From Security Weekly Wiki
Revision as of 14:58, 20 November 2019 by Johnny (talk | contribs) (→‎Episode Audio)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Recorded November 18, 2019 at G-Unit Studios in Rhode Island!

Episode Audio


  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting and clicking the button to join the list! You can also submit your suggestions for guests by going to and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Scott Petry, Authentic8

    Scott Petry
    is the CEO of Authentic8.

    Scott Petry has been using the cloud to disrupt the information security market for nearly 20 years. He founded Postini in 1999, which pioneered the cloud-delivered service model for email security and content compliance. After Postini was acquired by Google, Scott remained as Director of Product Management for Google Enterprise. In 2010, he co-founded Authentic8, a secure virtual browser solution designed to address the inherent lack of security in the protocols the world uses to access the web. He graduated with a B.S. from San Diego State University.

    Segment Topic:
    Challenges with the browser and securing web sessions.

    Leadership Articles

    1. 71% said that their organization uses their security posture as a selling point, despite their lack of confidence in the security stack.
    2. 34% percent of CISOs said that they were only somewhat or slightly confident their organization’s final choice of security solutions.
    3. Only 17% of those questioned said that the array of technology making up their security stack was completely effective.
    • Why Your Organization Needs an Innovation Ecosystem - The Bosch Accelerator Program provides a structured way for internal innovation teams to systematically validate the viability of their business ideas. Here's how it works:
      • Leaders and innovation managers select cohorts of 25-30 teams from all over the world that work together for 6-12 months.
      • Teams receive an initial funding of approximately €120,000 and get three months to test whether their business-model ideas could scale.
      • Depending on the results, teams can obtain an additional budget of €300,000 or more.
    • How businesses can accelerate innovation - To compete in the digital age, businesses will need to work quicker, partner where appropriate and upskill staff.
    • How To Get More Out Of Your Team
    • The Highest Performing Teams Have These 4 Mindsets - High performance teams are defined by four key mindsets:
    1. Teams Need Clarity Above All Else
    2. Teams Embrace Conflict in Order to Grow
    3. Teams Thrive on Trust
    4. High Performance Teams Lead Themselves

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+