Podcasts about Security operations center

  • 115PODCASTS
  • 180EPISODES
  • 34mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Jun 3, 2025LATEST
Security operations center

POPULARITY

20172018201920202021202220232024


Best podcasts about Security operations center

Latest podcast episodes about Security operations center

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001
From Ransomware to Recovery: How One Rural Hospital Transformed Its Cybersecurity

Cybersecurity and Compliance with Craig Petronella - CMMC, NIST, DFARS, HIPAA, GDPR, ISO27001

Play Episode Listen Later Jun 3, 2025 57:51 Transcription Available


Send us a textNestled along the scenic Southern Oregon coast, Southern Coos Hospital faces a unique set of challenges that many healthcare organizations never encounter. With just 25 beds serving a rural population of about 15,000, this critical access hospital demonstrates remarkable innovation in stretching limited resources while maintaining robust cybersecurity practices.Scott, the hospital's CIO who transitioned from fundraising and marketing into healthcare IT, shares the compelling story of how a ransomware attack just before COVID-19 transformed their approach to cybersecurity. This pivotal moment prompted Southern Coos to increase their cybersecurity budget from a mere 2% to over 12% of their IT spending - a decision that positioned them ahead of many similar-sized facilities in protecting patient data.The conversation delves into practical strategies that resource-constrained healthcare organizations can implement immediately: outsourcing Security Operations Center functions to specialized vendors, prioritizing security awareness training for staff, and making strategic investments in asset management tools. Scott's candid assessment of HIPAA's limitations ("a nice entry point to compliance but in no way updated for the current threat environment") demonstrates the gap between regulatory requirements and actual security needs that healthcare organizations must bridge themselves.Perhaps most transformative for this rural hospital was implementing Epic's electronic health record system, which revolutionized how they transfer patient records during emergencies. What once took 30+ minutes now happens "with the click of a button" - a game-cThis is Encrypted Ambition—a podcast about the builders rewriting the rules. Join Petronella Technology Group as we decode the ideas, challenges, and momentum behind tomorrow's business, technology, and leadership breakthroughs. That's a wrap on this episode of Encrypted Ambition. Subscribe wherever you listen, and if today's guest inspired you—leave us a review or share the show with someone in your circle.To learn more about how we support innovators with AI, cybersecurity, and compliance, head to PetronellaTech.com, YouTube and LinkedInSupport the showNO INVESTMENT ADVICE - The Content is for informational purposes only, you should not construe any such information or other material as legal, tax, investment, financial, or other advice. Nothing contained on our Site or podcast constitutes a solicitation, recommendation, endorsement, or offer by PTG.Support the ShowPlease visit https://compliancearmor.com and https://petronellatech.com for the latest in Cybersecurity and Training and be sure to like, subscribe and visit all of our properties at: YouTube PetronellaTech YouTube Craig Petronella Podcasts Compliance Armor Blockchain Security LinkedIn Call 877-468-2721 or visit https://petronellatech.com

OHRBEIT
Business Architektur durch Kommunikation

OHRBEIT

Play Episode Listen Later Apr 4, 2025 2:13


„Ich entwickle selbst nicht – das will auch keiner. Besser so. Aber ich bringe die Leute zusammen, damit Software wirklich funktioniert.“ – Martin, Business Architect bei x-cellentIn dieser Folge geben dir Martin und Niklas Einblicke in ihren Berufsalltag als Business Architekten bei x-cellent. Sie zeigen, wie wichtig die Rolle an der Schnittstelle zwischen Fachbereich und IT ist – von der Anforderungsaufnahme über Spezifikationen bis hin zur Umsetzung im agilen Projektteam.Außerdem erfährst du, was es heißt, Softwarelösungen mit Produktansatz zu entwickeln, wie komplexe Security-Projekte unter EZB-Aufsicht ablaufen und warum eine offene Unternehmenskultur den entscheidenden Unterschied macht.✅ Business Architektur in der Praxis – Schnittstellen-Management, Spezifikation & Umsetzung✅ Projekte mit Verantwortung – u. a. Security Operations Center bei einem Bankendienstleister✅ Cloud-Plattform & Produktansatz – agile Softwareentwicklung mit Strategie✅ Kommunikation auf Augenhöhe – Austausch mit Geschäftsführung & Teamkultur✅ IT-Security & Bankenregulierung – reale Use Cases mit Zeitdruck & hoher Verantwortung

Campus Technology Insider
Student-Led Cybersecurity: Bridging Talent Gaps with AI at Auburn University

Campus Technology Insider

Play Episode Listen Later Mar 27, 2025 34:54


In this episode of the Campus Technology Insider Podcast, Editor-in-Chief Rhea Kelly speaks with Jay James, senior cybersecurity operations lead at Auburn University, and Corey Lee, CTO for Security at Microsoft. They discuss the critical shortage of cybersecurity talent in higher education and explore how Auburn University's Security Operations Center (SOC) is utilizing student workers to bridge this gap. The conversation dives into the unique setup of their SOC, the impact of AI tools like Security Copilot, and the benefits of recruiting students from diverse academic backgrounds. Highlights include the operational and educational advantages of involving students in cybersecurity, and strategies for other institutions looking to implement similar programs. 00:00 Introduction and Guest Welcome 00:40 The Cybersecurity Talent Shortage in Higher Education 02:54 Auburn's Security Operations Center and Student Involvement 07:22 The Role of AI in Cybersecurity Training 19:53 Student Recruitment and Success Stories 30:28 Advice for Institutions Starting a Student SOC 34:14 Conclusion and Podcast Sign-off Resource links: Auburn University Microsoft Security Copilot Music: Mixkit Duration: 35 minutes Transcript (Coming Soon)

IT IST ALLES.
Das Update #25 | Wer sind die gefährlichsten Hackergruppen?

IT IST ALLES.

Play Episode Listen Later Mar 26, 2025 13:31


Moin aus Osnabrück und herzlich willkommen zur 25. Folge vom Update. Dieses Mal begrüßt Ulf Maximilian Dallmann am Podcast Mikrofon. Ulf und Max sprechen in dieser Update Folge über die gefährlichsten Hackergruppen der Welt. Wie arbeiten diese Gruppen? Was macht sie so gefährlich? Worin unterscheiden sie sich? Max und Ulf geben Antworten.

The Connector.
The Connector Podcast - DFS Digital Finance Summit - Approach - Cybersecurity for Fintechs: Protecting Digital Innovation

The Connector.

Play Episode Listen Later Mar 20, 2025 11:42 Transcription Available


How Approach Cyber helps fintech companies navigate cybersecurity challenges from integrated security development to regulatory compliance. Dorian Pacquet shares insights on evolving cyber threats, the role of AI in security, and the importance of managing data protection in the fintech ecosystem.• Approach is a pure-play cybersecurity and privacy partner with over 100 professionals across Belgium and Switzerland offering 360° cyber resilience services• Modern software development requires security integration at all stages, not just end-of-process testing• Supply chain vulnerabilities are a growing concern as all software now relies on external libraries and dependencies• Fintechs face increasing regulatory pressure not just directly but through their regulated customers• AI is becoming integral to security tools including code generation, vulnerability scanning, and remediation• Data protection compliance is equally challenging for organizations of all sizes with limited exceptions for SMEs• Approach offers multidisciplinary expertise spanning technical, strategic, and legal domains to help navigate complex regulations• 24/7 managed security services from their in-house Security Operations Center provide continuous protectionFor more information about Approach Cyber's services, contact Dorian at dorian.pacquet@approach-cyber.com or visit their website at www.approach-cyber.com.Thank you for tuning into our podcast about global trends in the FinTech industry.Check out our podcast channel.Learn more about The Connector. Follow us on LinkedIn.CheersKoen Vanderhoydonkkoen.vanderhoydonk@jointheconnector.com#FinTech #RegTech #Scaleup #WealthTech

IT IST ALLES.
#99 | Ronald Derler & Dominik Wagner - Wie sicher ist unsere Wasserversorgung?

IT IST ALLES.

Play Episode Listen Later Mar 5, 2025 52:11


In IT IST ALLES #99 geht es um das kühles Nass. Genauer gesagt um die Absicherung unserer Wasserversorgung, dessen Entsorgung und welche Rolle ein Security Operations Center dabei spielt. Julius und Marcel haben sich für einen Deep-Dive zu diesen Fragen Ronald Derler und Dominik Wagner als Podcast Gäste eingeladen. Ronald ist Geschäftsführer des Kompetenzzentrums Digitale Wasserwirtschaft und Dominik stellvertretender Leiter des Security Operations Centers der digitalen Wasserwirtschaft. Viel Spaß beim Reinhören.

Telecom Reseller
C3 Complete Expands to Pittsburgh & Launches Security Operations Center, Podcast

Telecom Reseller

Play Episode Listen Later Mar 3, 2025


"We always listen. Everybody has a story to tell, and sometimes their story and our story align," says Rick Mancinelli, CEO of C3 Complete. In this episode of Technology Reseller News, Rick joins Doug Green to discuss C3's expansion into Pittsburgh, the upcoming launch of their Security Operations Center (SOC), and their ongoing M&A strategy. Strategic Expansion into Pittsburgh C3 Complete has expanded into Pittsburgh through a strategic partnership with IAM Critical, a data center operator. The move positions C3 to support biotech, robotics, AI, and other high-tech industries in the region, reinforcing Pittsburgh's emergence as a technology hub. Why Pittsburgh? “Pittsburgh is reinventing itself as a technology hotspot, and we're excited to be part of that growth.” C3's Role: Operating as the network services provider for IAM Critical's data center. Security Operations Center (SOC) Launching April 1 C3 Complete is set to launch a state-of-the-art SOC in South Florida, enhancing cybersecurity and incident response capabilities for their clients. 24/7 Staffing – All in-house, no outsourcing. Incident Response Room – Equipped with cots, showers, and food storage for staff handling prolonged security events. Customer Benefits – Faster threat response, enhanced security monitoring, and regulatory compliance support. M&A and Partnership Strategy C3 Complete remains open to acquisitions and strategic partnerships, focusing on MSPs, TSPs, and CSPs that align with their culture and customer-first approach. Not Private Equity-Driven – C3 seeks long-term value, not rapid consolidation. Recent Acquisition Success – Their latest acquisition in August 2023 has been fully integrated, bringing new talent and expanded services. Open to Conversations – “We always listen. If there's alignment, we're open to discussing partnerships or M&A.” Where to Learn More C3 Complete Website: www.c3-complete.com Connect with Rick Mancinelli on LinkedIn Meet C3 Complete at upcoming industry events! #CyberSecurity #DataCenters #CloudInfrastructure #BusinessExpansion #C3Complete #MSSP #NetworkServices #TechGrowth

Behörden Spiegel
Public Sector Insider - Folge 268

Behörden Spiegel

Play Episode Listen Later Feb 11, 2025 21:45


Michael Korff und Prof. Dr. Ulrich Schäfermeier von der Hochschule Bielefeld sprechen mit uns über ihr Security Operations Center. Außerdem beleuchten wir die Umsetzung der Krankenhausreform und kommentieren die Forderung nach einem Bundesdigitalministerium.

