Difference between revisions of "ES Episode148"

From Paul's Security Weekly
Jump to: navigation, search
(Interview: Mehul Revankar, SaltStack)
Line 28: Line 28:
 
<br>
 
<br>
  
= Interview: Mehul Revankar, [https://securityweekly.com/saltstack SaltStack] =
+
= Interview: John Smith, [https://securityweekly.com/extrahop ExtraHop] =
[[File:MehulRevankar.jpg|thumb|right|<center>[https://twitter.com/mehulrevankar Mehul Revankar] is the Sr. Product Manager at [https://securityweekly.com/saltstack SaltStack]</center>]] Mehul is a Sr. Product Manager for security at SaltStack where he is responsible for building solutions that help Salt users secure their infrastructure across cloud, on-prem, hybrid and now IoT platforms. Before joining SaltStack, Mehul led multiple research teams across Vulnerability Management, Policy Compliance and Asset detection at Tenable.<br><br>'''Segment Topic:'''<br> The Sec & Ops challenge<br><br>'''Segment Description:'''<br> IT operations and security teams are very different, but at a high level they both work to  create a highly available digital infrastructure that’s secure and compliant with regulatory standards. Achieving this goal is easier said than done for most organizations. SaltStack is bringing new solution to market to solve this well know but unique problem.
+
[[File:JohnSmith.jpg|thumb|right|<center>[https://www.linkedin.com/in/jmsazboy John Smith] is the Principal Sales Engineer, Security at [https://securityweekly.com/extrahop ExtraHop]</center>]] I have over 21 years of experience in IT the last 17 in a Sr. Architect level role. While I refuse to use the term "thought leader" but I have fortunate enough to be a selected speaker at several conferences including Briforum (twice), Citrix Synergy (3x) as well as RSAC 2017 and 2 different B-Sides events in the last four years. My background is as a generalist but has swung back into Security in the last 8 years giving me over ten years of Cyber Security Experience. In 2010 I was awarded Citrix Technology Professional (CTP) by Citrix Systems and currently maintain two blogs [http://wiredata.net and http://edgesightunderthehood.com  http://wiredata.net and http://edgesightunderthehood.com].<br>I have extensive training and mentoring experience including two years as an adjunct instructor and over a dozen years of mentoring younger engineers. I have also functioned in a supervisory role either as a technical manager or team lead for over ten years including handling HR related issues, writing evaluations and assisting with career planning. <br><br>'''Segment Description:'''<br> Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.
 
<br>
 
<br>
  

Revision as of 15:16, 12 August 2019

Recorded August 14, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Strand
    Security analyst, Founder of Black Hills Information Security, and CTO of Offensive Countermeasures.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Enterprise News

    Template:ESWPaul148

    Interview: John Smith, ExtraHop

    John Smith is the Principal Sales Engineer, Security at ExtraHop
    I have over 21 years of experience in IT the last 17 in a Sr. Architect level role. While I refuse to use the term "thought leader" but I have fortunate enough to be a selected speaker at several conferences including Briforum (twice), Citrix Synergy (3x) as well as RSAC 2017 and 2 different B-Sides events in the last four years. My background is as a generalist but has swung back into Security in the last 8 years giving me over ten years of Cyber Security Experience. In 2010 I was awarded Citrix Technology Professional (CTP) by Citrix Systems and currently maintain two blogs and http://edgesightunderthehood.com http://wiredata.net and http://edgesightunderthehood.com.
    I have extensive training and mentoring experience including two years as an adjunct instructor and over a dozen years of mentoring younger engineers. I have also functioned in a supervisory role either as a technical manager or team lead for over ten years including handling HR related issues, writing evaluations and assisting with career planning.

    Segment Description:
    Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.


    Interview: