Player FM - Internet Radio Done Right
27 subscribers
Checked 7d ago
Lagt til nine år siden
Innhold levert av RSAC and RSA Conference. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av RSAC and RSA Conference eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!
Gå frakoblet med Player FM -appen!
Podcaster verdt å lytte til
SPONSET
Y
You Can’t Make This Up


At the dawn of the social media era, Belle Gibson became a pioneering wellness influencer - telling the world how she beat cancer with an alternative diet. Her bestselling cookbook and online app provided her success, respect, and a connection to the cancer-battling influencer she admired the most. But a curious journalist with a sick wife began asking questions that even those closest to Belle began to wonder. Was the online star faking her cancer and fooling the world? Kaitlyn Dever stars in the Netflix hit series Apple Cider Vinegar . Inspired by true events, the dramatized story follows Belle’s journey from self-styled wellness thought leader to disgraced con artist. It also explores themes of hope and acceptance - and how far we’ll go to maintain it. In this episode of You Can't Make This Up, host Rebecca Lavoie interviews executive producer Samantha Strauss. SPOILER ALERT! If you haven't watched Apple Cider Vinegar yet, make sure to add it to your watch-list before listening on. Listen to more from Netflix Podcasts .…
Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies
Manage episode 452114434 series 1237183
Innhold levert av RSAC and RSA Conference. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av RSAC and RSA Conference eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhancing their cyber resilience, SMEs can improve compliance, build trust with customers, and ultimately drive business growth. Speakers: Praise Ayodele, Graduate Researcher, University of Central Missouri Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC
…
continue reading
172 episoder
Manage episode 452114434 series 1237183
Innhold levert av RSAC and RSA Conference. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av RSAC and RSA Conference eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhancing their cyber resilience, SMEs can improve compliance, build trust with customers, and ultimately drive business growth. Speakers: Praise Ayodele, Graduate Researcher, University of Central Missouri Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC
…
continue reading
172 episoder
ทุกตอน
×
1 Empowering Seniors: Practical Cybersecurity for the Digital Age 24:50
24:50
Spill senere
Spill senere
Lister
Lik
Likt24:50
Seniors face growing cyberthreats like phishing and identity theft. This session simplifies cybersecurity, offering practical tools and strategies to help older adults and their caregivers recognize and avoid scams. Attendees will gain clear, actionable steps to protect themselves and their loved ones from evolving online dangers. Speakers: Alex East, Senior Solutions Engineer, Armorcode Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…

1 A Conversation with Our Security Strategy & Architecture Program Committee 24:11
24:11
Spill senere
Spill senere
Lister
Lik
Likt24:11
In today’s technological landscape, integrating AI into business operations presents both opportunities and complex security challenges. Our podcast will explore the importance of our Security Strategy and Architecture track, which examines robust security strategies from a diverse set of subject matter experts. We will cover foundational topics including the evolution of defense in depth, advanced threat modeling, adherence to established and evolving security standards and frameworks, and addressing more sophisticated attacks. We’ll also highlight innovative solutions and open-source frameworks shaping security, helping businesses enhance their security posture, comply with regulations, and fully harness emerging technologies to drive growth and efficiency. Additionally, we will explore the trends we have seen this year while reading the submissions. Join us for actionable insights to navigate the complexities of cybersecurity by careful design and implementing effective strategies to safeguard your organization and drive progress. Speakers: Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft Kelley Misata, Founder and Chief Trailblazer, Sightline Security & President, Open Information Security Foundation (OISF/Suricata) Ed Moyle, Partner, SecuirtyCurve Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC Listen to more RSAC Podcasts here: https://www.rsaconference.com/library/podcast…

1 Behind the Scenes of the Hackers and Threats Track 26:52
26:52
Spill senere
Spill senere
Lister
Lik
Likt26:52
Yes, winter is here, and some may find this time of year unbearable. But on the bright side, we're approaching RSAC 2025. And as we approach April, we're excited to bring together the Hackers & Threats track Program Committee Members. Tune into this podcast as they'll disclose behind-the-scenes insights, what they've seen in their tracks, which sessions stood out to them and why, and of course, what they're most excited about for RSAC 2025. Greg Day, VP & Global Field CISO, Cybereason Nicole Little, Security Products and Partnerships Manager, Netflix Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…

1 Father and Son, CISO and Psychologist: Navigating the Digital Age 29:36
29:36
Spill senere
Spill senere
Lister
Lik
Likt29:36
Richard Bird and Xavier Bird are father and son. Richard has spent 3 decades in technology and cybersecurity. Xavier, like most of Gen Z, is a digital native. He also happens to be a doctoral candidate in psychology who has focused his attention on adolescent counseling and the impact digital experiences have on the development of self-image among children consuming a steady diet of feeds and streams from video games to influencers. From the pitfalls of “algorithmic parenting” to the ripple effects of social media culture on identity formation. Tune in to this podcast as this father and son duo unpack the nuanced interplay of privacy, security, and mental health in the digital age. Speakers: Richard Bird, Senior Fellow, Executive Member, CyberTheory Zero Trust Institute, CyberEd.io. Xavier Bird, Psychology Doctorate (PsyD) Candidate, University of Denver Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…

1 Inside the RSAC Program Committee: Device Security & Accessibility 24:08
24:08
Spill senere
Spill senere
Lister
Lik
Likt24:08
As we approach RSAC 2025, we're excited to bring together the Program Committee Members (PCMs) from our Device Security & Accessibility track. Tune into this podcast to learn what Device Security and Accessibility means, what topics the PCs saw trending in the submissions, and what people can look forward to learning about at the Conference. Speakers: Justin Merhoff, Director of Security, Deque Systems Maggie Morganti, Senior Director of Product Security, WorldPlay Smitha Sriharsha, Sr Manager Platform Security Engineering, F5 Networks Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…

1 Jingle All the Way to Safety: Cyber Security Tips for the Holidays 22:19
22:19
Spill senere
Spill senere
Lister
Lik
Likt22:19
As the holidays approach, many are well into their shopping sprees. It's an exciting time to prepare for the holiday season and spend time with loved ones. However, with cyberattacks on the rise, we can expect a significant increase in cyberattacks during this season. Join this podcast to explore safety and security tips for online shoppers, learn about current cyberthreats, and discover actionable steps to protect yourself from becoming a victim of cybercrime. Speakers: Bailey Marshall, Customer Engineer, Security, Google Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…

1 Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies 19:25
19:25
Spill senere
Spill senere
Lister
Lik
Likt19:25
SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhancing their cyber resilience, SMEs can improve compliance, build trust with customers, and ultimately drive business growth. Speakers: Praise Ayodele, Graduate Researcher, University of Central Missouri Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…

1 Governing AI Innovation: Balancing Ethics and Compliance 27:16
27:16
Spill senere
Spill senere
Lister
Lik
Likt27:16
As AI rapidly integrates into our lives, it presents both immense opportunities and significant risks. This podcast explores the urgent need for robust governance frameworks to ensure AI is used responsibly. We will delve into ethical guardrails, risk mitigation strategies, and best practices inspired by academic AI principles. Join us to discover how to harness AI's power while upholding your organization's values. Speakers: Brian Warshawsky, Director, Research Ethics and Compliance, University of California, Berkeley Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…

1 Election Security: Best Practices and Emerging Threats 20:48
20:48
Spill senere
Spill senere
Lister
Lik
Likt20:48
In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system. This podcast explores the critical issue of election security, emphasizing the need for a collaborative and proactive approach. Join this talk as we delve into the bipartisan nature of election threats, highlighting the shared vulnerabilities faced by campaigns across the political spectrum. We discuss actionable steps that individuals, campaigns, and organizations can take to enhance their cybersecurity posture. Speakers: Andrew Schoka, Founder, VoterGuard Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…

1 Securing Sovereignty: How Technology is Strengthening Tribal GC Elections 21:39
21:39
Spill senere
Spill senere
Lister
Lik
Likt21:39
Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addressing challenges unique to Tribal elections. Speakers: Mackenzie Quick, Cybersecurity Analyst, Suquamish Tribe Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Navigating the Evolving Threat Landscape: Cybersecurity in Retail and Fashion 16:09
16:09
Spill senere
Spill senere
Lister
Lik
Likt16:09
Join us for an in-depth discussion on the cybersecurity threats facing the retail and fashion industries. We'll explore the top trends for 2024 and 2025, including AI, e-commerce fraud, ransomware, and supply chain compromise. Our expert guest will share real-world examples of cyberattacks targeting the retail and fashion value chain, shedding light on the tactics used by threat actors. We'll also discuss predictions for 2026 and explore strategies for mitigating these risks and safeguarding your organization. Speakers: Alexandra Forsyth, Retail, Fashion and Cyber Security Expert, A.F's RetailGuide Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 The World of AI: Governance and Application 31:04
31:04
Spill senere
Spill senere
Lister
Lik
Likt31:04
Speakers: Arti Raman, CEO and Founder, Portal26 Dane Sherrets, Senior Solutions Architect, HackerOne Kacy Zurkus, Senior Content Manager, RSA Conference AI has been implemented in almost every organization and AI governance helps ensure that AI is being used ethically and unbiasedly. We will explore the multifaceted world of AI, focusing on governance and applications. Join this podcast as we unfold the challenges and opportunities associated with AI technologies, examining the need for responsible governance, diverse applications across industries, and necessary measures for navigating the evolving landscape.…

1 Elevate & Innovate: Success Tips for Women Entrepreneurs 17:31
17:31
Spill senere
Spill senere
Lister
Lik
Likt17:31
Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potential investors. We will also highlight some of the ideas we would love to see come through the RSAC 2025 Call for Submissions. Tune in to this podcast to learn practical tips and strategies to craft compelling submissions and get inspired to contribute your voice at RSA Conference 2025. Speakers: Gadalia Montoya Weinberg O'Bryan, Founder & CEO, Dapple Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to keep in mind when submitting your presentation. Join this podcast with Program Committee member, John Elliot, who will share some helpful tips and guidance to those interested in submitting their ideas for RSAC 2025. Speakers: John Elliott, Principal Consultant, Withoutfire and Pluralsight Author Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Secure by Design: Transforming the Software Security Landscape 24:29
24:29
Spill senere
Spill senere
Lister
Lik
Likt24:29
Secure by design has many core principles, including manufacturer accountability, radical transparency, and leadership-driven security prioritization. Secure by design is critical for organizations as it minimizes risks and vulnerabilities within an enterprise. Join us as we discuss a transformative approach to software development and cybersecurity. Listeners will gain insights into how this initiative is reshaping the tech industry's approach to security, moving from reactive measures to proactive, built-in safeguards. Speakers: Vaibhav Malik, Partner Solutions Architect, Cloudflare Surya Prakash, Senior Vice President, Global Financial Corporation Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Healthcare Cybersecurity: The Intersection of Patient Safety & Clinical Resiliency 29:50
29:50
Spill senere
Spill senere
Lister
Lik
Likt29:50
Healthcare sectors need to implement a strong cybersecurity team, proactive strategies, and security awareness training, but how do they do that while prioritizing patient care? Enter the need for clinical resiliency. Join this podcast to learn actionable takeaways for building a team medical providers who also understand both the impact of cyberattacks on hospitals and how to achieve resilience in the face of an attack to ensure patient safety and care quality. Speakers: Christian Dameff, Emergency Physician and Clinical Informatics Fellow, University of California San Diego Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes 23:05
23:05
Spill senere
Spill senere
Lister
Lik
Likt23:05
Drones are becoming more common in skies around the world. While the initial reaction seems to be focused on privacy concerns, which are very valid, there should also be a higher focus on what someone can do with a relatively lightweight drone. Having it carry a hacking device or it being a hacking device itself is something that has not been talked about enough. Speakers: Brad Ammerman, Senior Director of Security, Prescient Security Alex Thines, Senior Security Consultant, Prescient Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 The CISA Zero Trust Maturity Model and the Five Pillars in Practice 18:44
18:44
Spill senere
Spill senere
Lister
Lik
Likt18:44
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to learn how to use and adapt CISA Zero Trust Maturity Model and it’s five security pillars in practice. Join this podcast to hear real-world examples of challenges, benefits, and approaches about the model. Speakers: Jason Garbis, President, Numberline Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 The Fundamentals: Policymakers on Cybersecurity 14:01
14:01
Spill senere
Spill senere
Lister
Lik
Likt14:01
In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to hear about the educational resources on cybersecurity fundamentals that policymakers need to keep up in the rapidly changing regulatory environment. Learn how preparing them will support strong policies and equitable participation in the global digital economy. Join this podcast to hear some approaches and resources, as we discuss ways to build community to fill this strategic gap. Speakers: Diana Burley, Vice Provost Research & Innovation, American University Tatyana Sanchez, Content and Programming Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 The Impact of AI for Cybersecurity on the Healthcare Sector 34:45
34:45
Spill senere
Spill senere
Lister
Lik
Likt34:45
In today’s digital world, organizations are increasingly impacted by AI for the good and bad. AI is being used in the healthcare industry for a variety of reasons. Despite AI being a resource for the healthcare sector it also comes with challenges. Join this podcast as we discuss: • How the healthcare can prepare for combatting AI-driven cyber threats • What steps should be taken now, next weeks, next months • Strategy for adoption of AI for cybersecurity • Upskilling your team • Realistic expectations…