Cloud Security Podcast by Google
EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments

Cloud Security Podcast by Google

Play Episode Listen Later Feb 10, 2025 26:58


Guest: Or Brokman, Strategic Google Cloud Engineer, Security and Compliance, Google Cloud Topics: Can you tell us about one particular cloud consulting engagement that really sticks out in your memory? Maybe a time when you lifted the hood, so to speak, and were absolutely floored by what you found – good or bad! In your experience, what's that one thing – that common mistake – that just keeps popping up? That thing that makes you say 'Oh no, not this again!' 'Tools over process' mistake is one of the 'oldies.' What do you still think drives people to it, and how to fix it? If you could give just one piece of cloud security advice to every company out there, regardless of their size or industry, what would it be?  Resources: Video (YouTube) “Threat Modeling: Designing for Security” by Adam Shostack EP16 Modern Data Security Approaches: Is Cloud More Secure? EP142 Cloud Security Podcast Ask Me Anything #AMA 2023 “For a successful cloud transformation, change your culture first” (OOT vs TOO blog) https://www.linkedin.com/in/stephrwong/  New Paper: “Autonomic Security Operations — 10X Transformation of the Security Operations Center” (2021)

The Data Diva E221 - Matthew Rosenquist and Debbie Reynolds

"The Data Diva" Talks Privacy Podcast

Play Episode Listen Later Jan 28, 2025 51:51 Transcription Available


Send us a textDebbie Reynolds “The Data Diva” talks to Matthew Rosenquist, Mercury Risk's Chief Information Security Officer (CISO), cybersecurity strategist, and LinkedIn Top Voice. With over 35 years of experience, Matthew shares his dynamic career journey, which started with internal investigations, building Intel's first Security Operations Center, and leading crisis response teams. His extensive background includes advising governments, businesses, and academia on emerging threats and cybersecurity best practices.Matthew highlights the critical evolution of cybersecurity from a “nice-to-have” to a mission-critical business necessity while discussing how rising consumer and regulatory expectations are reshaping the cybersecurity landscape. He explains the growing gap between mounting security demands and available resources, emphasizing that cybersecurity leaders must demonstrate value beyond risk prevention. Matthew advocates for evolving cybersecurity's role from compliance-focused operations to strategic business enablers that deliver competitive advantages and even revenue opportunities.The conversation explores the interconnectedness of privacy and cybersecurity, framing both as foundational to digital trust. Matthew emphasizes that privacy failures and cybersecurity breaches undermine trust with customers, regulators, and business partners, making collaboration between cybersecurity and privacy professionals essential. He also illuminates the importance of proactivity in cybersecurity, contrasting it with the reactive “firefighting” mindset often seen in organizations.Matthew goes into the threat of insider risks, distinguishing between malicious insiders and non-malicious actors who unintentionally create vulnerabilities. Drawing from his experience, he underscores the need for strong leadership, clear policies, and an organizational culture where employees feel empowered to report issues without fear. Looking to the future, he stresses the importance of having cybersecurity expertise on boards of directors, enabling organizations to navigate rising risks and better align cybersecurity initiatives with business objectives.As the discussion concludes, Matthew shares his wish for the cybersecurity industry: improved communication, collaboration, and leadership. He calls for greater strategic thinking, proactive risk management, and a collective effort to stay ahead of evolving threats in an increasingly complex digital world. He also highlights his hope for Cybersecurity and Data Privacy in the future.Support the show

Na Podsłuchu - Niebezpiecznik.pl
Ten o pracy w Security Operations Center (NP #061)

Na Podsłuchu - Niebezpiecznik.pl

Play Episode Listen Later Jan 14, 2025 59:54


Gościem dzisiejszego odcinka jest Paweł Babski, obecnie szef operacji SOC w Vattenfall IT Services Poland, części międzynarodowej grupy Vattenfall, czyli jednego z największych w Europie producentów i sprzedawców energii.Vattenfall IT Services Poland jest od 2011 roku odpowiedzialne za dostarczanie usług IT dla całej Grupy w zakresie m.in: e-Mobility, Asset Software Engineering, Security Operating Center, Monitoring Operating Center, Web Teams, SCADA Wind, Internet of Things, IT International Service Desk. Spółka zatrudnia ponad 430 osób i szuka kolejnych pracowników -- zajrzyj na stronę: https://www.vattenfall.com/pracaDziś rozmawiamy o tym:* Jak samodzielnie rozpocząć budowę SOC dla własnej firmy i jakie narzędzia mogą być przydatne?* Jak różni się praca w "małym" SOC-u od pracy w SOC dla międzynarodowej grupy z lokalizacjami w różnych krajach?* Na czym polega obsługa incydentu na pierwszej, drugiej i kolejnych liniach SOC?* Co zmieniło się po wybuchu wojny?* Ilu pracowników potrzeba, aby zapewnić obsługę przez całą dobę?

InfosecTrain
What is SOC (Security Operations Center)? | InfosecTrain Explains It All

InfosecTrain

Play Episode Listen Later Oct 7, 2024 1:56


In this Episode, InfosecTrain's experts dive deep into the importance of SOC, its role in safeguarding your business, and how it helps manage security incidents effectively. Whether you're a cybersecurity professional or simply interested in understanding how organizations protect their digital assets, this Episode will provide you with a comprehensive overview of SOC. Learn from the best and equip yourself with essential cybersecurity knowledge to stay ahead of potential threats. Don't miss out on this crucial information that could help secure your business's future!

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Hack the Plant (LS 34 · TOP 3% what is this?)Episode: Securing Embedded SystemsPub date: 2024-09-25In this episode, Bryson sits down with MITRE EMB3D co-founder Niyo Little Thunder Pearson. For nearly 20 years, Niyo has been at the forefront of protecting critical infrastructure systems. He previously led incident response for American Express, directing the company's Security Operations Center during the LulzSec and Anonymous attacks, and worked to develop an adversarial cyber defense program for the nation's third largest gas utility at ONE Gas Oklahoma. Now, Niyo has co-founded MITRE EMB3D, a groundbreaking global threat network aimed at enhancing the security of embedded devices. What is MITRE EMB3D? Who is the intended audience? What problems is it trying to solve? “There is such a gap that exists today on what we understand and how risk averse these [embedded] devices are. They do well and they operate well. They're built for what they're doing in a safety context, but the security was never brought forward with it,” Niyo said. Join us for this and more on this episode of Hack the Plan[e]t. Hack the Plant is brought to you by ICS Village and the Institute for Security and Technology. The podcast and artwork embedded on this page are from Bryson Bort, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cloud Security Podcast by Google
EP180 SOC Crossroads: Optimization vs Transformation - Two Paths for Security Operations Center

Cloud Security Podcast by Google

Play Episode Listen Later Jul 8, 2024 28:09


Guests: Mitchell Rudoll, Specialist Master, Deloitte Alex Glowacki, Senior Consultant, Deloitte Topics: The paper outlines two paths for SOCs: optimization or transformation. Can you elaborate on the key differences between these two approaches and the factors that should influence an organization's decision on which path to pursue?  The paper also mentions that alert overload is still a major challenge for SOCs. What are some of the practices that work in 2024 for reducing alert fatigue and improving the signal-to-noise ratio in security signals? You also discuss the importance of automation for SOCs. What are some of the key areas where automation can be most beneficial, and what are some of the challenges of implementing automation in SOCs? Automation is often easier said than done… What specific skills and knowledge will be most important for SOC analysts in the future that people didn't think of 5-10 years ago? Looking ahead, what are your predictions for the future of SOCs? What emerging technologies do you see having the biggest impact on how SOCs operate?  Resources: “Future of the SOC: Evolution or Optimization —Choose Your Path” paper and highlights blog “Meet the Ghost of SecOps Future” video based on the paper EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud and Beyond The original Autonomic Security Operations (ASO) paper (2021) “New Paper: “Future of the SOC: Forces shaping modern security operations” (Paper 1 of 4)” “New Paper: “Future of the SOC: SOC People — Skills, Not Tiers” (Paper 2 of 4)” “New Paper: “Future Of The SOC: Process Consistency and Creativity: a Delicate Balance” (Paper 3 of 4)”

Business RadioX ® Network
Cybersecurity: Its Importance & the Impact of AI E51

Business RadioX ® Network

Play Episode Listen Later Jul 2, 2024


Cybersecurity: Its Importance & the Impact of AI E51 This episode of AZ TechCast explores cybersecurity’s pivotal role and AI’s transformative impact, hosted by Steve Zylstra and Karen Nowicki. Guests Mark Dallmeier, JR Garcia, and Helen Patton emphasize proactive cybersecurity strategies and the dual nature of AI in enhancing threat detection while posing governance challenges. […]

Phoenix Business Radio
Cybersecurity: Its Importance & the Impact of AI E51

Phoenix Business Radio

Play Episode Listen Later Jul 2, 2024


Cybersecurity: Its Importance & the Impact of AI E51 This episode of AZ TechCast explores cybersecurity’s pivotal role and AI’s transformative impact, hosted by Steve Zylstra and Karen Nowicki. Guests Mark Dallmeier, JR Garcia, and Helen Patton emphasize proactive cybersecurity strategies and the dual nature of AI in enhancing threat detection while posing governance challenges. […] The post Cybersecurity: Its Importance & the Impact of AI E51 appeared first on Business RadioX ®.

Microsoft Threat Intelligence Podcast
Data Science for Security

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Mar 13, 2024 44:34


On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Emily Yale and Anna Bertiger. The discussion delves into Emily and Anna's daily activities within the security domain. Emily highlights her role in supporting Microsoft's internal Security Operations Center by building detections for potential threats. Anna emphasizes the practical application of research in solving security problems and focuses on anomaly detection in post-breach security. Emily and Anna provide insights into Microsoft's work culture, the intersection of technology and security, the importance of mathematical and data science skills in tech roles, and the practical applications of AI tools in professional and personal contexts.    In this episode you'll learn:       How data scientists support the internal SOC and enhance security  The importance of anomaly detection in post-breach security  Combining security with mathematical skills to create practical solutions     Some questions we ask:         What types of unusual patterns indicate malicious activity?   Is there difficulty in securing AI models compared to traditional code?   Should data science methods be used over complex models?    Resources:   View Emily Yale on LinkedIn   View Anna Bertiger on LinkedIn   View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.   

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Investigations: Methodology over Tools | A Conversation with Christopher Salgado | Redefining CyberSecurity Podcast with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 11, 2024 51:05


Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Cyber Investigations: Methodology over Tools | A Conversation with Christopher Salgado | Redefining CyberSecurity Podcast with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Mar 11, 2024 51:05


Guest: Christopher Salgado, CEO at All Points Investigations, LLCOn Linkedin | https://www.linkedin.com/in/christophersalgado/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin converses with Christopher Salgado about the critical yet overlooked aspects of cyber investigations. Salgado's rich experiences, from being an insurance investigator in Chicago to working on Facebook's global investigations division and being a key player amidst the Cambridge Analytica crisis, lay the foundation for this engrossing dialogue.Salgado elaborates on the unique challenges posed by cyber investigations—being analytical, yet organic; thorough, yet flexible—straddling between rigidity of process and fluidity of response. Pragmatism and diligent investigation are pitched alongside the usefulness of AI tools, which, as per Salgado, can be both ally and adversary.Highlighting the importance of operating within established processes, Salgado presses on the need for standardization and streamlining, without compromising on the inherently organic nature of investigative work. He underscores how modifiable Standard Operating Procedures (SOPs) can uphold consistency and enable comprehensive learning, while staying legally sound and economically feasible.Salgado also draws attention to the flip-side of AI-tools—potential data-leaks and the threat of manipulated AI-platforms. Corporations employing AI must weigh their usage against the risks, envisaging issues of data-privacy, information-misuse, and disinformation before rolling out (or permitting vendors to use) AI-based systems.In a nutshell, this enlightening conversation delves into the complexities of cyber investigations, the indispensable role of AI, and the necessity of solid processes, making it a must-listen for cybersecurity enthusiasts and cyber sleuths alike.Top 3 Questions Addressed:What role do processes and standardization play in effective cyber investigations?How do AI tools aid in cyber investigations, and what are the potential risks?What potential risks does modern technology present, especially AI, in the context of cybersecurity?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Federal Drive with Tom Temin
Inside the Security Operations Center of the Secret Service

Federal Drive with Tom Temin

Play Episode Listen Later Mar 1, 2024 20:18


The Secret Service operates a broad range of applications for its diverse missions. The most well-known are guarding executive federal personnel and the integrity of U.S. currency. But it also has its own cybersecurity requirements, for which it has its own SOC or Security Operations Center. For the details, Federal Drive Host Tom Temin went in-depth with Roy Luongo, the Secret Service's Chief Information Security Officer. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Federal Drive with Tom Temin
Inside the Security Operations Center of the Secret Service

Federal Drive with Tom Temin

Play Episode Listen Later Mar 1, 2024 21:03


The Secret Service operates a broad range of applications for its diverse missions. The most well-known are guarding executive federal personnel and the integrity of U.S. currency. But it also has its own cybersecurity requirements, for which it has its own SOC or Security Operations Center. For the details, Federal Drive Host Tom Temin went in-depth with Roy Luongo, the Secret Service's Chief Information Security Officer. Learn more about your ad choices. Visit megaphone.fm/adchoices

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 134 Is Automation, branching logic, and optimizing paths

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Feb 29, 2024 25:05


An American poet once wrote about reaching a fork in the road and he considered which path to take.    When one attempts to consider branching logic and automation in complex technical systems, there is a lot of consideration given to which path to take. There may be lessons to be learned from Robert Frost's 25-line masterpiece.     Today's discussion is with Thomas Kinsella, Chief Customer Officer and Co-founder of a company that focuses on improving automation.  It is appropriately called Tines.  Thomas Kinsella was asked to discuss a typical day in the life of a person working in a Security Operations Center, or SOC.  He describes it as a plethora of alerts, new data, and disjointed tools.  His description of the SOC was kind of like One Day in the Life of Ivan Denisovich by Aleksandr Solzhenitsyn. The story is almost as monotonous as a Soviet era gulag, although the remuneration may be slightly higher. Thomas Kinsella describes issues with alert fatigue, difficulty of finding good staff, and incompatible systems that make duplicative works. He and his co-founder decided to come up with a better solution, they founded Tines. During the interview Thomas Kinsella describes how they have been able to use technology to assemble data from a variety of sources. This was to address the idea of alert fatigue, if an incident was possibly confirmed, then it should be pursued. Secondly, the way to address staff shortage was to design a visually based system so that an untrained individual could drag and drop actions into a sequence.  In fact, Tines provides playbooks for many scenarios in a secure environment, he calls them playbooks.  The result is a system that can produce a Secure Orchestration Automation and Response system that is easy to use, scalable, and doesn't need the expertise of a PhD. in computer science. For more on Tines, please read the blog “Cybersecurity in 2024: Five Predictions from our co-founders”  = = = What's your score? Take the Podcast Appearance Scorecard www.podscorecard.com Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Got goin' to Mars on your bucket list? Listen to Constellations Podcast https://www.kratosdefense.com/constellations/podcasts Want to listen to other technology podcasts? www.Federaltechpodcast.com              

Ik weet je wachtwoord
De digitale soldaten

Ik weet je wachtwoord

Play Episode Listen Later Jan 31, 2024 23:18


Als je nu het nieuws aan zet, zie je helaas veel beelden van oorlog. Maar wat je niet ziet, als je naar de beelden van alle slachtoffers en verwoeste gebouwen kijkt, is de digitale kant van deze oorlogen. Die worden al lang niet meer alleen op het slagveld uitgevochten, maar ook vanachter de computer. Door overheden en schimmige collectieven, maar ook door doodnormale burgers als jij en ik, die zich als hacktivist mengen in de strijd. In de oorlog van Rusland met Oekraïne speelde dat voor het eerst een grote rol. Daarom duiken we in deze aflevering in het digitale aspect van die oorlog. Ook Nederlandse netwerken hebben te maken met cyberdreigingen. Onze partner KPN doet er alles aan om aanvallen af te wenden en de netwerken veilig te houden. In het Security Operations Center checken medewerkers dag en nacht potentiële dreigingen. De kennis die ze daarbij opdoen draagt ook weer bij aan de ontwikkeling van een sterk beveiligingsnetwerk. Lees er hier meer over.

Cy Saves the Day
Ep 79: SOC 101 with Mark Manglicmot

Cy Saves the Day

Play Episode Listen Later Jan 30, 2024 33:59


In this episode of LevelUp Cyber, we will delve into the dynamic world of Security Operations Center (SOC) jobs. Join us and special guest, Mark Manglicmot, Senior Vice President of Security Services at Arctic Wolf on a journey through the digital realm as we explore the challenges, triumphs, and expertise required to level up your skills in cybersecurity.Whether you're an aspiring cybersecurity professional, a seasoned IT veteran, or someone intrigued by the ever-evolving landscape of cybersecurity this is the episode for you.Key Highlights:1. Skill Advancement Strategies: Discover the essential skills and certifications needed to thrive in the world of cybersecurity, with a focus on leveling up your expertise within the Security Operations Center.2. Behind the Scenes of Cyber Defense: Gain exclusive access to the day-to-day operations of cybersecurity professionals as they tackle real-world threats. Learn about the tools, tactics, and procedures that keep organizations secure.3. Guest Interviews and Industry Insights: Engage with thought-provoking interviews featuring SOC managers, threat hunters, incident responders, and cybersecurity influencers. Stay informed about emerging trends, technologies, and best practices in the cybersecurity space.4. Career Leveling Strategies: Whether you're a cybersecurity novice or a seasoned professional, this episode guides navigating different SOC roles, advancing your career, and staying relevant in an ever-changing industry.Subscribe now to LevelUp Cyber and embark on a transformative journey through the realms of cybersecurity. Level up your knowledge, skills, and confidence as we explore the exciting and critical world of cybersecurity jobs together. Are you ready to take your cybersecurity game to the next level? Let's LevelUp Cyber!

