Interview with Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Links
- Verizon - Verizon 2017 Payment Security Report
- Security Boulevard - Leveraging PCI DSS Principles for General Data Protection
Guest: Rachel Snyder, Data Security Manager at Little Caesars Pizza/Ilitch Holdings
Over 20 years in IT, with 15 in Information Security, specializing in managing Security and IT Operations in a Regulatory Compliance environment: Confidentiality, Integrity, and Availability are the standard.
Links:
In segment three we discuss a recent report regarding cyber security trends and predictions for 2018. There are even some positive trends!
Links
- CSO Online – What’s Next for Cyber Security in 2018?
In this segment we discuss net neutrality and the role of government regarding the internet.
Links
- Engadget - What you need to know about net neutrality (before it gets taken away)
- Engadget - Over half of FCC net neutrality comments may be fake, study says
- Fortune - Mark Cuban Thinks Net Neutrality Puts Donald Trump 'In Charge' of the Internet
The team discusses a recent story about Uber paying hackers hush money and our experiences with the service.
Links
Links
- Science Daily - Experts call for ethics rules to protect privacy, free will, as brain implants advance
- Venture Beat - Why cybersecurity workers are some of the hardest to retain
- Slate - Why America’s Current Approach to Cybersecurity Is So Dangerous
- Dark Reading - 6 Steps for Sharing Threat Intelligence
Interview with
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.
Special Guest
Jeff Reava, Director of Security Operations at Jackson
Proven Cyber Security Operations Leader, experienced in building high performing SOC and Identity Management teams and leading security program rebuilding efforts. Effective at engaging all levels of the organization to successfully bring new capabilities into production to manage access, monitor activity and respond to threats.
Links
- CBS Detroit - Cyber Security Summit In Detroit Focuses On Emerging Trends, Technology
- Detroit News - Snyder preps ‘Marshall Plan’ for talent, high-tech ed
- CSO Online - Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021
- SecurityIntellegence.com - It Takes All Kinds: Identifying New Sources of Cybersecurity Talent
We opened the show talking about the crazy around McDonald’s Szechuan Sauce. Later in the show, the team talked about the latest WiFi vulnerability Krack and the infamous hacking group Fin7.
We're available on iTunes, Google Play in addition to SoundCloud.
Links from the Show
Here’s what you can do to protect yourself from the KRACK WiFi vulnerability
New Cybercrime Campaign a 'Clear and Imminent' Threat to Banks Worldwide
Insider tries to scam Dice after hacking company he sold to Dice
Cybercrime Group FIN7 Takes Phishing Attacks to the Next Level
State of Cybercrime 2017: Security events decline, but not the impact
We were joined in studio by Tom Lawrence. He's the owner of Lawrence Systems, a Podcast Master, and knows everything about Linux. Tom was recently at Microsoft Ignite, and you're going to want to listen to some of his stories. The team and Tom also spent a segment discussing what the best and worst security functions to outsource are.
We're back to our weekly schedule starting October 16th, so catch us live in Studio 1 on the PodcastDetroit.com website or on-demand on iTunes, Google Play in addition to SoundCloud.
Special Guest:
Tom Lawrence, Owner, Lawrence Systems
Tech Enthusiast, IT Business Owner, Entrepreneur, Open Source Advocate, Public Speaker, Podcaster & YouTube Creator.
Where you can find Tom
Lawrence Systems Website
Facebook
LinkedIn
YouTube
Sunday Morning Linux Review Podcast
Links From the Show
PC Mag - iPhone 8s splitting in half during charging
CNBC - Shake Shack Going Cashless
Reuters - Russian firm provides new internet connection to North Korea
Free Code Camp - How I hacked hundreds of companies through their helpdesk
Dark Reading - Best and Worst Security Functions to Outsource
We're available on iTunes, Google Play in addition to SoundCloud.
Links from the Show
- Factor – Tech - NOW EVEN COWS HAVE WEARABLE TECHNOLOGY
- The Guardian - Deloitte hit by cyber-attack revealing clients’ secret emails
- NY Times - Someone Made a Fake Equifax Site. Then Equifax Linked to It.
- Nextgov.com - MEET THE 17-YEAR-OLD WHO HACKED THE U.S. AIR FORCE
- Krebs - Canadian Man Gets 9 Months Detention for Serial Swatting’s, Bomb Threats
- Dark Reading - 10 Security Product Flaw Scares
We got back into the studio this week after a short break. The team spent the first segment talking about malware hid in CC Cleaner and the fallout from the recent credit reporting agency data breach. We were then joined by special guest Mark Phinick for segments two and three. Mark gave us a couple of great stories, his insight on data security, and some really good advice.
