Comment

Episode 15: Threat Hunting Returns

Comment

Comment

Episode 14: Energy Sector Threats

Security Jabber, Episode 14

On this week’s episode, we discussed the legality and ethics regarding drone software. The main topic covered was recent “revelations” that over a hundred energy plants have been comprised, including several nuclear facilities. We wrapped the show talking about Todd’s sweet retro gaming setup.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 13: Threat Hunting

We had a packed studio this week with special guest Mark Ernest to talk about threat hunting. In the opening segment, we spoke about how E-Cigarettes might be bad for your health and really bad for your data security, the new Atari gaming console, and North Korea. The last story about Crimeware-as-a-Service was a good one. You wouldn't believe the amount of havoc that is being offered by the bad guys.

In segment two we dove into the weeds with Mark on the concept of threat hunting and how it's rapidly evolving to become a significant part of building a security posture. The team was so into the topic we didn't even break for segment three.

Comment

Comment

Episode 12: Cyber Insurance

Security Jabber, Episode 12

Guest: David Derigiotis, Corporate Vice President at Burns & Wilcox
Corporate Vice President and Director of Professional Liability leading a team of highly specialized brokers and underwriters. Focus on professional, cyber, and executive liability risks and coverage solutions for clients nationally. Burns & Wilcox, the Kaufman Financial Group’s flagship organization, is North America’s leading independent wholesale insurance broker and underwriting manager. Burns & Wilcox offers wide-ranging and comprehensive solutions to serve retail insurance brokers and agents of all sizes, from the large houses to the more than 30,000 independent brokers and agents worldwide.
David’s Social: LinkedIn | Twitter



Comment

Comment

Episode 11: Incident Response, What Can You Do?

Security Jabber, Episode 11

Guest: Ray Davidson, Program Manager for Michigan Cyber Civilian Corps
The Michigan Cyber Civilian Corps (MiC3) is a group of trained cyber security experts who volunteer to provide expert assistance to enhance the State’s ability to rapidly resolve cyber incidents when activated under a Governor declared State of Emergency. The group includes volunteers from government, education, and business sectors.

The MISSION of MiC3 is to work with government, education, private sector organizations, and volunteers to create and implement a rapid response team to be activated under a Governor declared cyber State of Emergency and to provide mutual aid to the government, education, and business organizations in the State of Michigan.

Ray’s Social: LinkedIn | Twitter

Links from This Week's Episode

Comment

Comment

Episode 10: Let’s Talk About Cyber Security, What’s in the News This Week

Security Jabber, Episode 10

Security Jabber - Episode 10
LET’S TALK ABOUT CYBER SECURITY, WHAT’S IN THE NEWS THIS WEEK

Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

The Jabber Team was down as few hosts, but we still had a great show. We discussed new ways companies are using connected devices to reach you and why late people might be onto something. Finally, we really dove into cyber security policy, the IT security talent shortage and ways to address it.

Links from the Show

Comment

Comment

Episode 9: Part 3: Data Protection – Breach Response. The True Measure of Your Protection

Security Jabber, Episode 9

Security Jabber - Episode 9
Part 3: Data Protection – Breach Response. The True Measure of Your Protection.

Special Guest: Russ Gordon, Global IT Risk Management and Security, BorgWarner
Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

On this week’s podcast, we wrapped our data protection series with special guest, Russ Gordon, Global IT Risk Management and Security, BorgWarner. We started the show with a discussion around the record jail sentence given to an extradited Russian hacker. The team also covered new developments in the InterContinental Hotels Group (IHG) hack, where over 1,175 properties in the U.S. and Puerto Rico are affected.

In the second segment, we covered what to do when there’s a breach. The team weighed in on a recent study about how CISO’s are failing to keep pace with data breaches and how they prepare for data breaches. We also covered some of the ways to quantify risk and limit damages post-breach through a few different strategies.

