Difference between revisions of "Episode615"

From Paul's Security Weekly
Jump to: navigation, search
(Interview: Josh Douglas, Mimecast - 7:30PM-8:30PM)
(Topic: Software Development: Security Do's & Dont's- 6:30 - 7:30PM)
Line 35: Line 35:
 
<br>
 
<br>
  
= Topic: Software Development: Security Do's & Dont's- 6:30 - 7:30PM =
+
= Topic: Software Development: Security Do's & Don'ts- 6:30 - 7:30PM =
 
<!-- [[File:StewartRoom.jpg|right|250px|thumb|<center>'''[https://twitter.com/StewartRoom Stewart Room]'''<br>is the Partner at [https://pwc.blogs.com/data_protection/stewart-room/ PwC].</center>]] Stewart Room, CIPP/E, is a partner at PwC UK. He is the global leader of the cyber security and data protection legal services practice, the joint global leader of the multidisciplinary data protection practice, and the UK data protection practice leader. He has more than 25 years of experience as a Barrister and Solicitor, focusing for the majority of this time on data, technology and communications.<br>Room specialises in the field of data protection. information management and cyber security, including programme design and delivery, the commercial exploitation of data, the security of data, regulatory investigations and litigation arising from the misuse of data. He is rated as a leading individual in data protection by legal directory Chambers UK, who says he "is the kind of lawyer who inspires confidence" and "he is an excellent, first-rate, tactical lawyer."<br>He is one of the founding directors of Cyber Security Challenge UK (which forms part of the UK National Strategy for Cyber Security), the President of the National Association of Data Protection Officers and the editor of the Cyber Security Practitioner journal. Room has written a number of textbooks on information law and is regularly quoted in the press. He is a past winner of the Financial Times Innovative Lawyer of the Year award.<br><br>'''Segment Topic:'''<br>Data Provacy and The Journey to Code<br><br>'''Segment Description:'''<br> Security Professionals have long understood the need to deliver security outcomes in technology and data, but is the privacy community on the same page? Data Privacy requires outcomes for matters such as data accuracy, data minimisation and fair processing, as well as risks, such as portability and access. These outcomes need tech and data solutions. In this session we will examine The Journey to Code, the next evolutionary step for Data Privacy.<br><br>'''Segment Resources:'''<br>https://www.linkedin.com/feed/update/urn:li:activity:6550420449854058497-->
 
<!-- [[File:StewartRoom.jpg|right|250px|thumb|<center>'''[https://twitter.com/StewartRoom Stewart Room]'''<br>is the Partner at [https://pwc.blogs.com/data_protection/stewart-room/ PwC].</center>]] Stewart Room, CIPP/E, is a partner at PwC UK. He is the global leader of the cyber security and data protection legal services practice, the joint global leader of the multidisciplinary data protection practice, and the UK data protection practice leader. He has more than 25 years of experience as a Barrister and Solicitor, focusing for the majority of this time on data, technology and communications.<br>Room specialises in the field of data protection. information management and cyber security, including programme design and delivery, the commercial exploitation of data, the security of data, regulatory investigations and litigation arising from the misuse of data. He is rated as a leading individual in data protection by legal directory Chambers UK, who says he "is the kind of lawyer who inspires confidence" and "he is an excellent, first-rate, tactical lawyer."<br>He is one of the founding directors of Cyber Security Challenge UK (which forms part of the UK National Strategy for Cyber Security), the President of the National Association of Data Protection Officers and the editor of the Cyber Security Practitioner journal. Room has written a number of textbooks on information law and is regularly quoted in the press. He is a past winner of the Financial Times Innovative Lawyer of the Year award.<br><br>'''Segment Topic:'''<br>Data Provacy and The Journey to Code<br><br>'''Segment Description:'''<br> Security Professionals have long understood the need to deliver security outcomes in technology and data, but is the privacy community on the same page? Data Privacy requires outcomes for matters such as data accuracy, data minimisation and fair processing, as well as risks, such as portability and access. These outcomes need tech and data solutions. In this session we will examine The Journey to Code, the next evolutionary step for Data Privacy.<br><br>'''Segment Resources:'''<br>https://www.linkedin.com/feed/update/urn:li:activity:6550420449854058497-->
 
<br>
 
<br>

Revision as of 17:10, 12 August 2019

Recorded August 8, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Doug White
    Cybersecurity professor, President of Secure Technology, and Security Weekly network host.


  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020 and click the register button to register with our discount code!
    • We're currently running our annual Listener Feedback Survey! Please visit securityweekly.com -> click the survey tab & select "2019 Listener Survey" to submit your responses!
    • Attend RSA Conference 2020, February 24-28 and join thousands of security professionals, forward-thinking innovators and solution providers for five days of actionable learning, inspiring conversation and breakthrough ideas. Register before January 24 and save $900 on a Full Conference Pass. Save an extra $150 by going to securityweekly.com/rsac2020 and use our code to register!
    • Mark your calendars for our Security Weekly Holiday Extravaganza! On December 19th, Security Weekly will be live-streaming 5 one hour panel discussions with some of the most knowledgable professionals in the industry! To round out the evening, Ed Skoudis will be joining the Security Weekly hosts to give his annual announcement about the CounterHack Holiday Hack Challenge! You can view the live stream on our Youtube channel or by visiting securityweekly.com/live. We hope to see you there!
    • Qualys is introducing a new prescription for security and it’s FREE: Global IT Asset Discovery and Inventory. Activate it today at securityweekly.com/qualys so you can achieve 100% near real-time visibility across your hybrid environments.


    Interview: Gabriel Gumbs, Spirion - 6:00-7:00PM

    Gabriel Gumbsis the VP of Product Management at Spirion
    Gabriel Gumbs is the VP of Product Management at Spirion where his focus is on the strategy and technology propelling Spirion’s rapidly-growing security platform. A cybersecurity industry veteran with a 19 year tenure in CyberSecurity, he has spent much of that time as a security practitioner, aligning security innovations with business objectives for Fortune 100 organizations. Gabriel is an information security thought leader, privacy advocate and public speaker.




    Topic: Software Development: Security Do's & Don'ts- 6:30 - 7:30PM


    Interview: Josh Douglas, Mimecast - 7:30PM-8:30PM

    Josh Douglasis the VP of Threat Intelligence at Mimecast
    Joshua Douglas, Vice President of Threat Intelligence, joined Mimecast in 2019 after a stint as Chief Information Security Officer for TRC Companies Inc. He has two decades of experience in helping global organizations secure their most prized business/mission assets. Before TRC, Josh spent 12 years at Raytheon serving as the Chief Technology Officer for Forcepoint/Raytheon Cyber Products and Chief Strategy Officer for Raytheon Cyber Services. He is a forward-looking cybersecurity executive who creates advanced services and solutions that help protect enterprise from ever-changing risks and threats.

    Segment Description:
    During this discussion, Joshua and Paul will speak about the threats facing organizations today and how they are evolving. Josh will also discuss how IT and security teams need to understand the threats their organizations face and how leveraging actionable threat intelligence can help them build the most effective and efficient defense strategy.