1 Shielding Small Businesses: Tips for Defending Against Cyber Threats 17:35
17:35
Spill senere
Spill senere
Lister
Lik
Likt17:35
We engage in a dynamic discussion our guests who will share their experiences in cyber and thoughts on the cyber risks for small businesses where there is a crucial gap in the cybersecurity market. Focusing on the unmet needs of small businesses, guests will discuss the importance of providing support and solutions tailored to this underserved sector accompanied by use cases and real-world examples. Speakers: Tiffiny Bryant, Information Security Analyst, Shipt Inc. Nick Gipson, CEO, Gipson Cyber, Jordyn Short, Collaborator, Stats on Stats Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Inclusion Research: Women in CyberSecurity (WiCyS) 20:05
20:05
Spill senere
Spill senere
Lister
Lik
Likt20:05
Diversity, Equity, and Inclusion (DEI) has long been talked about in an effort to diversify the workforce, but what are organizations really doing to change organizational culture. Understanding different perspectives on inclusion is key to informing how to create effective change to help attract and retain talent. Join this podcast to learn about the findings of inclusion research that Women in CyberSecurity (WiCys) have conducted. Speakers: Lynn Dohm, Executive Director, Women in CyberSecurity (WiCyS) Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 DevSecOps Insights and Exciting Horizons 25:29
25:29
Spill senere
Spill senere
Lister
Lik
Likt25:29
Tune in as RSAC 2024 DevSecOps Program Committee Members discuss the trends pulled out from the DevSecOps track. Join this podcast to hear the latest trends, their significance, and what track submissions are telling us about today’s cybersecurity landscape and much more. Speakers: Akira Brand, Application Security Engineer, Akira Brand Consulting Jennifer Czaplewski, Senior Director, Target Chris Romeo, Chief Executive Officer, Devici Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Changing the End Game: AI-Powered Security Solutions 25:07
25:07
Spill senere
Spill senere
Lister
Lik
Likt25:07
How can we ensure we drive product security from the get go? How can we provide security assurance throughout the protect detect and response lifecycle of our services and solutions? How can AI empower our defenders? Leaders from Microsoft and Google will share insights on how AI can improve security efficiencies for the entire product lifecycle. We review real world examples from cloud security solution providers that can benefit the broad security community and defenders. Speakers: Heather Adkins, Vice President, Security Engineering, Google Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft Aanchal Gupta, CVP, Microsoft Tatyana Sanchez, Content and Programming Coordinator, RSA Conference…

1 Neglected Essentials: The Overlooked Basics of Cloud Security 19:03
19:03
Spill senere
Spill senere
Lister
Lik
Likt19:03
This podcast shares research that reveals how many of the most common cloud security risks—despite being tied to basic security guidelines such as the Principle of Least Privilege—are widely overlooked in organizations of all sizes, even in those with a high maturity level in terms of cloud security. We'll explain why that is and investigate approaches to reduce your risk. Speakers: Neil Carpenter, Principal Technical Evangelist, Orca Security Bar Kaduri, Research Team Leader, Orca Security Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
Many organizations have fallen victim to data breaches and exposure. It is crucial to strengthen security as the rise of cyberattacks increases. What are some strong measurements to reduce the risk of data exposure? Join the RSAC 2024 Governance, Risk, and Compliance Program committee as they discuss what decision-makers need to think about from a compliance perspective. Speakers: Elliott Franklin, Chief Information Security Officer, Fortitude-RE James Lugabihl, VP Security - Governance Risk & Compliance, ADP Jamie Sanderson Reid, Director, Cyber Governance Risk & Compliance (GRC), The AES Corporation Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
Protecting data is a critical key when developing products, systems, or services. What are some privacy measures to consider? Join us for a discussion on the overview of Privacy By Design and how to implement it into practice. Speakers: Kim Wuyts, Manager Cyber & Privacy, PwC Belgium Tatyana Sanchez, Content and Programming Coordinator, RSAC…

1 What's Trending in Privacy & Data Protection? 29:37
29:37
Spill senere
Spill senere
Lister
Lik
Likt29:37
With differing privacy approaches that expand many geographies, more organizations are focused on building a strong privacy program. Is it time for Privacy by Design? And where exactly is the intersection between privacy and security? Join the RSAC 2024 Privacy & Data Protection Program Committee for insights into why privacy was a strong trend in the RSAC 2024 submissions. Speakers: John Elliott, Principal Consultant, Withoutfire & Pluralsight Author Laura Koetlze, VP, Group Research Director, Forrester Research Kacy Zurkus, Senior Content Manager, RSA Conference…
What does the cybersecurity workforce of the future looks like, and more importantly, how do we get there? Join us for a discussion on embracing the resilience and brilliance of black women is cyber, all part of the Black Women in Cyber Collective, who are working to protect our privacy and secure our world while also fostering opportunities to expand open pathways into cyber careers. Speakers: Shinesa Cambric, Principal Product Manager, Microsoft Mari Galloway, CEO & Founding Board Member, Cyberjutsu Talya Parker, Founder, Black Girls in Cyber Kacy Zurkus, Senior Content Strategist, RSA Conference…
Recent studies have found that SMS users increasingly do not trust the confidentiality and integrity of SMS, with users also reporting that they can not trust the true identity of the sender. Cybercriminals are able to exploit the weaknesses of this authentication tool, yet it continues to be a technology widely used and relied upon for perceived security in mobile messaging. Join this podcast to learn more about the weaknesses in SMS texting and why it might be time to move on to more robust security technologies. Speakers: Tatyana Bolton, Security Policy Manager, Google Kacy Zurkus, Senior Content Manager, RSAC…

1 You Can’t Have Zero Trust Without API Security 20:06
20:06
Spill senere
Spill senere
Lister
Lik
Likt20:06
Zero Trust Security is often associated with network access and identity access management. However, while those solutions are important and necessary, the evolution in infrastructure and the onset of new attack surfaces require us to expand our perspective and include the API layer in security strategies. Join this podcast to hear industry influencers speak to the origins and evolution of the Zero Trust Framework, why Zero Trust must include the API layer for holistic and resilient security, what each participant sees as the future of Zero Trust, and how the latest reference architecture serves to guide security experts. Richard Bird, CSO, Traceable Chase Cunningham, CSO, Ericom Software Kacy Zurkus, Senior Content Manager, RSA Conference…

1 The Great Debate of a Cybersecurity Skills Gap 27:21
27:21
Spill senere
Spill senere
Lister
Lik
Likt27:21
For years, the cybersecurity industry has supported the narrative that there is a major skills gap, but some have been questioning whether the issues is an actual dearth of qualified candidates who possess the skills needed to fill open roles or an abundance of candidates with some transferable skills who aren't being given an opportunity to gain experience. Join this podcast in which we'll engage in the great debate of whether there actually is a cybersecurity skills gap.…

1 Cybersecurity Community: Fortifying Defense Through Education and Sharing 13:03
13:03
Spill senere
Spill senere
Lister
Lik
Likt13:03
Cyber leaders are unique in their necessity to share. Building community, leveraging best practices with organizations in the same industry is paramount to successfully protecting from threats. This podcast will delve into the world of the cybersecurity community and share some strategies, technologies, and best practices that CISOs can use to enhance the overall security posture of the organization. We'll focus on the importance of collaboration, communication, and relationship-building in cybersecurity.…

1 Misconfigurations and the Business Implications of AI 17:26
17:26
Spill senere
Spill senere
Lister
Lik
Likt17:26
In the race to develop the most powerful generative AI tools, businesses must take steps to avoid the inherent risks of this emerging tech. AI involves sharing massive quantities of data, so even a single misconfiguration can have serious repercussions. What are the new risks and broader business implications of AI that arise as organizations venture to harness its power? This podcast will examine that question and discuss the recent leak of 38 terabytes of data by AI engineers, as well as risk mitigation strategies that should be front of mind for developers and engineers looking to build more AI solutions.…

1 Threat Modeling - Using the DIPP Method (Detect, Identify, Protect, Prevent) 16:38
16:38
Spill senere
Spill senere
Lister
Lik
Likt16:38
Threat modeling is a process that is essential for organizations to use to combat threats, and for mitigating risks. Threat intelligence is a component that can be applied as a method for use with threat modeling to ensure that all risks and vulnerabilities are being properly assessed and techniques are used to protect assets. In this podcast, we'll discuss threat modeling and implementing threat intelligence to identify threat behavior and eliminate risks. Speakers: Tanisha L. Turner, Senior Security QA Engineer, Security Engineering Productivity, Elastic Kacy Zurkus, Senior Content Manager, RSAC…

1 Security Testing at Scale for Cloud Native Technology 17:40
17:40
Spill senere
Spill senere
Lister
Lik
Likt17:40
Cyberattacks have been growing in frequency and severity over the past decade and have increased exponentially with the adoption of cloud-native technology. The pressure is on for organizations to prioritize building and implementing a security testing strategy to avoid becoming the latest cyberattack headline. Speakers: Caroline Wong, Chief Strategy Officer, Cobalt Kacy Zurkus, Senior Content Manager, RSAC…

1 Avoiding Costly Toolset Purchase and Resource Spend for Enterprise-Wide Threat Modeling 16:46
16:46
Spill senere
Spill senere
Lister
Lik
Likt16:46
Threat modeling at an enterprise scale can be costly to implement, scale and maintain, but there are ways in which you can curtail spend in two key areas – threat modeling toolsets cost and resourcing cost. This podcast will discus key spend considerations including purchase model for OOTB software and services as well as resource allocation and required updates. Speakers: Karen Harris, Architect, Threat Modeling Program Lead, JP Morgan Chase Kacy Zurkus, Senior Content Manager, RSA Conference…

1 How to Be a Threat Modeling Subject Matter Expert 14:26
14:26
Spill senere
Spill senere
Lister
Lik
Likt14:26
What is threat modeling and where does it fit in to the overall development process? In this podcast, we'll discuss what threat modeling is, when threat modeling activities are essential, and the skills needed to become a threat modeling expert. Speakers: Ashwini Siddhi, Senior Principal Product Security Advisor, Dell Technologies Kacy Zurkus, Senior Content Manager, RSAC…

1 CMMC: DoD's 3rd Party Supply Chain Risk Management (SCRM) Program 26:24
26:24
Spill senere
Spill senere
Lister
Lik
Likt26:24
The Department of Defense (DoD) is implementing a 3rd Party Supply Chain Risk Management program that will require companies that receive their sensitive information to implement NIST SP 800-171 and then undergo a 3rd Party Cybersecurity Maturity Model Certification (CMMC) event. This podcast will discuss the ripple effects of the requirements and the extent of the impacts. Speakers: Matthew Titcombe, CEO, Peak InfoSec Kacy Zurkus, Senior Content Manager, RSAC…

