Difference between revisions of "BSWEpisode151"

From Security Weekly Wiki
Jump to navigationJump to search
 
(5 intermediate revisions by 2 users not shown)
Line 3: Line 3:
 
== Episode Audio ==
 
== Episode Audio ==
  
<!--<div align="center">
+
<div align="center">
 
{{#widget:SoundCloud
 
{{#widget:SoundCloud
|id=543346953
+
|id=711589879
 
|width=75%
 
|width=75%
 
|height=100
 
|height=100
Line 12: Line 12:
 
}}
 
}}
 
</div>
 
</div>
-->
+
 
 
== Hosts ==
 
== Hosts ==
 
{{Template:Matt}}
 
{{Template:Matt}}
{{Template:Paul}}
+
{{Template:Kinsella}}
{{Template:JasonA}}
+
{{Template:Shima}}
 
<br>
 
<br>
  
Line 23: Line 23:
 
<br>
 
<br>
  
= Interview: Brendon Macareg, [https://securityweekly.com/signalsciences Signal Sciences] =
+
= Interview: Brendon Macaraeg, [https://securityweekly.com/signalsciences Signal Sciences] =
[[File:BrendonMacareg.jpg|right|220px|thumb|<center>'''[https://securityweekly.com/signalsciences Brendon Macareg]'''<br> is the Cloud Chief Information Security Officer of [https://securityweekly.com/signalsciences Signal Sciences].</center>]] Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at UK defense and security company BAE Systems. Henry’s previous ventures include a desktop videoconferencing startup, and he has been responsible for developing and selling advanced electronics solutions into governments, telecommunications companies and financial services organizations amongst other sectors.<br><br>'''Segment Topic:'''<br>Developing an Effective AppSec Security Program<br><br>'''Segment Description:'''<br>Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover:
+
[[File:BrendonMacareg.jpg|right|220px|thumb|<center>'''[https://securityweekly.com/signalsciences Brendon Macaraeg]'''<br> is the Sr. Director of Product Marketing of [https://securityweekly.com/signalsciences Signal Sciences].</center>]] Brendon Macareg leads product marketing for Signal Sciences, which protects the web presence of the world's leading brands. Prior to Signal Sciences, Brendon led product marketing for CrowdStrike Services, the incident response and professional services division of CrowdStrike Inc. Prior to CrowdStrike, Brendon spent several years at Symantec leading product marketing efforts for both the Norton consumer brand of information security products and Symantec's enterprise mobility and endpoint management solutions. Prior to Symantec, Brendon managed online product development across a variety of verticals from event ticketing to travel and consumer-facing technology companies.<br><br>'''Segment Topic:'''<br>Developing an Effective AppSec Security Program<br><br>'''Segment Description:'''<br>Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover:
 
* Prioritize visibility into the most critical attack types
 
* Prioritize visibility into the most critical attack types
  
Line 36: Line 36:
 
= Leadership Articles =
 
= Leadership Articles =
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
 
<!--<center>{{#ev:youtube|Rr3VkFPCT44}}</center>-->
 +
* [https://www.ciodive.com/news/5-questions-with-ciscos-ciso/566408/ 5 questions with Cisco's CISO] - There is no easy answer for securing a global workforce of 75,000+ employees, including Cisco.  Steve Martino, SVP and CISO at Cisco, discusses how to protect a distributed remote workforce without compromising the integrity of a secure network.  The interview focuses around 5 questions:
 +
** What kind of pressure is Cisco facing with securing products and working with cross-company teams?
 +
** How do you prepare an organization for the inevitable — that bad events are going to happen? How do you insure against that with different stakeholders, whether that's customers, shareholders or even just internal business units?
 +
** How did your security strategy at Cisco take shape and what were your priorities when you started? How have they evolved over time?
 +
** What was the process of implementing technology to make remote work viable? What was the timeline? And what were the perceived vs. real risks you dealt with implementing it across such a large workforce?
 +
** What keeps you up at night in terms of security and threats, and how do you see those evolving?
 +
* [https://searchcio.techtarget.com/cio-role The CIO role, from IT operator to business strategist] - The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today, including:
 +
** CIO role in driving digital transformation today
 +
** Qualities of high-performing CIOs
 +
** How does the CIO role differ from other technology roles in the C-suite?
 +
** What's next for the CIO?
 +
* [https://www.ciodive.com/news/less-than-one-quarter-of-companies-are-innovation-leaders-report-says/566583/ Less than one-quarter of companies are innovation leaders, report says] - Less than one-quarter of organizations "qualify" as innovation leaders, according to a Harvard Business Review Services survey of more than 1,000 executives across industries 1,000 international consumers.
 +
* [https://www.computerweekly.com/feature/Making-the-case-for-integrated-risk-management Making the case for integrated risk management] - Security experts discuss how an integrated approach to risk and governance can be effectively managed
 +
* [https://www.computerweekly.com/news/252473394/Gartner-The-time-is-right-to-make-IT-a-boardroom-issue Gartner: The time is right to make IT a boardroom issue] - In many businesses, IT is regarded as an internal service provider and cost centre. Gartner says now is the best time for CIOs to make IT strategic
 +
* [https://www.ciodive.com/news/gartner-tech-trends-2020-automation-multiexperience-democratization/565876/ Gartner's strategic tech trends for 2020: Part 1, augmenting skills] - Here are the "people-centric" advancements IT decisions makers need to follow:
 +
# Hyperautomation
 +
# Multiexperience
 +
# Democratization
 +
# Human augmentation
 +
# Transparency and traceability
 +
* [https://www.ciodive.com/news/gartner-tech-trends-edge-cloud-blockchain/566490/ Gartner's strategic tech trends for 2020: Part 2, computing moves to the edge] - Here are the advancements in technology IT decision makers need to watch out for:
 +
# Empowered edge
 +
# Distributed cloud
 +
# Autonomous things
 +
# Practical blockchain
 +
# AI security
  
