ES Episode148

From Paul's Security Weekly
Jump to: navigation, search

Recorded August 14, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor
  • Annoucements:

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • We're currently running our annual Listener Feedback Survey! Please visit securityweekly.com -> click the survey tab & select "2019 Listener Survey" to submit your responses!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Mark your calendars for our Security Weekly Holiday Extravaganza! On December 19th, Security Weekly will be live-streaming 5 one hour panel discussions with some of the most knowledgable professionals in the industry! To round out the evening, Ed Skoudis will be joining the Security Weekly hosts to give his annual announcement about the CounterHack Holiday Hack Challenge! You can view the live stream on our Youtube channel or by visiting securityweekly.com/live. We hope to see you there!


    Interview: John Smith, ExtraHop

    John Smith is the Principal Sales Engineer, Security at ExtraHop
    I have over 21 years of experience in IT the last 17 in a Sr. Architect level role. While I refuse to use the term "thought leader" but I have fortunate enough to be a selected speaker at several conferences including Briforum (twice), Citrix Synergy (3x) as well as RSAC 2017 and 2 different B-Sides events in the last four years. My background is as a generalist but has swung back into Security in the last 8 years giving me over ten years of Cyber Security Experience. In 2010 I was awarded Citrix Technology Professional (CTP) by Citrix Systems and currently maintain two blogs and http://edgesightunderthehood.com http://wiredata.net and http://edgesightunderthehood.com.
    I have extensive training and mentoring experience including two years as an adjunct instructor and over a dozen years of mentoring younger engineers. I have also functioned in a supervisory role either as a technical manager or team lead for over ten years including handling HR related issues, writing evaluations and assisting with career planning.

    Segment Description:
    Network Detection & Response (NDR) as a critical component of cloud-first security, both because of the need for east-west visibility across cloud and on-premises assets, and because combining behavioral-based threat detection with signature-based detection gives organizations a better chance of discovering threats quickly enough (and with enough context) to mitigate the damage.


    Interview: Joe Gillespie, Netsparker

    Joe Gillespie is the Enterprise Account Executive at Netsparker


    Segment Topic:
    Managing Vulnerabilities in the Enterprise

    Segment Description
    Managing verbalities sin the Enterprise is more than how many assets can you scan but how do you manage the issues that you discover.
    • Usability – Software that is easy to use even for non - security personnel
    1. Easy to use tool
    2. Fast deployment, quickly operational
    3. intuitive UI and workflow.
    • Discovery
    1. What assets do I have that I need to secure?
    • Accuracy – Accuracy ensures acceptance and reduces manual checking
    1. accuracy of the scanner
    2. lack of false positives
    3. coverage


    • Integration – Integrating with other tools as part of the process (Issue tracking, CI )
    1. Integration with other tools such as issue tracking, CI, risk management, , SSO, messaging
    2. API - open and documented, allows for easy integration
    3. SDLC Process workflow
    • Automation – Automation enables the management of large numbers of vulnerabilities
    1. Workflows that simplify and automate processes
    2. Synchronization with Issue tracking (updating both sides of the process)
    3. Automate notifications of activities
    4. Automated retesting of vulnerabilities
    • Resolution – Tracking results and remediation progress
    1. Reporting
    2. Data insights
    3. Data management


    Interview: Brandon Edwards, Capsule8

    Brandon Edwards is the Chief Scientist at Capsule8
    Brandon Edwards is Capsule8’s Chief Scientist responsible for cybersecurity research strategy and for operationalizing findings into resulting innovations. Prior to Capsule8, Brandon was VP of Threat Labs at BAE Systems, having joined the company through its successful acquisition of SilverSky, where he designed their cloud-based, zero-day prevention product. Brandon has also served as hacker-in-residence at NYU Tandon School of Engineering, and held senior security roles at TippingPoint and McAfee.