Feds At The Edge by FedInsider
Ep. 132 Bringing Agility to the Modern Security Operations Center

Feds At The Edge by FedInsider

Play Episode Listen Later Jan 12, 2024 59:39


Secure Operations Centers (SOC's) were designed in the early 1970 with an attempt to thwart minor malicious codes. Well, things have changed slightly in the past 50 years! Today's SOC provides 24 hour a day, year-round protection for key government organizations. Somehow, this initial design has not kept up with the profusion of threat vectors and many need to be upgraded to manage today's threats. This is an interview with several leaders who have decades of experience in optimizing the performance of a SOC. We have experts from the Cybersecurity and Infrastructure Agency (CISA), a couple of major research laboratories, and a subject matter expert from Palo Alto Networks. During the interview they discussed topics like tool management, the importance of standards in automation, and some help that is offered by CISA. Humans tend to be attracted to bright, shiny things. Companies like to dangle innovation in front of commercial and federal leaders, and they tend to jump on them. Some studies show that many only use 20% of a tool's capability. Robert Roser suggests reviewing the capabilities of existing tools before adding tolls to mange threats. Several participants indicated that every incident may not be a threat; one should prioritize where to go next. That concept is nice in theory, but in practicality, it needs standards that lead to automation to allow the threats to be prioritized. A SOC can get hit with thousands of alerts a day, causing operators to misidentify threats due to alert fatigue. Michael Duffy from CISA understands and lists ways that CISA can assist. He refers to the Binding Operational Directive CISA  22-01 that is designed to cut down on alert fatigue. The threat to federal SOCs is real and the response can help everyone involved make federal systems more secure.  

ITSPmagazine | Technology. Cybersecurity. Society
The Battle of the Bad Bots in Santa's Security Operations Center | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 23, 2023 9:06


Join TAPE3 for a tale where Mrs. Claus engages in an epic cyber showdown against the Grinch, as they duel with 'Grinch Bots' and 'Gift Ghost Bots' in a whimsical, festive cyber battle. Witness this unique old-school, stop-motion styled confrontation, where holiday spirit meets digital defense at the North Pole.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

Redefining CyberSecurity
The Battle of the Bad Bots in Santa's Security Operations Center | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

Redefining CyberSecurity

Play Episode Listen Later Dec 23, 2023 9:06


Join TAPE3 for a tale where Mrs. Claus engages in an epic cyber showdown against the Grinch, as they duel with 'Grinch Bots' and 'Gift Ghost Bots' in a whimsical, festive cyber battle. Witness this unique old-school, stop-motion styled confrontation, where holiday spirit meets digital defense at the North Pole.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

Data Protection Gumbo
225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security

Data Protection Gumbo

Play Episode Listen Later Dec 12, 2023 23:02


Yoav Nathaniel, CEO of Silk Security, joins us to discuss the transformative role of AI-driven solutions in cybersecurity risk management. Exploring how to leverage AI to enhance security operations and streamline risk assessment processes. Yoav offers unique insights into tackling the overwhelming challenge of managing security alerts. We delve into the importance of effective cybersecurity strategies in today's complex IT environments and the benefits of AI in making security operations more efficient and less overwhelming for teams.

CISO Tradecraft
#156 - SMB CISO Challenges (with Kevin O'Connor)

CISO Tradecraft

Play Episode Listen Later Nov 20, 2023 43:27


In this episode of CISO Tradecraft, host G Mark Hardy talks to Kevin O'Connor, the Director of Threat Research at Adlumin. They discuss the importance of comprehensive cybersecurity for Small to Medium-sized Businesses (SMBs), including law firms and mid-sized banks. The conversation explores the complexities of managing security infrastructures, the role of managed security service providers, and the usefulness of managed detection and response systems. The discussion also delves into the increasing threat of ransomware and the critical importance of managing data vulnerabilities and providing security awareness training. Big Thanks to our Sponsor: Adlumin - https://adlumin.com/ Transcripts: https://docs.google.com/document/d/1V_qkMFdGC4NRLCG-80gcsiSA8ikT8SwP Youtube: https://youtu.be/diCZfWWB3z8   Chapters 00:12 Introduction and Sponsor Message 01:42 Guest Introduction: Kevin O'Connor 02:29 Discussion on Cybersecurity Roles and Challenges 03:20 The Importance of Defense in Cybersecurity 04:23 The Role of Managed Security Services for SMBs 07:26 The Cost and Staffing Challenges of In-House SOCs 14:41 The Value of Managed Security Services for Legal Firms 16:30 The Threat Landscape for Small and Mid-Sized Banks 18:19 The Difference Between Compliance and Security 20:08 Understanding the Reality of Cybersecurity 20:45 The Challenges of Building IT Infrastructure 21:08 Outsourcing vs In-house Security Management 21:55 The Importance of Understanding Your Data 22:43 Security Operations Center vs Security Operations Platform 24:21 The Role of Managed Detection and Response 24:54 The Importance of Quick Response in Security 28:07 The Threat of Ransomware and Data Breaches 34:31 The Role of Pen Testing in Cybersecurity 36:33 The Growing Threat of Ransomware 38:28 The Importance of Security Awareness Training 40:42 The Role of Incident Response and Forensics 42:11 Final Thoughts on Cybersecurity

Public Sector Future
Leveling the cybersecurity playing field with AI, Machine Learning, and Cloud

Public Sector Future

Play Episode Listen Later Nov 9, 2023 22:45


Jonathan Cassar, the Chief Technology Officer and Head of Information Security at the Malta Information Technology Agency (MITA), provides insights into global cybersecurity trends and their implications for the public sector. He discusses strategies to bolster cybersecurity in government and critical infrastructure, approaches to tackling the cybersecurity talent shortage, the integration of human expertise with technology to combat threats effectively, and best practices for automating security operations in government. Olivia Neal [host] | LinkedIn   Alvaro Vitta | LinkedIn Jonathan Cassar | LinkedIn MITA Microsoft Public Sector Center of Expertise for more information and transcripts of all episodes  Discover and follow other Microsoft podcasts at aka.ms/microsoft/podcasts   

ConnectedPodcast
Connected Podcast Episode 128: Protecting Your Data and Your Dealership

ConnectedPodcast

Play Episode Listen Later Oct 18, 2023 48:16


Happy National Cybersecurity Awareness Month! Well, we hope it's a happy occasion. This week on Connected, Greg sits down with Ken Wolf, the supervisor of Reynolds' Security Operations Center. While thinking about cyber incidents can be intimidating, Ken was able to talk through some things that can help you protect yourself and your dealership. Things like: -Where you have control when it comes to your data. -The impact of ransomware and cyberattacks. -What you can be doing to keep your data safe.

Tech Disruptors
Splunk's Role in Security Operations Center

Tech Disruptors

Play Episode Listen Later Oct 17, 2023 45:02


Tom Casey, senior vice president of products and technology at Splunk joins Bloomberg Intelligence Senior Analysts Mandeep Singh and Sunil Rajgopal to discuss the company's efforts to build an enterprise security operations center (SOC). The episode was recorded after the company announced its takeover by Cisco.

The Other Side Of The Firewall
NSA Building an AI Security Operations Center - The Other Side of the Firewall Episode 78

The Other Side Of The Firewall

Play Episode Listen Later Oct 3, 2023 14:23


In this episode, Ryan and Shannon discuss the NSA's plans to create a state-of-the-art AI Security Operations Center to bolster U.S. defense and intelligence. Please

ITSPmagazine | Technology. Cybersecurity. Society
Preview of Devo's SOC Analyst Appreciation Day | Celebrating SOC Analysts: A Day of Appreciation and Happiness | An Event Coverage Conversation with Kayla Williams, CISO of Devo

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 25, 2023 30:42


Guest: Kayla Williams, CISO of Devo Inc. [@devo_Inc] and co-host of the Locked Down Podcast [@LockedDownKT]On Linkedin | https://www.linkedin.com/in/kaylamwilliams1/On Twitter | https://twitter.com/kayla_obviouslyOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode, hosts Marco and Sean are joined by Kayla Williams, CISO for Devo Technology, to discuss the upcoming SOC Analyst Appreciation Day. The conversation covers various sessions that will be part of the event, including topics such as mental health, a day in the life of a SOC analyst, and the impact of AI and automation. They emphasize the need for empathy and understanding when it comes to mental health, highlighting the importance of recognizing signs of distress and offering support. They also discuss the challenges faced by SOC analysts, such as burnout and the lack of recognition, and stress the need for better communication and collaboration within the industry.The CISO panel that will be part of the event, titled "CISOs in the Hot Seat," sparks curiosity about the discussion topics, with hopes that people management and understanding the mental health of teams will be addressed. The session on AI and automation raises questions about whether it will make the life of SOC analysts easier or increase the threat landscape. There is tons of excitement from Sean and Marco about hosting the "Day in the Life of a SOC Analyst" panel, where they aim to explore the daily struggles and experiences of analysts. They underscore the importance of appreciation and recognition within the industry, as indicated by statistics showing that many analysts are seeking a way out of their roles.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
Preview of Devo's SOC Analyst Appreciation Day | Celebrating SOC Analysts: A Day of Appreciation and Happiness | An Event Coverage Conversation with Kayla Williams, CISO of Devo

Redefining CyberSecurity

Play Episode Listen Later Sep 25, 2023 30:42


Guest: Kayla Williams, CISO of Devo Inc. [@devo_Inc] and co-host of the Locked Down Podcast [@LockedDownKT]On Linkedin | https://www.linkedin.com/in/kaylamwilliams1/On Twitter | https://twitter.com/kayla_obviouslyOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode, hosts Marco and Sean are joined by Kayla Williams, CISO for Devo Technology, to discuss the upcoming SOC Analyst Appreciation Day. The conversation covers various sessions that will be part of the event, including topics such as mental health, a day in the life of a SOC analyst, and the impact of AI and automation. They emphasize the need for empathy and understanding when it comes to mental health, highlighting the importance of recognizing signs of distress and offering support. They also discuss the challenges faced by SOC analysts, such as burnout and the lack of recognition, and stress the need for better communication and collaboration within the industry.The CISO panel that will be part of the event, titled "CISOs in the Hot Seat," sparks curiosity about the discussion topics, with hopes that people management and understanding the mental health of teams will be addressed. The session on AI and automation raises questions about whether it will make the life of SOC analysts easier or increase the threat landscape. There is tons of excitement from Sean and Marco about hosting the "Day in the Life of a SOC Analyst" panel, where they aim to explore the daily struggles and experiences of analysts. They underscore the importance of appreciation and recognition within the industry, as indicated by statistics showing that many analysts are seeking a way out of their roles.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Cybersecurity Readiness Podcast Series
Cybersecurity in the Age of AI

