the domain us-east-1.com, a domain closely tied to AWS's naming conventions. What insights can this seemingly simple purchase reveal about DNS misconfigurations and AWS security practices? Next, we shift focus to DARPA's ambitious new project aimed at revolutionizing cybersecurity by breaking software into smaller, more secure compartments. With expert analysis and intriguing insights, we explore the intersection of DNS, innovation, and the future of cybersecurity.

Progress, Potential, and Possibilities
Steve Blank - Co-Founder, Gordian Knot Center for National Security Innovation, Stanford University - Innovation At Speed And Scale For Future National Security Challenges

Progress, Potential, and Possibilities

Play Episode Listen Later Dec 6, 2024 77:45


Send us a textSteve Blank is an Adjunct Professor at Stanford and Co-Founder of the Gordian Knot Center for National Security Innovation (https://gordianknot.stanford.edu/people/steve-blank). He has been described as the Father of Modern Entrepreneurship.Credited with launching the Lean Startup movement and the curriculums for the National Science Foundation Innovation Corps and Hacking for Defense and Diplomacy, Steve has changed how startups are built; how entrepreneurship is taught; how science is commercialized, and how companies and the government innovate.Steve is the author of The Four Steps to the Epiphany and The Startup Owner's Manual which revolutionized how startups were built. His Harvard Business Review cover story redefined how large companies can innovate at speed.Steve blogs at www.steveblank.com#SteveBlank #NationalSecurity #DepartmentOfDefense #DoD #Entrepreneuship #LeanStartup #NationalScienceFoundation #InnovationCorps #HackingForDefense #IntelligenceCommunity #SpaceX #ElonMusk #DefenseInnovationUnit #VannevarBush #VentureCapital  #PrimeContractors #LockheedMartin #Boeing #GeneralDynamics  #Raytheon #NorthropGrumman #Anduril #Palantir #Stanford #ProgressPotentialAndPossibilities #IraPastor #Podcast #Podcaster #ViralPodcast #STEM #Innovation #Technology #Science #ResearchSupport the show

Daily Influence
331. Building Trust Through Family Culture and Security Innovation: A Conversation w/ Gini Shahzada

Daily Influence

Play Episode Listen Later Oct 31, 2024 10:15


In today's episode of Daily Influence, Gregg Koleno sits down with Gini Shahzada, VP of Business Development at Apex3 Security Systems. Gini shares her journey of cultivating long-lasting relationships both personally and professionally. She discusses how she fosters a family culture within her organization and among her clients, emphasizing trust and authenticity. Gini also dives into the importance of being proactive in the security industry, educating clients on the latest technology to create safer communities. Tune in to hear Gini's insights on leadership, balancing business growth with team motivation, and how her personal values shape her approach to making a positive impact. This episode is filled with practical advice for those looking to make a difference in the world while staying grounded in their values. Email Gini at: gshahzada@apex3systems.com 

Cloud Wars Live with Bob Evans
Oracle's Bold Moves: Cloud Innovation, Global Expansion, and the Multi-Cloud Era with Mahesh Thiagarajan | Cloud Wars Live

Cloud Wars Live with Bob Evans

Play Episode Listen Later Oct 9, 2024 18:18


Oracle's Expanding Multi-Cloud StrategyThe Big Themes:Oracle's unique cloud architecture: Oracle's differentiated cloud architecture offers customers flexibility across different environments, whether public, private, or government. This hybrid architecture ensures that customers can deploy the same services whether they need an on-premises solution, a fully isolated cloud region, or a multi-cloud setup. Oracle's approach also addresses the specific needs of regulated industries, like finance or healthcare.Global expansion and investments: Oracle is heavily investing in expanding its cloud infrastructure across the globe, including in emerging markets like Saudi Arabia, Malaysia, and Latin America. These investments aim to meet growing local demands for cloud services while enhancing Oracle's global footprint. By establishing more localized data centers, Oracle can reduce latency for customers, ensure data sovereignty, and cater to regional regulatory requirements.Multi-cloud partnerships: Oracle's partnerships with major cloud providers like Microsoft, Google Cloud, and AWS represent a shift in the cloud industry, as it was previously unheard of for these companies to collaborate. Oracle recognized early on that customers were using multi-cloud strategies, so it adapted by integrating with these other platforms. Its willingness to collaborate with competitors reflects its commitment to answering customers' needs.The Big Quote: “It is very clear that customers drive our strategy . . . Oracle is kicking this multi-cloud era forward, an open era, if you will."

eXecutive Security
Expanding Cybersecurity Careers Beyond Hacking with Ed Adams, CEO of Security Innovation

eXecutive Security

Play Episode Listen Later Sep 11, 2024 25:03


In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security and training. Ed also dives into his book, See Yourself in Cybersecurity Careers Beyond Hacking, which highlights the many career paths available in the cybersecurity industry beyond hands-on keyboard roles. He discusses the cybersecurity talent shortage, particularly how it affects underrepresented groups, and the need for organizations to rethink how they hire and retain talent.Takeaways:There are many ways to start a career in cybersecurity, even from non-technical backgrounds.Security is an integral part of software quality can help developers and organizations create more secure, reliable applications.The book, See Yourself in Cybersecurity Careers Beyond Hacking, focuses on educating the next generation of cybersecurity professionals and promoting diversity in the field.The cybersecurity talent shortage is not about the lack of skilled individuals, but about outdated hiring practices and insufficient investment in talent development.

ITSPmagazine | Technology. Cybersecurity. Society
Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 13, 2024 7:12


In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization's security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture's evolution.A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai's rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai's tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.Learn more about Horizon3.ai: https://itspm.ag/horizon3ai-bh23Note: This story contains promotional content. Learn more.Guest: Snehal Antani, Co-Founder & CEO at Horizon3.ai [@Horizon3ai]On LinkedIn | https://www.linkedin.com/in/snehalantani/On Twitter | https://twitter.com/snehalantaniResourcesLearn more and catch more stories from Horizon3.ai: https://www.itspmagazine.com/directory/horizon3aiView all of our OWASP AppSec Global Lisbon 2024 coverage: https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugalLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani

Redefining CyberSecurity

Play Episode Listen Later Aug 13, 2024 7:12


In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization's security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture's evolution.A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai's rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai's tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.Learn more about Horizon3.ai: https://itspm.ag/horizon3ai-bh23Note: This story contains promotional content. Learn more.Guest: Snehal Antani, Co-Founder & CEO at Horizon3.ai [@Horizon3ai]On LinkedIn | https://www.linkedin.com/in/snehalantani/On Twitter | https://twitter.com/snehalantaniResourcesLearn more and catch more stories from Horizon3.ai: https://www.itspmagazine.com/directory/horizon3aiView all of our OWASP AppSec Global Lisbon 2024 coverage: https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugalLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
From Signatures to Behavior: RAD Security's Recognized Innovations for Cloud Threat Detection and Response | A Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 26, 2024 7:00


In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).The What: RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.The How: RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.Key Points Discussed:Behavioral Detection vs. Signature-Based Methods:Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.Enhanced Capabilities for Real-Time Response:The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.Recognition and Impact:RAD Security's innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.Supply Chain Security:Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security's verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.Future of Cloud Security:As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.Learn more about RAD Security: https://itspm.ag/radsec-l33tzNote: This story contains promotional content. Learn more.Guest: Brooke Motta, CEO & Co-Founder, RAD Security [@RADSecurity_]On LinkedIn | https://www.linkedin.com/in/brookemotta/On Twitter | https://x.com/brookelynz1ResourcesA Brief History of Signature-Based Threat Detection in Cloud Security: https://itsprad.io/radsec-4biOpen Source Cloud Workload Fingerprint Catalog: https://itsprad.io/radsec-kroLearn more and catch more stories from RAD Security: https://www.itspmagazine.com/directory/rad-securityView all of our Black Hat USA  2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
From Signatures to Behavior: RAD Security's Recognized Innovations for Cloud Threat Detection and Response | A Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta

