Difference between revisions of "BSWEpisode130"

From Security Weekly Wiki
Jump to navigationJump to search
(Created page with "''Recorded June 3, 2019 at G-Unit Studios in Rhode Island!'' == Episode Audio == <!--<div align="center"> {{#widget:SoundCloud |id=543346953 |width=75% |height=100 |color=66...")
 
 
(8 intermediate revisions by 2 users not shown)
Line 3: Line 3:
 
== Episode Audio ==
 
== Episode Audio ==
  
<!--<div align="center">
+
<div align="center">
 
{{#widget:SoundCloud
 
{{#widget:SoundCloud
|id=543346953
+
|id=632019819
 
|width=75%
 
|width=75%
 
|height=100
 
|height=100
Line 12: Line 12:
 
}}
 
}}
 
</div>
 
</div>
-->
+
 
 
== Hosts ==
 
== Hosts ==
 
{{Template:Matt}}
 
{{Template:Matt}}
 
{{Template:Paul}}
 
{{Template:Paul}}
 +
{{Template:JasonA}}
 
<br>
 
<br>
  
 
== Announcements ==
 
== Announcements ==
* John Strand will be teaching Active Defense and Cyber Deception at Black Hat 2019.  Please register here!  Register Now @ [https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124].<br><br>
+
{{Template:Announcements}}
*We just released our 2019 Security Weekly 25 Index Survey. Please go to [https://securityweekly.com securityweekly.com] and click the Survey link to help us understand who's evaluating, using, or formerly used any of the Security Weekly 25 companies. The results will be summarized and presented back to all responders in a private webcast.
+
<br>
 +
 
 +
= Interview: John McCumber, [https://securityweekly.com/isc2 (ISC)2] =
 +
[[File:JohnMcCumber.jpg|thumb|<center>[https://www.isc2.org/Research/Workforce-Study John McCumber] is the Director, Cybersecurity Advocacy at [https://securityweekly.com/isc2 (ISC)2]</center>]] McCumber is the Director of Cybersecurity Advocacy, North America, for (ISC)2. In this newly established role, John represents (ISC)2’s 125,000+ members as their spokesperson for the profession of cybersecurity. His duties require him to work with legislators on Capitol Hill and provide strategic input to national and international committees on critical cybersecurity issues. John is a retired U.S. Air Force officer and former Cryptologic Fellow of the National Security Agency. During his military career, John served in the Defense Information Systems Agency and on the Joint Staff at the Pentagon as information warfare officer during the Persian Gulf War. He was appointed a Fellow of (ISC)2 in 2016, an honor that recognizes elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession. Before joining (ISC)2, John held information security consulting roles with Gartner and Symantec. He also served as chair of the TechAmerica Cybersecurity Committee, and was appointed an interim CISO for a post-breach federal contractor. John has been a professorial lecturer in information security at The George Washington University in Washington, D.C. and is currently technical editor and columnist for Security Technology Executive magazine. John is the author of the textbook Assessing and Managing Security Risk in IT Systems: a Structured Methodology from Auerbach Publications.<br><br>Topic: John will cover the statistics behind the cybersecurity workforce gap, and explain why what we perceive anecdotally isn't what we see in the media. Learn what is really taking place in cybersecurity hiring, training, and education. Find new opportunities in this data for your personal career growth.<br><center>{{#ev:youtube|-wLzbbgvrUM}}</center>
 
<br>
 
<br>
  
 
= Interview: Andrew Hollister, [https://securityweekly.com/logrhythm LogRhythm] =
 
= Interview: Andrew Hollister, [https://securityweekly.com/logrhythm LogRhythm] =
[[File:AndrewHollister.jpeg|thumb|<center>[https://logrhythm.com/person/andrew-hollister/ Andrew Hollister] is the Chief Architect & Product Manager at [https://securityweekly.com/logrhythm LogRhythm]</center>]] Andrew Hollister is Chief Architect and Product Manager of LogRhythm Labs at LogRhythm. With over 20 years of experience, he has worked both in the private and public sectors, and he has held a variety of security roles, including those focused on SIEM, DLP, and application-level firewall design and implementation. Driven by his passion for machine analytics, Andrew initially joined the LogRhythm team in 2012 to help mature AI Engine. He now works closely with LogRhythm’s executive leadership and product management teams to steer broader product strategy.
+
[[File:AndrewHollister.jpg|thumb|<center>[https://logrhythm.com/person/andrew-hollister/ Andrew Hollister] is the Chief Architect & Product Manager at [https://securityweekly.com/logrhythm LogRhythm]</center>]] Andrew Hollister is Chief Architect and Product Manager of LogRhythm Labs at LogRhythm. With over 20 years of experience, he has worked both in the private and public sectors, and he has held a variety of security roles, including those focused on SIEM, DLP, and application-level firewall design and implementation. Driven by his passion for machine analytics, Andrew initially joined the LogRhythm team in 2012 to help mature AI Engine. He now works closely with LogRhythm’s executive leadership and product management teams to steer broader product strategy.<br><center>{{#ev:youtube|W1HY9Zsu7vc}}</center>
 
<br>
 
<br>
 
= Leadership Articles =
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
 
 
<br><br>
 
 
  
 
{{Template:SocialMedia}}
 
{{Template:SocialMedia}}

Latest revision as of 13:54, 10 July 2019

Recorded June 3, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: John McCumber, (ISC)2

    John McCumber is the Director, Cybersecurity Advocacy at (ISC)2

    McCumber is the Director of Cybersecurity Advocacy, North America, for (ISC)2. In this newly established role, John represents (ISC)2’s 125,000+ members as their spokesperson for the profession of cybersecurity. His duties require him to work with legislators on Capitol Hill and provide strategic input to national and international committees on critical cybersecurity issues. John is a retired U.S. Air Force officer and former Cryptologic Fellow of the National Security Agency. During his military career, John served in the Defense Information Systems Agency and on the Joint Staff at the Pentagon as information warfare officer during the Persian Gulf War. He was appointed a Fellow of (ISC)2 in 2016, an honor that recognizes elite information security professionals who have made outstanding contributions, throughout their careers, to the information security profession. Before joining (ISC)2, John held information security consulting roles with Gartner and Symantec. He also served as chair of the TechAmerica Cybersecurity Committee, and was appointed an interim CISO for a post-breach federal contractor. John has been a professorial lecturer in information security at The George Washington University in Washington, D.C. and is currently technical editor and columnist for Security Technology Executive magazine. John is the author of the textbook Assessing and Managing Security Risk in IT Systems: a Structured Methodology from Auerbach Publications.

    Topic: John will cover the statistics behind the cybersecurity workforce gap, and explain why what we perceive anecdotally isn't what we see in the media. Learn what is really taking place in cybersecurity hiring, training, and education. Find new opportunities in this data for your personal career growth.


    Interview: Andrew Hollister, LogRhythm

    Andrew Hollister is the Chief Architect & Product Manager at LogRhythm

    Andrew Hollister is Chief Architect and Product Manager of LogRhythm Labs at LogRhythm. With over 20 years of experience, he has worked both in the private and public sectors, and he has held a variety of security roles, including those focused on SIEM, DLP, and application-level firewall design and implementation. Driven by his passion for machine analytics, Andrew initially joined the LogRhythm team in 2012 to help mature AI Engine. He now works closely with LogRhythm’s executive leadership and product management teams to steer broader product strategy.



    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+