Episode622

From Paul's Security Weekly
Jump to: navigation, search

Recorded October 3, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Announcements

    • Register for one of our upcoming webcasts with Bryce Shroeder and Barbara Kay of ServiceNow, Kevin O'Brien of GreatHorn, or Steve Laubenstein of Core Security (or all of them!) by going to securityweekly.com -> Click the webcast dropdown & Select Registration! If you have missed any of our previously recorded webcasts, you can find our on-demand library by selecting on-demand from the webcast drop down! If you attend any of our webcasts, you will receive 1 CPE credit per webcast!
    • We're currently running our annual Listener Feedback Survey! Please visit securityweekly.com -> click the survey tab & select "2019 Listener Survey" to submit your responses!
    • The new Security Weekly website is officially live! Visit securityweekly.com to check out all of our new sorting and filtering functionality! Please let us know if you find any issues or have any feedback by sending to website@securityweekly.net
    • Paul will be providing his insights & predictions in the information & cyber security space at a local (ISC)2 RI Chapter Meeting on Monday, November 18th @ Gregg's Restaurant in Providence. If you would like to join us, go to securityweekly.com/isc2ri


    Security News - 6:00-6:30PM

    Paul's Stories

    1. American Express Insider Breaches Cardholder Information
    2. Turkey fines Facebook $282,000 over privacy breach
    3. FBI: Don't pay ransomware demands, stop encouraging cybercriminals
    4. WhatsApp Flaw Opens Android Devices to Remote Code Execution Attacks
    5. Measuring the Security of IoT Devices - Schneier on Security
    6. Good cybersecurity comes from focusing on the right things, but what are they? - Help Net Security
    7. Skylight Cyber | All Your Cloud Are Belong To Us (CVE-2019-12491)
    8. MITRE ATT&CK: Clipboard data
    9. 10 Cybersecurity Myths That Criminals Love
    10. Top 5 New Open Source Security Vulnerabilities in September 2019
    11. The Secret to CISO Success? Do This One Thing Extremely Well - Accellion

    Larry's Stories

    Lee's Stories

    1. Unfixable Jailbreak Exploit released iPhone X and prior vulnerable to exploit, physical access required. Fixed in iPhone 11.
    2. Doordash third-party breach hits 4.9M users Third party security is critical.
    3. "Bulletproof" Dark Web data center seized by German Police While the takedown is significant, services will likely move to alternate hosting sites.
    4. Ex-Yahoo Engineer Hacked accounts seeking Porn Ex-Yahoo Engineer cracked passwords, seeking credentials to access other services, porn, gaming, iTunes, etc.
    5. Microsoft blocks 38 more attachment types in Email These can be enabled by Exchange Admin. Include Python, PowerShell, Java and Certificate file typical extensions.
    6. O.MG Lightning Cable hits Prime Time The O.MG cable is hitting the shelves at Hak5 for $49.
    7. Fake browser Updates Infect Enterprises with Ransomware, Banking Trojans JavaScript popup indicating old browser, linked update is fake version. Payloads include Dridex, NetSupporter Manager RAT, AZOrult and Chthonic.
    8. Tax and PII records of 20 Million Russians stored without encryption, leaked online Records from 2009-2016 exposed online via exposed AWS instance. Ukrainian owner of AWS instance determined, unknown if hackers have leveraged the data.



    Interview: Stewart Room, PwC - 6:30 - 7:30PM

    Stewart Roomis a Partner of PwC.
    Stewart Room, CIPP/E, is a partner at PwC UK. He is the global leader of the cyber security and data protection legal services practice, the joint global leader of the multidisciplinary data protection practice, and the UK data protection practice leader. He has more than 25 years of experience as a Barrister and Solicitor, focusing for the majority of this time on data, technology and communications.

    Room specialises in the field of data protection. information management and cyber security, including programme design and delivery, the commercial exploitation of data, the security of data, regulatory investigations and litigation arising from the misuse of data. He is rated as a leading individual in data protection by legal directory Chambers UK, who says he "is the kind of lawyer who inspires confidence" and "he is an excellent, first-rate, tactical lawyer."

    He is one of the founding directors of Cyber Security Challenge UK (which forms part of the UK National Strategy for Cyber Security), the President of the National Association of Data Protection Officers and the editor of the Cyber Security Practitioner journal. Room has written a number of textbooks on information law and is regularly quoted in the press. He is a past winner of the Financial Times Innovative Lawyer of the Year award.

    Segment Topic:
    Data Privacy and The Journey to Code

    Segment Description:
    Security Professionals have long understood the need to deliver security outcomes in technology and data, but is the privacy community on the same page? Data Privacy requires outcomes for matters such as data accuracy, data minimisation and fair processing, as well as risks, such as portability and access. These outcomes need tech and data solutions. In this session we will examine The Journey to Code, the next evolutionary step for Data Privacy.

    Segment Resources:

    Security & Compliance Introduction - 7:30PM-8:30PM

    It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly. This show is hosted by: Jeff Man, Josh Marpet, and Scott Lyons

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+