Recorded January 29, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
- New Cisco, AppDynamics integration bridges IT and DevOps for app management | ZDNet
- Cequence Security Launches CQ botDefense SaaS Silicon Valley Daily
- Optimizing Your IT Spend as You Move to the Cloud | Flexera Blog
- Newswire & Press Release / Cybereason Launches Free Emotet-Locker Tool to Help Global Organizations and Local and State Governments Combat... - IT Security / Anti-Spam - Cybereason, Inc. | NewswireToday
- CloudKnox Security raises $12M to accelerate customer growth and innovation - Help Net Security
- Swimlane version 10.0: Reducing mean time to detect and response for security incidents - Help Net Security
- Cequence CQ botDefense now available on AWS Marketplace as a SaaS - Help Net Security
- Magnet Forensics unveils new solution that simplifies remote forensics investigations - Help Net Security
- Cisco launches IoT security architecture to deliver enhanced visibility across IoT and OT environments - Help Net Security
- Most AV vendors will continue to support their products under Windows 7 - Help Net Security
- Citrix and FireEye Mandiant Launch Indicator of Compromise Scanner
- StackRox Announces Google Anthos Support for Hybrid and Multicloud Kubernetes Environments
- Sophos Introduces Intercept X for Mobile
Topic: Migrating Legacy Apps to the Cloud Pt. 1
Whether you're trying to migrate a "homegrown" application or an open-source tool, getting into containers and to the cloud can be challenging. There are many ways to achieve the same goal, and as always, some not-so-great advice on the Internet. This segment will cover some of the technical details and considerations for moving applications into Docker and eventually into cloud services. We'll review Docker configurations and strategies for building, maintaining and securing containers.
Interview: Steven Bay, Security On-Demand
Steven Bay has over 16 years of cybersecurity experience, spanning the military, government, consulting, and enterprise security. For 10 of those years he supported the National Security Agency both as a member of the military and a contractor. In 2013 he hired Edward Snowden to a contract position in Hawaii and was his manager when Snowden fled the country with top secret NSA data. Following this he moved into commercial cybersecurity where he provide IR and Threat Intelligence services to Fortune 500 companies, served as a CISO, and today is the Director of Security Operations at Security On-Demand. He also is keynote speaker where shares his story and lessons learned from his Snowden experience at industry groups, corporate events, and student groups.
Edward Snowden and the Insider Threat
Edward Snowden is a prime example of an Insider Threat. We will discuss insiders and why they are so dangerous, my story with Ed, and lessons we can all apply to both identify and protect ourselves from such threats.