From Security Weekly Wiki
Revision as of 14:11, 11 November 2019 by Matt (talk | contribs)
Jump to navigationJump to search

Recorded November 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Mike Shema
    is the Product Security Lead of Square.

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting and clicking the button to join the list! You can also submit your suggestions for guests by going to and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Brendon Macareg, Signal Sciences

    Brendon Macareg
    is the Sr. Director of Product Marketing of Signal Sciences.

    Brendon Macareg leads product marketing for Signal Sciences, which protects the web presence of the world's leading brands. Prior to Signal Sciences, Brendon led product marketing for CrowdStrike Services, the incident response and professional services division of CrowdStrike Inc. Prior to CrowdStrike, Brendon spent several years at Symantec leading product marketing efforts for both the Norton consumer brand of information security products and Symantec's enterprise mobility and endpoint management solutions. Prior to Symantec, Brendon managed online product development across a variety of verticals from event ticketing to travel and consumer-facing technology companies.

    Segment Topic:
    Developing an Effective AppSec Security Program

    Segment Description:
    Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover:

    • Prioritize visibility into the most critical attack types
    • Develop appsec metrics and KPIs
    • Methods to prompt safe coding by default
    • How to be your org's security champion

    Leadership Articles

    • 5 questions with Cisco's CISO - There is no easy answer for securing a global workforce of 75,000+ employees, including Cisco. Steve Martino, SVP and CISO at Cisco, discusses how to protect a distributed remote workforce without compromising the integrity of a secure network. The interview focuses around 5 questions:
      • What kind of pressure is Cisco facing with securing products and working with cross-company teams?
      • How do you prepare an organization for the inevitable — that bad events are going to happen? How do you insure against that with different stakeholders, whether that's customers, shareholders or even just internal business units?
      • How did your security strategy at Cisco take shape and what were your priorities when you started? How have they evolved over time?
      • What was the process of implementing technology to make remote work viable? What was the timeline? And what were the perceived vs. real risks you dealt with implementing it across such a large workforce?
      • What keeps you up at night in terms of security and threats, and how do you see those evolving?
    • The CIO role, from IT operator to business strategist - The CIO position has changed dramatically since its inception 40 years ago. This in-depth review traces the job's evolution and explains what is required of the CIO role today, including:
      • CIO role in driving digital transformation today
      • Qualities of high-performing CIOs
      • How does the CIO role differ from other technology roles in the C-suite?
      • What's next for the CIO?
    • Less than one-quarter of companies are innovation leaders, report says - Less than one-quarter of organizations "qualify" as innovation leaders, according to a Harvard Business Review Services survey of more than 1,000 executives across industries 1,000 international consumers.
    • Making the case for integrated risk management - Security experts discuss how an integrated approach to risk and governance can be effectively managed
    • Gartner: The time is right to make IT a boardroom issue - In many businesses, IT is regarded as an internal service provider and cost centre. Gartner says now is the best time for CIOs to make IT strategic
    • Gartner's strategic tech trends for 2020: Part 1, augmenting skills - Here are the "people-centric" advancements IT decisions makers need to follow:
    1. Hyperautomation
    2. Multiexperience
    3. Democratization
    4. Human augmentation
    5. Transparency and traceability
    1. Empowered edge
    2. Distributed cloud
    3. Autonomous things
    4. Practical blockchain
    5. AI security