Episode606

From Security Weekly Wiki
Revision as of 14:59, 2 May 2019 by Wheat Loaf (talk | contribs) (Created page with "''Recorded May 30, 2019 at G-Unit Studios in Rhode Island!'' ==Episode Audio== <!-- <div align="center"> {{#widget:SoundCloud |id=496965687 |width=75% |height=100 |color=6602...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Recorded May 30, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Announcements

    • We just released our 2019 Security Weekly 25 Index Survey. Please go to securityweekly.com and click the Survey link to help us understand who's evaluating, using, or formerly used any of the Security Weekly 25 companies. The results will be summarized and presented back to all responders in a private webcast.

    Interview: Lisa Forte, Red Goat Cyber Security - 6:00-6:30PM

    Lisa Forte is an expert in the human side of cyber security and social engineering. In 2018 she won the “Top 100 Women In Tech” Awards recognising her achievements and contributions to the cyber security industry. Lisa Forte delivers dynamic and engaging presentations based on her expert personal experiences of dealing with cybercrime cases and the research she has done into how cyber criminals use psychological principles in their activities. An experienced cyber security trainer, Lisa knows how to effectively communicate her message to all types of audience in a lively, informative and engaging manner. Lisa began her career in counter-terrorism intelligence for a UK Government agency before moving into one of the UK Police Cyber-Crime Units dealing with serious cybercrime cases both in the UK and abroad. Through these experiences she has gained a unique insight into darker side of human nature and has led to her becoming one of the leading experts on cybercrime cases involving social engineering and psychological manipulation. Lisa founded Red Goat Cyber Security in 2017 to teach companies about the methodologies used by cyber criminals. Her areas of expertise include social engineering, the psychology of persuasion, insider threats and rehearsing for a cyber attack. She has conducted groundbreaking research into the psychology behind insider threats and created the first ever GCHQ certified social engineering course. Lisa’s has appeared on national and international radio and is a frequent contributor to BBC news and similar news publications. Lisa has also been recognised for her pro-bono work with charities and the UK National Health Service. She also works closely with the Women’s Tech Hub helping to increase diversity in the tech sector.


    Tech Segment: Justin Murphy, CISCO - 6:30 - 7:30PM



    Security News - 7:30PM-8:30PM

    Paul's Stories

    1. Redditor can stay anonymous, court rules
    2. The industrys best-kept secret: why mobile ad fraud prevention is just too good to be true
    3. Spies with that? Police can snoop on McDonald's and Westfield wifi customers
    4. 8 Ways to Authenticate Without Passwords
    5. Flipboard Resets User Passwords in Response to Data Breach | SecurityWeek.Com
    6. Eternally Blue: Baltimore City leaders blame NSA for ransomware attack
    7. Docker Vulnerability Gives Arbitrary File Access to Host | SecurityWeek.Com
    8. Trends in Cybersecurity to Watch
    9. Majority of CISOs plan to ask for an increase in cybersecurity investment - Help Net Security
    10. Hackers actively exploit WordPress plugin flaw to send visitors to bad sites
    11. Virus-packed laptop sells as artwork for over RM5.5mil
    12. Technology is Not Our Problem | SecurityWeek.Com
    13. What a teen grade hackers confession can teach us
    14. The cryptominer that kept coming back
    15. InfoSec Handlers Diary Blog - Analyzing First Stage Shellcode
    16. Malware Found on PoS Systems at Checkers and Rally's Restaurants | SecurityWeek.Com
    17. High-Risk Flaws Found in Process Control Systems From B&R Automation | SecurityWeek.Com
    18. macOS Gatekeeper Bypass Exploits Trust on Network Shares | SecurityWeek.Com
    19. InfoSec Handlers Diary Blog - nmap Service Fingerprint
    20. Killer SecOps Skills: Soft Is the New Hard
    21. Old Threats Are New Again

    Larry's Stories

    Lee's Stories