Recorded October 3, 2019 at G-Unit Studios in Rhode Island!
- Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
- OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
- We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
- Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.
Security News - 6:00-6:30PM
- American Express Insider Breaches Cardholder Information
- Turkey fines Facebook $282,000 over privacy breach
- FBI: Don't pay ransomware demands, stop encouraging cybercriminals
- WhatsApp Flaw Opens Android Devices to Remote Code Execution Attacks
- Measuring the Security of IoT Devices - Schneier on Security
- Good cybersecurity comes from focusing on the right things, but what are they? - Help Net Security
- Skylight Cyber | All Your Cloud Are Belong To Us (CVE-2019-12491)
- MITRE ATT&CK: Clipboard data
- 10 Cybersecurity Myths That Criminals Love
- Top 5 New Open Source Security Vulnerabilities in September 2019
- The Secret to CISO Success? Do This One Thing Extremely Well - Accellion
- A malware strain dubbed Masad Stealer is using the Telegram messaging app to steal cryptocurrency by accessing browser passwords and clipboard information, security researchers learned.
- Security researchers detected a previously undocumented botnet named Gucci, which is capable of launching multiple types of distributed denial-of-service (DDoS) attacks against targeted organizations.
- A former Yahoo software engineer has pleaded guilty to hacking 6,000 user accounts in a hunt for sexual images. Following an FBI investigation, Reyes Daniel Ruiz, 34, also admitted to hacking the iCloud, Facebook, Dropbox and Gmail accounts of his victims, primarily young female colleagues and friends.
- Web-conferencing users who don't assign passwords could be having online meetings with more people than they think, according to new research.
- Unfixable Jailbreak Exploit released iPhone X and prior vulnerable to exploit, physical access required. Fixed in iPhone 11.
- Doordash third-party breach hits 4.9M users Third party security is critical.
- "Bulletproof" Dark Web data center seized by German Police While the takedown is significant, services will likely move to alternate hosting sites.
- Ex-Yahoo Engineer Hacked accounts seeking Porn Ex-Yahoo Engineer cracked passwords, seeking credentials to access other services, porn, gaming, iTunes, etc.
- Microsoft blocks 38 more attachment types in Email These can be enabled by Exchange Admin. Include Python, PowerShell, Java and Certificate file typical extensions.
- O.MG Lightning Cable hits Prime Time The O.MG cable is hitting the shelves at Hak5 for $49.
Interview: Stewart Room, PwC - 6:30 - 7:30PM
Stewart Room, CIPP/E, is a partner at PwC UK. He is the global leader of the cyber security and data protection legal services practice, the joint global leader of the multidisciplinary data protection practice, and the UK data protection practice leader. He has more than 25 years of experience as a Barrister and Solicitor, focusing for the majority of this time on data, technology and communications.
Room specialises in the field of data protection. information management and cyber security, including programme design and delivery, the commercial exploitation of data, the security of data, regulatory investigations and litigation arising from the misuse of data. He is rated as a leading individual in data protection by legal directory Chambers UK, who says he "is the kind of lawyer who inspires confidence" and "he is an excellent, first-rate, tactical lawyer."
He is one of the founding directors of Cyber Security Challenge UK (which forms part of the UK National Strategy for Cyber Security), the President of the National Association of Data Protection Officers and the editor of the Cyber Security Practitioner journal. Room has written a number of textbooks on information law and is regularly quoted in the press. He is a past winner of the Financial Times Innovative Lawyer of the Year award.
Data Privacy and The Journey to Code
Security Professionals have long understood the need to deliver security outcomes in technology and data, but is the privacy community on the same page? Data Privacy requires outcomes for matters such as data accuracy, data minimisation and fair processing, as well as risks, such as portability and access. These outcomes need tech and data solutions. In this session we will examine The Journey to Code, the next evolutionary step for Data Privacy.
Security & Compliance Introduction - 7:30PM-8:30PM
It’s the show, that bridges the requirements of regulations, compliance, and privacy with those of security. Your trusted source for complying with various mandates, building effective programs, and current compliance news. It’s time for Security and Compliance Weekly. This show is hosted by: Jeff Man, Josh Marpet, and Scott Lyons