1 Are Password Managers Still Not Improving Password Habits? 18:35
18:35
Spill senere
Spill senere
Lister
Lik
Likt18:35
Password Managers are required by for employees at most companies, but are they designed to encourage good password hygiene? We conducted a comprehensive study with users who trusts the most popular passwords managers offered in the industry. We discovered that many users are still ignoring password reset notification from their Password Managers and aim to explain why that is the case. Speakers: David Ng, Director of Product Management, Salesforce Jacky Ho, Director of Technology Regulatory Advisory, USB AG…

1 The People-Centric Security Framework - A People Protection Perspective 21:05
21:05
Spill senere
Spill senere
Lister
Lik
Likt21:05
Well-known frameworks and lots of advice exist to help people protect data, privacy, and devices, but minimize the implication of human factors. This podcast will discuss the PCSF and highlight the ways in which it will help organizations move one step closer to having people recognized as the new enterprise edge. The PCSF complements, and does not replace, an organization’s risk management process and cybersecurity program. Speakers: Lucia Milică Stacy, VP, Global Resident Chief Information Security Officer, Proofpoint Kacy Zurkus, Senior Content Manager, RSAC…

1 Tomorrow's Cyber Workforce Requires Access to Cyber Education Today 17:16
17:16
Spill senere
Spill senere
Lister
Lik
Likt17:16
The cybersecurity community has had lots of conversations about workforce development, but it's time to take action. Learn about the efforts to bring cybersecurity education to the K-12 sector as part of the effort to narrow the skills gap and build the next generation of cyber defenders. Speakers: Laurie Salvail, Executive Director, CYBER.ORG Kacy Zurkus, Senior Content Manager, RSA Conference…

1 Cybersecurity Risk in Today’s Telehealth Smart Home 16:46
16:46
Spill senere
Spill senere
Lister
Lik
Likt16:46
In order to mitigate the risks in telehealth devices, healthcare delivery organizations need to identify threats. Join this podcast to hear practical steps to implement a more robust security strategy rooted in standards and best practices that include how to use NIST Frameworks and the work being done by the NCCoE Healthcare team. Speakers: Anahi Santiago, CISO, ChristianaCare Kacy Zurkus, Senior Content Manager, RSAC This podcast is sponsored by Quantinuum. Quantinuum uses the power of quantum computing to keep organizations ahead of cyber risks by providing quantum-computing-hardened encryption keys to provably harden existing security measures.…

1 Driving Resilience: A Discussion on the US National Cybersecurity Strategy 30:32
30:32
Spill senere
Spill senere
Lister
Lik
Likt30:32
The White House published the US National Cybersecurity Strategy that outlines a five-pillared approach to dismantling threat actors, enabling partnerships, and investing in resilience. But what does all that mean for cyber defenders? This podcast will examine the strategy in depth to help listeners both realize the vision and understand roles, responsibilities, and resources in cyber. Speakers: Brandon Pugh, Director, Cybersecurity and Emerging Threats, R Street Institute Megan Stifel, Chief Strategy Officer, Institute for Security and Technology Kacy Zurkus, Senior Content Manager, RSA Conference…
Within the last decade, fraud and cyberattacks have become increasingly focused on exploiting digital identity. The exposure of digital identity as an attack surface has implications for individuals, enterprises, and even our societal structures. In this session we discuss the state of identity-based attack vectors and what the security community is doing to address them. Speakers: Gadalia Montoya Weinberg O'Bryan, CEO, Dapple Security Kacy Zurkus, Senior Content Manager, RSAC…
How much responsibility should people really bear in the big data realm? Does informed consent equate to waiving rights? Is it realistic that they understand how data travels and is there an incorrect underlying assumption that data is their priority when they are consenting to its collection or use? In this podcast, we will examine the reasons people sign consent forms (to access care or information), the limited ability of informed consent to protect people from hacking and cybersecurity breaches, and its irrelevance to compensating people whose data is aggregated, sold, and resold. We will explore the limitations of informed consent in governing data collection and use in the healthcare arena. Speakers: Anne Zimmerman, Founder, Modern Bioethics Kacy Zurkus, Content Strategist, RSAC…
The Program Committee for the RSAC 2022 Privacy track was challenged with selecting the top session that would make it onto the agenda, but privacy topics were not limited to this one track. So why is privacy trending, and what are this year’s privacy trends? Join two members of the Privacy Program Committee as they reveal their favorite picks and what attendees have to look forward to at Conference. Speakers: Bernard Brantley, Chief Information Security Officer, Corelight Francesca Ginexi, Privacy Policy Manager, Facebook Kacy Zurkus, Content Strategist, RSAC…

1 Shift-left! Scanning for Security Compliance from Day Zero 29:08
29:08
Spill senere
Spill senere
Lister
Lik
Likt29:08
Migrating to public cloud introduces new attack surfaces commonly the exploitation of misconfigured resources. In a cloud landscape that contains millions of resources, how do we detect these threats. This session explores the journey from security policy documentation to scanning and detecting security compliance violations in product infrastructure from the start of the development life cycle. Joe McCrea, Cloud Security DevOps Engineer, SAP Mariam Triki, DevSecOps Engineer, SAP Kacy Zurkus, Content Strategist, RSAC…

1 Cloud Security & Cloud Sec Ops: Trends that Matter Most for 2022 33:05
33:05
Spill senere
Spill senere
Lister
Lik
Likt33:05
The importance of cloud security has, perhaps, never been more critical, following massive shifts to remote workforces and ramped up digital transformation across organizations of all sizes. In this podcast, two members of the Cloud Security & Cloud Sec Ops Program Committee discuss trends observed in their selection process for 2022 RSA Conference and what matters most as organizations look to secure and further mature their multi-cloud and hybrid deployments. Speakers: Britta Glade, Senior Director, Content & Curation, RSA Conference Shawn Harris, Director, Information Security, Starbucks Rich Mogull, CEO/CISO, Securosis…

1 Turn It Up to 11: MITRE’s 11 Strategies for a World Class Cybersecurity Operations Center (CSOC) 30:38
30:38
Spill senere
Spill senere
Lister
Lik
Likt30:38
Refreshed and updated to include the latest technologies and best practices in cybersecurity operations, guests will share key takeaways from the new 11 Strategies for Operating a World Class Cybersecurity Operations Center (CSOC) book that will be coming out later this year. We will discuss the 11 strategies, how to balance the CSOCs core incident response mission with supporting functions such as threat intelligence and threat hunting, the importance of growing staff in house, and why the CSOC can never stop evolving. As with the original book, this new edition will include a free electronic version available to everyone. Speakers: Kathryn Knerler, Department Manager, Cyber New Professionals Development Program, The MITRE Corporation Ingrid Parker, Chief Engineer, Homeland Security Enterprise Division, The MITRE Corporation Kacy Zurkus, Content Strategist, RSAC…

1 Pay What You Owe: Fiduciary Duty and Ransomware 42:25
42:25
Spill senere
Spill senere
Lister
Lik
Likt42:25
In today’s world, data is currency. With that in mind, organizations need to consider the fiduciary duty they owe to data subjects, especially when they suffer a ransomware attack. This session outlines what types of fiduciary duties organizations have, why paying a ransom falls under those duties, how negotiations mitigate harm, and three steps for effectively responding to a ransomware attack. Speakers: Robert Fitzgerald, Founder and CEO, Arcas Risk Management Karen Walsh, CEO and Founder, Allegro Solutions Kacy Zurkus, Content Strategist, RSAC…

1 Cybersecurity Jobs that Don't Require a Cybersecurity Background 25:45
25:45
Spill senere
Spill senere
Lister
Lik
Likt25:45
Have you been wondering how to get into Cybersecurity? It may seem that you have to be a security tester or expert. It's not true! There are many paths into Cybersecurity using your existing experience, skills, and schooling. This talk will show the multiple paths people have followed into the Schneider Electric IT Security and Application Security organizations. Cassie Crossley, Director, Product Security Office, Schneider Electric Kacy Zurkus, Content Strategist, RSAC…
You've gotten the job in tech—congrats! So now what do you do? We’ve heard stories from those who struggled with overcoming unexpected obstacles while new to the job. Let’s talk about what you can do to prepare for the unexpected. In this podcast, you’ll hear from an industry expert on ways to level up your career. This talk will provide various tools and resources to help navigate the tech space and make the most of what you have and help you in reaching your future goals. Speakers: Mari Galloway, Chief Executive Officer and Founding Board Member, Women’s Society of Cyberjutsu Kacy Zurkus, Content Strategist, RSAC…

1 Thinking about Android – A Multi-Faceted Discussion 27:07
27:07
Spill senere
Spill senere
Lister
Lik
Likt27:07
Humans engage with Android technology in myriad ways, but how has the technology been used to date and how is it evolving? This podcast will explore the ways in which the Android ecosystem has evolved by looking at Android from a techno-sociological, security, and privacy context. We will discuss dimensions of privacy, the impact Android has had on humans, the kinds of threats we are seeing in the wild, the security challenges that need to be addressed, and the evolution of features like Digital Well Being. Speakers: Aditi Bhatnagar, Product Security Engineer, Atlassian Kacy Zurkus, Content Strategist, RSAC…

1 Trust, but Verify: Maintaining Democracy Despite Информационные контрмеры 34:19
34:19
Spill senere
Spill senere
Lister
Lik
Likt34:19
In this podcast, we discuss how countries have influenced worldwide elections historically and in modern day using cyberwarfare. We explore how countries and critical infrastructure respond to these attacks and how they should respond in the future. By the end, we brainstorm the ways to disrupt a future election in order to understand how to better protect it. Geoff Hale, Senior Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency Allie Mellen, Analyst, Security and Risk, Forrester Research…

1 The Ransomware Paradigm Change — Lessons from Insurers and Breach Coaches 49:53
49:53
Spill senere
Spill senere
Lister
Lik
Likt49:53
Throughout 2020, ransomware was consistently amongst the most challenging cyber exposures for organizations to manage. The insurance market can provide critical insights on how to understand the evolving ransomware landscape, given the volume of insurance claims being seen and emerging data on loss and exposure trends. This session will bring together experts from across the cyber insurance and breach coach space and give end to end insights on the financial and organizational impact of ransomware, risk implications, and challenges that will be seen in the market. Speakers: Marcello Antonucci, Global Cyber & Tech Claims Team Leader, Beazley Benjamin Di Marco, Cyber Specialist, Willis Towers Watson Christina Terplan, Founding Partner and President, Atheria Law This episode is brought to you by Axonius. Axonius helps organizations immediately know what assets they have, and shows which devices, cloud instances, and users adhere to or deviate from security policies. Try it free at axonius.com/rsac…

1 Hunting Sodinokibi: Insights from Tracking the King of Ransomware 31:49
31:49
Spill senere
Spill senere
Lister
Lik
Likt31:49
Drawing on original research, the speakers will dive deep into one of the most prominent ransomware strains today: Sodinokibi/REvil. By tracking its operators’ activity in affected organizations, on the dark web, and through the group’s public blog, we will bring our collective insights to the audience, detailing how Sodinokibi operates, its malware uniqueness, and the damage it has inflicted. Speakers: Limor Kessem, Executive Security Advisor, IBM Security Camille Jackson Singleton, Strategic Cyber Threat Lead, IBM Kacy Zurkus, Content Strategist, RSAC…

1 Who’s Driving Your Security Architecture Bus? 35:32
35:32
Spill senere
Spill senere
Lister
Lik
Likt35:32
With the increased scale and pace of automated processes along with migrations to the cloud, proper design of security architecture becomes a critical component of your overall IT architecture implementation. Considering this, what should your business prioritize as the ultimate driver for security architecture decisions - and where does risk, privacy and compliance fit into the picture? Speakers: Shinesa Cambric, CISSP, CISA, CISM, CDPSE, Principal Program Manager, Microsoft Aparna Murthy, Aparna Murthy, CA, CPA, Principal Risk and Compliance Consultant Kacy Zurkus, Content Strategist, RSAC…

