- 1 Paul's Security Weekly Episode 641 - 2020-02-24
- 2 News - Cool Things We Found At RSAC 2020
- 3 Interview: Protect Ya Data - 6:00-6:45PM
- 4 Interview: Tales From The Crypt...Analyst - 6:00-6:45PM
- 5 Fullaudio - None
Paul's Security Weekly Episode 641 - 2020-02-24
- Is your Open Source code secure? Learn how to verify your code during development, not after the build in our next webcast with Synopsys. Register for our upcoming webcasts or virtual trainings by visiting securityweekly.com/webcasts. You can also access our on-demand library of previously recorded webcasts/trainings by visiting securityweekly.com/ondemand. Each webcast will earn you 1 CPE credit that we will submit on your behalf if you provide your ISC2 number.
- Join us at InfoSecWorld 2020 - June 22nd-24th at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
News - Cool Things We Found At RSAC 2020
- Kuberenetes - Lots of talk about securing Kuberenetes. - Fuzzbuzz - Unit testing and fuzzing applied to security, found a startup doing it! - CyCognito - Cool stuff, especially the image tracing. - Cool startup we want to bring on the show called Isovalant. - We learned a little about eBPF, its not a kernel module, its part of the code itself. It provides you with more than just network data and cilium is a tecnology that allows you to access eBFP. - Sysmon is really cool and to the point where you don't need to rely on an endpoint EDR to get information about Windows systems. - There was a cool company Threatlocker, doing a briefing to get more, but they can protect applications on Windows systems with some unique whitelisting, prevent process injection. - You could apply these to protect Sysmon
Jeff Man's Content:
Matt Alderman's Content:
Paul Asadoorian's Content:
Interview: Protect Ya Data - 6:00-6:45PM
|Gabriel Gumbs is the VP of Product Management at Spirion where his focus is on the strategy and technology propelling Spirion’s rapidly-growing security platform. A cybersecurity industry veteran with a 19 year tenure in CyberSecurity, he has spent much of that time as a security practitioner, aligning security innovations with business objectives for Fortune 100 organizations. Gabriel is an information security thought leader, privacy advocate and public speaker.|
Interview: Tales From The Crypt...Analyst - 6:00-6:45PM
|Respected Information Security advocate, advisor, evangelist, international speaker, keynoter, host of Security & Compliance Weekly, co-host on Paul's Security Weekly, Tribe of Hackers, TOH Red Team, and currently serving in a Consulting/Advisory role for Online Business Systems. Nearly 40 years of experience working in all aspects of computer, network, and information security, including cryptography, risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. Certified NSA Cryptanalyst. Previously held security research, management and product development roles with the National Security Agency, the DoD and private-sector enterprises and was part of the first penetration testing "red team" at NSA. For the past twenty years, has been a pen tester, security architect, consultant, QSA, and PCI SME, providing consulting and advisory services to many of the nation's best known companies.|
Fullaudio - None