Redefining CyberSecurity

Play Episode Listen Later Jul 26, 2024 7:00


In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).The What: RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.The How: RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.Key Points Discussed:Behavioral Detection vs. Signature-Based Methods:Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.Enhanced Capabilities for Real-Time Response:The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.Recognition and Impact:RAD Security's innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.Supply Chain Security:Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security's verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.Future of Cloud Security:As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.Learn more about RAD Security: https://itspm.ag/radsec-l33tzNote: This story contains promotional content. Learn more.Guest: Brooke Motta, CEO & Co-Founder, RAD Security [@RADSecurity_]On LinkedIn | https://www.linkedin.com/in/brookemotta/On Twitter | https://x.com/brookelynz1ResourcesA Brief History of Signature-Based Threat Detection in Cloud Security: https://itsprad.io/radsec-4biOpen Source Cloud Workload Fingerprint Catalog: https://itsprad.io/radsec-kroLearn more and catch more stories from RAD Security: https://www.itspmagazine.com/directory/rad-securityView all of our Black Hat USA  2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

CROSSTALK 英会話
Security Innovation 新紙幣デビュー!日本の新しいお札デザインの秘密

CROSSTALK 英会話

Play Episode Listen Later Jul 14, 2024 21:16


今回のエピソードでは日本の新紙幣デザインと、それが自動販売機に与える影響について探ります。2024年7月に発行される新紙幣の特徴、世界の紙幣事情、そして200万台以上の自販機が直面する課題と、キャッシュレス化への影響を徹底解説!日本の現金文化の転換点となるか、注目の話題をお届けします。 エピソードを楽しんだら...ぜひ私たちのメーリングリストにご登録ください。特別コンテンツやイベントのお知らせもいち早くお届けします。 https://forms.gle/2wDCe1QZvwnVLXTo6

ITSPmagazine | Technology. Cybersecurity. Society
The Present and Future of Cybersecurity Culture | An Infosecurity Europe 2024 Conversation with Aston Martin's CISO Robin Smith | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 11, 2024 26:54


Guest: Robin Smith, CISO of Aston Martin [@astonmartin]On LinkedIn | https://www.linkedin.com/in/robin-s-78148a133/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe latest episode of "On Location With Marco and Sean" features an in-depth discussion with Robin Smith, the Chief Information Security Officer (CISO) at Aston Martin. Recorded live in the media room at Infosecurity Europe 2024 in London, this episode explores the essential role of culture in cybersecurity. Sean Martin and Marco Ciappelli guide the conversation, touching on everything related to the complexities of organizational security culture.The IcebreakerThe conversation kicks off with some light-hearted banter about yogurt and its cultural significance, setting a relaxed tone before diving into the serious business of cybersecurity. Sean and Marco's playful exchange effectively breaks the ice, before Sean introduces Robin Smith, emphasizing how this conversation is the final one in their Infosecurity Europe coverage. Robin reciprocates with a warm thank you, before sharing insights on Aston Martin's cybersecurity culture.Life at Aston MartinRobin elaborates on his role at Aston Martin, revealing that he considers himself the "luckiest man in cyber." He explains how a commitment to high-quality IT initially existed at Aston Martin but not a fully developed cybersecurity culture. Over the past three years, his mission has been to build that culture, aligning it with Aston Martin's values and brand prestige.Building a Cybersecurity CultureRobin describes how he introduced a comprehensive security program that aligns with Aston Martin's renowned design and engineering standards. He discusses the importance of integrating cybersecurity as a full-spectrum approach to business improvement, not just a technological add-on.Lessons LearnedThe conversation shifts to some of the challenges and failures encountered along the way. Robin recounts an ambitious but ultimately unsuccessful attempt to engage the board with an open-source intelligence report on their personal information. Though the exercise did not go as planned, it provided invaluable lessons on cultural sensitivity and resource allocation.The Vision for the FutureRobin and Sean discuss the forward-thinking mindset necessary to navigate both immediate and long-term cybersecurity challenges. Robin emphasizes the need for a balanced approach that combines visionary planning with effective tactical response. He highlights Aston Martin's ambition for full automation and AI-driven security measures.Impact on Customers and CommunityMarco Ciappelli raises the question of how this robust security culture affects Aston Martin's customers. Robin assures that high-value customers expect the best, including top-notch security. He underscores the importance of securing the entire value chain, from suppliers to dealership networks.Community and CollaborationSean explores the role of community among CISOs. Robin shares his positive experiences with the automotive CISO community, emphasizing the value of honest and sometimes brutal feedback. This collaborative environment helps him and his peers continually improve their security programs.Wrapping UpAs the conversation winds down, both hosts thank Robin for his insights. They reflect on the passion and dedication evident in the cybersecurity community throughout the event. Sean invites Robin for another discussion on cyber futurism, hinting at more intriguing conversations to come.Marco and Sean close the episode by thanking their audience and expressing their excitement for future events. They hope to see everyone again at next year's Infosecurity Europe, promising more engaging content and enlightening discussions.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our InfoSecurity Europe 2024 coverage: https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverageOn YouTube:

Redefining CyberSecurity
The Present and Future of Cybersecurity Culture | An Infosecurity Europe 2024 Conversation with Aston Martin's CISO Robin Smith | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Jun 11, 2024 26:54


Guest: Robin Smith, CISO of Aston Martin [@astonmartin]On LinkedIn | https://www.linkedin.com/in/robin-s-78148a133/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe latest episode of "On Location With Marco and Sean" features an in-depth discussion with Robin Smith, the Chief Information Security Officer (CISO) at Aston Martin. Recorded live in the media room at Infosecurity Europe 2024 in London, this episode explores the essential role of culture in cybersecurity. Sean Martin and Marco Ciappelli guide the conversation, touching on everything related to the complexities of organizational security culture.The IcebreakerThe conversation kicks off with some light-hearted banter about yogurt and its cultural significance, setting a relaxed tone before diving into the serious business of cybersecurity. Sean and Marco's playful exchange effectively breaks the ice, before Sean introduces Robin Smith, emphasizing how this conversation is the final one in their Infosecurity Europe coverage. Robin reciprocates with a warm thank you, before sharing insights on Aston Martin's cybersecurity culture.Life at Aston MartinRobin elaborates on his role at Aston Martin, revealing that he considers himself the "luckiest man in cyber." He explains how a commitment to high-quality IT initially existed at Aston Martin but not a fully developed cybersecurity culture. Over the past three years, his mission has been to build that culture, aligning it with Aston Martin's values and brand prestige.Building a Cybersecurity CultureRobin describes how he introduced a comprehensive security program that aligns with Aston Martin's renowned design and engineering standards. He discusses the importance of integrating cybersecurity as a full-spectrum approach to business improvement, not just a technological add-on.Lessons LearnedThe conversation shifts to some of the challenges and failures encountered along the way. Robin recounts an ambitious but ultimately unsuccessful attempt to engage the board with an open-source intelligence report on their personal information. Though the exercise did not go as planned, it provided invaluable lessons on cultural sensitivity and resource allocation.The Vision for the FutureRobin and Sean discuss the forward-thinking mindset necessary to navigate both immediate and long-term cybersecurity challenges. Robin emphasizes the need for a balanced approach that combines visionary planning with effective tactical response. He highlights Aston Martin's ambition for full automation and AI-driven security measures.Impact on Customers and CommunityMarco Ciappelli raises the question of how this robust security culture affects Aston Martin's customers. Robin assures that high-value customers expect the best, including top-notch security. He underscores the importance of securing the entire value chain, from suppliers to dealership networks.Community and CollaborationSean explores the role of community among CISOs. Robin shares his positive experiences with the automotive CISO community, emphasizing the value of honest and sometimes brutal feedback. This collaborative environment helps him and his peers continually improve their security programs.Wrapping UpAs the conversation winds down, both hosts thank Robin for his insights. They reflect on the passion and dedication evident in the cybersecurity community throughout the event. Sean invites Robin for another discussion on cyber futurism, hinting at more intriguing conversations to come.Marco and Sean close the episode by thanking their audience and expressing their excitement for future events. They hope to see everyone again at next year's Infosecurity Europe, promising more engaging content and enlightening discussions.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our InfoSecurity Europe 2024 coverage: https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverageOn YouTube:

The Retrospective
#6 The Retrospective 10th June 2024: Career Security, Innovation, and the Tech Industry in 2024

