Recorded February 12, 2020 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
- Insight Completes Venture Acquisition of Armis for $1.1 Billion
- Salt Security API Protection Explained | Salt Security
- RSA NetWitness Platform Bolsters Threat Detection and Incident Response
- Thycotic Leads the Way for Cloud-based Privileged Access Management
- Deep learning cybersecurity co Deep Instinct raises $43m
- LogicHub launches MDR+ to provide flexible end-to-end detection and response - Help Net Security
- CipherCloud CASB+ for Slack: Visibility, protection and control of all user activity on Slack - Help Net Security
- ZeroFOX launches AI-powered Advanced Email Protection for Google and Microsoft platforms - Help Net Security
- 12,000+ Jenkins servers can be exploited to launch, amplify DDoS attacks - Help Net Security
- Elastic Stack 7.6 delivers automated threat analysis and response - Help Net Security
- Tufin SecureCloud Enables Companies to Secure Hybrid Cloud Environments Without Compromising Business Speed or Agility
Interview: David Waugh, ManagedMethods
A father first, and a growth leader second, David Waugh sees first-hand how cybersecurity impacts schools, students, families and communities. David has over 20 years of experience in enterprise software that he has dedicated the past several years applying to educational institutions. Today, David focuses on building valuable, long-lasting relationships with customers, business partners, and team members to build a more secure cyber world for students, school districts, non-profits and businesses. He believes that access to technology directly impacts the next generation's ability to excel and that it is our responsibility to make that technology safe and secure for positive learning outcomes.
Cyber Safety & Security in K-12 Schools
As K-12 schools and students move into a digital world, the traditionally separate areas of campus safety and cybersecurity are converging. Cyberbullying, the increase in violence on campus, hackers targeting school information systems and student data, and the technological overlap between campus safety and cybersecurity are all driving this trend. The segment will look at how schools are taking a layered approach to protecting Google G Suite and Microsoft Office 365 data from risks focused on the K-12 education environment.
Interview: Jeff Deininger, ExtraHop
After over a decade as a Systems Engineer for enterprise technology companies including AMS Technology and ExtraHop, Jeff now works closely with customers in order to improve their cloud security through cloud-native network detection and response.
How to Secure Cloud Workloads & Reduce Friction with Cloud-Native Network Detection & Response
Migrating to the cloud is increasingly a business imperative, but there are pressing security challenges unique to cloud environments that can slow, halt, or even reverse progress. Here's how cloud-native network detection and response addresses those challenges, with a real-world example from Wizards of the Coast.
- https://www.extrahop.com/wizards - blog with AWS re:Invent session featuring Wizards of the Coast discussing their experience using ExtraHop Reveal(x) Cloud
- https://www.extrahop.com/resources/whitepapers/ndr-cloud-security-missing-link/ - educational ebook discussing and defining cloud-native NDR
- https://www.extrahop.com/lp/shared-responsibility/ - an interactive educational quiz detailing how the shared responsibility model breaks down across different cloud service models