BSWEpisode99

From Paul's Security Weekly
Jump to: navigation, search

Business Security Weekly #99

Recorded September 17, 2018 at G-Unit Studios in Rhode Island!


Hosts

  • Michael Santarcangelo
    Founder of Security Catalyst, author of Into the Breach, and creator of the Straight Talk Framework.
  • Matt Alderman
    Strategic Advisor at Automox, security consultant, and wizard of entrepreneurship.
  • Announcements

    • Check out our On-Demand material! Some of our previously recorded webcasts are now available On-Demand at: securityweekly.com/ondemand.
    • DerbyCon is holding its first-ever Mental Health & Wellness Workshop - to help support their efforts, please go to DerbyCon.com/wellness
    • Join us for our Webcast with LogRhythm about "Tips & Tricks for Defending the Enterprise Using Open Source Tools". The webcast will be held September 27 @3:00PM EST!


    Interview: Chris Brenton, ACM

    Chris Brenton
    is the Chief Operating Officer Active Countermeasures.
    Hello, my name is Chris Brenton. I have been a leader in IT and security for over 20 years. I’ve written multiple books on networking and security including “Mastering Cisco Routers” and “Mastering Network Security”. I’ve been involved with a number of key security projects such as a founding member of the Honeynet Project (https://www.honeynet.org/), and an active contributor to the PCI special interest group responsible for the standards for credit card processing in public cloud environments (https://www.pcisecuritystandards.org/pdfs/pr_130205_Cloud_SIG.pdf). I’ve also developed security training, including complete courses for SANS where I served as a Fellow Instructor (https://www.sans.edu/bios/chris-brenton), and for the Cloud Security Alliance where I authored and presented all of their online training material (https://cloudsecurityalliance.org/education/white-papers-and-educational-material/courseware/). I currently run the day to day operations at Active Countermeasures (https://www.activecountermeasures.com/), where we provide inexpensive tools that that simplify the process of threat hunting your network.


    Questions:

    • What is threat hunting?
    • What does this actually mean?
    • Is there a level of maturity required (organization, security team, individuals)?


    • What problem(s) are you trying to solve?
    • How do you keep track of everything on your network?
    • How do you make it accessible to someone other than the superstar talent?
    • What is your approach?

    Tracking Security Innovation

    Special Guest: Ron Gula, Gula Tech Adventures

    Ron Gula
    is the Founder of Tenable and Gula Tech Adventures.
    Serial Cyber Security Entrepreneur. Founded Tenable Network Security and Network Security Wizards. 15+ years experience as CEO in cyber security industry.

    Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking's team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. As CEO and co-founder of Tenable Network Security, Ron led the company's rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20,000 customers worldwide, raise $300m in venture capital and achieve revenues in excess of $100m annually.



    Opening Concept:

    • How do you take someone with a basic level certification and give them access to the tool?


    Let’s focus on how it works:

    • How do you deploy?
    • What about feeds?


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+