1 The Journey Toward a Singular Security Framework: Lessons from Finland 20:18
20:18
Spill senere
Spill senere
Lister
Lik
Likt20:18
Turku Energia - a Finnish energy distribution company - secured its power supply & IT network for the city’s 200,000 citizens. Utility SCADA systems are hacking targets, due to the damage that can be inflicted by sending cities dark or damaging the grids. The utility’s IT team ensured data integrity, visibility, and rapid threat detection and remediation within both IT and OT environments. Speakers: Vikram Sharma, Senior Engineering Manager, IoT, Cisco Kacy Zurkus, Content Strategist, RSAC…

1 The Art & Science of Using Cybersecurity Talent Frameworks & Taxonomies 31:14
31:14
Spill senere
Spill senere
Lister
Lik
Likt31:14
Study after study shows cybersecurity job descriptions lack clarity across most roles and industries — stifling talent recruitment, development and retention efforts. Infosec Institute and Aspen Cybersecurity Workforce Coalition will provide data-backed insights into how organizations are aligning job descriptions and training to tools like the NICE Framework, including what’s working and what’s not. Speakers: David Forscey, Senior Policy Analyst, National Governors Association Megan Sawle, VP of Research & Marketing, Infosec Kacy Zurkus, Content Strategist, RSA Conference…

1 Effective or Confusing: New Structures and Regulations in Cybersecurity 23:05
23:05
Spill senere
Spill senere
Lister
Lik
Likt23:05
Over the course of the last two years, cybersecurity planning and thought leadership have picked up with a parallel increase in regulation, Congressional action, and government reorganization. The Cyberspace Solarium Commission recommended and got a National Cyber Director and incident reporting legislation through the hard work of the SASC, HASC, and HSGAC, but where do these changes leave us now? Is the National Cyber Director leading the federal government effort, or are government turf battles making leadership in cyber confusing? And what about incident reporting - how many new proposals have we seen, and which are the most critical to understand? Join us for a discussion of all of these issues and what the cybersecurity landscape might look like in a year or five years from now. Speakers: Tatyana Bolton, Policy Director, Cybersecurity and Emerging Threats, The R Street Institute Kacy Zurkus, Content Strategist, RSAC…

1 What is DevSecOps and why is it important? 18:23
18:23
Spill senere
Spill senere
Lister
Lik
Likt18:23
Integrating security into the development lifecycle can be a challenge, especially for those who don’t understand why security matters to development and operations. What’s the ROI of DevSecOps? What are the key KPIs? Join us for an insightful conversation that explains why DevSecOps is important while shining a spotlight on some DevSecOps bloopers to avoid. Our guests will also expose the cost of bad DevSecOps and offer suggestions for how to measure developers on security. Speakers: Keenan Skelly, CEO, Shadowbyte Stephanie Simpson, Vice President of Product, SCYTHE…

1 Affirming LGBTQ Populations in Virtual Health through DevSecOps & Software Integrity 30:55
30:55
Spill senere
Spill senere
Lister
Lik
Likt30:55
Virtual health providers create favorable conditions for the LGBTQ population's access to healthcare, an influx of electronic personal health information, and massive increases in cyber threats. Using software flaws, bad actors increasingly target healthcare systems to steal, monetize, and affect availability of data. This session explores software integrity and DevSecOps approaches to secure highly interconnected digital healthcare systems. Speakers: Safi Mojidi, Head of InfoSec, FOLX Health Kacy Zurkus, Content Strategist, RSA Conference…

1 Get Your Head IN the Clouds: SOC Teams Must Live in Clouds to Secure Them 35:02
35:02
Spill senere
Spill senere
Lister
Lik
Likt35:02
Massive cloud proliferation has driven huge increases in IT and security complexity, the vast majority of which come from trying to force fit legacy concepts, processes and even tools, into a cloud context. This will cover the most important considerations and requirements facing organizations to adequately understand and affect their new reality – and evolve their security thinking. Speakers: Nipun Gupta, Senior Security Leader, Devo Sounil Yu, CISO and Head of Research, JupiterOne Kacy Zurkus, Content Strategist, RSAC…
Leading and guiding a data-driven security program as a BISO can be challenging. Data is everywhere and owned by many departments. Once a BISO has found that data they need, they must overcome the challenges of data access, storage, normalization and all the other steps required to turn that data into an actionable story. Fortunately, the Cloud can make this easier and faster. Speakers: James Binford, Director and Business Information Security Officer, Humana Ashish Rajan, Host of Cloud Security Podcast & SANS Trainer, Cloud Security Kacy Zurkus, Content Strategist, RSAC…

1 How Threats in Today’s Landscape Can Be Exploited (And Avoided) 28:33
28:33
Spill senere
Spill senere
Lister
Lik
Likt28:33
What does an attacker need to do to exploit a threat? Join us to discuss the TTPs attackers are using to exploit myriad threats in today’s threat landscape. Our guests will look across different sectors to understand new and emerging threats, how those threats can be exploited, and steps organizations can take to avoid being the next victim of a cyberattack. Speakers: Jerone Jones, Founder, JustOne Solutions, LLC Alexiaa Jordan, Cyber Security Consultant, JustOne Solutions…

1 Defending with Passion: Cultivating a Passion for Evolving as a Cyber Defender 19:53
19:53
Spill senere
Spill senere
Lister
Lik
Likt19:53
The technology we work to secure is ever evolving, as are the threat actors that are out there trying to exploit those technologies. Hence, the challenge we face today with securing and then defending those advances in technology requires people that are just as excited about learning how to defend that new technology as someone once was about creating it. There is absolutely someone out there that is passionate about hacking their way into that new technological advancement, no matter what it is. Join this podcast to learn what motivates hackers and how to help instill a passion for defending against cyber threats in the members of a security team. Speakers: Tiffiny Bryant, Cyber Security Analyst, Crystal Clear Technologies, Inc Kacy Zurkus, Content Strategist, RSAC…

1 SBOM: Where We’ve Come From, and Where We’re Going 22:32
22:32
Spill senere
Spill senere
Lister
Lik
Likt22:32
Across the security world, there’s a growing appreciation about the need to better understand our software supply chain. Transparency won’t solve all our problems, but will lay a foundation for greater resilience and more informed decisions. This discussion will review the basics of SBOM, using the recent log4j vulnerability to understand how SBOM can help across the software ecosystem—and also understand its limits. We’ll also delve into the future of SBOM, exploring some of the gaps, where we need to focus to advance the state of the art. Our ultimate goal should be the integration of SBOM into the broader vulnerability and security data ecosystem through automation. Speakers: Allan Friedman, Senior Advisor and Strategist, CISA Kacy Zurkus, Content Strategist, RSA Conference…

1 Zero-sum Security: Zero Trust is Compromised as Long as Passwords Remain 33:37
33:37
Spill senere
Spill senere
Lister
Lik
Likt33:37
Furthering the White House Cybersecurity EO, the OMB just released a Zero Trust Architecture Strategy with one of its 5 pillars focused on identity, and requiring implementation of strong, phishing-resistant MFA for agency and citizen access. This session explores the gatekeeper role of identity in ZTA, and the business and technology challenges faced in managing access while passwords persist. Speakers: Mario Duarte, Vice President of Security, Snowflake Tom (TJ) Jermoluk, CEO and Co-Founder, Beyond Identity Kacy Zurkus, Content Strategist, RSA Conference…

1 Beware AI Landmines: Legal and Policy Considerations Revisited 25:07
25:07
Spill senere
Spill senere
Lister
Lik
Likt25:07
In 2021, artificial intelligence emerged as a viable technology, which warranted a conversation about the legal and policy considerations underlying modern society. We’ll look back at the ethical, legal, and policy considerations discussed in May of 2021 and ask where are we now? What more needs to be done in order to maximize a successful implementation and minimize potential risk? Speakers: Behnam Dayanim, Partner, Global Chair of Privacy & Cybersecurity Practice and Chair, Advertising & Gaming Practice, Paul Hastings LLP Kacy Zurkus, Content Strategist, RSAC…

1 The Road to Smart Cities is Paved with Good AI Intentions 22:58
22:58
Spill senere
Spill senere
Lister
Lik
Likt22:58
In a world where the terms “AI” and “machine learning” are used liberally to describe new products and technologies, creating an assessment framework for buyers (and sellers!) to evaluate these products is essential. In this session, we’ll follow the Cost and Vulnerability dimension of MITRE’s AI Relevance Competence Cost Score (ARCCS) Framework and consider the security and privacy implications of AI for smart cities and the humans that travel them. Speakers: Anne Townsend, Department Manager and Cybersecurity Engineer, The MITRE Corporation Kacy Zurkus, Content Strategist, RSAC…

1 What’s Trending in Protecting Data & the Supply Chain 39:00
39:00
Spill senere
Spill senere
Lister
Lik
Likt39:00
Protecting Data & the Supply Chain so deeply intertwined with everything from software to identity. Join Program Committee members Edna Conway and Diana Kelley as they discuss the challenges that folks are struggling with right now and some potential mitigation strategies. We'll explore what’s happening with Log4j and other vulnerabilities as well as the need for a software Bill of Materials (SBOM). Speakers: Edna Conway, Vice President, Security & Risk Officer, Azure, VP, Chief Security & Risk Officer, Azure Microsoft Diana Kelley, CTO and Co-Founder, SecurityCurve Kacy Zurkus, Content Strategist, RSAC…

1 Cybersecurity? Isn't it really the Data Care industry? 29:30
29:30
Spill senere
Spill senere
Lister
Lik
Likt29:30
Countless conversations with students, politicians, and leaders about cybersecurity suggest that the term ‘cybersecurity’ does not invoke the personal sense of responsibility necessary, nor is it inviting to the majority of the public including minorities, women and young adults who we want to seek a career in this field. How do we change that? Let's start with Data Care. In this podcast, our guests will discuss what’s missing from the term ‘cybersecurity’ and how taking a ‘Data Care’ approach can help us all to build a more secure world. Speakers: Britta Glade, Senior Director, Content & Curation, RSA Conference Ron Gula, President, Gula Tech Adventures Cyndi Gula, Managing Partner, Gula Tech Adventures…

1 Privacy Tech: The Crossroads of Cybersecurity 23:30
23:30
Spill senere
Spill senere
Lister
Lik
Likt23:30
The Rise of Privacy Tech (TROPT) recently released a whitepaper categorizing the privacy tech landscape. It explores privacy tech's relationship to its adjacent industries, which include cybersecurity, identity management, and data governance, among others. Join this podcast for a look at key takeaways and insight into the 8-month-long working group drafting process. Speakers: Lourdes Turrecha, Founder and CEO, The Rise of Privacy Tech Kacy Zurkus, Content Strategist, RSAC…

1 What Do We Owe Each Other? Securing Systemic Dependencies and Beyond 19:33
19:33
Spill senere
Spill senere
Lister
Lik
Likt19:33
Recognizing that the security of our interconnected world is as interdependent and fragile as a Jenga puzzle, how do we ensure that the entire system doesn’t fall apart when a single block is pulled? What do we ow each other, and how do we work together to ensure those organizations—be they non-profits, NGOs, or public schools and institutions—have the resources they need to be resilient in the face of a cyberattack? In this podcast, we’ll examine the security poverty line and our systemic dependencies and explore what we owe each other in order to ensure a more secure world. Speakers: Dr. Kelley Misata, Founder and CEO, Sightline Security Kacy Zurkus, Content Strategist, RSAC…

1 Tracers in the Dark: A Discussion with Andy Greenberg 26:04
26:04
Spill senere
Spill senere
Lister
Lik
Likt26:04
In the story of Gyge’s Ring, Plato asserts that if humans had the power to be invisible, they would act without consequence. In his book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, Greenberg details the truth of Plato’s claim as he recounts stories of criminal activity on the dark web, where people believed they were acting anonymously without the risk of getting caught. Join this podcast to hear Greenberg discuss his favorite scenes in the book that reveals how researchers and investigators were able to trace cryptocurrency exchanges. Speakers: Andy Greenberg, Senior Writer, Wired Kacy Zurkus, Senior Content Manager, RSAC…

