ESWEpisode165

From Security Weekly Wiki
Revision as of 16:42, 13 January 2020 by Johnny (talk | contribs) (→‎Episode Audio)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Recorded December 11, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Jeff Man
    Cryptanalyst
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Enterprise News

    1. Booz Allen Hamilton announces support for AWS Outposts - Help Net Security
    2. Greenbone unveils new vulnerability management service platform for SMEs - Help Net Security
    3. Barracuda launches Cloud Security Guardian integration with Amazon Detective
    4. Sophos launches new cloud-based threat intelligence and analysis platform
    5. CyberGRX Completes $40M Series D Funding | FinSMEs
    6. Accenture Launches Cloud Native Solution to Help Clients Innovate New Products and Services Using the Public Cloud
    7. Cyberhaven raises $13 million, launches Data Behavior Analytics solution - Help Net Security
    8. Most enterprises hit cloud migration problems, still run apps on legacy operating systems - Help Net Security
    9. 10 Notable Cybersecurity Acquisitions of 2019, Part 2
    10. STEALTHbits launches Privileged Activity Manager with zero standing privilege architecture - Help Net Security


    Interview: James Carder, LogRhythm

    James Carder is the Chief Security Officer (CSO) and Vice President at LogRhythm

    James Carder brings more than 22 years of experience working in corporate security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he oversees the company’s governance, risk, and compliance program, security architecture, awareness, product security, physical security, and security operations. He also directs the LogRhythm Labs strategic integrations, threat and compliance research teams.

    He holds an MBA from the University of Minnesota, is an Advisory Board member for Colorado University, the Identity Defined Security Alliance, and New Cloud Networks, and a member of the Forbes Technology Council.

    Segment Topic:
    Measuring and maturing security operations maturity

    Segment Description:
    Overview of our security operations maturity model (SOMM), discussion around measurement and road-map to advancing your organization's maturity level. What are mature organizations measuring, who are they reporting that to, what key uses cases are on the roadmap, etc.

    • SECURITY OPERATIONS MATURITY MODEL (SOMM)
    • SOMM AND ZERO TRUST
    • TRUE UNLIMITED DATA PLAN
    • SECURITY PREDICTIONS


    Interview: Jamie Butler, Elastic

    Jamie Butler
    is the Tech Lead at Elastic.

    Jamie Butler is the Technology Lead at Elastic Security, He was formerly the Chief Technology Officer at Endgame, where he led Endgame’s engineering, product, and research teams.

    Jamie was a computer scientist at the National Security Agency and co-authored the bestseller, "Rootkits: Subverting the Windows Kernel." He is also a frequent speaker at security conferences and serves as a Review Board member for Black Hat.

    Segment Topic:
    Improving security requires reducing complexity

    Segment Description:
    The vast majority of breaches are not launched by nation states or foreign militaries, but individuals and cyber crime groups with varying degrees of experience, often looking for weaknesses in enterprise systems or processes. One of the primary reasons these actors are successful is the complex web of technologies deployed across enterprise networks by defenders in the search for a security panacea that does not exist. This discussion will focus on ways an organization can reduce complexity and improve security efficiency and scale.