The Retrospective

Play Episode Listen Later Jun 10, 2024 70:02


In this episode, we discuss the critical importance of career security over job security in the changing tech landscape, highlighting strategies for sustaining and advancing one's career in 2024. Then, we explore the Innovation Framework based on the Möbius Loop for balancing discovery, delivery, and options in the software development life cycle. We also urge organisations to consider capturing structured practices with the Open Practice Library. Additionally, we discuss the value of pair programming and mob programming for strengthening collaboration, learning, and problem-solving. 00:00 Hey! 00:25 We Are Slowing Figuring Out The Show Format and Target Audience 02:09 Politics - The Morning After The Night Before - EU and Hungarian Election Results 04:21 Artistic Pairing - The Twin Peaks Soundtrack 12:30 Pair Programming and Collaboration 24:08 What's Old Is New in Tech 30:36 How to maintain career security in the 2024 tech climate? 46:22 A Framework for Innovation 50:37 Implementing Standard Practices 01:08:47 Wrapping Up

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Prioritize with Precision: Outshift by Cisco VP Papi Menon on Scaling Cloud Infrastructure Security Innovation

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Oct 30, 2023 26:01


815: Papi Menon, Vice President and Chief Product Officer of Cisco's incubation engine Outshift, discusses the innovation he is leading at the company and the process by which his team is scaling that innovation. He explains the skills he has on his team at Outshift and how he is developing that talent internally. Papi also describes the focus on cloud security, the platforms his team has built to help companies secure their cloud infrastructure, and the core pillars of these products. Finally, Papi touches on the cultural component of innovation, exploring use cases for artificial intelligence, and the secrets to his career success.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Prioritize with Precision: Outshift by Cisco VP Papi Menon on Scaling Cloud Infrastructure Security Innovation

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Oct 30, 2023 26:01


815: Papi Menon, Vice President and Chief Product Officer of Cisco's incubation engine Outshift, discusses the innovation he is leading at the company and the process by which his team is scaling that innovation. He explains the skills he has on his team at Outshift and how he is developing that talent internally. Papi also describes the focus on cloud security, the platforms his team has built to help companies secure their cloud infrastructure, and the core pillars of these products. Finally, Papi touches on the cultural component of innovation, exploring use cases for artificial intelligence, and the secrets to his career success.

Breaking Banks Fintech
Episode 513: Stablecoins Going Mainstream

Breaking Banks Fintech

Play Episode Listen Later Oct 12, 2023 52:47


In This Episode In this week's episode of Breaking Banks, Brett King engages in an informative and dynamic discussion with Jonathan Anastasia, EVP, Crypto & Security Innovation, Mastercard and Mike Coscetta, Head of Revenue at Paxos Trust Company about why financial leaders should be investing in blockchain now. It's a watershed moment for stablecoins and an opportunity to extend the benefits of blockchain technology to the realm of traditional finance and everyday transactions while ensuring integrity and security for customers. The trio cover it all -- the state of the market today, the volatility, regulatory outlook and crackdown, international trends vs that in the US, growth in crypto in LATAM & other regions -- and then dive in to their partnership, Crypto Source, sharing their vision for crypto in banking, what it means for the industry and how easy it is for banks to turn on, safely and compliantly, while being in control. With banks unlocking crypto, what does it mean for the future of finance? Listen to find out, now's the time! https://www.youtube.com/watch?v=fK1pUXA_2Nw

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More
Healthcare de Jure: Fred Pinkett, Senior Director of Product at Security Innovation

HealthcareNOW Radio - Insights and Discussion on Healthcare, Healthcare Information Technology and More

Play Episode Listen Later Sep 9, 2023 28:23


Host Matt Fisher is joined by Fred Pinkett, Senior Director of Product at Security Innovation. They discuss current security risks to systems; distinctions between types of cybersecurity training; impact of using simulations and scenarios in training; importance of regularly updating training. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen

Brian Crombie Radio Hour
Brian Crombie Radio Hour - Epi 967 - Canada-Ukraine Security Innovation Challenge with Joel Semeniuk

Brian Crombie Radio Hour

Play Episode Listen Later Sep 7, 2023 48:47


Brian speaks with Joel Semeniuk. Joel talks about a contest sponsored by Communitech, the Canada-Ukraine Security Innovation Challenge (CUSIC). This challenge is a collaborative effort between Communitech, the Ontario Centre of Innovation (OCI), and the Ukrainian Startup Fund, among other partners. In addition to leading strategy for Communitech, Joel oversees programs that help connect startups to Canadian markets. Tech companies in Canada and Ukraine will be invited to participate in a bilateral competition and showcase that will bring together tech entrepreneurs from both countries to work on innovative solutions that will strengthen Canada and Ukraine's technological expertise and could shape the future of national, economic, and climate security.

The New IT Podcast
Exploring Cyber Security Innovation with Justin Fischer of Guardsight

The New IT Podcast

Play Episode Listen Later Aug 16, 2023 44:38


In this exciting episode of the Jobs in Tech Podcast, our host sits down with Justin Fischer, the visionary Director of Special Operations & Incident Response at Guardsight, a leading cybersecurity company. Join us as we dive into the cutting-edge and innovative initiatives that Guardsight is spearheading in the world of cybersecurity, as well as gain valuable insights into what they look for in prospective candidates. Justin takes us on a captivating journey through Guardsight's commitment to staying ahead of the ever-evolving cyber threats landscape. He shares how the company's team of experts is continuously devising groundbreaking solutions to protect businesses and organizations from data breaches, malware attacks, and other cyber risks. Throughout the conversation, we uncover the unique work culture at Guardsight, highlighting the emphasis on creativity, collaboration, and professional growth. Justin sheds light on the diverse roles available within the company, ranging from ethical hackers and threat analysts to engineers and project managers, each playing a pivotal role in defending against cyber threats. For aspiring candidates eager to be part of Guardsight's dynamic team, Justin provides invaluable advice on the skill sets and qualities they seek. He discusses the importance of problem-solving abilities, adaptability, and a passion for staying updated on the latest developments in the cybersecurity domain. If you're intrigued by the incredible work done at Guardsight and wish to explore potential career opportunities with them, be sure to visit their careers page at  guardsight.com/careers Interested in other tech opportunities? Check out techbridgeinc.com/job-board

Federal Drive with Tom Temin
National Security Innovation Capital meets investment milestone for the year

Federal Drive with Tom Temin

Play Episode Listen Later Jul 10, 2023 17:29


When National Security Innovation Capital (NSIC) obligated its available funds for the current year, it marked a milestone for the three-year-old government-backed venture fund. After starting as an idea — exploring whether the government can make an impact on early-stage hardware production to benefit the Defense Department — it quickly developed into a working fund with 17 companies in its portfolio. The initial seed money from Congress spanned five years at $15 million per fiscal year after the first year with a mandate of providing funds to start-up hardware companies that could provide the Defense Department much-needed products from secure domestic sources. Learn more about your ad choices. Visit megaphone.fm/adchoices

Dark Mode Podcast
#43 - Australia's Hybrid Threat Centre & Cyber Security Innovation - Matt Warren

Dark Mode Podcast

Play Episode Listen Later Apr 16, 2023 49:14


In this episode @GabeMarzano & @BenSullivan host Matt Warren who is the Director of the RMIT Centre of Cyber Security Research and Innovation and Co-Director of the Australian - Lithuanian Cyber Research Network. Matt also holds Cyber leadership roles in professional bodies such as the ACS, AISA and IFIP and is a prolific and passionate researcher in Cyber Security and have authored and co-authored over 300 books, book chapters, journal papers and conference papers. // SUPPORT THIS CHANNEL //

To The Point - Cybersecurity
StateRAMP: The Easy Button for Security Innovation with Joe Bielawski and Leah McGrath

To The Point - Cybersecurity

Play Episode Listen Later Jan 24, 2023 45:35


Joining us on the podcast this week is Joe Bielawski – founding member of StateRAMP and President of Knowledge Services – as well as StateRamp Executive Director Leah McGrath. If the name sounds somewhat familiar – like FedRAMP – it should because StateRAMP helps to meet the growing need in state and local government to manage third party risk and efficiently verify cloud security. The organization has an incredible wealth of resources and tools - such as security maturity assessment tool Security Snapshot - that help bring innovation to state/local governments faster. And in just a couple years StateRAMP is already working with 17 states. For those interested in learning more or taking advantage of the awesome resources this organization delivers visit their website at stateramp.org. Joe Bielawski, Founding Member of StateRAMP – In 2020, Joe Bielawski (President of Knowledge Services) and J.R. Sloan developed the idea of StateRAMP to meet the growing need in state and local government to manage third party risk and efficiently verify cloud security. Leah McGrath, Executive Director of StateRAMP - Serving as the Executive Director, Leah McGrath has been involved with StateRAMP since its formation. In 2020, she spent countless hours working alongside Steering Committee members to develop StateRAMP's governance and policy framework. Prior to her work with StateRAMP, McGrath held leadership positions in both the public and private sector, including serving as the first deputy mayor of the City of Fishers, Indiana. During her tenure, Fishers transformed from a town into a smart, vibrant, entrepreneurial city and was named the #1 Best Place to Live in America in 2017 by Money magazine. As deputy mayor, she helped lead modernization efforts and spearheaded city-wide efforts to develop the city's first long-range, comprehensive plan. McGrath's 20-year career has been focused on working to improve government outcomes at the state and local level, helping shepherd government into the digital age securely and effectively for the citizens it serves. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e217

