From Security Weekly Wiki
Revision as of 13:55, 28 October 2019 by Matt (talk | contribs)
Jump to navigationJump to search

Recorded October 21, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting and clicking the button to join the list! You can also submit your suggestions for guests by going to and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Kevin O'Brien, GreatHorn

    Kevin O'Brien is the CEO & Co-Founder at GreatHorn

    Currently CEO and co-founder of email security company GreatHorn, Kevin O’Brien is a frequent speaker, commentator, and author that advises customers and the public on data security and privacy issues. With 20 years of deep cybersecurity expertise, most notably with CloudLock (Cisco), Conjur (CyberArk), and @stake (Symantec), Kevin also serves as co-chair for the Mass Technology Leadership Council’s cybersecurity group. Beyond security, he holds a black belt in the Japanese martial art of Aikido and is also an amateur wood worker.

    Segment Description:

    • Email Security

    Leadership Articles

    • Gartner: Of the 4 manager types, only 1 boosts employee performance 26% - There are four basic types of managers and their impacts on employee performance:
      • Teachers - 7-9% positive impact on employee performance
      • Cheerleaders - 7-9% positive impact on employee performance
      • Always on - degrade employee performance
      • Connectors - boost employee performance by 26%
    • How to become a CIO thought leader - Experts discuss how CIOs and IT leaders can utilize successful thought leadership to distinguish and promote either their companies or themselves.
    • Secrets of Success - How Divide and Conquer Strategy Generates efficiency to Systems and Boosts Productivity - The Divide and Conquer strategy is one of the most useful computer science algorithms that you can use in your daily life. The definition of Divide and Conquer Strategy classifies into two parts: First, to divide a big task into multiple smaller tasks, tackle each job individually. Second, use either one or combine those smaller tasks to reach the desired result. It's a successful strategy for the following life events:
      • Divide Learning based on Breath instead of Depth
      • Searching
    • How to Look and Sound Confident During a Presentation - Tips to wow the audience:
      • How to Look Confident
        • Make eye contact
        • Keep an open posture
        • Use gestures
      • How to Sound Confident
        • Eliminate filler words
        • Take time to pause
        • Vary your pace
    • 2020 IT spending priorities — and the traps a cloud shift creates - In 2020, on-premise software accounts for 22% of technology budgets, while 25% are dedicated to SaaS, IaaS and PaaS. However, more than half of companies plan to decrease on premise-software spend, while 80% expect to boost SaaS and public cloud investments. The coming investment arises from companies' top-three technology initiatives:
    1. digital transformation
    2. cybersecurity
    3. cloud adoption.
    • Failures must be expected in pursuit of digital innovation - Gartner surveyed 144 senior executives across industries and found that "digitalization misconceptions" tops the list of concerns, while "lagging digitalization" ranks second. Last quarter's top emerging risk, "pace of change," continues to rank high, as it has in four previous emerging risk reports. How ca organizations support digital innovation?
      • Think like a startup, including smaller teams and developing minimal viable products
      • Everyone must have 'permission to disrupt', especially executives

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+