1 Pulling Back the Curtain on the Dark Web Payment Card Landscape 20:04
20:04
Spill senere
Spill senere
Lister
Lik
Likt20:04
Intrigued by the dark web payment card landscape? Join us for this RSAC 365 podcast to hear about how the dark web payment card landscape was affected by the Russia-Ukraine war, exploring everything from the magecart infections/e-skimmers, which are used to steal the payment card data to “checkers”, which are tools used by cybercriminals to check the stolen payment cards for validity and 3-D bypass methods, and the tools cybercriminals. Get a sneak peak at the upcoming “Crypto Drainer” report, which details this as-a-service tool cybercriminals use to trick crypto centric individuals into providing access to their wallets. Speakers: Ilya Volovik, Senior Manager - Payment Fraud Intelligence Team, Recorded Future Kacy Zurkus, Senior Content Manager, RSAC…
Cybersecurity and the resiliency of space assets are a priority because of the critical infrastructure services they provide. This session will discuss the attack vectors and mitigation approaches of exploits that can impact them as well as how the cyber security and space asset resiliency range will be used to test and validate their confidentiality, integrity, and availability. Speakers: Barbara Grofe, Lead Designer, Spartan Corp Kacy Zurkus, Content Strategist, RSAC…

1 Critical Infrastructure at Risk: Uncovering the Danger of insecure-by-design Control System Software 28:42
28:42
Spill senere
Spill senere
Lister
Lik
Likt28:42
In this podcast, we will uncover the realities of insecure control systems software in critical infrastructure. From discovering zero-days to exposing vulnerabilities in built-in features, we'll explore the role of both vendors and operators in safeguarding our essential utilities. By the end, listeners will have a new perspective on the need to implement strong security practices into the foundation of the control systems that make modern life possible. Don't miss out on this crucial conversation about the current state and the future of our critical infrastructure! Speakers: Brian Foster, GMS Cybersecurity Lead, South California Edison Kacy Zurkus, Content Strategist, RSAC…

1 A Quantum-Ready Board: Governance and Cyber Risk Oversight 21:44
21:44
Spill senere
Spill senere
Lister
Lik
Likt21:44
There is a general lack of quantum risk awareness among board members. The emergence of powerful quantum computers are an impending threat to our digital ecosystems — e.g. mobile phones and internet — because they can conceivably crack classical encryption. A quantum algorithm with that capability already exists; yet, quantum risk management is not a standard topic discussed at board meetings. Speakers: Maëva Ghonda, Host, Quantum AI Institute Podcast and Senior Fellow of HQS Quantum Simulations Dr. Lily Chen, Project Leader, Mathematician, Cryptographic Technology Group, NIST Kacy Zurkus, Content Strategist, RSAC…

1 Ransomware Operators Can Circle Defenses: Proactive Defense Strategies 28:54
28:54
Spill senere
Spill senere
Lister
Lik
Likt28:54
Ransomware Operators have not only increased the ransoms they demand but are also using additional coercion techniques to perform multifaceted extortion attacks. Between us, we have worked on several ransomware incidents observing closely the challenges that organizations face while battling and remediating ransomware incidents. Based on the learnings from responding to such incidents, we will share our learnings and thoughts on the ransomware attack life cycle, practical security controls and enforcement measures to defend against and limit the impact of ransomware attacks. Speakers: Anurag Khanna, Manager, CrowdStrike Services Thirumalai Natarajan, Senior Manager, Mandiant Consulting Kacy Zurkus, Content Strategist, RSAC…

1 Beyond MFA: Why Multi-factor Alone Is Not a Fail-Safe for Identity Protection 22:49
22:49
Spill senere
Spill senere
Lister
Lik
Likt22:49
Most organizations have moved beyond the insecure username and password access control a long time ago and started using multifactor authentication. But as Yahoo, Deloitte, and LinkedIn know, MFA won’t always save the company from a data breach. Not only has MFA access been defeated multiple times by attackers, but users hate it. It’s cumbersome, annoying, increasingly exploitable. In this podcast Violet Sullivan and Jessica Smith will discuss the evolution of MFA, why and how it can be exploited, and what organizations can and should do to address access control in a way that keeps their data security and users happy. Speakers: Jessica Smith, Vice President of Client Services, AllClear ID Health Violet Sullivan, Esq. CIPP/US, Vice President of Client Engagement, Redpoint Cybersecurity Kacy Zurkus, Content Strategist, RSAC…

1 Transcendent Tango: The Role of Cryptography in Establishing Zero Trust Identity 12:08
12:08
Spill senere
Spill senere
Lister
Lik
Likt12:08
In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world. Speakers: Karen Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot Kacy Zurkus, Content Strategist, RSA Conference…

1 Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX 21:58
21:58
Spill senere
Spill senere
Lister
Lik
Likt21:58
Security analysts must fight both attackers and the products and services they rely on to drive their detection and response capabilities because of a lack of usability of security tools and processes. This podcast explains an emerging cybersecurity technology trend: analyst experience (AX). Join us to understand how AX can enable your team to find more effective security tools, build better workflows, and help security analysts make faster, more accurate decisions. Speakers: Allie Mellen, Analyst, Security and Risk, Forrester Research Jeff Pollard, Vice President & Principal Analyst, Forrester Kacy Zurkus, Content Strategist, RSA Conference…

1 September Spotlight: From Hacker Kid to Cyber Pro 14:54
14:54
Spill senere
Spill senere
Lister
Lik
Likt14:54
Back in 2017 New America and The Christian Science Monitor hosted then 14-year-old and CEO of VannTechCyber LLC, Paul Vann. He was indeed a rising star in the field, but where is Vann now? Join this RSAC 365 podcast as we shine a spotlight on the making of a cyber professional. We’ll feature Paul Vann, who’s now a senior at the University of Virginia and a Developer at Cyborg Security. Vann will inspire listeners with his story of growing from a “hacker kid” to a developer working on a malware analysis tool as well as his goals and aspirations for a future in the industry. Speakers: Paul Vann, Student, University of Virginia Kacy Zurkus, Content Strategist, RSA Conference…

1 Overcoming Barriers to Intelligence Sharing 15:15
15:15
Spill senere
Spill senere
Lister
Lik
Likt15:15
When it comes to defending critical infrastructure from cyber threats, understanding the threat landscape is critical to assessing risk and implementing a robust security strategy. Threat intelligence enables organizations to identify and react to threats, and we know that having the right attack surface intelligence informs the processes and procedures needed to quickly recover. Yet, intelligence sharing remains a problem for defenders. In this podcast we'll explore the value in public/private partnerships, the barriers to threat intelligence, and how organizations can collaborate to overcome those barriers and improve resilience. Speakers: Erin Miller, Executive Director, NCC/Space ISAC Kacy Zurkus, Content Strategist, RSA Conference…

1 What Could a U.S. Federal Data Privacy and Security Law Look Like? 21:08
21:08
Spill senere
Spill senere
Lister
Lik
Likt21:08
Congress has tried for years to pass a comprehensive federal data privacy and security law without success, which impacts consumers, industry, and security. Meanwhile, other countries and multiple U.S. states have moved forward with laws. However, the bipartisan, bicameral American Data Privacy and Protection Act (ADPPA) could be an opportunity to change this. This podcast will cover why data privacy and security legislation is important and look at the R Street Institute’s report on reaching consensus on traditional roadblocks, specific aspects of the bill like data security, the bill’s current status and possible next steps, and remaining challenges. Speakers: Brandon Pugh, Resident Senior Fellow and Policy Counsel, Cybersecurity and Emerging Threats, R Street Institute Kacy Zurkus, Content Strategist, RSA Conference…

1 The Cyber Physical War: Does the Investment Match the Hype? 18:26
18:26
Spill senere
Spill senere
Lister
Lik
Likt18:26
While there seems to be a growing awareness of the threats to the cyber-physical world with cybercriminals increasingly targeting industrial organizations within critical infrastructure, are current investments, regulations, and actions enough to stop attackers. In this podcast, we’ll have a follow up Q&A to the RSAC 2022 session, “The Cyber Physical War—Lessons from the Digital Front Line,” to understand what more must be done to protect industrial organizations. Speakers: Ian Bramson, Global Head of Industrial Cybersecurity, ABS Group Kacy Zurkus, Content Strategist, RSA Conference…

1 "Anatomy of Smart Living” - Limit Cyber Exposure by Embracing Mobility and IoT 19:30
19:30
Spill senere
Spill senere
Lister
Lik
Likt19:30
We live very “smart” lives equipped to stay connected anywhere, any time. Getting connected is easy, securing it may be a fool’s errand if not approached properly. Say goodbye to the days of signature-based detection and say hello to IoT data anomaly and volatility predictive analysis for advanced “on the go” monitoring, detection and response. In this podcast, we will discuss novel approaches in using data analytics models from financial market trading systems (quant) to determine security volatility when faced with unprecedented and overwhelming volumes of data. We’ll propose potential solutions called the Cyber VIX and engineering concepts to test cyber defenses such as the “shake down test” and where failures and blind spots can be predicted and modeled. Speakers: Peter Tran, CISO & EVP Global Cyber and Product Security Solutions, InferSight LLC Kacy Zurkus, Content Strategist, RSA Conference…

1 Incentivizing Collaboration and Promoting Zero Trust Adoption 23:20
23:20
Spill senere
Spill senere
Lister
Lik
Likt23:20
Our world is becoming increasingly interconnected and more interdependent than ever before. We continue to see an increase in cybercrime, which brings us to an inflection point - who's responsible for addressing security in our integrated digital world and what should be the role of policymakers and industry regulators in promoting good cyber hygiene and incentivizing collaboration? Speakers: Shinesa Cambric, CISSP, CISA, CISM, CDPSE, Product Manager, Microsoft Jay Hira, Cyber Security Strategy and Transformation Director This podcast is sponsored by DNSFilter. DNSFilter offers industry leading threat protection for companies across the globe. Utilizing powerful artificial intelligence, we identify and block threats 7 days earlier than competitors.…

1 Catch a Hacker if You Can: Social Engineering Meets Risk Mitigation 27:04
27:04
Spill senere
Spill senere
Lister
Lik
Likt27:04
Rachel Tobac hacks people based on publicly available information. Camille Stewart encourages people to mitigate risk and defend against Rachel’s methods. We’re bringing these two industry leaders together for this one-of-a-kind podcast that will explore social engineering risks and highlight some best practices to help protect users and organizations. Presenters: Camille Stewart, Cyber Fellow, Harvard Belfer Center and Head of Security Policy, Google Play & Android, Google Rachel Tobac, CEO, SocialProof Security, White Hat Hacker Kacy Zurkus, Content Strategist, RSA Conference…

1 Fraud on the Rise! An In-Depth Look at the FBI’s 2020 Internet Crime Report 24:07
24:07
Spill senere
Spill senere
Lister
Lik
Likt24:07
The FBI’s Internet Crime Complaint Center received more than 791,000 complaints in 2020—a record number, representing a 69% increase over 2019. Join us for an in-depth discussion as we examine details of the report with FBI’s Cyber Division's Deputy Assistant Director Herb Stapleton. Speakers: Herb Stapleton, Deputy Assistant Director, Cyber Division, FBI Kacy Zurkus, Content Strategist, RSA Conference…

1 Reduce the Cybersecurity Risks for Property Management Systems through Secure Payment Practices 42:02
42:02
Spill senere
Spill senere
Lister
Lik
Likt42:02
Hotel chain data breaches have resulted in huge financial loss and reputational harm. Unlike other consumer-facing businesses, such as retail stores, hotels must hold onto payment card data for extended periods passing this valuable data among many participants in the payment security ecosystem as customers make reservations and complete travel. In this podcast, our guests will identify and discuss how organizations can reduce the risks associated with handling payment card information for hotels and, in turn, begin to strengthen the cybersecurity of the property management system (PMS). For more information, visit NIST’s project on Securing Property Management Systems. https://www.nccoe.nist.gov/projects/use-cases/securing-property-management-systems Speakers: John T. Bell, Founder and Principle Consultant, Ajontech LLC Arshad Noor, CTO, StrongKey Bill Newhouse, Cybersecurity Engineer, National Cybersecurity Center of Excellence (NCCoE) Kacy Zurkus, Content Strategist, RSA Conference…