The Cybersecurity Readiness Podcast Series

Play Episode Listen Later Jul 12, 2023 38:36


While large language models such as ChatGPT can be used to write malicious code, AI tools are increasingly used to proactively detect and thwart cyber-attacks. There is growing recognition of AI's potential to fight cybercrime. Ian L. Paterson, CEO, Plurilock, sheds light on how AI has impacted the cybersecurity industry, especially how Generative AI is changing the industry. Describing the role of the AI as a co-pilot, he says, "The way I think about leveraging AI is typically having a human do the first 10%, and the last 10%, an AI is really good at doing the 80% in the middle. So it's not a replacement for the human, but it's an enabler for that human and allows them to do more with less."Time Stamps00:02 -- Introduction02:26 -- Ian L. Paterson's professional highlights04:56 -- What is generative AI and how does it work?10:34 -- How can we protect ourselves from phishing attacks?16:12 -- Leveraging AI for behavioral biometrics21:21 -- What is generative AI? How are these tools being used to thwart cyber attacks?24:45 -- How do we speed up detection and remediation?28:20 -- Cybersecurity is a team sport and it is a team game32:29 -- Guidance and recommendations36:19 -- Final thoughtsMemorable Ian Paterson Quotes/Statements"What we see today is that large language models can appear as if they are themselves intelligent.""One of the chief dangers of this new (AI) type of technology is that you can now author convincing text at scale.""What we are seeing today is both an increase in the volume of attacks and an increase in the severity and the convincingness of some of these attacks. I call them multimodal attacks because you're using not only the modality of text but you can also use the modality of video or audio. I think we're going to have to deal with these types of attacks, with these problems, for many years to come.""You're not going to have a ransomware attack on Monday at 10 am when everybody's refreshed from the weekend; it's going to be Friday afternoon, it's going to be on Christmas Day, it's going to be when you don't want to deal with those types of situations.""You can certainly use large language models to accelerate or help cut down on some of the minutiae when writing code.""Large language models are being used as co-pilot in Security Operations Center, to do log analysis, to speed up monitoring, identification, and notification of potential threats.""We've always had this need in cybersecurity to increase productivity because there are not enough people to do the work needed to stay safe. So, AI will help, it will be a productivity boon.""The way I think about leveraging AI is you typically have a human do the first 10% and the last 10%, an AI is really good at doing the 80% in the middle. It's not a replacement for the human, but it's an enabler for that human and allows them to do more with less, and hopefully, highlight the area they need to focus on.""The reality is that cybersecurity is a team sport, and you need a host of products and solutions working in harmony to adequately address the threats out there and reduce the attack surface.""In summation, AI is good, we're certainly going to see cybersecurity-related innovations, but it's not going to replace the people it takes to deploy and leverage those solutions.""It's really about having that defense-in-depth strategy. I think that makes a difference between somebody with pretty good security and somebody with great security."Connect with Host Dr. Dave Chatterjee and Subscribe to the PodcastPlease subscribe to...

Campus Technology Insider
A Security Operations Center Powered by Students

Campus Technology Insider

Play Episode Listen Later May 24, 2023 29:25


Growth in the cybersecurity industry is quickly outpacing the number of skilled workers available to fill the need, with estimates putting the global cybersecurity workforce gap at more than 3 million people. That shortage of IT talent is particularly acute in higher education, where salaries and benefits often can't compete with the corporate sector. In light of those issues, the University of South Carolina Aiken recently found a creative way to staff a new security operations center — and give students hands-on cybersecurity training at the same time. We spoke with Ernest Pringle, vice chancellor for Information Technology and CIO at USC Aiken, about creating a student-led SOC, helping students put cybersecurity theory into practice, forging regional cybersecurity partnerships, and more. Resource links: How USC Aiken's CIO Used Regional Cybersecurity 'Buzz' to Launch a Student-Staffed Security Operations Center Music: Mixkit Duration: 29 minutes Transcript

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Code: The Human Side of Cybersecurity and Social Engineering | A Conversation with Aunshul Rege | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 10, 2023 44:51


Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist

BLUEPRINT
11 Strategies of a World-Class Security Operations Center: Fundamentals

BLUEPRINT

Play Episode Play 19 sec Highlight Listen Later May 8, 2023 55:16


Welcome to a brand new season of Blueprint! In this intro episode we discuss "Fundamentals" chapter of the "11 Strategies of a World Class Cybersecurity Operations Center" with the authors. We get into the motivation behind updating the book and why its lessons are more important than ever in 2023. This chapter includes discussion of the functions of a SOC, basics of workflow, CTI and contextual data sources, and why ops tempo and speed is a critical factor in SOC success.This special season of the Blueprint Podcast is taking a deep dive into MITRE's 11 Strategies of a World-Class Cyber Security Operations Center. Each episode John will break down a chapter of the book with the book's authors Kathryn Knerler, Ingrid Parker, and Carson Zimmerman.Visit this Mitre page to find more information.-----------Support for the Blueprint podcast comes from the SANS Institute.If you like the topics covered in this podcast and would like to learn more about blue team fundamentals such as host and network data collection, threat detection, alert triage, incident management, threat intelligence, and more, check out my new course SEC450: Blue Team Fundamentals.This course is designed to bring attendees the information that every SOC analyst and blue team member needs to know to hit the ground running, including 15 labs that get you hands on with tools for threat intel, SIEM, incident management, automation and much more, this course has everything you need to launch your blue team career.Check out the details at sansurl.com/450 Hope to see you in class!Follow SANS Cyber Defense: Twitter | LinkedIn | YouTubeFollow John Hubbard: Twitter | LinkedIn

ITSPmagazine | Technology. Cybersecurity. Society
The ROC Revolution: Risk Management Reimagined with Business Context Overlays in the Risk Operations Center | A Their Story Conversation from RSA Conference 2023 | A Brinqa Story with Mayuresh Ektare

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 1, 2023 15:46


Mayuresh Ektare, an expert in risk management and SVP of Product Management at Brinqa, joins Sean Martin for a quick dive into the world of centralizing risk management frameworks. Ektare explains that the magic sauce isn't just bringing the data together, but stitching it together to create a unified understanding of an organization's attack surface. By overlaying business context, customers can prioritize and act upon the right set of findings in a timely fashion. Martin and Ektare discuss the challenges faced by customers in finding a centralized repository for business context, with many relying on tribal knowledge or CMDB records.Ektare introduces the concept of a Risk Operations Center (ROC), which allows organizations to orchestrate the risk lifecycle and proactively reduce exposure. Comparing it to a Security Operations Center (SOC), he highlights the importance of extending vulnerability management programs to encompass cloud infrastructure and application security posture management. The conversation also touches on the challenges of managing false positives and distilling a vast amount of findings into actionable items. By overlaying business context and understanding the impact of vulnerabilities on their organization, customers can fine-tune security scores, prioritize effectively, and respond accordingly.Note: This story contains promotional content. Learn more: https://www.itspmagazine.com/their-infosec-storyGuest:Mayuresh Ektare, SVP of Product Management at Brinqa [@brinqa]On Linkedin | https://www.linkedin.com/in/mektare/ResourcesLearn more about Brinqa and their offering: https://itspm.ag/brinqa-pmdpFor more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Hacking Humans
Security Operations Center (SOC) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Apr 25, 2023 7:57


A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization. CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center Audio reference link: AT&T Tech Channel, 2012. A tour of AT&T's Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.

video noun security operations center network operations center
Word Notes
Security Operations Center (SOC) (noun)

Word Notes

Play Episode Listen Later Apr 18, 2023 7:57


A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization. CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center Audio reference link: AT&T Tech Channel, 2012. A tour of AT&T's Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw. Learn more about your ad choices. Visit megaphone.fm/adchoices

video noun security operations center network operations center
SECURE AF
#42 - SOC It To 'Em

SECURE AF

Play Episode Listen Later Mar 16, 2023 37:39


How do you build a Security Operations Center from the ground up? On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged. Watch the full video at youtube.com/@aliasinfosec.Catch the whole episode now at secureafpodcast.comListen on Apple Podcasts, Spotify and anywhere you get you're podcasts.

Telarus
48. Why Shouldn’t I Run a Security Operations Center? with Guest, Sean Weisenburger

Telarus

Play Episode Listen Later Dec 22, 2022 38:11


Listen in today as we talk with our partner, Sean Weisenburger of JIL Communications. Sean has been immersed in Security for 20+ years, originally as an MSP, and also as a seller. His angle of viewing security as a risk is very complimentary to how he helps customers leverage the power and economies of scale when it's time to add Security Operations. Find out for Sean how it all started with the computer store next door! Transcript of episode can be found below. Josh Lupresto (00:01): Welcome to the podcast that is designed to fuel your success in selling technology solutions. I'm your host, Josh Lupresto, SVP of Sales Engineering at Telarus. And this is Next Level BizTech. Hey everybody, welcome back. I'm here wrapping up the security track. You know, we were on, if you, if you tuned in a couple weeks ago, we started this with Jeff Hathcote, and we got his purview, Telarus solution architect, and then we went and we talked to Ben Bowman of Masergy talked about all the things that, the great things that Masergy's doing with SOC and, and SEM and MDR and all of that. Now we're on with Sean Weisenburger of JIL Communications, the Man of the Hour. Sean, thanks for coming on, man. Sean Weisenburger (00:42): Hey, thanks for having me. I appreciate it, Josh. Josh Lupresto (00:45): Sean, I'd like to kick these off with any unique background or any blackmail I can use against you later, however this translates. But I really just wanna know, how did you get started? How long have you been in it? Where did you start? And then we'll learn a little bit about JIL Sean Weisenburger (00:59): I'm going to contribute this to my father, actually, because he used to work for a bank doing the ATM network, right? Mm-Hmm. And he, and this was like mid eighties, late eighties, right? And he always had the coolest toys to bring home. I mean, these things were suitcases, right? Of these, these computers and everything. And we would sit there and just bang on 'em and, and kind of, you know, kick it around. And before I know it, I had a a Commodore 64, a Tandy T 100, all of the evolution of those and everything. And I can remember from my eighth, my eighth grade, like dissertation final project, right? We, we were writing programming, we were writing programming, basic, right? No big deal, you know, 10 print, go-to 10, you know, that kind of stuff, right? Mm-Hmm. pretty Simple. So I did a kind of a whole program, and I, you know, I, this was all pre-done. Sean Weisenburger (01:56): Everything. I just hit play, man. And the, and the, the whole class was amazed of what we were doing. So it was, it was kind of cool. So that kind of spun my propeller head right there. You know, you get a little older, you kind of get away from it. You're 16, you know what happens, you know when, when that happens, right? So there's stories in there, we won't go for it. Yeah. Yeah. But, but but really after I was working, you know, I started as a paperboy, went to a lumber yard, was working through there. Kind of got my business knowledge from just that retail sales acumen. Next door there was a a computer shop next door, right? And one of the, with the sales managers would go over there and, and actually on the side build clones, right? Clone computers all day long. Sean Weisenburger (02:45): And that just fascinated me. This was 94 or five, like right when Windows 95 was coming out. So, yeah. You know, we were all on dos. And this 95 was like, oh my gosh, gooey, gooey, gooey, right? Mm-Hmm. , it was so cool. Mm-Hmm. everything. So yeah. So I got really interested in that piece of it, and I decided to apply for a position at a local var integrator here in Louisville, Kentucky, entree computers. And my first real, real quote, real sales job was going out and getting clients to buy networks and printers and all these devices and services,...

