ES Episode153

From Paul's Security Weekly
Jump to: navigation, search

Recorded September 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Our next webcast is February 13th with Sri Sundaralingam, Vice President, Product and Solutions Marketing at ExtraHop where we will discuss Cloud Native Network Detection and Response! Register for our upcoming webcasts by visiting securityweekly.com, selecting the webcast drop down from the top menu bar and clicking registration.


    Enterprise News

    1. Splunk buys SaaS startup Omnition | ZDNet
    2. Stage Fund buys Israeli cybersecurity co Cymmetria
    3. Trustwave platform brings more visibility and control cloud security
    4. Shape Security Blog : The War No One is Talking About
    5. VMware buys Carbon Black and Pivotal, valued together at $4.8 billion
    6. Palo Alto Networks Announces Intent to Acquire Zingbox
    7. Vectra introduces a privilege-aware network detection and response solution
    8. Quest Announces Newest Release of the KACE SMA for Stronger Unified Endpoint Management and Security
    9. SyncDog partners with Symantec to address full spectrum of mobile security concerns - Help Net Security
    10. Awake Security enhances its platform with the ability to identify attackers based on their intent - Help Net Security
    11. Ping Identity launches initial public offering of its common stock - Help Net Security
    12. HackerOne Raises $36.4 Million in Series D Funding Round | SecurityWeek.Com

    https://www.axios.com/private-equity-firms-to-buy-symantec-for-16-billion-214459c3-b21f-4a20-a432-5ec564047a44.html

    Interview: Steve Laubenstein, Core Security - a HelpSystems Company

    Steve Laubenstein is the VP - Cyber Threat Products Group at Core Security - a HelpSystems Company
    Steve Laubenstein has been working for cyber security companies for the past 20 years, most recently as the GM for Core Security's Penetration Testing Solutions and now he heads up the Cyber Threat Business Unit at Core Security, a HelpSystems company.

    Segment Topic:
    Elements of an effective penetration testing program in an interconnected world

    Segment Description:
    The need to understand your system's resilience to attacks, and your people's ability to quickly identify and respond, has never been higher. Yet, we live in an IT world that is increasingly becoming borderless. We will be discussing the role of pen testing where mobile, cloud, IoT and network sprawl are the new normal.


    Black Hat Interviews: DenimGroup, SCYTHE, & Eclypsium

    We interview Dan Cornell, the Founder & CTO the at DenimGroup.

    Segment Topic:
    Injecting the “Sec” into “DevSecOps” has always been a balancing act of getting the best reasonable coverage in the shortest reasonable length of time. Slowing down the DevOps process is a sure-fire way to get pulled out of the pipeline. Because of the current business culture, security teams are often forced to wait until the last minute to address any vulnerabilities within the developed code, leaving the organization vulnerable to security issues. These kinds of practices can leave companies and anyone within their ecosystem exposed to attacks which can cripple networks and cost millions in reparations. During this recording, Dan will speak directly to the difficulties organizations face in fitting security into the DevOps stack, how to change the current paradigm, and how organizations can streamline communication between Security and DevOps with the goal of earning itself a seat at the [board room] table.



    We interview Bryson Bort, the Founder & CEO at SCYTHE.

    Segment Topic:
    Bryson covers some his research and talks in the IoT space.



    We interview Yuriy Bulygin, the Founder & CEO at Eclypsium.

    Segment Topic:
    Yuriy will be giving 5 Tips for Protecting Firmware from Attacks. Firmware is the unguarded attack surface of the enterprise. Hackers attack firmware because they know many security and IT managers aren’t paying attention to it, and because firmware level attacks are persistent, stealthy, and able to bypass most security measures. The Meltdown and Spectre vulnerabilities introduced the world to the power of hardware-level weaknesses, LoJax malware brought UEFI rootkits into the wild, and BMC firmware vulnerabilities have impacted servers in the supply chain and the cloud. Laptops, servers and network devices are all at risk. Yuriy Bulygin, CEO of Eclypsium and founder of CHIPSEC, will discuss why firmware security is important, and steps that security teams can take to protect enterprise devices.