1 Detect BEC and Vishing Attacks Before the Deal Is Done 29:48
29:48
Spill senere
Spill senere
Lister
Lik
Likt29:48
Business email compromise (BEC) has made a comeback. Vishing calls have proven profitable for cybercriminals as well. How can you stay ahead of these threats and detect fraud before any money is sent? Join us for a podcast that discusses how these attacks work, who they target and why. Our guests will also offer tips on what to do both professionally and personally to limit risk—from small things like training those who are handling the financial transactions to working with the banks and the cyber team. Speakers: Nicole Beckwith, Staff Cyber Intelligence Analyst, GE Aviation Ursula Cowan, Threat Research Analyst, FireEye/Mandiant Kacy Zurkus, Content Strategist, RSA Conference…

1 Could 2021 Be the Year of Product Security? 27:25
27:25
Spill senere
Spill senere
Lister
Lik
Likt27:25
In the industrial space, we’ve seen more organizations bringing in Chief Product Security Officers—with good reason. Security needs to be baked into the products that companies are delivering to customers, particularly when there is a life/safety impact. But the need for product security extends beyond ICS and OT. Join us with our guests Megan Samford and Patrick Miller who will look at why product security is the new frontier of the cybersecurity industry. Presenters: Patrick Miller, Founder, Director & President Emeritus, EnergySec and US Megan Samford, Chief Product Security Officer, Schneider Electric Kacy Zurkus, Content Strategist, RSA Conference…

1 Rising Flaws, and Slow to Fix: What’s at Stake for Software Security? 24:30
24:30
Spill senere
Spill senere
Lister
Lik
Likt24:30
The majority of applications contain at least one security flaw and fixing those flaws typically takes months. Automating scanning and scanning via API can help development teams fix faster by a pretty wide margin. Veracode’s Chris Eng and Cyentia’s Jay Jacobs explore what’s driving the volume of code flaws, what factors influence fix rates, how organizations with higher fix rates are tackling the problem successfully, and automation as a best practice for DevSecOps and an action developers can take to "nurture" their apps to better security. Presenters: Chris Eng, Chief Research Officer, Veracode Jay Jacobs, Co-Founder and Chief Data Scientist, Cyentia Institute Kacy Zurkus, Content Strategist, RSA Conference…

1 How to Apply Pandemic Principles to Battle Cyber Outbreaks 47:51
47:51
Spill senere
Spill senere
Lister
Lik
Likt47:51
Principles of epidemiology can be effectively applied to cyber security, with some adaptations. What do travel quarantines and firewalls, social distancing and port closures have in common? Learn how much cyber incident responders can learn from the recent pandemic that effectively shut down so many of the human connections in the modern world. Presenters: Steve Faruque, Cyber Security Manager, IBM Dr. Manisha Juthani-Metha, Associate Professor of Medicine and Epidemiology and Infectious Diseases Specialist, Yale School of Medicine and Yale New Haven Hospital Kacy Zurkus, Content Strategist, RSAC This podcast is sponsored by Axonius. Axonius is the cybersecurity asset management platform that gives organizations a comprehensive asset inventory, uncovers security solution coverage gaps, and automatically validates and enforces security policies.…
The submissions and decisions have been made. The Program Committee’s selections will soon be announced. Before that happens join me and two members of a Hackers & Threats PC to discuss what trends they saw come through in this year's RSA Conference submissions. They'll also give a sneak peak into what attendees of RSAC 2021 have to look forward to on the Hackers & Threats track. Greg Day, VP and Chief Security Officer, EMEA, Palo Alto Networks Nicole Little, Walt Disney Studios Kacy Zurkus, Content Strategist, RSA Conference…
TikTok and Huawei are probably two of the most notable Chinese technology companies that are enveloped in policy debates. The US government's most recent actions against TikTok could be an indication of future actions that could be taken against Chinese technology companies. Join us for the important discussion about how geopolitical motivations impact technology regulations and international interference operations. We'll look at how Western businesses are changing their technology development, operations and staffing strategies in Greater China and much more. Gabo Alvarado, Managing Director, Pointe Bello Katherine Koleski, Program Analyst, Defense Innovation Unit Aaron Turner, President and Chief Security Officer, HighSide Kacy Zurkus, Content Strategist, RSAC…

1 Mind the Gap: Strategies for Finding and Retaining Cyber Talent 31:16
31:16
Spill senere
Spill senere
Lister
Lik
Likt31:16
Sometimes the greatest obstacles we must overcome are the ones we put in front of ourselves. It’s no different for businesses or even for an entire industry. In cybersecurity, one of the greatest barriers to entry could be the perception people have of what cybersecurity is. Many outsiders believe a job in cybersecurity equals sitting in front of a screen and coding all day. So, how do we rebrand ourselves in order to develop talent from various diverse sources? Join us to discuss different strategies for addressing the talent shortage.…

1 Increasing Threats to OT/ICS Assets Need a Robust Cybersecurity Program 29:09
29:09
Spill senere
Spill senere
Lister
Lik
Likt29:09
What is OT systems management and why is it so critical to protecting our critical infrastructure? What are the necessary controls to ensure ICS/OT cybersecurity? A comprehensive program includes a range of controls and design efforts, In this podcast, industry leaders will discuss the challenges and requirements of protecting Operating Information Technology systems, which includes the need for establishing OT Systems Management, a holistic approach to hardening, updating, maintaining, and monitoring the endpoints and networks in industrial environments.…

1 Election Security Concerns, Expectations and How You Can Get Involved 43:50
43:50
Spill senere
Spill senere
Lister
Lik
Likt43:50
Though concerns over election security did not begin with the 2016 Presidential election, new and emerging threats coupled with an expanding attack surface have exacerbated what were already major security concerns for municipalities, states and the federal government. So what is the current risk environment and what has changed in CISA and the FBI’s cyber missions? We’ll answer these questions and offer tips on how the tech community and citizens can get involved in this can’t miss podcast.…
Networking has many advantages and has the potential to open doors of opportunity, but how do you identify the right people to network with? What do you bring to the table and what are you looking for from others? Join us for an engaging exchange with two industry leaders who will share their perspectives on the value of education, experience and relationship building. They’ll share advice on how to meet security practitioners, motivate other, be a well-rounded worker and an industry influencer.…

1 Zero Trust Architecture: The Defacto Network Segmentation Approach 35:34
35:34
Spill senere
Spill senere
Lister
Lik
Likt35:34
Agility is not a strategy, and Zero Trust is not a product you can buy. In a Zero Trust approach as identity becomes more important than ever, managing the lifecycle correctly is critical, during provisioning, use as well as destruction. These are some of the reasons why Zero-trust architecture is becoming the defacto segmentation approach in our digital-first world. Interrelated are the opportunities in both Edge Computing and DevSecOps to help businesses differentiate products and services by transitioning to more collaborative and risk-based security. Join us as we discuss Zero Trust, DevSecOps and Edge Computing with two industry experts who will explore the ways in which these approaches to customer-centric transformation can help businesses stay competitive.…

1 Proactive Steps to Securely Build for the Future 24:11
24:11
Spill senere
Spill senere
Lister
Lik
Likt24:11
COVID-19 has forced enterprises to adopt new ways of working in order to ensure their data remains protected as they navigate the impacts of the global pandemic and manage a distributed workforce. As more employees work remotely and an organization’s attack surface area increases, it’s never been more important to invest in security. At the same time, IT budgets are shrinking and security is at risk of being deprioritized or compromised in this new reality, where many employees are working from home and not on secure corporate networks. The only way to protect organizations is by protecting your endpoints, and in this podcast, we’ll discuss how adopting a zero-trust strategy can help organizations quickly adapt and prepare for a different post-pandemic world.…
As Camille Stewart wrote, “Cyber diplomacy and international cyber capacity building are better served by having diverse representation that understands the cultural nuances that determine how technology will move through a society.” Similarly, when it comes to managing security risk management programs, diversity matters. Risk management has many challenges, which is why a team can only be enriched and strengthened by including those with a vast range of experiences. There is no one-size-fits-all when it comes to risk management, however being attune to issues of race and other forms of discrimination and how they manifest themselves in their work, will result in building better programs. In this podcast, we will hear from esteemed industry experts who will share their different perspectives on why diversity matters to risk management and the consequences of not addressing the lack of diversity in cybersecurity and risk management.…

1 Why Your Security Organization Needs a Communications Lead 30:15
30:15
Spill senere
Spill senere
Lister
Lik
Likt30:15
Having a communications person as part of the security organization ensures that the enterprise communicates security not only through awareness programs but also across silos. A security communications lead plays a critical role in developing and executing incident response plans as well as other security policies that impact the business. In order to effectively create a security aware culture, your security organization needs to be able to communicate the risks, the strategies to mitigate risks and the policies that must be followed in the event of a security incident. People need to understand their roles and responsibilities, which need to be clearly communicated. In this podcast, we will hear from industry experts who will help you understand the value of and implement good, clear security communications.…

1 “Robot Downsizing”—How the Ultimate Solution to Security is Human 36:27
36:27
Spill senere
Spill senere
Lister
Lik
Likt36:27
Security vendors come to the rescue with AI and automation to save the day. But even smart technology can only go so far, and while it can definitely help lessen the noise, it can never replace the intuition, inventiveness and insight of a human.Technology can’t replace humanity in security defense because endpoint lockdowns don’t work, and repetitive scenarios don’t advance anything but boredom. Rather, we need to give users the tools to be skeptical, aware and intuitive. Analysts need to find patterns in the process, not just the results. Security teams need to work together and across an environment to find what can be fixed, not just what individuals can break, and technology needs to assist, amplify and augment human behavior, not lead.…

1 Researcher Relations: Building Trusted Relations Between Security Researchers and Organizations 38:21
38:21
Spill senere
Spill senere
Lister
Lik
Likt38:21
Security is one of the most evolving and impactful landscapes in the regulatory sphere. Proposed initiatives in the areas of Internet of Things (IoT) security and Coordinated Vulnerability Disclosure (CVD) are among the most active and developing areas of security regulation around the world. The vulnerability disclosure landscape has been rapidly evolving for the past decade, but there’s still a way to go. In this podcast, we’ll talk with industry experts about policy trends and how to build trust and understanding so that developers, researchers and vendors can all work in harmony toward the goal of promoting security. Highlights will include researchers’ collaboration, IoT Security, anti-hacking laws. We will also talk about bug bounties and vulnerability disclosure programs, what are some of the industry's best practices in this area, and how to implement programs at your organization to foster security, collaboration and transparency.…

1 Contact Tracing: Ethics in Privacy and Technology in a Post COVID World 34:50
34:50
Spill senere
Spill senere
Lister
Lik
Likt34:50
As the world continues to navigate what a “return to work” environment will look like and how that will play out for businesses, many are concerned about contact tracing, their role in becoming a point of contact and the privacy concerns inherent in the collection of all that data. In this podcast, we will be talking with privacy experts who will discuss how legislative proposals are responding to specific trends/worries in pandemic data response. While both are a bit bearish on any actual legislation being passed at the state/federal level, there are generalized privacy concerns that companies and employers would be wise to consider as we try to open post-COVID.…

1 We're Facing a Remote Working Future and It's a Security Opportunity 32:01
32:01
Spill senere
Spill senere
Lister
Lik
Likt32:01
Pieter Danhieux and Fatemah Beydoun both have a long history of working remotely, but as their company moved to a completely remote work environment in response to the COVID-19 global pandemic, it presented its own set of challenges... along with some very compelling benefits. This unprecedented situation has shown many companies that remote work is not only possible, it's the future. And it's a great opportunity to improve cybersecurity and general security awareness. In this podcast, Pieter and Fatemah detail how remote teams can be effective and secure, the benefits of access-anywhere collaboration tools and cybersecurity training, and how the time won back from eliminating commutes can be used to bolster a workforce to weather larger storms, including improving development practices and considering security much earlier. With cyberattacks on the rise, it's a great time to assess and improve your security culture.…