CISO Tradecraft
#100 - 7 Ways CISOs Setup for Success

CISO Tradecraft

Play Episode Listen Later Oct 17, 2022 33:09


References https://github.com/cisotradecraft/Podcast https://cisotradecraft.podbean.com/e/84-gaining-trust-with-robin-dreeke/ https://www.youtube.com/shorts/vSART2mutwc https://www.peopleformula.com/selfmastery https://cisotradecraft.podbean.com/e/ciso-tradecraft-roses-buds-thorns/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-how-to-compare-software/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-shall-we-play-a-game/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-aligning-security-initiatives-with-business-objectives/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-promotion-through-politics/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-presentation-skills/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-avoiding-death-by-powerpoint/ https://cisotradecraft.podbean.com/e/ciso-tradecraft-partnership-is-key/ Hello, and welcome to another episode of CISO Tradecraft -- the podcast that provides you with the information, knowledge, and wisdom to be a more effective cybersecurity leader.  My name is G. Mark Hardy, and today's episode is something special for us and we hope for you as well.  It's hard to believe it but CISO Tradecraft has been producing episodes for about two years now.  This is our 100th episode!  We've covered quite a bit of ground over that time, and we thought we would do a little reflection on our previous episodes and highlight seven differentiators that set World Class CISOs apart from others.  So, stick around and learn these seven tips that will enable you to enhance your CISO Tradecraft and help you have a more successful career.   The first tip we want you to understand is that you must always help others to understand your viewpoints through Connection.  Now there is one thing to note:  the way you connect depends on the size of the audience.  We observe that there's usually three different audience sizes that you will connect with: Individuals or 1:1, Small Teams (between 2 and 20), and Large Groups (more than 20).With Individuals it's all about building the one-on-one connection.  An example of folks who excel at building connections are spies.  Spies have a mission to build connections with others and recruit them to share important information.  Now if you go back to Episode #84, we brought Robin Dreeke on the show to talk about Building Relationships of Trust.  Robin was a long time FBI agent who excelled in recruiting and turning Russian spies.  In the episode, Robin talked about the key to building relationships of trust.  He mentioned four key recommendations:Seek the thoughts and opinions of others; Talk in terms of priorities, pain points, and challenges of others; Use nonjudgmental validation (i.e., seek to understand others without judging); and Empower others with choices and give them the cause and effect of each choice. There's a lot more detail in that episode, so be sure to check it out if you haven't yet listened to it.  We would like to add one more key point to these thoughts from Robin.  It's about seeking the thoughts and opinions of others.  You might be thinking to yourself, how do I connect with others, so they actually tell me their unfiltered opinions?  Jim Lawler, a 25-year veteran CIA operations officer came on Robin's Dreeke's Forging Trust podcast and provided a very interesting quote, “You don't recruit people when you are in transmit mode.  You recruit people by listening.”  Therefore, find ways to listen with great questions.  Imagine if you asked these three powerful questions from Andy Ellis: What is the stupidest risk that we are not taking care of that no one has dealt with? What is the dumbest security control that gets in your way? What is something that you wish we did better in security? Now after you ask those three questions, take Jim's advice, and just listen.  We mean to actively listen to every word coming off of the other person's lips.  Don't just listen for the purpose of responding right away and providing your opinion and guidance.  Remember, good listeners are very hard to come by.  It's uncommon to find people who really take an interest in others.  So, listen with the purpose of understanding what the other person wants, not what you intend to say back.  When you care enough to truly listen, people feel heard, which generates a connection. Small Teams - In addition to listening with others you will often need to connect with small teams.  This might be your executive leadership team.  It might be your boss and your peers.  To build connections with small groups you must enable Conversations of Candor.  If you haven't heard of the word candor it means the quality of being open and honest in expression or frankness.  Here's two examples of doing that:On Episode #27, we talked about how the Boy Scouts use the concept of Roses, Buds, and Thorns.  For those who were scouting leaders, after each campout you would talk about what's going well (i.e., roses), what new ideas are working (i.e., buds) and what are the things you want to stop (i.e., thorns).  By consistently asking these questions in each of your staff meetings, you enable everyone the opportunity to speak their mind.  They have a venue to speak up.  Now if you really want to connect with small groups and build trust, then please act on their guidance.  If someone says a particular person isn't responding, reach out to that other individual and say, "I would appreciate if you could assist so-and-so with this problem."  You're using the power of your leadership position to influence this other person.  When you step in for your team and work to help them, they will consider you as a good leader who helps his or her people.  [Navy story] By doing this, you enable trust and strengthen connections. Another example of creating conversations of candor is problem framing.  Note you can learn about all the steps in problem framing from Episode #14, How to Compare Software.  Now in today's discussion we're not talking about software but about people, but in that episode, we talked about the importance of applying problem framing to understand limitations and politics.  The first two steps of the seven in that methodology were defining the problem and stating the intended objective.  To best solve problems in an organization, it's important everyone agrees that something is a real problem worth focusing on.  If each person has a different problem in mind, then there really isn't going to be any meaningful agreement.  Start by getting consensus -- we all agree this is the exact problem we are solving today.  Once the room agrees on a problem, you need everyone to agree on an intended objective.  You can think of these as SMART goals.  You know the acronym: specific, measurable, achievable, relevant (or realistic), and time bound.  For example, let's say that today our organization is unable to retain quality talent.  We see many of our best and brightest going to other companies for more money.  So, your organization creates an intended objective.  For next year, we will seek to retain 80% of our employee population throughout the year that are not retiring.  This metric will enable our company to measure ourselves each month to see if we are successful and will allow everyone to connect by working together on the same issue.  Naturally, there needs to be resources allocated to achieve this goal; but if you have this stated objective in place, you're much more likely to set up your organization for success. Large Groups- The last audience size is large groups.  In large groups you don't have the opportunity to connect with everyone and have detailed conversations.  Additionally, with over twenty folks it becomes very difficult to have a conversation with everyone being able to provide their opinions and feedback.  So, for this audience, we recommend using gamification techniques to build connections.  Most executives are competitive.  We have all been involved in friendly competitions growing up as well as many of us have played some type of organized sport.  So, if we can create a game that increases active participation, provides immediate feedback, includes dynamic interaction, has competition or novelty, and improves a company's ability to achieve a goal, then you are on to something truly special.  If you would like to learn more about gamification concepts and the four player types that you need to support, please check out Episode #65 which is entitled, "Shall We Play a Game?"   The second differentiator of the seven used by World-Class CISOs involves understanding how to build an effective metrics program that drives ownership and accountability.  If there isn't someone accountable, then chances are the project is going to fail.  So, we need to have an accountable party and a good metric to show progress.  Remember, that which gets measured gets done; that which gets done well gets funded again.  To create good metrics, we want to you use the 4 Lines Approach.  Every metric needs a start line, a trend line, a goal line, and a timeline.A metric needs to have a Start Line to show the current status of where the organization is right now.  This allows the accountable parties to have a scoreboard.  You can think of playing a pick-up game of basketball.  If you are just playing for fun, people might not play their best.  However, if you put up a scoreboard, suddenly it becomes competitive, and players put forth a little more effort.  This helpful competition increases individual as well as team productivity. A metric should have a Trend Line to show how things have gone over the past four months.  Are things getting better, getting worse, or staying the same?  This tells management when something is going wrong, because negative trends indicate we need to change our course of action.  For example, if we see that the number of high and critical vulnerabilities on our SOX applications continues to increase, then we need to identify the root cause.  Are there enough resources on those teams, is something wrong from an architecture perspective, are our vendors not giving us the support we need, and so on?  If you are not watching the trend line, you will miss identifying when things are forecasted to go bad and end up taking corrective action much later than you could have. Metrics need a Finish   Line- This is a goal that the organization is targeting.  It has a clearly defined definition of done.  For example, let's say we really care about ransomware and being able to restore critical applications from offline backups.  We need to be specific on our restoration capabilities.  If a server goes down do we have 4 hours, 8 hours, 24 hours, or more before it catastrophically impacts the business?  This matters since the business is going to have to both recreate all of the data lost in that amount of time as well as account for loss of operational efficiencies when key IT systems are down.  Compliance can have a big impact on this as well, so make sure you know your requirements. Metrics also need a Timeline- We need to set a time to which we hold people accountable for reaching the finish line.  Goals or definition of "done" might go on forever, which isn't what you want.  You want results and that comes from accountability.  Therefore, ensure every task has a clear owner with a clear deadline.  Note if you want to hear more about these four lines, please check out Episode #69 on aligning security initiatives with business objectives.   The third differentiator of seven for World-Class CISOs is understanding the shift between being competent versus being effective.  On Episode #62 entitled Promotion Through Politics, we talked about the four major phases in your career and the different skillsets you must display to get promoted.  At first you are an individual contributor.  In this role you get promoted by demonstrating technical skills.  This phase usually lasts several years, and if you are proficient in your area of expertise, you'll get promoted to first line manager.  [If we use the Navy as an example, if you're a skilled pilot you'll compete well for promotion to Lieutenant Commander, or Major in the non-sea services.]  Here you must demonstrate your management skills -- executing to budget, managing paperwork effectively, meeting deadlines.  If you learn and do all this well, you get to become a manager of managers and are welcomed into middle management.  [Back to the Navy, if you do well as a department head, you'll be a strong candidate to promote to Commander (or Lieutenant Colonel) and select for Executive Officer or Commanding Officer.]  This is where you must demonstrate leadership skills -- inspiring and strengthening your team, setting and achieving stretch goals, accomplishing your mission through innovation.  [Today, less than half of those officers will be offered a promotion to Captain (or Colonel.)]  If you've seen the Top Gun Maverick movie, you'll see that Tom Cruise's character as a Captain does all of these things -- he portrays a seasoned leader building a team, teaching teamwork skills, inspiring confidence, and leading by example rather than just playing a hotshot pilot competing against his peers as he did in the first movie (although he still is the best of the best in the cockpit, but I don't want to spoil any of the plot if you still want to see it.)  