ITSPmagazine | Technology. Cybersecurity. Society
Supporting Security Innovation To Protect The World | A Conversation With Bob Martin @ The MITRE Corporation & Industrial Internet Consortium | Cy Beat Podcast With Deb Radcliff

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 4, 2022 27:26


GuestRobert (Bob) MartinSenior Principal Engineer at The MITRE Corporation [@MITREcorp] and Chair of the Steering Committee of the Industrial Internet Consortium [@IIConsortium]On LinkedIn | https://www.linkedin.com/in/robert-martin-589579/____________________________HostDeb RadcliffOn ITSPmagazine  

Lab to Startup
National Security Innovation Capital (NSIC)- Funding dual-use hardware startups

Lab to Startup

Play Episode Listen Later Oct 4, 2022 37:22


Salvador Badillo-Rios, an Associate at the National Security Innovation Capital (NSIC). We talk about the origins of the National Security Innovation Capital (NSIC); funding priorities; criteria for funding; application process; and insights into best practices for applicants. Show Notes: - Website: National Security Innovation Capital (NSIC) - Building hardware is hard - A new DoD initiative that enables dual-use hardware startups - Help product development by addressing the shortfall of private investment from trusted sources. - Some of the founders were looking to China for funding innovations - Areas of interest: Autonomy, Space, Sensors, Power, Communications - Selection criteria - Rolling applications - Application and Review process - Support post funding - Intellectual Property - Tips to Apply- Focus on the why; include risk and mitigation plan - Commercial Acceleration Opportunity (CAO) - Email: sbadillorios.ctr@diu.mil - Linkedin profile:  https://www.linkedin.com/in/salvador-badillo-rios/   Sub-contracting: Companies are allowed to subcontract some work since this is often needed for hardware startups (specialized manufacturing, etc). NSIC had several portfolio companies do this. However, subcontracting should not be the majority of the product development we are funding (the majority should be performed by in-house talent). NSIC looks at companies on a case-by-case basis.

The CyberPHIx: Meditology Services Podcast
Securing the Software Development Lifecycle (SDLC) in Healthcare

The CyberPHIx: Meditology Services Podcast

Play Episode Listen Later Aug 22, 2022 48:43


Breaches continue to balloon for healthcare applications as the industry continues to drive innovations in virtual care, personalized medicine, and digital healthcare. Organizations that deploy robust application development security programs create the opportunity to identify and correct security weaknesses before products hit the market.  Software Development Lifecycle (SDLC) security programs provide the tools, processes, and training required to design products with security in mind to reduce the likelihood of breaches of sensitive information.  Join us for this episode of the CyberPHIx podcast where we hear from Ed Adams, CEO for Security Innovation. Security Innovation provides application security services, training, testing, and consulting to healthcare and other industries.  Topics covered in this session include:   Application development security trends  The latest threats and vulnerabilities impacting healthcare application development  Best practices for securing AppDev, DevOps, and DevSecOps teams and processes  Common development misconceptions and missteps that lead to security exposures Security training approaches for healthcare app developers  Frameworks and external resources for SDLC security including OWASP and others  Healthcare-specific vulnerabilities and risk exposures identified during application development  Third-party and fourth-party risks including open-sourced code and IoT devices Budget priorities for SDLC security investments 

UBC News World
Britive Announces Customer Growth & Partnerships For Cloud Security Innovation

UBC News World

Play Episode Listen Later Aug 7, 2022 2:22


Britive is continuing to grow their cloud-native security network through a number of new key partnerships. Check them out at https://www.britive.com/blog/britive-momentum (https://www.britive.com/blog/britive-momentum)

Tomorrow's Tech Today
Secure by Design - A Cyber Security Innovation Special with Vivek Bhandari, Senior Director, VMware

Tomorrow's Tech Today

Play Episode Listen Later Mar 10, 2022 34:21


A Security Imperative! New research has shown that cybercrime costs are poised to grow by 15 percent per year over the next five years, reaching $10.5 trillion dollars annually by 2025. Heightened risk alongside endpoint choice, flexible workstyles and applications everywhere means that the once traditional, established trust boundaries that use perimeter security simply no longer exist. Endpoints are not “yours” anymore. Indeed, for reasons explored in this episode, a combination of vectors has now created a 'perfect risk storm'. It could therefore not be more timely to unpack these challenges - but equally move beyond these to the support that is available right now to counter the threats. And to do exactly this I am delighted to be joined by Vivek Bhandari, Senior Director of Product Marketing | Networking & Security at VMware. In particular we focus on the expanding risk landscape including threats to the operating system in multi-cloud environments and addressing these through embedding ongoing Zero Trust practices, alongside the importance of continual learning, supporting ease of security management and fostering diversity within Cyber Security teams. It's a truly dynamic discussion! And we would love your thoughts on the episode too - thanks for listening!Sally, Vivek and the #TTT TeamPlease join us on Twitter to continue the conversation! @techradiotttToday's guest Vivek on LinkedIn: https://www.linkedin.com/in/vivekbhandari/ And our host Prof. Sally Eaves on Twitter @sallyeavesAnd LinkedIn http://www.linkedin.com/in/sally-eaves

Control System Cyber Security Association International: (CS)²AI
23: Transitioning from IT to OT to Cybersecurity with Bryan Singer

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Jan 25, 2022 45:08


Derek Harp is excited to have Bryan Singer join him today for an episode in the Security Leader interview series!  Bryan is a true pioneer in the cyber security space! He has an extensive background in several industries, including manufacturing, DoD, and healthcare. His proven professional skills include system architecture and design, software project management, application development, system administration, network administration, database design and administration, and multi-tier support. Currently, he is Principal Director of Security Innovation at Accenture. Bryan was born in Mountain Home, Idaho. His father was a pilot in the air force, so they lived in many different places across the country while he was growing up. He spent most of his childhood in Alabama, and he remembers being the coolest kid on the street because he had an Apple 2 Plus computer with two five-and-a-quarter-inch floppy drives. Watching WarGames inspired him to become a hacker, but he soon realized that hacking was not quite what it appeared to be on television! In this episode of the (CS)²AI Podcast, Bryan shares his superhero backstory, talks about his career journey, and discusses the valuable lessons he learned early on that he could apply later in his career. He also shares some helpful nuggets for people either considering a career in cyber security or crossing over from other areas in IT or OT. If you are interested in cyber security, stay tuned. You will not want to miss this informative episode! Show highlights: Bryan talks about when he first got an itch for hacking. (1:23) Immediately after high school, he joined the army. He worked in Intelligence and got exposed to computer and network security, now known as cyber security. (3:40) Bryan started his career doing software development. (4:58) Bryan describes his first experience of dealing with a compromise. (7:00) Having a deep systems background has been helpful when diagnosing other problems later in his career. (8:43) What Bryan tells people when they ask him how he got involved in cyber security. (9:34) How he ended up being Chairman of the ISA-99 Security Committee. (12:34) Bryan discusses mentorship and explains how he managed to connect with mentors in the world of industrial safety. (17:12) How to get involved in the standards bodies early on in your career. (21:51) The advice Bryan would give to his younger self. (29:34) Some helpful advice for facing challenges. (33:14) The impact of the pandemic on the cyber security industry. (34:01) Bryan discusses the things he chose to do in his career, outside of what his job required. (35:52) Bryan co-authored two books. (36:14) Links: https://www.cs2ai.org/ ((CS)²AI)  https://www.accenture.com/us-en (Accenture) Bryan L Singer on https://www.linkedin.com/in/bryanlsinger/ (LinkedIn) Resources: The books Bryan co-authored:  https://www.amazon.com/-/es/gp/product/B0071ART60/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i1 (Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS) https://www.amazon.com/-/es/gp/product/B01L4UGJKE/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0 (Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions) Mentioned in this episode: Join CS2AI Join the largest organization for cybersecurity professionals. Membership has its benefits! We keep you up to date on the latest cybersecurity news and education. https://cs2ai.captivate.fm/cs2ai (Preroll Membership) Our Sponsors: We'd like to thank our sponsors for their faithful support of this podcast. Without their support we would not be able to bring you this valuable content. We'd appreciate it if you would support these companies because they support us! Network Perception Waterfall Security Tripwire KPMG Cyber