1 Do This, Not That! How Remote Workers Can Secure Home Networks 31:48
31:48
Spill senere
Spill senere
Lister
Lik
Likt31:48
Yes, there are enterprise tools security teams are using to mitigate the vulnerabilities of a remote workforce, but with all the connected devices in a given home, they need to help of their employees. In this podcast, we will talk with consumer-facing security pros who can provide steps your remote workforce can take to shore up their home networks, making their homes and your business less vulnerable to cyber attacks.…

1 Finding Balance Between Surveillance & Safety 38:12
38:12
Spill senere
Spill senere
Lister
Lik
Likt38:12
As countries across the globe work through various phases of opening and trying to return to a new COVID-19-tinged normal, contact tracing is a core tenant to many plans. The slippery slope of providing data to authorities to understand if shelter at home guidance is being followed to potentially using this data to alert individuals to potential exposure can serve a short term good to public safety measures, but this data is persistent, so what are the longer term downsides to increased surveillance activities. Who is the custodian of this data? How might it be utilized? How should it be governed? Many new shades of grey have emerged in the last few months will be explored in this podcast.…
Life can be downright overwhelming at times. With the stress of work and home life, one’s personal well-being can often take a back seat—but it shouldn’t. When you’re not sleeping well or sleeping at all, it has a dramatic effect on your job performance and your overall mood. Join us in this open and frank discussion why cybersecurity professionals need to take a step back and evaluate their own physical and mental health in order to find balance.…

1 Will You Emerge as a Leader in Your Organization by Enabling Innovation? 18:34
18:34
Spill senere
Spill senere
Lister
Lik
Likt18:34
Right now we are in what Matthew Chiodi, CSO Public Cloud, Palo Alto Networks, calls the Opportunity. There is a temptation when events like this happen to be narrowly focused on just keeping the lights on. The Opportunity Zone presents three unique opportunities: Time to reflect, Time to transform and Time to experiment. In this podcast Chiodi will dive a little deeper into how you can take advantage of the Opportunity Zone in order to enable innovation and emerge as a new leader in your organization.…

1 Communications Tips for Managing an Incident 22:15
22:15
Spill senere
Spill senere
Lister
Lik
Likt22:15
When managing an incident, communication is critical. In this podcast Kim Albarella Senior Director, Global Security Organization Security Advocacy at ADP will share tips for efficient and effective communications. We’ll also discuss what lessons ADP has learned through the pandemic and how businesses can apply those lessons to their future crisis and incident response plans.…

1 How to Deal with the Security Challenges of Disruptions in Supply Chain 32:18
32:18
Spill senere
Spill senere
Lister
Lik
Likt32:18
Supply chains are disrupted across all industries, which makes for back-ordered webcams and many other products being unavailable. But what happens when mission-critical services completely go down? What are the cybersecurity challenges that organizations have been faced with because of the impact of the global pandemic, and how can security teams deal with these challenges?…

1 How a Global Crisis Changes the Threat Landscape 29:20
29:20
Spill senere
Spill senere
Lister
Lik
Likt29:20
Threats evolve and change, but many of the threats in the attacker’s playbook are hardly new. They have been around for a while. What has changed in recent weeks is the threat landscape, but why and how? In this podcast we will look at how a global crisis can change the threat landscape and how industries can work together to effectively navigate those changes.…

1 Incident Response Analysis vs. Automation: What Matters Most Right Now 20:38
20:38
Spill senere
Spill senere
Lister
Lik
Likt20:38
Across all sectors, security teams are dealing with an increased number of incidents. In our latest podcast, Tim Bandos, Vice President, Cybersecurity at Digital Guardian and Jennifer Ayers, VP, OverWatch and Security Response at CrowdStrike discuss what you can do right now to improve incident response, specifically when working remotely.…

1 Perspectives on the Times with RSAC AdBoard Members 42:39
42:39
Spill senere
Spill senere
Lister
Lik
Likt42:39
RSA Conference Advisory Board members Todd Inskeep and Caroline Wong weigh in on security implications/risks of working fully remotely, the rise of misinformation and phishing campaigns, and the impact that these challenges are having on the mental health of security teams.
Britta Glade and Hugh Thompson talk about their take on highlights from the week at RSA Conference 2019

1 Bridging the Gap at RSAC 2019: Cybersecurity + Public Interest Tech 23:49
23:49
Spill senere
Spill senere
Lister
Lik
Likt23:49
As cybersecurity seeps deeper into so many areas of our lives, it’s more important than ever for technology creators and policy makers to work together for the benefit of society as a whole. That’s the backdrop for our new track at RSAC 2019, Bridging the Gap: Cybersecurity + Public Interest Tech, brought to you in partnership with Bruce Schneier and the Ford Foundation. In this podcast, Britta Glade talks to Bruce and the Ford Foundation’s Jenny Toomey as they discuss some of the topics that will be covered during the day-long track, including how cybersecurity and social progress are becoming increasingly intertwined—and how infosec professionals can contribute to positive change both individually and collectively.…
Get a head start on Boot Camp with our CISO-focused February podcast episode. In it, RSAC CISO Boot Camp speakers, Dawn Cappelli, VP Global Security and CISO of Rockwell Automation, and Tim Callahan, SVP of Global Security and Chief Security Officer of Aflac Inc., will share their vision for RSAC CISO Boot Camp and preview topics that’ll be covered in March.…

1 Our Own Worst Enemy: Tackling the Social Engineering Problem 38:33
38:33
Spill senere
Spill senere
Lister
Lik
Likt38:33
As it turns out, the weakest link in any cybersecurity solution is…us. More than ever, hackers are using a variety of social engineering scams designed to fool people into giving up personal information voluntarily. So how do you protect us from ourselves? Join hosts Britta Glade and Hugh Thompson and their guests Ira Winkler of Secure Mentem and Lance Hayden of Elligo Health Research for a wide-ranging discussion on what to do about the human problem, including establishing protocols, creating a Human Security Officer position and more.…

1 Speaking of the Future: InfoSec Trends for 2019 15:42
15:42
Spill senere
Spill senere
Lister
Lik
Likt15:42
Every year, RSA Conference receives hundreds of submissions from potential speakers. It’s the job of the RSAC Program Committee to examine every submission. Taken as a whole, these submissions form a fascinating view into the trends that will affect the industry in 2019 and beyond. In this podcast, you’ll hear from six Program Committee members as they discuss the trends they discovered that will be most relevant to you in the coming year.…

1 Getting employees on board with cybersecurity awareness 21:58
21:58
Spill senere
Spill senere
Lister
Lik
Likt21:58
In the 15 years since cybersecurity first received an October shout-out, technology has grown in leaps and bounds. But one thing that’s remained constant? The vital role that humans play in not only creating these advancements, but in driving their success and—often unknowingly—contributing to their limitations. In this episode, we talk with two awareness experts who share how best to secure our most important infosec asset: people. Some of the topics that we’ll cover include: •What are the core tenants of awareness training beyond phishing warnings? •What do you say to an IT team that believes it can code its way to complete safety? •How do you persuade employees to pay attention to cybersecurity—especially those who are working remotely from home networks?…
What are some career tips for future cybersecurity professionals? Get the answers as Britta Glade talks with Founder and Managing Director, Ursus Security Consulting LLC, Kim Jones and Stanford University student Maggie Engler.
Britta Glade and Dr. Hugh Thompson delve into the latest cybersecurity technology developments with Microsoft’s Diana Kelley and Denim Group’s John Dickson. Topics to be covered include: •What is data gravity and how can it help analysts in the SOC/CDOC? •How can security strategies be adapted for DevOps application developments? •What are the advantages of using a layered machine learning (ML) model over a single ML? •Are humans in danger of being replaced by artificial intelligence?…

1 The ABCs of prioritizing cybersecurity. Emphasis on C. 34:34
34:34
Spill senere
Spill senere
Lister
Lik
Likt34:34
Britta Glade and Hugh Thompson talk with State of Colorado CISO Deborah Blyth and Oracle CSO Mary Ann Davidson about the relationship between cybersecurity and the C-Suite—and the repercussions when the two go their separate ways.

1 Words That Have (Cybersecurity) Consequences 28:03
28:03
Spill senere
Spill senere
Lister
Lik
Likt28:03
Britta Glade and Hugh Thompson interview IBM Security’s Etay Maor and Symantec’s Dr. Saurabh Shintre about their upcoming artificial intelligence and blockchain seminars at RSAC 2018 Asia Pacific & Japan.
Tasked with creating a cybersecurity policy framework, the National Institute of Standards and Technology (NIST) had its work cut out for it—and then some. After all, it’s one thing to agree that organizations and the nation’s critical infrastructure need to be protected. And another to find common ground on how best to proceed. In this episode, we take a look at how the NIST Cybersecurity Framework was born, and where it’s headed once the recently drafted—and more user friendly—updates go into effect. Some of the topics we cover include: •To what degree are both the public and private sectors guided by the Cybersecurity Framework? •In what ways does the Cybersecurity Framework address various technologies such as IoT? •How does the Cybersecurity Framework weigh in on the challenges specific to vertical industries?…

1 Securing Government and National Infrastructure 32:05
32:05
Spill senere
Spill senere
Lister
Lik
Likt32:05
Cybersecurity has come a long way. But unfortunately, with every bit of progress the industry makes, threats and risks are never far behind. Especially now, in the midst of a turbulent political atmosphere, cyberattacks put everything from personal data to personal liberties at stake, leaving our government to address the biggest uncertainty of all: where do we go next? Joining hosts Britta Glade and Hugh Thompson, along with guests Jason Healey, a senior research scholar at Columbia University’s School for International and Public Affairs, and Dmitri Alperovitch, co-founder and CTO of CrowdStrike, as they team up for our newest RSAC podcast episode. Topics covered will include: •What does today’s threat landscape look like and how can we address its many challenges? •Have there been changes in breakout time and speed of adversary activity within compromised networks and what does that mean for future security priorities? •How can infosec professionals engage Boards and other governing bodies in discussions of cybersecurity policy? •What challenges are unique to protecting critical infrastructure?…

1 An Inside Look at Highlights from RSA Conference 2018 USA 20:21
20:21
Spill senere
Spill senere
Lister
Lik
Likt20:21
Britta Glade, Curator and Director, RSA Conference and Hugh Thompson, Program Committee Chair, RSA Conference
Davi Ottenheimer, of MongoDB, interviews Tim Jenkin, winner of the Excellence in Humanitarian Service award at RSA Conference 2018.
Here’s something to ponder: In an alternate universe, where would cybersecurity be today without the continuous pursuit of innovation? While we can only guess, one thing is pretty certain. Cyberattackers would be a lot happier in that universe than they are here. In this episode, we take a look at multiple aspects of industry growth—from revenue and investments to tech advancements and opportunities. Some of the topics we cover include: •What investment strategies are VCs employing in 2018, and how do they differ from previous years? •What criteria should buyers consider in choosing startups to add to their security portfolios? •Based on where the industry is headed, what new and exciting developments can we expect at the RSAC 2018 Early Stage Expo?…

1 Revisiting Mobile MFA Madness to Improve Device Hygiene and Integrity Challenges 24:15
24:15
Spill senere
Spill senere
Lister
Lik
Likt24:15
Industry leaders across the globe joined together at RSA Conference 2020 to talk security. During one of those talks, Mobile MFA Madness: Mobile Device Hygiene and MFA Integrity, the presenters demonstrated how easy it is to compromise mobile authenticator apps. Then the world went mobile—with employees either working remotely on corporate devices or accessing corporate assets on their own mobile devices. In this podcast, we will revisit the topic and look at how the current cybersecurity challenges and disruptions in supply chains are impacting mobile.…