The show  ends with an interview with special guest Russ Gordon.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 8: Part 2b: Data Protection - Layer 8, The Insider Threat

Security Jabber, Episode 8

Security Jabber - Episode 8
Part 2b of the Data Identification Series: Layer 8, The Insider Threat

Special Guest: Michael LipinskiCISO and Chief Security Strategist, Securonix
Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

The Security Jabber team took a little detour on our three-part series in Data Protection this week. We dove deeper into insider threats and how they just might be the biggest risk in securing data. The studio was full with again with multiple guests. Michael Lipinski, CISO and Chief Security Strategist, Securonix was our special interview host while Jason Brown, Lab Manager / Mystical Guru of All InfoSec Things, CBI also joined the team to give his perspective.

The show opened with a story about a hacker setting of all 156 emergency sirens in Dallas, is it a conspiracy, you’ll have to listen to find out. A recent release of NSA tools by the Shadow Brokers Group and how they can be used for Whitehat or Blackhat purposes is also discussed. Our second segment focused on seven ways hackers targeted your employees, the panel dove in and gave their personal experiences in using these methods when they do their Whitehat hacking. In our final segment, we interviewed Michael Lipinski from Securonix to learn about how behavioral analytics and new technologies like machine learning are changing our security practices for the better.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 7: Part 2 of the Data Protection Series - Locking it Down

Security Jabber, Episode 7

Security Jabber - Episode 7
Part 2 of the Data Identification Series: Locking It Down

Special Guest: Joe Sturonas, Chief Technology Officer at PKWARE, Inc.
Guest Host: Brian VecciTechnical Evangelist, Varonis

In this week’s episode, we continue our three-part series focused on data protection with “Part 2: Data Protection, Locking it Down”. Our in-studio special guest and third segment interview this week is Joe Sturonas, Chief Technology Officer at PKWARE. Brian Vecci, last week’s guest, couldn’t get enough of the Jabber team and will be back for round two. 

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

 

Comment

Comment

Episode 6: Part 1 of the Data Protection Series - Where Are Your Crown Jewels?

Security Jabber, Episode 6

Security Jabber - Episode 6
Part 1 of the Data Identification Series: Where Are Your Crown Jewels

Guest: Brian Vecci, Technical Evangelist, Varonis

In this week’s episode, we kick off the first leg of our three-part series in Data Protection, “Part 1: Data Identification, where are your Crown Jewels?”. The special guest this week is Brian Vecci, Technical Evangelist, Varonis whose LinkedIn mission statement might be one of the best I’ve seen, “Protecting you from insider threats, cyber attacks, and terrible sales presentations.” The team will also be discussing encoding data on DNA, the WikiLeaks Vault7 release, and you guessed it, more cow stuff; that’s just in the first segment! In segment two we’ll get deep into data identification and close out the show with an interview with Brian.

We're also now available on iTunes, Google Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 5: Build, Buy or Outsource - SOC Best Practices

Security Jabber, Episode 5

Security Jabber - Episode 5

Guest: Martin Bally, VP & CSO, Diebold Nixdorf

In this week’s episode, we tackle cows as big as elephants, not literally, but still fun. The team also will be talking about, “Build, Buy, or Outsource, Managed Services & Security Operations” with Mike Pearson, VP of Managed Services, CBI (formerly founder & CTO of SecureWorks) and special interview guest Martin Bally, VP & CSO, Diebold Nixdorf.

Comment

Comment

Episode 4: We interview Lance James, Chief Scientist for Flashpoint

Security Jabber, Episode 4

Security Jabber - Episode 4

Guest: Lance James, Chief Scientist at Flashpoint

A journey begins with a single step, our podcast begins with a single question and quickly finds a way to jump of the path to cover everything from patch Tuesday, to RSAC, and that time hackers “swatted” the wrong guy.

This week’s episode is jam packed with all things cyber security. We had Lance James, Chief Scientist at Flashpoint on from the get go and spoiler alert, he didn’t disappoint. The team dove into the stories of the week and among them was an update to Brian Krebs getting swatted in 2013, turns out Lance helped Brian track down the bad guys and help get justice served.

We also talked about the RSA Conference and what the future of cyber security looks like. There are plenty of links below so you can see the coolest booths, best bloggers, and how a few people left their WiFi vulnerable on the show room floor.

In segment three Lance reveals his connection with the hit show Mr. Robot, listen to find out what it is.