@BEERISAC: CPS/ICS Security Podcast Playlist
23: Transitioning from IT to OT to Cybersecurity with Bryan Singer

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jan 25, 2022 43:57


Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 23: Transitioning from IT to OT to Cybersecurity with Bryan SingerPub date: 2022-01-25Derek Harp is excited to have Bryan Singer join him today for an episode in the Security Leader interview series! Bryan is a true pioneer in the cyber security space! He has an extensive background in several industries, including manufacturing, DoD, and healthcare. His proven professional skills include system architecture and design, software project management, application development, system administration, network administration, database design and administration, and multi-tier support. Currently, he is Principal Director of Security Innovation at Accenture.Bryan was born in Mountain Home, Idaho. His father was a pilot in the air force, so they lived in many different places across the country while he was growing up. He spent most of his childhood in Alabama, and he remembers being the coolest kid on the street because he had an Apple 2 Plus computer with two five-and-a-quarter-inch floppy drives. Watching WarGames inspired him to become a hacker, but he soon realized that hacking was not quite what it appeared to be on television!In this episode of the (CS)²AI Podcast, Bryan shares his superhero backstory, talks about his career journey, and discusses the valuable lessons he learned early on that he could apply later in his career. He also shares some helpful nuggets for people either considering a career in cyber security or crossing over from other areas in IT or OT. If you are interested in cyber security, stay tuned. You will not want to miss this informative episode!Show highlights:Bryan talks about when he first got an itch for hacking. (1:23)Immediately after high school, he joined the army. He worked in Intelligence and got exposed to computer and network security, now known as cyber security. (3:40)Bryan started his career doing software development. (4:58)Bryan describes his first experience of dealing with a compromise. (7:00)Having a deep systems background has been helpful when diagnosing other problems later in his career. (8:43)What Bryan tells people when they ask him how he got involved in cyber security. (9:34)How he ended up being Chairman of the ISA-99 Security Committee. (12:34)Bryan discusses mentorship and explains how he managed to connect with mentors in the world of industrial safety. (17:12)How to get involved in the standards bodies early on in your career. (21:51)The advice Bryan would give to his younger self. (29:34)Some helpful advice for facing challenges. (33:14)The impact of the pandemic on the cyber security industry. (34:01)Bryan discusses the things he chose to do in his career, outside of what his job required. (35:52)Bryan co-authored two books. (36:14)Links:(CS)²AI AccentureBryan L Singer on LinkedInResources:The books Bryan co-authored: Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SISHacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & SolutionsThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Security Weekly Podcast
Episode 304 - Aussie cyber security innovation secures over US$10M for US expansion plans

Cyber Security Weekly Podcast

Play Episode Listen Later Jan 11, 2022


Haventec, a Sydney-based award-wining cyber security company founded in 2015, has secured US$10M in capital and launched their expansion into the US market after tremendous demand for their passwordless authentication and data storage solutions. Macquarie Group and Future Now Capital led the raise which will predominantly fund Haventec's growth plans in the financial services, government and health sectors handling sensitive data. We speak with CEO of Haventec David Maunsell who outlines the recent hires in the US and the strategy for the next couple of years as the company continues to grow and expand beyond Australian shores. Recorded 21 December 2022 for MySec.TVTo view the video version visit https://mysecuritymarketplace.com/av-media/aussie-cyber-security-innovation-secures-over-us10m-for-us-expansion-plans/ #cybersecurity #austcyber #gameon #haventec #passwordless #authentication #datastorage

Steve Blank Podcast
The Gordian Knot Center for National Security Innovation at Stanford

Steve Blank Podcast

Play Episode Listen Later Jan 7, 2022 9:42


75 years ago, the Office of Naval Research (ONR) helped kickstart innovation in Silicon Valley with a series of grants to Fred Terman, Dean of Stanford's Engineering school. Terman used the money to set up the Stanford Electronics Research Lab. He staffed it with his lab managers who built the first electronic warfare and electronic intelligence systems in WWII. This lab pushed the envelope of basic and applied research in microwave devices and electronics and within a few short years made Stanford a leader in these fields. The lab became ground zero for the wave of Stanford's entrepreneurship and innovation in the 1950's and 60's and helped form what would later be called Silicon Valley. 75 years later, ONR just laid down a bet again, one we believe will be equally transformative. They're the first sponsors of the new Gordian Knot Center for National Security Innovation at Stanford that Joe Felter, Raj Shah, and I have started.

Becker’s Payer Issues Podcast
Digital Transformation – Putting Control in the Hands of the Consumer

Becker’s Payer Issues Podcast

Play Episode Listen Later Dec 3, 2021 14:30


In this episode, Beth Griffin, Vice President of Security Innovation at Mastercard, who leads the Healthcare Vertical for the Cyber and Intelligence division, dives into the world of digital transformation in healthcare and why more focus in this area is necessary to improve the consumer experience. Beth also discusses the impact of legislation in the United States that's enabling consumers to have more insight and control of the cost of their healthcare.This episode is sponsored by Mastercard. 

Embracing Digital Transformation
Securing the Data Center Through the Edge #69

Embracing Digital Transformation

Play Episode Listen Later Nov 11, 2021 30:57


Darren Pulsipher, Chief Solution Architect, Intel, discusses securing the data center through the edge with fellow Intel executives and podcast hosts Tom Garrison, VP of Client Security, and Camille Morhardt, Director of Security Innovation and Communication. Video: https://youtu.be/2Mr5Tl2oHFw Blog: https://www.intel.com/content/www/us/en/government/podcasts/embracing-digital-transformation-episode69.html

Netzpalaver Podcasts
Interview mit Airlock - Was bietet Airlock der Entwickler-Community in puncto IT-Security?

Netzpalaver Podcasts

Play Episode Listen Later Oct 24, 2021 6:52


Beim Schweizer Security-Spezialisten Airlock, einer Security Innovation von Ergon Informatik, steht jetzt alles im Zeichen von DevSecOps. Netzpalaver sprach via Remote-Session mit Dr. Martin Burkhart, Head of Product Management bei Airlock, was es damit auf sich hat, was Airlock Besonderes für Entwickler in petto hat und wie die DevSecOps-Community derzeit und künftig davon profitieren kann.

CompTIA Sharkbytes
A Look at the Current State of Cyber Security, Innovation, and Overcoming the Obstacles that Lie Ahead

CompTIA Sharkbytes

Play Episode Listen Later Jun 24, 2021 32:26


A Conversation with Dr. Costis Toregas, is the Director of the Cyber Security and Privacy Research Institute at George Washington University and is Montgomery County's IT Advisor, and if his name looks familiar he was with PTI for some 28 years mostly as its President and CEO. Dr. Toregas is regarded as one of the finest thought leaders in the US when it comes to technology and government. Costis speaks to the continued need for innovation in government, sheltered adoption and the reality of dissonance between policy and the speed of technological advances. The discussion looks at the current state of cyber security and how the issue of privacy fits in. Ultimately it's all about the citizen and how local governments relates to them both in form and substance.

The Burn Bag Podcast
Defense Hacks: National Security Innovation and Creating a Civil-Military Alliance with Steve Blank

The Burn Bag Podcast

Play Episode Listen Later Jun 21, 2021 46:50


In this episode, A'ndre and Ryan speak with Steve Blank, serial entrepreneur (often referred to as the 'Father of Modern Entrepreneurship') and Silicon Valley guru, about his thinking on defense innovation and how a civil-military alliance can help the U.S. maintain its technological edge. Steve, who spearheaded the creation of the 'Hacking 4 Defense' class at Stanford which soon became sponsored by the Department of Defense, provides us with examples for how business and government have worked together in the past to drive defense innovation, and how organizational structures in start-ups can and cannot work with the public sector. Steve also provides his thoughts on the security of Research & Development and corporate espionage, and how the U.S. Government needs to adapt to address new and emerging threats from the rise of technologies.