This is where you get some of the most rewarding opportunities in your career -- leading men and women in accomplishing great tasks.  Many careers top out here.  Brigadier General Jeremy Horn writes in his article, The 10 Secret Rules of the Colonel, "Colonel is the last rank that you can make through personal effort.  Everything from here on out is luck and timing."  He's right.  Invitations to the executive suite, known in the military as Flag Officer, requires excellence in your record, your reputation, and your relationships.  If you want to read some more of my thoughts on that topic, look up my article on Running Up the Flagpole.  Finally, if you are lucky and haven't burned too many bridges you get welcomed into the executive level.  [In the Navy, that would be promotion to Rear Admiral (Brigadier General), a selection rate by the way that was less than 1% in my community.  Think about that -- 99% of Navy captains retire as captain.  Essentially, you can consider this as your terminal pay grade.  That realization does one of three things -- there are a few that hit cruise control and are on what we call the ROAD program -- retired on active duty.  The majority work well in their roles and serve honorably and effectively while looking for a good civilian job to transition out of the military.  But for a handful of us, it became "no fear" -- leadership couldn't hold not getting your promotion over your head if you took a risk and lost, so you go for things that are considered impossible and make them happen.  [pin on story]  If you consider some of the names you might remember from the military -- Colonel John Boyd's OODA Loop -- observe, orient, decide, and act; Colonel David Hackworth, the most decorated officer from the Korean War and the Vietnam War with two Distinguished Service Crosses, ten Silver Stars, and eight Bronze Stars -- they retired as Colonels, not Generals].  In this final career phase at the very top, it's not about leadership, it's all about politics.  Leaders show their political acumen to get recognized as being able to serve at this level.  Those who do not understand this think they're just brown-nosing, but it really is a manner of virtue-signaling, IF done at the right point in one's career.   Now as you are moving between levels in your career there's one subtle thing that we want to you understand about executives.  It's this concept of being competent versus being effective.  When you are in an individual contributor and first line manager roles, you must be competent.  For example, a pentester who can't go hands-on to the keyboard to find vulnerabilities isn't providing much value.  A firewall engineer who can't change the access control rules isn't helping.  You must display competence.  However, by the time you are a manager of managers you aren't touching a keyboard much anymore.  So, your competence isn't as important.  It's important you know what good looks like so you can provide your team guidance.  However, your ability to troubleshoot a firewall is probably behind you.  You need to make the shift to focus on effectiveness.  Instead of improving only yourself, you need to improve the effectiveness of the people assigned to you.  If you could make everyone 100% more productive, then that is like having twice as many people on your team.  Here's another example.  There was a company that hired a CISO who wasn't technical.  He had never had traditional cyber security roles such as running a Security Operations Center, building a compliance organization to keep auditors happy, or implementing antivirus and firewalls.  However, this CISO was really good at connecting with others and getting resources.  After meeting with all the technical experts within the cyber organization, he learns they needed funding.  So, he plays a round of golf with the CEO and gets the resources necessary to increase the team size to the appropriate levels.  Later on, he gets asked technical questions by the CIO about why the application security tools have so many false positives.  He responds that he will discuss this concern with his technical experts.  Later on, he brings those experts into a meeting where they brief the CIO on why the AppSec tools have issues and the recommended way forward to fix them.  This resolves the CIO's concerns.  We mention this story because the CISO was not competent as an application security expert.  However, he was extremely effective in his role.  Of course, competent CISOs can do more, but the main point we want you to understand is at the executive level you need to spend your time learning how to get things done more effectively, and you do this by enabling (or coercing) others to accomplish the work, not by becoming increasingly competent as a technical contributor.   The fourth differentiator of World-Class CISOs is they are amazing communicators.  Who wants to listen to a boring presentation?  The answer is no one.  So don't be that type of speaker.  Imagine you are a world class communicator that your CXO peers love hearing from.  That type of speaker is going to get invited to talk again and again.  When that happens, you get the opportunity to influence, to change behavior, to discuss high priority risks, and to be seen.  This is all goodness.  On Episode #61, we talk about presentation skills and how to give great presentations.  We discuss a JP Phillips Ted Talk that explains if you want listeners to remember your talk, try adding a cliffhanger.  If you want to build trust with a team, then tell something vulnerable about yourself.  Finally, if you want people to be focused and relaxed, try being overly dramatic or funny.  Also don't just try to communicate via email and PowerPoint.  On Episode #75, Avoiding Death by PowerPoint, we talk about using escape rooms, tabletop exercises, and polls to create unique experiences that others will enjoy.  Mix it up a little and you'll improve your ability to influence others.   The fifth differentiator that sets up World-Class CISOs for success is they align security initiatives with business objectives.  In Episode #69 we talk about profit generation, cost reduction, service enablement, and customer and market outreach as the four key objectives that build profitable growth for businesses.  To best learn the business objectives and build relationships of trust with the C Suite, you need to learn how to partner.  We give detailed explanations of this process in Episode #70, Partnership Is Key.  One example is the marketing department.  They often direct where the IT organization needs to build its next webpage or widget.  However, marketing folks are often not technical.  Now imagine if you are the CISO that really gets on well with them.  So, you and they both partner together to identify a way to send marketing material via text and social media platforms such as TikTok, WeChat, and others.  Marketing estimates this will create millions of dollars of new sales.  So, the marketing team, the CIO, and the CISO brief the CEO and CFO to ask for an additional budget to perform this effort.  The CEO and CFO hear the business case and listen to the CIO saying this can be built in a six-month time frame.  The CEO and CFO also hear from the CISO that this can be done securely.  After due consideration, they approve the funding request.  Guess what?  That's a big win for the company.  Since you were involved early with marketing, you also have the greatest opportunity to design security correctly on the new solution, versus being asked to approve something the week before going live.  So, find ways to connect through partnership and always focus on enabling business objectives.   The sixth differentiator that sets CISOs up for success is they can create effective risk governance and management processes within an organization.  The business must see that cyber is a business risk and not just an IT risk.  For example, when system XYZ is unavailable, how does that affect each of the users of that IT system?  What business processes fail?  What are the potential impacts on revenue and customer service?  This is why cyber risks need to be acknowledged by both the business owners who can identify the consequences of downtime and the IT maintainers who can actually remediate the findings.   Now one important thing to remember is approval authorities.  For example, who in the organization has purchasing authority for two million dollars of software?  Can any manager do this, or does it need to receive approval from a director, vice president, or senior vice-president?  A quick conversation with the CFO can confirm spending levels.  Once you know the spending authorities, then you can make a comparison that accepting two million dollars in cyber risk is the same as approving two million dollars in additional spending.  If a third-party risk assessment identifies two million dollars in new software risk, then the business must acknowledge the risk by either moving forward, rejecting the software, or finding a way to remediate the vulnerability before using the software.  Remember, the purpose of cyber isn't to say "no."  The purpose of cyber is to be in the business of revenue protection.  Cyber protects revenue when the business owners can make business decisions in their best interest.  Most business executives will not understand the likelihood of a system being compromised, but that's where cyber can show real value.  Cyber can communicate the vulnerabilities within systems to the business in risk committees and governance boards.  This allows cyber and the business to document the risk decisions being made.  When you document discussions and decisions based on risks and money, then you are acting like an executive.  This is the way to success.   The last world class differentiator for CISOs is they are successful in their jobs.  Want to know how to set up for success in any job?  If so, then please follow this piece of advice.  You must accomplish three things:First you need to get the job done.  If others refer to you as a "closer" for finishing the job, then you build trust.  When leadership knows they can trust you with little things, you get bigger responsibilities.  Mission accomplishment is the coin of the realm. The second thing to being successful in any job is you must cover all the angles.  Never let an overlooked detail derail you.  Good executives run efficient programs and projects that finish on time and within budget.  When things don't go as forecasted there should not be big surprises to anyone since you keep a close watch of the details.  If you keep track of the details and think things through, then you can be successful.  You can succeed in this area by creating a culture of no-fear, specifically of not shooting messengers.  Are your people confident they can come to you early with potential issues for situational awareness, consideration, or possible resolution?  Can even your most junior person speak up and point out what might be a problem?  If it isn't, don't  cut them down, but patiently point out that that issue is already covered, but thank you for keeping your eyes open, and if you see other potential problems, continue to speak up.  You make better decisions when you don't have people afraid to bring you bad news.  I think we can all imagine a global leader today that none of us would want to approach saying things aren't going well and according to plan.  Don't be that kind of boss. The final and most important thing to succeed in any job is to keep the customer happy.  Remember, if the customer isn't happy, then it doesn't matter what you have done.  The key thing to remember is determining who is the customer with every project.  Sometimes it's your boss, sometimes it's the business, sometimes it's actually an external corporate customer.  If you know who that is and you keep them happy, then you usually have a high probability that you will stay gainfully employed.   Well, we hope you have enjoyed listening to the seven ways world class CISOs set themselves up for success.  Let's recap: They focus on building connections; They leverage effective metrics programs that drive ownership and accountability; They know effectiveness is more valuable than being competent at the executive level; They are great communicators; They align security initiatives with business objectives; They create effective risk governance and management processes; and finally, They practice the three tips to be successful in any job. If you want to learn more great tips on being an effective CISO, please take a look at our GitHub Page which lists each of our podcast episodes under ten high-level topics.  Also note there's a link to each of the episodes we mentioned in our show notes.   And finally, if you learned something that you like, please help us celebrate one hundred episodes of CISO Tradecraft by leaving us a 5-star review on your favorite podcast platform -- those ratings really help us reach other security leaders.  The more CISOs we can help, the more businesses we can protect.  This is your host, G. Mark Hardy.  Thanks again for listening and stay safe out there.

