From Security Weekly Wiki
Jump to navigationJump to search

Paul's Security Weekly - Episode 476

Recorded: August 10, 2016

Episode Audio

[] Coming Soon


Interview: Lance James - 6:00PM-7:00PM

Lance James serves as Chief Scientist at Flashpoint where he heads up research and engages in thought leadership. Prior to joining Flashpoint, Mr. James was the Head of Cyber Intelligence at Deloitte & Touche LLP.

An internationally renowned information security specialist, Mr. James has more than fifteen years of experience in programming, network security, digital forensics, malware research, cryptography design, cryptanalysis, counterintelligence, and protocol exploitation. He provides advisory services to a wide range of government agencies and Fortune 500 organizations including America’s top financial services institutions. Credited with the identification of Zeus and other malware, Mr. James is an active contributor to the evolution of security practices and counterintelligence tactics and strategies.

Mr. James was the founding force behind the CryptoLocker Working Group, where he and his team of researchers were acknowledged for their critical role in disrupting CryptoLocker as part of an FBI-led takedown operation. Over the years, he has championed other takedowns of criminal organizations through his strategic alliances with industry, academia, and law enforcement.

  1. Three words to describe yourself.
  2. If you were a serial killer, what would be your weapon of choice?
  3. If you wrote a book about yourself, what would the title be?
  4. In the popular game of ass grabby-grabby, do you prefer to go first or second?
  5. Choose two celebrities to be your parents.

Technical Segment - 7:00PM-7:30PM

Security News - 7:30PM-8:00PM

Paul's Stories

Larry's Stories

  1. Carlos adds user to his test AD domain
  2. About the DEF CON 24 Wireless network - a response to the Register article
  3. What is old is new again - TCP spoofing sequence number style
  4. Apple launches (invite only) bug bounty program
  5. Profiling clients using SSL/TLS

Joff's Stories

Jack's Stories

Kevin's Stories

Michael's (Santa) Stories