Progress, Potential, and Possibilities
Morgan Plummer, Managing Director, National Security Innovation Network, U.S. Department of Defense

Progress, Potential, and Possibilities

Play Episode Listen Later Feb 23, 2021 42:55


 The National Security Innovation Network (NSIN) is a United States Department of Defense (DoD) program office, under the Defense Innovation Unit, that seeks to create new communities of innovators to solve national security problems. NSIN partners with national research universities and the venture community to reinvigorate civil-military technology collaboration. As opposed to making investments in specific technologies, government R&D programs, or startups, NSIN focuses on human capital innovation, specifically developing and enabling innovators and human-centered networks. NSIN provides tools, training, and access to DoD assets that enable entrepreneurs and intrapreneurs to develop and commercialize high potential products in the national interest. Morgan Plummer is the Managing Director of the National Security Innovation Network at the U.S. Department of Defense. Prior to his appointment as Managing Director, Morgan served as the Senior Advisor to the Director of the NSIN and was a Visiting Senior Research Fellow at National Defense University in Washington, D.C. Prior to joining NSIN, Morgan served as a senior defense official in the Obama Administration, departing in April 2016 as the Senior Advisor to the Undersecretary of Defense for Personnel and Readiness. As the senior public policy advisor and principal deputy to the Department's chief human resources officer, Morgan helped oversee a bold set of sweeping and progressive reforms, including the full integration of women into ground combat units, the repeal of the ban against open transgender service and Secretary of Defense Ash Carter's signature set of civilian, and military personnel policy reforms, collectively referred to as the “Force of the Future” initiative. Before his role at Personnel and Readiness, Morgan served as the Special Assistant and Deputy Chief of the Staff to the Under Secretary of the US Army. While there, he focused on strategic planning, improving the organizational design of the Army's headquarters and refining its business processes. Morgan joined the Obama Administration after almost 12 years on active duty in the United States Army, where he served in a variety of command and staff assignments and completed multiple combat tours. Morgan has received numerous meritorious service and achievement medals, been decorated for valor and received the Office of the Secretary of Defense Medal for Exceptional Public Service. In addition to his military and civilian awards, Morgan holds a BS degrees from Michigan State University (Criminal Justice/Law Enforcement Administration) and a masters Georgetown University (Policy Management). He also serves as the Executive Director of the Defense Entrepreneurs Forum (DEF), a non-profit dedicated to enabling a culture of innovation in the US national security community. 

This Week in Enterprise Tech (Video HD)
TWiET 428: What's Up with Endpoint Security? - Blastdoor Security, pandemic response data privacy, TrendMicro on trends in endpoint security

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 428: What's Up with Endpoint Security?

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 428: What's Up with Endpoint Security?

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

All TWiT.tv Shows (Video HI)
This Week in Enterprise Tech 428: What's Up with Endpoint Security?

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

All TWiT.tv Shows (Video HD)
This Week in Enterprise Tech 428: What's Up with Endpoint Security?

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

This Week in Enterprise Tech (Video LO)
TWiET 428: What's Up with Endpoint Security? - Blastdoor Security, pandemic response data privacy, TrendMicro on trends in endpoint security

This Week in Enterprise Tech (Video LO)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

This Week in Enterprise Tech (Video HI)
TWiET 428: What's Up with Endpoint Security? - Blastdoor Security, pandemic response data privacy, TrendMicro on trends in endpoint security

This Week in Enterprise Tech (Video HI)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

This Week in Enterprise Tech (MP3)
TWiET 428: What's Up with Endpoint Security? - Blastdoor Security, pandemic response data privacy, TrendMicro on trends in endpoint security

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Jan 30, 2021 70:12


Blastdoor Security: What it means for your organization Ransomware payoffs surge in 2020 Sudo trouble in the world of Linux App variety and security innovation in 2020 Police take down Emotet botnet Giant WestRock disrupted by ransomware attack Dark-Web site seized for being linked to Netwalker ransomware States try to ban Comcast data caps during pandemic Pandemic response data privacy Brian Gorenc and Dustin Childs from TrendMicro talk about the trends in endpoint security Hosts: Louis Maresca and Curt Franklin Guests: Brian Gorenc and Dustin Childs Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: forwardnetworks.com/twit nureva.com/twit

Smart Women, Smart Power
Tech Security, Innovation, and Amazon

Smart Women, Smart Power

Play Episode Listen Later Dec 9, 2020 33:01


Host Beverly Kirk talks to Teresa Carlson, vice president of Amazon Web Services (AWS) Worldwide Public Sector. They discuss current tech trends, the impact of the Covid-19 pandemic on innovation, and her efforts to support women in tech. 

Smart Women, Smart Power
Tech Security, Innovation, and Amazon

Smart Women, Smart Power

Play Episode Listen Later Dec 9, 2020 33:01


Host Beverly Kirk talks to Teresa Carlson, vice president of Amazon Web Services (AWS) Worldwide Public Sector. They discuss current tech trends, the impact of the Covid-19 pandemic on innovation, and her efforts to support women in tech. 

The Secure Developer
Ep. #76, New Playbooks for Security with Lucas Moody, Rubrik

The Secure Developer

Play Episode Listen Later Sep 17, 2020 34:22


Today's guest is Lucas Moody, Head of Security Innovation and Operations at Rubrik, here to talk about what being forward-thinking about security in 2020 looks like. We open with Lucas sketching out his impressive career in Silicon Valley and how his role as the first CISO at Palo Alto Networks is informing his current work at Rubrik. Here we explore what it means to work on security as far as operations and product innovation too, and Lucas compares his experience doing this at Palo Alto, a security company first, versus at Rubrik which is more focused on data management, resiliency and recovery, and backup. From there, we move onto the topic of how the shift to cloud and SaaS has changed tech companies and is leading to exciting evolutions in the roles of CIOs, CSOs, and CISOs. Shifting to the idea of security DNA, we discuss how firms should think about security as part of their day to day operations with Lucas next. Before closing, we talk about how the pandemic affected the security strategy at Rubrik, and Lucas details some of the major shifts they made away from infrastructure-related projects to things like identity and access so that security work could still effectively be done remotely. Finally, Lucas shares a few top tips for how firms can level up their security foo as far as throwing old playbooks out and having an independent red team. Be sure to tune in!

Storytelling in the Field
WiFi security innovation - insights from Tracie Thompson, CEO of HackHunter

Storytelling in the Field

Play Episode Listen Later Sep 10, 2020 25:24


In addition to introducing HackHunter, which continuously monitors for malicious WiFi networks, Tracie Thompson takes us through the evolution of their product and strategy.  An important element of our conversation is hearing Tracie talk through the benefit of accelerator programs and mentors, not just from an intellectual perspective, but the power of the network.  We also spoke about the diversity considerations inside an early-stage startup, and the role of the network and startup communities can play in bringing a broader perspective.

Storytelling in the Field
WiFi security innovation - insights from Tracie Thompson, CEO of HackHunter

Storytelling in the Field

Play Episode Listen Later Sep 10, 2020 25:24


Tracie Thompson is a co-founder and CEO of HackHunter and they protect organisations from malicious WiFi networks. To hear this story is to understand how deep experience and insight can translate into a unique product. What you may find of great interest, is to hear Tracie explain how, where and why they pivoted from their original go-to-market and in doing so, found a niche that has scale. B2C shifting to B2B - it is a wonderful part of the HackHunter evolution.

Alliance Aces
105: Security, Innovation & Inclusion Still Matter in the COVID-19 Era w/ James Gordon

Alliance Aces

Play Episode Listen Later May 19, 2020 28:04 Transcription Available


The COVID-19 crisis has changed things for everybody.    The race for innovations to guide us through to safety includes everyone.   Interestingly, security, innovation, and inclusion are also key elements of any successful alliance program.    On our show today, I spoke with James Gordon, GM of Ecosystem Strategy & Business Development at Intel, to discuss how these very topics guide Intel’s work in their partner ecosystem.    We covered:   - How to keep your ecosystem secure   - What COVID-19 means for innovation   - Why inclusion should be a top priority, both inside and outside your company   To contact the host, Chip Rodgers, with topic ideas, suggest a guest, or join the conversation about alliances, he can be reached by:   - Email: chip@workspan.com   - Twitter: @chiprodgers   - LinkedIn: linkedin.com/in/chiprodgers

Bitcoin Takeover Podcast
S4 E8: Slush on Trezor Hardware Wallets and Security Innovation

Bitcoin Takeover Podcast

Play Episode Listen Later Feb 19, 2020 84:54


Slush, inventor of both the world's first mining pool and hardware wallet, talks about his work on the Trezor products and why good and transparent software is more important than physical security.

Open Web Application Security Project (OWASP) - Portland, Oregon Chapter
Chad Holmes - CMD+CTRL Web Application Cyber Range

Open Web Application Security Project (OWASP) - Portland, Oregon Chapter

Play Episode Listen Later Feb 7, 2020 11:55


Today we'll be talking with Chad Holmes.Chad is a Product Marketing Manager for Security Innovation with a focus on educating customers on emerging Cyber Range technologies and how they can improve security education within organizations. Prior to joining Security Innovation, Chad was a Penetration Tester, Product Manager, Security Program Manager and Team Lead at Cigital, Veracode and Red Hat.We'll be talking about our next chapter meeting CMD+CTRL Web Application Cyber Range Tuesday, February 11 2020 @ 5:30 PM at Zapproved. Go to meetup.com to RSVP. https://www.meetup.com/OWASP-Portland-Chapter/events/267265705/ You won't want to miss this amazing event Chad is interviewed by John L. Whiteman Follow us, join us:https://twitter.com/portlandowasp?lang=enhttps://www.meetup.com/OWASP-Portland-Chapterhttps://www.linkedin.com/groups/4223013/Support the show (https://www.owasp.org/index.php/Membership#tab=Other_ways_to_Support_OWASP)

Seamless Podcast with Darin Andersen
Ed Adams, President/CEO of Security Innovation | Seamless Podcast: Ponemon Institute Series

Seamless Podcast with Darin Andersen

Play Episode Listen Later Feb 5, 2020 29:44


This episode features a conversation on cybersecurity training with Ed Adams, President and CEO of Security Innovation. Ed is a software quality and security expert with over 20 years of experience in the field. He has presented to tens of thousands of security professionals at reputable industry events such as RSA Conference (the US & Asia), Ponemon Institute’s RIM Renaissance, Connected Security Expo,  Mozilla’s Privacy Lab, Allstate CyberCon, Applied Materials Global Technology Conference, among others.

I'm A Millionaire! So Now What?
Cyber Breach: The Impact on Businesses of ALL Sizes with Katherine Thompson, Principal at Human Firewall Solutions Inc. (HFS) and Chair of Canadian Cyber Security Innovation Institute (C2I2)

I'm A Millionaire! So Now What?

Play Episode Listen Later Oct 10, 2019 36:11


  Katherine Thompson is the Principal of Human Firewall Solutions Inc, an organization focused on helping businesses find, secure, and retain cybersecurity professionals. Katherine is the Chair of the Canadian Cyber Security Innovation Institute and a speaker on the state of cybersecurity in Canada. She is an expert on the security of critical infrastructure, breach management, the risks for small to medium-sized enterprises, and the growing labor and skills shortages. Previously, Katherine was the national spokesperson and chair of CATA and held senior positions at MNP, GTACC, and Transcom.   Katherine joins me today to share how a cyber breach can impact businesses of all sizes. She reveals the severity of the consequences a hack could have for SMEs and stresses why it is vital to acquire cyber insurance now before costs start to spiral upwards. Katherine also shares how there is a shortfall of cybersecurity professionals in the market and why we must get young Canadians interested in cybersecurity as a career path.       “Don’t just look at cyber as a security risk. Look at it as a risk to revenue.” - Katherine Thompson       Today on I’m A Millionaire...So, Now What:   Why small and medium-sized enterprises need to be aware of cybersecurity risks. How the impact of cybersecurity hacks is more severe for SMEs. The supplier agreement and the need for cyber remedies to be in place. Why you should get cyber insurance now and get in early. Why it is vital to educate your workforce and build a human firewall. The labor shortfall of cybersecurity professionals in Canada. Why we need to get young Canadians interested in cybersecurity.     Katherine Thompson’s Fun Frank Advice for Self-Made Millionaires & Wealthy Families:   The onus of responsibility for the protection of our personal information is not someone else's; it's not the banks or the governments. So as a consumer in the digital economy, we all should understand the companies we are sharing our information with. Do not be afraid to ask a company how do you protect my data, how do you use it, and who do you share it with?   Resources Mentions:   Cybersecurity with a twist of Entrepreneurism & Employee Engagement with Mathew Lafrance, President & CEO of GRADE-A Securing your Business in the Cloud with Gene Villeneuve, Chief Revenue Officer, Tehama Cybersecurity Theft, Threat, or Breach: Isn’t not IF, it’s WHEN. with Patricia McLeod, Corporate Director Cybersecurity: Is your business at risk? with Catherine Evans, Senior Vice President, National Cyber Practice Leader at Marsh Cybersecurity: Who is keeping Canada's internet safe? with Byron Holland, CEO of CIRA (Canadian Internet Registry Authority) PIPEDA   Connect with Katherine Thompson:   Human Firewall Solutions Inc. Katherine Thompson on LinkedIn         Join me for Elevated Conversations: Cybersecurity: Securing your Business in the Cloud   Join me on October 16, 2019 at 5:00 PM - 7:00 PM Eastern for the exclusive, invitation-only event: Elevated Conversations: Cybersecurity: Securing your Business in the Cloud with special guest, Gene Villeneuve, Chief Financial Officer of Tehama.io, to learn more about the cybersecurity landscape and how you can secure your business in the cloud.   Email Colleen.Campbell@RBC.com to request your exclusive invitation today!   Book Your Prosperity Discovery Session Today!   Are you ready to double your net worth? Ready to create your roadmap to riches or get your financial life back on track? Join me for a Prosperity Discovery Session today! Let’s unlock your roadmap to riches so you can begin to live your life to the fullest. To book your Prosperity Discovery Session, email me at colleen.campbell@rbc.com to request a free questionnaire and let’s begin your roadmap to riches now!   Spots are limited, so book your Prosperity Discovery Session today!   Subscribe to the I’m A Millionaire, So Now What Podcast! Thanks for joining us for this episode of I'm A Millionaire, So Now What Podcast - the show bringing you inspirational stories, practical strategies, and fun, frank advice for self-made millionaires and wealthy families. If you enjoyed this episode, please subscribe to the show on Apple Podcasts and leave a positive review. Don’t forget to share your favorite episodes with other wealthy families and self-made millionaires on social media!  

Cybersecurity and Technology - Audio
Implementing Innovation: The 21st Century National Security Innovation Partnership Conference

Cybersecurity and Technology - Audio

Play Episode Listen Later Sep 23, 2019 156:13


Want to ask a question to our panelists? Submit an online question here: https://bit.ly/2kM4sXN The Center for Strategic and International Studies (CSIS) and Northeastern University invite you to attend a half-day public conference titled Implementing Innovation: The 21st Century National Security Innovation Partnership Conference on September 23 at the Center for Strategic and International Studies’ headquarters-- located at 1616 Rhode Island Avenue, NW, Washington, DC.  The half-day conference will include a discussion between Northeastern University’s President, Dr. Joseph E. Aoun, and Director of the Defense Advanced Research Projects Agency, Dr. Steven Walker, followed by an expert panel. Please see the agenda below for more details on speakers.  The conference will include discussion topics related to the 21 century national security innovation partnership, and bring together leaders from government, academia, and industry to discuss how to deliver a lasting culture of innovation in support of national security. This partnership between national security leadership, technology developers in industry, and the nation’s academic research institutions promises to continue producing decades of advancements applicable to defense and the broader economy, and is recognized as a major U.S. advantage in the most recent national security strategy. The event’s speakers will address four specific issues: Please join us on September 23 for this timely conversation. Follow the conversation on social media: @NationalSecurityInnovation, @Northeastern, @CSIS, @CSIS_ISP and @PresidentAoun.   9:30 AM – 10:00 AM - Registration  10:00 AM – 10:15 AM - Introduction  Hon. Sean O'Keefe, Syracuse University Maxwell School; Senior Adviser at CSIS   Mr. Andrew P. Hunter, CSIS Director, Defense-Industrial Initiatives Group & Senior Fellow, International Security Program  10:15 AM – 11:15 AM - Session 1: Keynote Discussion on The 21st Century National Security Innovation Partnership  Dr. Joseph E. Aoun, President, Northeastern University   Dr. Steven H. Walker, Director, Defense Advanced Research Projects Agency      11:15 AM – 11:30 AM -  Coffee Break  11:30 AM – 12:30 PM - Session 2: Panel Discussion This panel will focus on how the 21 Century National Security Innovation Partnership supports the development of STEM talent for national security, incubates promising technological firms, fosters technology and process innovation, enables human-machine teaming, and supports cyber and supply chain security. Dr. Lisa Porter, Deputy Under Secretary of Defense for Research & Engineering, U.S. Department of Defense   Dr. David E. Luzzi, Senior Vice Provost for Research & Vice President of the Innovation Campus, Northeastern University   Dr. Robie I. Samanta Roy, Vice President, Technology, Government Affairs, Lockheed Martin   Dr. William LaPlante, Senior Vice President & General Manager, MITRE National Security Sector   12:30 PM – 12:40 PM...

