Difference between revisions of "BSWEpisode145"

From Security Weekly Wiki
Jump to navigationJump to search
 
Line 3: Line 3:
 
== Episode Audio ==
 
== Episode Audio ==
  
<!--<div align="center">
+
<div align="center">
 
{{#widget:SoundCloud
 
{{#widget:SoundCloud
|id=543346953
+
|id=690162028
 
|width=75%
 
|width=75%
 
|height=100
 
|height=100
Line 12: Line 12:
 
}}
 
}}
 
</div>
 
</div>
-->
+
 
 
== Hosts ==
 
== Hosts ==
 
{{Template:Matt}}
 
{{Template:Matt}}

Latest revision as of 17:40, 19 November 2019

Recorded September 30, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Jeff Costlow, ExtraHop

    Jeff Costlow is the Head of Security at ExtraHop

    Jeff is a security technologist and leader with over 20 years of deep experience securing information and technology assets as well as years of successful engineering leadership, delivering secure product deployments to thousands of customers. Jeff leads the ExtraHop team towards groundbreaking security and privacy services.

    Segment Description:
    Organizations looking to embrace the speed and flexibility of the cloud need to shift gears in security as well, moving towards a cloud-first approach that combines complete visibility with behavioral- and- rule-based threat detection. Learn how the SOC Visibility Triad pairs network detection and response with endpoint detection and response and SIEM tools in order to help you strengthen your cloud security posture.

    Segment Resources:


    Leadership Articles

    • Why New Leaders Should Make Decisions Slowly - 74% of new leaders say they are unprepared for the new role, and in 18 months nearly half of them disappoint or fail entirely. In many cases, leaders either judge too quickly, making snap decisions that prove to be ill advised, or wait interminably to “gather more facts,” only for the critical moment to slip away. Here are three strategies leaders can use to make decisions more effectively when they’re new to an organization
    1. Manage the urge to “do something” right away.
    2. Make sure you’re talking to a wide variety of sources.
    3. Select one critical area of focus for the year.
    • The Missing Ingredient in Kraft Heinz’s Restructuring - There has been a company restructuring recipe that has worked for decades. Buy a company, trim the fat, then reinvest to facilitate growth, and make lots of money. But sometimes this recipe doesn’t work... Three lessons from Kraft Heinzs' restructuring:
    1. When Restructuring Kills Innovation
    2. Calming the Overheated Survive Channel
    3. Activating the Thrive Channel
    1. More than 60% of business stakeholders believe IT implements less than half of their ideas, widening the disconnect between the departments
    2. Half of IT respondents say their budgets are too limited to deliver "solutions at scale"
    3. 89% of stakeholders say IT plays a key role in business initiatives, but only 66% of business technology decision-makers "think of IT as a value-creator."
    1. Digital business is where CEOs want to move their companies, but they have to recognize, "if we're digital, it's not only huge risk, it's complex risk"
    2. About 82% of CEOs say they have some form of a management initiative or program in place for handling the digital business, according to Gartner. "What they don't get is associated risk."
    3. Developing a "risk-aware" culture means deciphering the difference between digital business risk and cyber risk
    • Introduction to 5G: Your guide to fifth-generation wireless - Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks. Anticipated 5G benefits include increased speeds, improved reliability and lower latency. 5G use cases include:
      • Fixed wireless for better business connectivity
      • Private 5G networks
      • Expanded 5G coverage for rural areas



    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+