Special Guest: Mark Phinick, Global Sales Leader, Endpoint Security at IBM Security
Mark Phinick is a successful cybersecurity software sales leader with a consistent track record of building global, client-centric teams who exceed expectations. Throughout his career, he's partnered with CIOs and CISOs on optimizing their people, processes, and technology to protect critical assets and brand equity against cyber threats.
Links from the Show
We're available on iTunes, Google Play in addition to SoundCloud.
In this week's episode, we open with Taco Bell opening a special location in the metro Detroit area and probably spend too much time thinking about tacos after. The team also covers a "story" about Microsoft's big win over the DNC hackers, spoiler alert they did but really didn't.
We spent a good amount of time on the FBI's mega database which is more than likely housing some of your info. Finally, we closed out our show with a great discussion on the 10 time-consuming tasks security people hate.
- Detroit News - Boozy, fast-casual Taco Bell coming to Royal Oak
- The Hill - Microsoft wins major court victory against DNC hackers
- ZDNet - FBI can keep secret who's in its biometrics 'mega database,' says Justice Dept.
- Reuters - India and Pakistan hit by spy malware
- Dark Reading – 10 Time-Consuming Tasks Security People Hate
We're available on iTunes, Google Play in addition to SoundCloud.
In this episode, the team covers a wide variety of stories including
- Motherboard Vice - 'Facebook for Horses' Is Mongolia's Hot New Social App
- Washington Post - ‘20 seconds of burning’: Friends partly blinded after watching solar eclipse warn of dangers
- Time - 4 Surprising Eclipse Facts
- CyberScoop - FBI pushes private sector to cut ties with Kaspersky
- Dark Reading - Trump Makes US Cyber Command an Official Combat Arm
- Wired - A DEEP FLAW IN YOUR CAR LETS HACKERS SHUT DOWN SAFETY FEATURES
- AP - How Your Cell Phone Can Detect ATM, Gas Pump Skimmers
In this week's episode, we had really great discussions on topics ranging from hermit's to hackers. We opened the show with a story about the Northpond Hermit and how he alluded society for 26 years in the woods of Maine. Next up was drones as per the usual. The team then weighed in on the HBO hack and the dangers of unsecured printers. Finally, we ended the first segment with new regulations being proposed in the U.K. around smart car cyber protection.
Our main topic is about Marcus Hutchins, the British hacker that stopped WannaCry and rose to fame very quickly in the aftermath is now being charged in the U.S. for his role in a banking Trojan. The team had no shortage of opinions on this one.
We are on break until August 21st. What a great chance to catch up on any shows you missed.
We're available on iTunes, Google Play in addition to SoundCloud.
Links from the Show
- Hazlitt - There Have Always Existed People Who’ve Simply Wanted to be Alone’: An Interview with Michael Finkel
- Verge - US Army reportedly asks units to stop using DJI drones, citing cyber security concerns
- Hollywood Reporter - HBO Hack: No New Material Surfaces Despite Threat of Sunday Leak
- Press Enterprise - Copiers pose bigger threats than paper jams, cyber security experts say
- Computer Weekly - UK calls for smart car cyber protection
- Verge - Black hat or white hat? Questions swirl around hero researcher's sudden arrest
- Daily Mail - a British computer geek, hailed a hero for stopping Wannacry global hack 'admitted to police he created program which steals bank customers' details'
The team covered a lot of ground this week. We opened the podcast with a debate whether or not implanting a RFID chip in our hand is a good idea, spoiler alert, some of the guys think it's a conspiracy. A story from Forbes got us talking about Israel's position in the cyber security market as a country and in private industry. The first segment ended with a look at how Sweden potential leaked the private info of nearly all its citizens including vital military information.
Segment two was a preview of Black Hat and the results the attendee survey. Next week we'll have several guests on that attended Black Hat 2017 and hear all about what they saw. We closed out the show with a discussion on connected toys and the security risks they pose to families.
We're also now available on iTunes, Google Play in addition to SoundCloud.
Links from the Show
- Washington Post - A U.S. company offers to implant chips in its employees
- Forbes - 6 Reasons Israel Became A Cybersecurity Powerhouse Leading The $82 Billion Industry
- Hacker News - Sweden Accidentally Leaks Personal Details of Nearly All Citizens
- Naked Security - Black Hat USA 2017: what’s on the agenda in Las Vegas
- Dark Reading - Black Hat Survey: Security Pros Expect Major Breaches in Next Two Years
- Dark Reading - FBI Issues Warning on IoT Toy