SCWEpisode15

From Security Weekly Wiki
Revision as of 15:54, 28 January 2020 by Jeff (talk | contribs)
Jump to navigationJump to search

Recorded on January 28, 2020, @G-Unit Studios in Rhode Island!

Hosts

  •  
    Jeff Man
    Cryptanalyst
    Infosec analyst
    Pioneering ex-NSA pen tester
    PCI specialist
    Tribe of Hackers
    InfoSec Curmudgeon
    Currently a Sr. InfoSec Consultant for Online Business Systems.
  •  
    Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  •  
    Scott Lyons
    CEO at Red Lion
    MISTI Instructor
    Patent Holder
  •  
    Josh Marpet
    COO at Red Lion
    IANS Faculty
    Blockchain Patent Holder
    MISTI Instructor
    Entrepreneurship Curmudgeon
    Board Member BSidesDE
    Board Member BSidesDC
    Ex-cop and Fireman
  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Topic: Cyber Insurance

    Is Cyber Insurance Your Last Line of Defense?
    Cyber insurance 101 — for any business operating in today’s digital environment

    Cyberinsurance points to ponder: Relationship and dilution of responsibility between brokers, underwriters, and reinsurance companies. Cost of cyberinsurance. Actuarial tables for cyberinsurance. Questionnaires to get cyberinsurance. Is there anyone who is NOT eligible for cyberinsurance? (Thanks Trevor!) Typical exclusions of cyberinsurance policies. How has cyberinsurance changed over the last few years? Big cases in cyberinsurance (Zurich insurance, Cottage health). Cost of cyberinsurance vs. the cost of an incident response.

    Compliance News

    Jeff's Stories

    Scott's Stories

    Josh's Stories