Enterprise Security Weekly Show Notes

From Paul's Security Weekly
Jump to: navigation, search

Coming Soon

Episode #119 - John Bradshaw, Acalvio

Previously Recorded

Episode #118 - Mike Nichols, Endgame

Episode #117 - Jeremy Winter, Microsoft

Episode #116 - Rick Fernandez, LogRhythm

Episode #115 - James WIckett, Signal Sciences

Episode #114 - Harry Sverdlove, Edgewise

Episode #113 - Ian McShane, Endgame

Episode #112 - Jonathan Sander, Snowflake

Episode #111 -

Episode #110 - Mark Russinovich, CTO of Microsoft

Episode #109 - Michael Gordover, ObserveIT

Episode #108 - September 26, 2018

Episode #107 - Audit Mistakes

Episode #106 - David Maestas, Bandura Systems

Episode #105 - September 5, 2018

Episode #104 - Rick Holland, Digital Shadows

Episode #103 - Mike Jones, DomainTools

Episode #102 - Al Ghous, GE Digital

Episode #101 - Jeff Man and Paul Asadoorian

Episode #100 - Corey Thuen, Gravwell

Episode #99 - John Moran, DFLabs

Episode #98 - Joe McManus, Automox & Ferruh Mavituna, Netsparker

Episode #97 - Gabriel Gumbs, STEALTHbits

Episode #96 - How I learned to Stop Hating and Love IPFIX

Episode #95 - Chris Brenton, Activecountermeasures

Episode #94 - Adrian Sanabria, Savage Security

Episode #93 - Eric Bednash and Jonathan Halstuch, RackTop Systems

Episode #92 - Building Your Purple Team

Episode #91 - Ron Gula, Gula Tech Adventures

Episode #90 - SOURCE Boston 2018

Episode #89 - Adam Gordon, ITProTV

Episode #88 - Eddy Bobritsky, MinervaLabs

Episode #87 - Kevin Donovan, ObserveIT

Episode #86 - Security Threats from Virtual Machines

Episode #85 - Keith Hoodlet and Paul Asadoorian

Episode #84 - Brian Honan, BH Consulting

Episode #83 - Rami Essaid, Distil Networks

Episode #82 - Eyal Neemany, Javelin Netowrks

Episode #81 - Ferruh Mavituna, NetSparker

Episode #80 - Guy Franco, Javelin Networks

Episode #79 - Summer Fowler

Episode #78 - John Moran, DFLabs

Episode #77 - Lenny Zeltser, Minerva Labs

Episode #76 - Clayton Fields, Javelin Networks

Episode #75 - Marci McCarthy, CEO and President of T.E.N. & CEO and Chairman of ISE® Talent

Episode #74 - Patching Intel Vulnerabilities In The Enterprise

Episode #73 - All I want for Christmas is a Secure Active Directory

Episode #72 - Jeff Schilling, CSO of Armor

Episode #71 - James Wilkinson

Episode #70 - Ismael Valenzuela, SANS Institute

Episode #69 - Tony Kirtley, SecureWorks

Episode #68 - Logan Harris, SpotterRF

Episode #67 - Bryan Patton, Quest Software

Episode #66 - Richard Moulds, Whitewood Security

Episode #65 - Cloud Security (SaaS)

Episode #64 - Mary Chaney, ICMCP

Episode #63 - Network Security Architecture

Episode #62 - Equifax Breach Insights

Episode #61 - Tom Parker, Accenture

Episode #60 - Don Pezet, ITProTV

Episode #59 - Matt Alderman and Michael Santarcangelo

Episode #58 - Vulnerability Tracking & Reporting

Episode #57 - Mike Nichols, Endgame

Episode #56 - Security Policies and Procedures

Episode #55 - Ping Look, Optiv

Episode #54 - Thomas Fischer, Digital Guardian

Episode #53 - Ferruh Mavituna, Netsparker

Episode #52 - Hardening Your Network Using Egress Filtering with Doug White

Episode #51 - Docker Security, AWS Management with Apollo Clark

Episode #50 - Brian Ventura and Ted Gary

Episode #49 - Malware: Endpoint Defense

Episode #48 - Building an Internal Penetration Testing Team

Episode #47 - Corey Bodzin, Tenable

Episode #46 - Atif Ghauri, Herjavec Group

Episode #45 - April Wright and Matt Ploessel

Episode #44 - Ryan Hays, TBG Security

Episode #43 - Don Pezet, ITPro.TV

Episode #42 - Building a Bug Bounty Program

Episode #41 - Rami Essaid, Distil Networks

Episode #40 - Gabriel Gumbs, STEALTHbits

Episode #39 - How to handle a breach: public disclosure

Episode #38 - Configuration Management

Episode #37 - Michael Dalgleish, LogRhythm

Episode #36 - Don Pezet, ITPro.TV

Episode #35 - Chris Clymer, Jack Nichelson, and Jason Middaugh, InfoSec World

Episode #34 - Jim Routh, Aetna

Episode #33 - Rules for Security Vendors

Episode #32 - Lior Frenkel, Waterfall Security

Episode #31 - Matt Alderman, Tenable Security

Episode #30 - Jayne Groll & Alan Shimel, InfoSec World

Episode #29 - Zane Lackey, Signal Sciences

Episode #28 - Michael Santarcangelo, Cyber Insurance

Episode Guide Archive

2016

2016

ES_Episode27 - "John Strand, Black Hills Infosec"

ES_Episode26 - "Don Pezet, ITPro.TV"

ES_Episode25 - "Interview with Don Pezet, ITPro.TV"

ES_Episode24 - "Top 5 Defenses Against Penetration Testers (and attackers)"

ES_Episode23 - "An Open Source Enterprise Security Program?"

ES_Episode22 - "Incident Response In The Enterprise"

ES_Episode21 - "Using Bro In The Enterprise"

ES_Episode20 - "Multi-Factor Authentication"

ES_Episode19 - "Defending IoT Devices"

ES_Episode18 - "Darkweb Monitoring"

ES_Episode17 - "Security Training For Enterprises"

ES_Episode16 - "Privileged Alphabet Soup"

ES_Episode15 - "Documentation"

ES_Episode14 - Enterprise Security User Awareness Training

ES_Episode13 - To MSSP or not to MSSP, this is the question

ES_Episode12 - Guest: Paul Paget, CEO Pwnie Express - Detecting Rogue Devices In The Enterprise

ES_Episode11 - User Behavior Analytics

ES_Episode10 - Penetration Testing

ES_Episode9 - Securing the SDLC

ES_Episode8 - Securing "Air Gapped" Networks

ES_Episode7 - Web Application Scanning

ES_Episode6 - IDS/IPS

ES_Episode5 - "SEIM"

ES_Episode4 - Patch Management

ES_Episode3 - Vulnerability Management

ES_Episode2 - Threat Intelligence

ES_Episode1 - Threat Hunting