Links from this week’s stories

Comment

Comment

Teen hacks 150,000 printers

Comment

Comment

Episode 3: Data Breaches Special guest Todd Beski

Security Jabber, Episode 3

Security Jabber - Episode 3

Guest: Todd Beski

“There are only two types of companies in the world today. Those that have been breached and those that don’t know they’ve been breached.”  ~ Generic Security Expert

We’ve heard that line a million different ways in the InfoSec industry but it still remains true, breaches are a problem. In this week’s episode or “breachisode” as Dave put it, we covered all things breach related. The show started with a disclaimer and a dive in to the Dark Web. We then talked about the recent arrest of Kaspersky employees being arrested for treason.

The bulk of the podcast was spent talking about breaches and all the steps you need to take to protect yourself. We covered recent stats, stories like David Beckham being extorted, and the infamous RSA breach. The team also covered the top 5 data breach predictions for 2017, the conversation may surprise you. In the last segment we discussed what to do if there’s been a breach whether you’re a private citizen or a CISO at a company.

Oh, and we added a new member to the Security Jabber team, Todd Beski!

Links from this week’s stories

Comment

Comment

Episode 2: Interview of Steve Barone, CBI CEO

Security Jabber, Episode 2

Security Jabber - Episode 2

Guest: Steve Barone, CEO, CBI

Well, the Security Jabber crew beat the spread and made it to episode 2. This week, we had Steve Barone on as our special guest. There was quite a bit ground covered this week from cows, to 2 factor authentication, and all the way back to our favorite memories of our first computers. We even touched on critical infrastructure again and the likelihood of a massive failure in the near future, spoiler alert it was decided we will be doing a special episode dedicated to prepping. Until next time, here’s some links to keep you busy and don’t forget to visit us on Facebook, LinkedIn and Twitter.

Links from this week’s stories

Comment

Comment

Episode 1: Red Team Leader, A Day In The Life

Hi everyone,   it's our first episode! A special thank you to our friends at PodcastDetroit & ITinTheD.

Security Jabber debuts

 https://soundcloud.com/podcastdetroit/security-jabber-debuts

Guest: Shaun Bertrand, Red Team Lead from CBI

What a cool conversation with a group of people that like hanging out together. We talked about the growing concerns around the Internet of Things (IoT) which are very real concerns around real-world attacks taking advantage of existing vulnerabilities on home appliances, car, drop cams, etc.  It's not just an invasion of privacy, it can lead to an increased level of personal vulnerability, identity theft, financial loss, etc.   

Autonomous assistants such as Alexa & Siri (used for simple, common, and published voice commands) could possibly be used to access and exfiltrate personal, financial data. It's been proven that services provided by Amazon store recorded video/audio when the device is active and sometimes when it's not. Mainstream media might have you believe that it's being used to drive marketing research but what about the huge holes this opens up, enabling the bad-guys to collect intel on highly valued targets? 

Shaun Bertrand leads the Red Team practice for Cyber Security consulting company "CBI".  He's always been curious, but his passion regarding cyber security started when he was 13 yrs old, "dabbling a little bit with a computer". Shaun started off with a 9600 baud modem and moved up to using a port scanner while his friends were "chatting" on AIM & ICQ, he was "scanning and finding open telnet all over the place". 

Shaun said, "It showed me how easy it was to get anywhere I wanted to".  He slowly started attending 2600 meetings and the rest, as they say, is history. Quickly he escalated into going out to Defcon and winning a "shootout" contest, experimenting with throwing wireless signals long distance with custom wireless antennas (pictures to come). Shaun also started doing pen-testing before most people knew what it was and developed a passion for recognizing the impacts of these new identified vulnerabilities. He now starts off his day by thinking "who has been breached today" and begins by researching recent breaches, understanding how they are carried out then contacts his clients letting them know how to improve their defenses against them.

We asked what type of education someone should to get started in this industry. Shaun's advice, have an intimate knowledge of the technical mechanics and modeling that drives IT security. Routing, spoofing, etc... other tips included:

1.       Learn the fundamentals

2.       Lean a small bit about coding (bash scripting, PERL, etc.)

3.       Identify a mentor

4.      Most of all, keep learning

 

Comment