The AI Eye: stock news & deal tracker
The #AI Eye: UBS Card Center Wins Security Innovation Award by Leveraging FICO (NYSE:FICO) Falcon Platform and PegaSystems (NasdaqGS:PEGA) A

The AI Eye: stock news & deal tracker

Play Episode Listen Later May 13, 2019 4:04


The #AI Eye: UBS Card Center Wins Security Innovation Award by Leveraging FICO (NYSE:FICO) Falcon Platform and PegaSystems (NasdaqGS:PEGA) Acquires In The Chat

The AI Eye: stock news & deal tracker
The #AI Eye: UBS Card Center Wins Security Innovation Award by Leveraging FICO (NYSE:FICO) Falcon Platform and PegaSystems (NasdaqGS:PEGA) A

The AI Eye: stock news & deal tracker

Play Episode Listen Later May 13, 2019 4:04


The #AI Eye: UBS Card Center Wins Security Innovation Award by Leveraging FICO (NYSE:FICO) Falcon Platform and PegaSystems (NasdaqGS:PEGA) Acquires In The Chat

Business Security Weekly (Video)
Cloudera, AlienVault, and CA - Business Security Weekly #97

Business Security Weekly (Video)

Play Episode Listen Later Aug 29, 2018 26:52


Join Paul, Doug White, and Todd to talk about Security Innovation that includes: AlienVault, Cloudera, Splunk, Fortinet, CA and more! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode97 Visit http://securityweekly.com/category/ssw for all the latest episodes!

Paul's Security Weekly TV
Cloudera, AlienVault, and CA - Business Security Weekly #97

Paul's Security Weekly TV

Play Episode Listen Later Aug 29, 2018 26:52


Join Paul, Doug White, and Todd to talk about Security Innovation that includes: AlienVault, Cloudera, Splunk, Fortinet, CA and more! Full Show Notes: https://wiki.securityweekly.com/BSWEpisode97 Visit http://securityweekly.com/category/ssw for all the latest episodes!

Risk Roundup
Fourth Industrial Revolution and Security

Risk Roundup

Play Episode Listen Later Jan 15, 2018 57:24


Dean Anuj Sharma, Chairman, and President at “Canada Research Center for 4th Industrial Revolution” based in Canada participate in Risk Roundup to discuss -Fourth Industrial Revolution and Security Fourth Industrial Revolution and Security Innovation is undoubtedly an important driver of economic growth. Since the beginning of the scientific revolution, science and technology innovations have always […] The post Fourth Industrial Revolution and Security appeared first on Risk Group.

Steve Blank Podcast
National Security Innovation just got a major boost in Washington

Steve Blank Podcast

Play Episode Listen Later Jul 21, 2017 11:24


Two good things just happened in Washington – these days that should be enough of a headline. First, someone ideal was just appointed to be Deputy Assistant Secretary of Defense. Second, funding to teach our Hacking for Defense class across the country just was added to the National Defense Authorization Act. Interestingly enough, both events are about how the best and brightest can serve their country – and are testament to the work of two dedicated men.

Intel Chip Chat
Security Innovation Within OpenStack – Intel® Chip Chat episode 438

Intel Chip Chat

Play Episode Listen Later Feb 11, 2016 9:43


In this livecast from OpenStack Summit Tokyo Ravi Varanasi, General Manager of Cloud Security Solutions at Intel discusses the importance of security to enable enterprise grade OpenStack. He emphasizes that when a company utilizes OpenStack they receive the benefit of thousands of developers working within the ecosystem to develop the strongest, most robust, most secure product they can build. Ravi also describes how OpenStack can be the catalyst for ensuring that enterprise workloads run on an Intel architecture that is optimized to provide a chain of trust, encryption, and key management solutions to help secure those workloads from many different kinds of compromises.

Executive Focus | International (HD)
ICANN CEO Fadi Chehade on Internet governance & balancing security, innovation, and privacy

Executive Focus | International (HD)

Play Episode Listen Later Jan 4, 2016 3:58


Fadi Chehadé is the President and CEO of ICANN, the Internet Corporation for Assigned Names and Numbers. He spoke with The Prospect Group about the economic impact of the digital sector, Internet governance, and finding the balance between security, innovation, and privacy online.

DEF CON 23 [Audio] Speeches from the Hacker Convention
Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Oct 21, 2015


Materials Available Here: https://media.defcon.org/DEF CON 23/DEF CON 23 presentations/DEFCON-23-Aaron-Grattafiori-Linux-Containers-Future-or-Fantasy-UPDATED.pdf Linux Containers: Future or Fantasy? Aaron Grattafiori Principal Security Consultant, iSEC Partners/NCC Group Containers, a pinnacle of fast and secure deployment or a panacea of false security? In recent years Linux containers have developed from an insecure and loose collection of Linux kernel namespaces to a production-ready OS virtualization stack. In this talk, the audience will first learn the basics of how containers function, understanding namespaces, capabilities and cgroups in order to see how Linux containers and the supporting kernel features can offer an effective application and system sandboxing solution yet to be widely deployed or adopted. Understanding LXC or Docker use, weaknesses and security for PaaS and application sandboxing is only the beginning. Leveraging container technologies is rapidly becoming popular within the modern PaaS and devops world but little has been publicly discussed in terms of actual security risks or guarantees. Understanding prior container vulnerabilities or escapes, and current risks or pitfalls in major public platforms will be explored in this talk. I'll cover methods to harden containers against future attacks and common mistakes to avoid when using systems such as LXC and Docker. This will also include an analysis and discussion of techniques such as Linux kernel hardening, reduced capabilities, Mandatory Access Controls (MAC), the User kernel namespace and seccomp-bpf (syscall filtering); all of which help actually contain containers. The talk will end on some methods for creating minimal, highly-secure containers and end on where containers are going and why they might show up where you least expect them. Aaron Grattafiori (@dyn___) is a Principal Security Consultant and Research Lead with iSEC Partners/NCC Group. A jack-of-all-security, Aaron leads projects dealing with complex system analysis, mobile and web application security to network, protocol, and design reviews to red teams and other hybrid testing. With over nine years of security experience, Aaron utilizes a wide array of technology skills, historical research and security knowledge to consistently discover critical vulnerabilities. Aaron has spoke on a wide range of topics at security conferences such as Blackhat, DEF CON Kids, Toorcon:Seattle+SanDiego, ToorCamp, Source Seattle, EELive! and SecureWorld in addition to being a guest speaker at Stanford University. Prior to working at iSEC Partners, Aaron worked as a Security Consultant for Security Innovation and is a retired long time member of the Neg9 CTF team. This will be Aaron's 12th DEF CON, w00t! Twitter: @dyn___

UKFast - Corporate Film Production
Encryption Box Limited Security Innovation of the Year, Digital Entrepreneur Awards 2013

UKFast - Corporate Film Production

Play Episode Listen Later Nov 27, 2013 0:43


For more information please visit: http://www.digital-entrepreneur.co.uk Encryption Box Limited Security Innovation of the Year, Digital Entrepreneur Awards 2013 As main sponsor of the acclaimed Digital Entrepreneur Awards, UKFast exclusively interviewed the prestigious evening's 2013 winners. Here, Encryption Box talk to us about winning Security Innovation of the Year, their feelings about winning, and the importance of the DEA awards recognising digital entrepreneurship in Britain.

britain limited dea encryption security innovation ukfast digital entrepreneur awards