ES Episode140

From Paul's Security Weekly
Jump to: navigation, search

Recorded June 5, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Jeff Man
    Cryptanalyst,
    infosec analyst, pioneering ex-NSA pen tester, PCI specialist,
    Tribe of Hackers, & InfoSec Curmudgeon.
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Annoucements:

    • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

    • So many of the big East Coast cybersecurity tradeshows take place in crowded cities like Boston and New York, where parking is a nightmare and will cost you an arm and a leg. However, this year's Compass Cybersecurity Symposium is being held at Twin River Casino in Lincoln, RI, just 15 minutes outside of Providence! The venue has plenty of free and easy parking. Speakers include social engineering expert Chris Hadnagy and Security Weekly podcast founder Paul Asadoorian. Use the discount code "SW2019" to save $20 on registration!

    • Security Weekly will be at Hacker Halted in Atlanta, GA this October 10th-11th! EC-Council is offering our listeners a $100 discount to attend the two day conference. Use discount code HH19SW when you register or go to securityweekly.com/hackerhalted and register there! Make sure you checkout the keynote (Paul Asadoorian) and Mr. Jeff Man's talk as well!

    • Have you been trying your hardest to get a ticket to DerbyCon FinishLine?! We know that tickets sold out almost immediately, as they do almost every year, and we have an exciting announcement: Security Weekly is giving away 7 tickets to DerbyCon! Here's what you need to do - subscribe to the Security Weekly YouTube channel and send an email to sam@securityweekly.com with either a written or video testimonial about what Security Weekly means to you! That's it, it's really that simple! First 7 people to complete this will receive a ticket to DerbyCon! You will also be invited to participate in our Security Weekly DerbyCon interview series that Sam and Mark will be running at the conference!



    Interview: Charles Thompson, Viavi

    Charles Thompson is the Senior Director of Product Management at Viavi
    Charles Thompson, Sr. Director of Product Management at VIAVI Solutions, has a career spanning 20 years in the IT space specializing in using wire-data to assist SecOps and NetOps teams with management, analysis, and protection of critical applications, services, and data. At VIAVI, Charles leads product management for the enterprise security and performance management solutions allowing earlier detection and faster, more comprehensive responses to security threats. Prior to VIAVI, Charles held various leadership roles in product management and services at Network Instruments. To learn more about VIAVI Solutions security solutions and to access a variety of premium whitepapers and assets, visit securityweekly.com/viavi.

    Topic: Charles will discuss the importance of response/remediation in a strong security strategy and the role wire-data plays in having the forensic detail needed to identify a breach, understand scope of impact, and confirm restoration of network performance to pre-incident baseline.

    Segment Resources:


    Topic Segment: Defending Your Environment Against Major Microsoft Vulnerabilities

    Discussion point before we begin: What defines a "major" Microsoft vulnerability?

    1. Discovery - Scoping the problem is just one part of determining just how big of a problem you have if you even have a problem at all. The discovery must be an ongoing process, constantly looking for the known bad states, notifying the right people, and implementing a fix. This also means both externally and internally, whatever that means to you today.
    2. Temporary Countermeasures - These can vary, but should be considered a when Microsoft has a "major vulnerability", it is more likely attackers will go after this weakness vs. others.
    3. Be Resilient - This is extremely hard for large enterprises today, most of which have legacy systems and architecture that prevents them from moving fast. The faster you can build an environment, test a patch or fix, deploy it to production, the more resilient you become. I realize that various levels of resiliency may exist in your environment, keep focused on your most critical assets and most sensitive data first.
    4. I'd want two things - If I were to be in charge of defending a Windows environment, I'd want two capabilities: 1) The ability to run scenarios through the environment at any time, pointing out exposures. For major MS vulnerabilities, there would be a constant simulation running identifying the exposure 2) Configuration management would be critical to my plans, the ability to safely make a change across an environment with 10,000+ systems exists, and I'd want it.


    Enterprise News

    Security Product Announcements

    1. Database Security for Amazon RDS
    2. Infoblox unveils simplified security platform to detect and stop cyber threats
    3. Palo Alto Networks launches new 'Prisma' cloud security suite
    4. CyberX Launches First Open Development Environment (ODE) for Securing IoT/ICS Devices Running Proprietary Protocols
    5. Sophos Intercept X Endpoint Protection
    6. Morphisec Announces Version 3.5 at Infosecurity Europe 2019 with New Unified Security Center for End-to-End Visibility Across All Blocked Attacks
    7. Securonix Partner Program Targets MSSPs
    8. Thycotic Expands Enterprise-Grade Privileged Access Management-as-a-Service Solution
    9. SecureAuth Innovates Secure Identity Management with its Intelligent Identity Cloud Service

    Security Company Acquisitions

    1. Flexera Acquires RISC Networks
    2. Security stays hot as Imperva grabs Distil Networks
    3. Palo Alto Networks Announces Intent to Acquire Two Companies to Extend Its Cloud Security Leadership

    Security Company Funding

    1. Insight Partners Acquires Recorded Future for $780 Million
    2. EnSilo is raising a series B to monitor and remediate cyber threats (Updated)
    3. SentinelOne lands $120 mln Series D
    4. SEC FORM D
    5. PSG funds ThreatConnect
    6. Swimlane secures $23 million to accelerate growth