 
<br>
 
<br>
 
{{Template:SocialMedia}}
 
{{Template:SocialMedia}}

Latest revision as of 17:50, 19 November 2019

Recorded November 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Mike Shema
    is the Product Security Lead of Square.

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Brendon Macaraeg, Signal Sciences

    Brendon Macaraeg
    is the Sr. Director of Product Marketing of Signal Sciences.

    Brendon Macareg leads product marketing for Signal Sciences, which protects the web presence of the world's leading brands. Prior to Signal Sciences, Brendon led product marketing for CrowdStrike Services, the incident response and professional services division of CrowdStrike Inc. Prior to CrowdStrike, Brendon spent several years at Symantec leading product marketing efforts for both the Norton consumer brand of information security products and Symantec's enterprise mobility and endpoint management solutions. Prior to Symantec, Brendon managed online product development across a variety of verticals from event ticketing to travel and consumer-facing technology companies.

    Segment Topic:
    Developing an Effective AppSec Security Program

    Segment Description:
    Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover:

    • Prioritize visibility into the most critical attack types
    • Develop appsec metrics and KPIs
    • Methods to prompt safe coding by default
    • How to be your org's security champion


    Leadership Articles

    • 5 questions with Cisco's CISO - There is no easy answer for securing a global workforce of 75,000+ employees, including Cisco. Steve Martino, SVP and CISO at Cisco, discusses how to protect a distributed remote workforce without compromising the integrity of a secure network. The interview focuses around 5 questions:
      • What kind of pressure is Cisco facing with securing products and working with cross-company teams?
      • How do you prepare an organization for the inevitable — that bad events are going to happen? How do you insure against that with different stakeholders, whether that's customers, shareholders or even just internal business units?
      • How did your security strategy at Cisco take shape and what were your priorities when you started? How have they evolved over time?
      • What was the process of implementing technology to make remote work viable? What was the timeline? And what were the perceived vs. real risks you dealt with implementing it across such a large workforce?
      • What keeps you up at night in terms of security and threats, and how do you see those evolving?
    • The CIO role, from IT operator to business strategist - The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today, including:
      • CIO role in driving digital transformation today
      • Qualities of high-performing CIOs
      • How does the CIO role differ from other technology roles in the C-suite?
      • What's next for the CIO?
    • Less than one-quarter of companies are innovation leaders, report says - Less than one-quarter of organizations "qualify" as innovation leaders, according to a Harvard Business Review Services survey of more than 1,000 executives across industries 1,000 international consumers.
    • Making the case for integrated risk management - Security experts discuss how an integrated approach to risk and governance can be effectively managed
    • Gartner: The time is right to make IT a boardroom issue - In many businesses, IT is regarded as an internal service provider and cost centre. Gartner says now is the best time for CIOs to make IT strategic
    • Gartner's strategic tech trends for 2020: Part 1, augmenting skills - Here are the "people-centric" advancements IT decisions makers need to follow:
    1. Hyperautomation
    2. Multiexperience
    3. Democratization
    4. Human augmentation
    5. Transparency and traceability
    1. Empowered edge
    2. Distributed cloud
    3. Autonomous things
    4. Practical blockchain
    5. AI security


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+