PSWEpisode636

From Security Weekly Wiki
Revision as of 19:59, 14 January 2020 by Wheat Loaf (talk | contribs)
Jump to navigationJump to search

Recorded January 23, 2020 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • Larry Pesce
    Senior Managing Consultant and Director of Research at InGuardians, SANS Instructor.
  • Lee Neely
    is a Sr. Cyber Analyst at LLNL,SANS Analyst, SANS NewsBites Editor


  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Dug Song, Duo Security - 6:00-6:45PM

    Dug Songis the Co-founder & General Manager of Duo Security at CISCO

    Dug Song is Co-founder and General Manager of Duo Security, one of the fastest-growing cybersecurity providers in the world. In 2018, Duo was acquired by Cisco for $2.35 billion, making it the largest exit ever for a Michigan-based software company.
    Founded in 2010, Duo protects more than 20,000 organizations against data breach with its simple and easy two-factor authentication and Zero Trust security products.

    Dug has a history of leading successful products and companies to solve pressing security problems, and is a leading voice in the cybersecurity industry. Prior to launching Duo, Dug spent seven years as founding Chief Security Architect at Arbor Networks, protecting 80 percent of the world’s Internet service providers.

    Dug is heavily involved in mentorship and fostering entrepreneurship in Michigan. He is co-founder of the Ann Arbor’s Entrepreneurs Fund, which enables local entrepreneurs to turn business success into positive community impact. Dug is an executive board member of the University of Michigan’s Wallace House journalism fellowship program.

    Segment Description:

    • Part 1 - Introduction and Background
    1. How did you get your start in information security?
    2. Tell us about some of the software you worked on while still in school at the University of Michigan.
    3. What prompted you to begin work on dsniff?



    • Part 2 - Founder
    1. In 2000 you founded Arbor Networks, was that the point when you began to transition from engineer to entrepreneur?
    2. In the early PC days, some say Apple’s success was driven by the fact that they recruited business leaders (Jobs was known for his ability to talk to people, design things and his vision, not his technical prowess). The competition was largely being driven by hackers and computer nerds. What changed that allows hackers and engineers to move on to create successful tech companies?
    3. What did you learn from the experiences at Arbor Networks? What prompted you to move on to a different company?
    4. Why did you decide to found a company in the authentication space?
    5. When I think of Duo, I think of a company that has an outstanding culture, how do you continue to grow and maintain your vision and culture?



    • Part 3 - The Journey
    1. Cisco’s acquisition of Duo is, in my opinion, one of the greatest acquisitions in security, how did it come about and what was it like to be integrated into such a large company?
    2. What makes companies great? Some say great sales and marketing, others say great tech, but clearly, if you get any of those things wrong you are likely doomed for failure?
    3. What advice do you have for talented tech people that want to become entrepreneurs?
    4. What is your recommendation for an inspiring book for entrepreneurs? (Note: We are HUGE Wu-Tang fans)



    Segment Resources:



    Security News - 6:45PM-7:30PM

    Paul's Stories

    1. Cybersecurity Lessons Learned from 'The Rise of Skywalker'
    2. Brazil prosecutes Glenn Greenwald in attack on press freedom
    3. How to prep for Windows 7, Server 2008 end of life
    4. Multiple Vulnerabilities Found in AMD ATI Radeon Graphics Cards | SecurityWeek.Com
    5. NSA Offers Guidance on Mitigating Cloud Flaws
    6. Report: Saudi Crown Prince Personally Sent Malware to Jeff Bezos, Possibly to Steal Those Dick Pics
    7. Here Is the Technical Report Suggesting Saudi Arabias Prince Hacked Jeff Bezos Phone
    8. Microsoft Security Shocker As 250 Million Customer Records Exposed Online
    9. Sonos Makes It Clear: You No Longer Own The Things You Buy
    10. UN experts: Israeli spyware likely used in alleged Saudi hack of Bezos phone
    11. Quay Container Registry Quay

    Larry's Stories

    Jeff's Stories

    Lee's Stories

    Tyler's Stories


    Tech Segment: Hacker Culture Roundtable - 7:30-8:30PM



    To see all hosts on this show, visit our wiki page and all of the show notes are here as well!

    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+