Viewing entries in
Podcast

Comment

Episode 13: Threat Hunting

We had a packed studio this week with special guest Mark Ernest to talk about threat hunting. In the opening segment, we spoke about how E-Cigarettes might be bad for your health and really bad for your data security, the new Atari gaming console, and North Korea. The last story about Crimeware-as-a-Service was a good one. You wouldn't believe the amount of havoc that is being offered by the bad guys.

In segment two we dove into the weeds with Mark on the concept of threat hunting and how it's rapidly evolving to become a significant part of building a security posture. The team was so into the topic we didn't even break for segment three.

Comment

Comment

Episode 8: Part 2b: Data Protection - Layer 8, The Insider Threat

Security Jabber, Episode 8

Security Jabber - Episode 8
Part 2b of the Data Identification Series: Layer 8, The Insider Threat

Special Guest: Michael LipinskiCISO and Chief Security Strategist, Securonix
Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

The Security Jabber team took a little detour on our three-part series in Data Protection this week. We dove deeper into insider threats and how they just might be the biggest risk in securing data. The studio was full with again with multiple guests. Michael Lipinski, CISO and Chief Security Strategist, Securonix was our special interview host while Jason Brown, Lab Manager / Mystical Guru of All InfoSec Things, CBI also joined the team to give his perspective.

The show opened with a story about a hacker setting of all 156 emergency sirens in Dallas, is it a conspiracy, you’ll have to listen to find out. A recent release of NSA tools by the Shadow Brokers Group and how they can be used for Whitehat or Blackhat purposes is also discussed. Our second segment focused on seven ways hackers targeted your employees, the panel dove in and gave their personal experiences in using these methods when they do their Whitehat hacking. In our final segment, we interviewed Michael Lipinski from Securonix to learn about how behavioral analytics and new technologies like machine learning are changing our security practices for the better.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 6: Part 1 of the Data Protection Series - Where Are Your Crown Jewels?

Security Jabber, Episode 6

Security Jabber - Episode 6
Part 1 of the Data Identification Series: Where Are Your Crown Jewels

Guest: Brian Vecci, Technical Evangelist, Varonis

In this week’s episode, we kick off the first leg of our three-part series in Data Protection, “Part 1: Data Identification, where are your Crown Jewels?”. The special guest this week is Brian Vecci, Technical Evangelist, Varonis whose LinkedIn mission statement might be one of the best I’ve seen, “Protecting you from insider threats, cyber attacks, and terrible sales presentations.” The team will also be discussing encoding data on DNA, the WikiLeaks Vault7 release, and you guessed it, more cow stuff; that’s just in the first segment! In segment two we’ll get deep into data identification and close out the show with an interview with Brian.

We're also now available on iTunes, Google Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 3: Data Breaches Special guest Todd Beski

Security Jabber, Episode 3

Security Jabber - Episode 3

Guest: Todd Beski

“There are only two types of companies in the world today. Those that have been breached and those that don’t know they’ve been breached.”  ~ Generic Security Expert

We’ve heard that line a million different ways in the InfoSec industry but it still remains true, breaches are a problem. In this week’s episode or “breachisode” as Dave put it, we covered all things breach related. The show started with a disclaimer and a dive in to the Dark Web. We then talked about the recent arrest of Kaspersky employees being arrested for treason.

The bulk of the podcast was spent talking about breaches and all the steps you need to take to protect yourself. We covered recent stats, stories like David Beckham being extorted, and the infamous RSA breach. The team also covered the top 5 data breach predictions for 2017, the conversation may surprise you. In the last segment we discussed what to do if there’s been a breach whether you’re a private citizen or a CISO at a company.

Oh, and we added a new member to the Security Jabber team, Todd Beski!

Links from this week’s stories

Comment

Comment

Episode 2: Interview of Steve Barone, CBI CEO

Security Jabber, Episode 2

Security Jabber - Episode 2

Guest: Steve Barone, CEO, CBI

Well, the Security Jabber crew beat the spread and made it to episode 2. This week, we had Steve Barone on as our special guest. There was quite a bit ground covered this week from cows, to 2 factor authentication, and all the way back to our favorite memories of our first computers. We even touched on critical infrastructure again and the likelihood of a massive failure in the near future, spoiler alert it was decided we will be doing a special episode dedicated to prepping. Until next time, here’s some links to keep you busy and don’t forget to visit us on Facebook, LinkedIn and Twitter.

Links from this week’s stories

Comment