The Employee Safety Podcast
How to Build a Modern Security Operations Center

The Employee Safety Podcast

Play Episode Listen Later Aug 24, 2022 27:10 Transcription Available


Many organizations recognize the need for “always on” security, but few know how to achieve or sustain it. Grant Hayes, Owner of Childers, Hayes and Richards, has more than 20 years' experience in physical security, from protecting U.S. Presidents as a Secret Service Agent to leading security operations at major organizations like BP and Magnolia.  In this episode, Grant shares the basic building blocks of launching a SOC and provides actionable advice on how to uplevel your security program. Listen in to learn: The benefits of a modern SOC Expected costs Common roles and responsibilities of SOC personnel How to fully integrate a security team into your organization Tips on choosing the right vendors and contractors  The Employee Safety Podcast is hosted by Peter Steinfeld, SVP of Safety Solutions at AlertMedia. You can find this interview and many more by following The Employee Safety Podcast on Apple Podcasts, Spotify, or subscribing here. Listening on a desktop and can't see the links? Just search for The Employee Safety Podcast on your favorite podcast player.

Cloud Security Podcast by Google
EP79 Modernize Data Security with Autonomic Data Security Approach

Cloud Security Podcast by Google

Play Episode Listen Later Aug 15, 2022 27:37


Guest:  John Stone,  Chaos Coordinator @ Office of the CISO, Google Cloud Topics: So what is Autonomic Data Security, described in our just released paper?  What are some notorious data security issues today? Perhaps common data security mistakes security leaders commit? What never worked in data security, like say manual data classification? How should organizations think about securing the data they migrated and the data that was created in the cloud? Do you really believe the cloud can make data security better than data security in traditional environments? Resources: “Modern Data Security: A path to autonomic data security” paper (NEW) “How autonomic data security can help define cloud's future” blog “Megatrends drive cloud adoption—and improve security for all” blog “Modernizing SOC ... Introducing Autonomic Security Operations” blog “Autonomic Security Operations: 10X Transformation of the Security Operations Center" paper “Zero Trust: Fast Forward from 2010 to 2021” (ep8) “Data Security in the Cloud” (ep2) and the resource. “Modern Data Security Approaches: Is Cloud More Secure?” (ep16) “Reflections on Trusting Trust” paper (1984).

Your Cyber Path: How to Get Your Dream Cybersecurity Job
EP 76: Which Certification Roadmap or Path Should I Use?

Your Cyber Path: How to Get Your Dream Cybersecurity Job

Play Episode Listen Later Aug 5, 2022 24:54


https://www.yourcyberpath.com/podcast/76/ In this episode of Your Cyber Path, Kip and Jason discuss the world of cybersecurity certifications and how you can determine the proper path for you to follow. We bust the myth that the Security Certification Roadmap by Paul Jerimy is a proper roadmap from left to right to follow…but it isn't! A certification roadmap or pathway should be something that allows you to outline the skills and certifications you will need in your career for the next few years. A roadmap gives you a plan to follow and allows you to not try and “collect them all” when it comes to certifications. After all, certifications are expensive, and you don't need to collect them like Pokémon cards. Jason personally prefers the CompTIA Certs Roadmap, which presents the roadmap based on 5 different jobs within cybersecurity. This will allow you to pick a position, such as cybersecurity analyst, and then it will outline which certifications you should take. Note, this isn't just CompTIA certifications, but they also include competitor certifications that are applicable to the career and positions you are working towards. Remember, when it comes to certifications, you don't need 20 or 30 of them to be competitive, but instead you need 3-5 key certifications based on the job role you are trying to fulfill in the marketplace. For example, if you want to be a cybersecurity analyst, you should only have a handful of certifications, such as CompTIA Network+ or CCNA, CompTIA Security+, CompTIA Cybersecurity Analyst+, and ITIL 4 Foundation. With these 4-5 certifications, you would be well qualified to join a Security Operations Center as a cybersecurity analyst. By having these certifications under your belt, you will have a better chance of getting through the HR job filtering process, landing an interview, and then impressing the hiring manager with your knowledge and skills. In addition to all of that, you will be much better prepared to do value added work in a large SOC on day 1, too, because you have the foundational knowledge needed to succeed! What You'll Learn ●     How to determine which certifications you should earn ●    How to create a roadmap for your future career ●     Where to find data on which certifications employers are asking for ●     How to use certification roadmaps Relevant Websites For This Episode: ●    www.YourCyberPath.com ●   www.CyberSeek.org ●   CompTIA IT Certification Roadmap ●   Paul Jerimy's Security Certification Progression Chart Other Relevant Episodes ●   Episode 55 - Which cybersecurity certifications should you get?

2 Cyber Chicks
Let's Talk Kubernetes Security Operations Center | A RSA Conference 2022 Conversation With Brooke Motta | 2 Cyber Chicks Podcast With Erika McDuffie And Jax Scott

2 Cyber Chicks

Play Episode Listen Later Jun 24, 2022 17:32


RSAC 2022 interview with Brooke Motta, the CEO & Co-Founder of a groundbreaking start-up to help organizations secure their Kubernetes.During this interview Brooke shares her journey as a woman in cybersecurity, and her thoughts on how we are doing as a community within diversity and inclusion. She provides her insights on how we can drive change and support the newer generation breaking into cybersecurity.__________________________GuestBrooke MottaCEO / Co-FounderOn LinkedIn | https://www.linkedin.com/in/brookemotta/__________________________HostsJax ScottOn ITSPmagazine  

The CEO Sessions
Why Leading by Example Works - Thales AM CISO, Eric Liebowitz

The CEO Sessions

Play Episode Listen Later Jun 13, 2022 39:36


Stop wasting your energy on barking orders and telling people what to do. It's far more effective and satisfying to lead by example. It's one of the greatest leadership hacks of all time because people respond better to what they see, not what they're told. I host Eric Liebowitz, CISO of Thales Americas, who shares a key insight that explains why leading by example works and an essential strategy to immediately begin leading more effectively.  Thales is a global Aerospace, Transportation, Cybersecurity and Defense organization with a complex IT environment and multiple product lines. They have over 81.000 employees across 5 continents. Eric has over 15 years in the cybersecurity space. He is a strong leader who is experienced in building and maturing Information Security programs for large Financial Services and Technology organizations. Eric started his career on Wall Street where he led a global team of security professionals that implemented a 24/7 Security Operations Center to monitor threats and respond to attacks at Lehman Brothers.  Eric then moved on to Freddie Mac where he built and led multiple teams in different security disciplines such as Identity & Access Management, Governance, Risk and Compliance and Security Monitoring & Incident Response. Eric's attributes include strong leadership and communication skills with the ability to translate technical and risk based solutions to senior management as well as business partners. He also has a demonstrated track record of delivering innovative Security solutions that meet corporate strategic goals while promoting a team-oriented work environment. Eric has partnered with peers in other organizations to start a CISO roundtable with security leaders from the Virginia, Maryland and DC area. He is also a 9 year contributing member of the CISO Executive Network. He holds the CISSP, CISA and CISM certifications and is a member of ISACA National DC chapter and ISC2.  LinkedIn Profile: https://www.linkedin.com/in/ericliebowitz/ Company Link: https://www.thalesgroup.com/en What You'll Discover in this Episode What Eric learned at the biggest defining moment in his career. Vital strategies to strike the balance between working hard and taking care of yourself. What to do when you don't speak the language in the room. Why leaders must become PROACTIVE when it comes to employee retention. The reality of the staffing shortages in the Cyber Security industry. Why leading by example is so effective. The importance of leading with integrity and how to do it. How to have a one-on-one meeting that builds a personal connection every time. Resources: https://www.amazon.com/Habits-Highly-Effective-People-Powerful/dp/1982137274/ref=asc_df_1982137274/?tag=hyprod-20&linkCode=df0&hvadid=509245866633&hvpos=&hvnetw=g&hvrand=12380231504550548321&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9010496&hvtargid=pla-908915591470&psc=1 (The 7 Habits of Highly Effective People), Stephen Covey https://www.amazon.com/SPEED-TRUST-Thing-Changes-Everything/dp/1416549005/ref=asc_df_1416549005/?tag=hyprod-20&linkCode=df0&hvadid=312009828129&hvpos=&hvnetw=g&hvrand=208795773085388419&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9010496&hvtargid=pla-433459424349&psc=1 (The Speed of Trust), Franklin Covey ----- Connect with the Host, #1 bestselling author Ben Fanning https://www.benfanning.com/speaker/ (Speaking and Training inquires) https://followbenonyoutube.com (Subscribe to my Youtube channel) https://www.linkedin.com/in/benfanning/ (LinkedIn) https://www.instagram.com/benfanning1/ (Instagram) https://twitter.com/BenFanning1 (Twitter)