1 Humans and technology. A complicated—and fascinating—pair. 30:23
30:23
Spill senere
Spill senere
Lister
Lik
Likt30:23

1 The Most Memorable Moments from RSAC 2020 USA 10:33
10:33
Spill senere
Spill senere
Lister
Lik
Likt10:33

1 Growing Developer Challenges Spur New RSAC Tracks 27:53
27:53
Spill senere
Spill senere
Lister
Lik
Likt27:53

1 Threats of Surveillance Tools: Spyware and Stalkerware 27:04
27:04
Spill senere
Spill senere
Lister
Lik
Likt27:04
Sit in on a fascinating discussion with David Ruiz and Diana Freed, two security professionals who are passionate about the threats posed by surveillance tools, particularly spyware and stalkerware. They’ll describe the work they’ve been doing independently and collaboratively to help protect victims and their personal data from unwanted surveillance.…

1 Security Coming Together: The Convergence of IT and OT 14:01
14:01
Spill senere
Spill senere
Lister
Lik
Likt14:01
While physical security has traditionally reigned supreme within the industrial and manufacturing sector, disruptive attacks such as NotPetya demonstrate the need to adapt IT security best practices to an OT environment. In this podcast, Britta Glade talks to Johnson & Johnson’s Roy Gundy and Rockwell Automation’s Dawn Cappelli about how CISOs and OT cybersecurity leaders can work together to create a converged security program.…
In today’s digitally connected world, security vulnerabilities can literally pop up in a flash. In this podcast, Britta Glade talks to Checkmarx’s Erez Yalon about how he and his team discovered an Android camera app vulnerability that could allow hackers to access videos and photos—and even spy on users.…

1 Diversity’s Indispensable Role in Cybersecurity’s Future 33:43
33:43
Spill senere
Spill senere
Lister
Lik
Likt33:43
As cybersecurity continues to encompass more areas of our lives, the value of different perspectives becomes increasingly clear. In this podcast, Britta Glade and Hugh Thompson talk to KnowBe4’s Perry Carpenter and cybersecurity consultant Prudence Smith about the benefits of a diverse workforce—not only for individual companies, but for the industry as a whole.…

1 Incident Response: Debunking the Myths and Misconceptions 31:37
31:37
Spill senere
Spill senere
Lister
Lik
Likt31:37
Though incident response (IR) is a key component of any cybersecurity protocol, it’s also surrounded by misconceptions that give rise to a number of questions. Are a security event and incident the same? Will machines soon outperform humans in the arena of IR? Are threat actors truly that much more advanced? To help separate fact from fiction, Britta Glade and Hugh Thompson turn to Kristy Westphal, VP, CSIRT, Union Bank, and Robert Lee, CEO, Dragos, Inc.…
The fast-approaching 5G revolution will bring fundamental changes—many of which give rise to a whole new world of security challenges. In this podcast, Britta Glade talks to Hotshot Technologies’ Aaron Turner and special counsel Randy Sabett about how organizations can best mitigate these risks.

1 Insider tips for RSAC 2020 Speaker Proposals 6:42
6:42
Spill senere
Spill senere
Lister
Lik
Likt6:42
Have an area of expertise than can benefit other cybersecurity pros? In this RSAC podcast, Britta Glade and Hugh Thompson share how to submit a speaker proposal that will stand out during the selection process.
With such a packed agenda at RSAC 2019 APJ, you might be wondering if you missed something significant. The good news is you can catch up on the trends and topics that had everyone talking when you listen to our podcast—recorded live at Conference.

1 Security Hygiene Gets a Refresh in the Wake of Baltimore's Cyberattack 25:52
25:52
Spill senere
Spill senere
Lister
Lik
Likt25:52
The City of Baltimore’s recent ransomware incident not only caught government servers by surprise. It also jolted the industry as a stark reminder that cyberattacks can still occur where and when they’re least expected. Not the most comforting prospect—but are there constructive takeaways to be gleaned in the aftermath? Helping us uncover these silver linings are Duo Security’s Wendy Nather and LEO Cybersecurity’s Andrew Hay. Some of the topics to be covered in this podcast include: • How the Center for Internet Security’s Top 20 Critical Security Controls remains an effective guide for preventing cyberattacks—regardless of a company’s security budget • The importance of educating all employees on the need for good cyber hygiene habits • Taking a first-responder approach to dealing with a cyberattack, such as immediately bolstering IT staff Related links: https://www.colorado.gov/pacific/dhsem/atom/129636 https://www.cisecurity.org/controls/cis-controls-list/ https://sightlinesecurity.org/…
It’s a key component of Microsoft’s new ElectionGuard. And as the world becomes increasingly hyperconnected, cryptography will be called upon to protect much more than our votes. In this podcast, Britta Glade talks to Microsoft Research’s Josh Benaloh and NIST’s Matthew Scholl about applied cryptography’s expanding role.…
GDPR is not even a year old but in that short time, it’s dramatically changed how companies handle and are held accountable for the data they use. But beyond companies, the main purpose of GDPR was to protect and empower consumers. So, how well is it working? With the help of Bree Fowler, Technology Writer at Consumer Reports and John Elliott, Data Protection Specialist, this month’s RSAC Podcast focuses on how GDPR has impacted consumer expectations and their willingness to share personal information. During the episode, our experts will answer these questions and more: • When it comes to understanding a company’s privacy policies, what responsibility does the consumer assume? • Are there situations where consumers should push back and ask for more diligent privacy and data use regulations? • How much information is “appropriate” for companies to gather from their users?…

1 StoryCorps @ RSAC: You Need to Shine Your Light 7:32
7:32
Spill senere
Spill senere
Lister
Lik
Likt7:32
The biggest impact you can have is working with kids to teach them about cybersecurity and cybersafety, according to Ben Jun, security architect and CEO of HVF Labs, and Theresa Payton, privacy expert and CEO at Fortalice.

1 StoryCorps @ RSAC: The Key Is Intellectual Curiosity 7:31
7:31
Spill senere
Spill senere
Lister
Lik
Likt7:31
Security and perimeter experts Rich Mogull, CEO and analyst at Securosis, and Jim Routh, CSO and leader of the global information security function for AETNA, sat down at RSA Conference 2016 to discuss what it takes to be successful in the information security industry, and what it's like to be on the front lines of the battle against cybercriminals.…

1 StoryCorps @ RSAC: There Is a Way to Win This 7:05
7:05
Spill senere
Spill senere
Lister
Lik
Likt7:05
“I think there’s a new way for us to think about how we live in a post-perimeter world,” says Niloofar Razi Howe, an ex-venture capitalist and RSA’s Senior VP and Chief Strategy Officer, and Asheem Chandna of Greylock Partners, in a conversation at StoryCorps @ RSAC. The two met in San Francisco at RSA Conference 2016 to talk about the future of technology, artificial intelligence, and the way cybersecurity will have to rethink itself to meet those challenges.…

1 StoryCorps @ RSAC: You Cannot Have Privacy Without Security 7:58
7:58
Spill senere
Spill senere
Lister
Lik
Likt7:58
Former executive chairman of RSA, Art Coviello talks with head of the International Association of Privacy Professionals Trevor Hughes about how the rapid evolution of technology requires vigilance when it comes to protecting our data—because without good security, privacy can’t exist.
Friends and colleagues Jay Jacobs and Wade Baker, creator of the Verizon Data Breach Investigations Report, talk about the ways in which challenging assumptions--by looking at data--can change the way we see the world.
StoryCorps @ RSAC: Preview by RSA Conference

1 StoryCorps @ RSAC: I Might Die Because of a Software Bug 6:51
6:51
Spill senere
Spill senere
Lister
Lik
Likt6:51
Joshua Corman & Marie Moe discuss the potentially dire consequences of insecure medical devices at StoryCorps @ RSA Conference 2016.
What do AppSec and DevOps have in common besides two-syllable monikers? A lot. Which is why their importance—especially from a risk management and compliance perspective—has not gone unnoticed. Nor has their ability to learn from each other along the way. In this episode, we talk with two guests who draw on their very relevant experiences to weigh in on where AppSec and DevOps are situated today and where they’re possibly headed in the future. Some of the topics we cover include: •With a variety of threats slipping through a growing number of cracks, is threat modeling at speed a viable solution? •What skill set is needed for secure coding, and should companies be responsible for ensuring these skills are met? •What is the single greatest impact that DevSecOps is having within organizations?…
It used to be that cities set themselves apart based on population density, cultural attractions and historical significance. But intelligence? Welcome to the intersection of modern living and the Internet of Things. In this episode, we’ll be talking with two guest speakers who weigh in on whether smart cities have rescinded the welcome mat for privacy. Take a look at some of the topics we’ll be covering: •Given how much smart cities “know” about us, can individual and company privacy still be protected? •What steps should corporations take to safeguard all the data they are gathering on smart city citizens? •What are the privacy implications of inviting smart assistants like Alexa and Siri into our homes?…
It’s never good news when potential security exploits are detected. But when they affect all personal computers, mobile devices and cloud infrastructure dating back to 1995, it creates a problem of a whole new magnitude. In this episode, we’ll be talking with Paul Kocher, the researcher credited with co-discovering Spectre and a co-author of the Meltdown research paper. Some of the topics that we cover include: •How did these vulnerabilities happen, and why were they not detected sooner? •Did the rush to bring technology to market play a role in allowing these exploits to slip through the cracks? •What are the main concerns to look out for—both as an individual and as a CISO?…
The holiday season is upon us. And our gift to you? An insider look at the potential threats and countering strategies that could have the greatest impact, for better or worse, in 2018. In this year-end episode, we talk with two cybersecurity luminaries who weigh in on the latest trends as part of a word game. Sound too fun to be enlightening? We promise you’ll learn as much as you’ll laugh. Some of the topics that we cover include: •Does threat intelligence sharing have a future now that IOCs are longer relevant? •Will NotPetya--a new class of attack that allowed only seven seconds to respond--be replicated? •How can we help build the next generation of cybersecurity talent to carry on the battle?…
People, process, and technology. It’s an interlocked trio that’s vital to most organizations today. And when there’s a shift in security operations or strategy, all three will feel the jolt. In this episode, we’ll be talking with two guest speakers who draw on their firsthand experiences to share must-do and avoid-at-all-costs security operations and strategy advice. Some of the topics that we’ll cover include: •Skills that are most needed for today’s security operations and analyst roles •Differentiating between product security and IT security •How to adapt security operations and architecture for public cloud deployments…
Big numbers have a way of getting our attention. And in the case of recent data breaches, they’re eye-poppingly notable. According to Gemalto, 1.9 billion data records were exposed in the first half of 2017—which equates to 122 records exposed every second in breaches worldwide. In this episode, we’ll be talking with two guest speakers whose cybersafety sessions drew some of the highest scores at RSA Conference 2017. Some of the topics that we’ll cover include: •Are data breaches getting worse, and if so, why? •How do you best measure security awareness? •What role does positive incentives for employees play in keeping data safe?…
What’s the good, the bad and the future of the increasingly close relationship between technology and security? Find out as Ben Jun, CEO, HVF Labs, and Ed Amoroso, CEO, TAG Cyber, share the latest insights into the technology development process.
What exactly happened? And how can you best protect yourself? Get answers to these questions and more as Lance Spitzner, Director at SANS Securing the Human, weighs in on the data breach affecting 143 million Equifax users
You know “Must See TV”? Well, this is a must-hear podcast. This episode is focused on professional development, and we’ll be talking with two guest speakers who have very different backgrounds but share a strong commitment to growing the infosec profession. Some of the topics that we’ll cover include: •How we can help develop future cybersecurity aspirants to fill in the current worker-shortage gaps, knowing that purple unicorns remain elusive •How cybersecurity as a profession has changed over the past 10 years, and what to expect moving forward •How contributing to the community and giving back helps shape and enhance your professional development…
Our first episode focuses on policy and government regulations in information security, including: •How the Cybersecurity Framework (CSF) is holding up against the recent wave of attacks •Strategies for keeping up with regulatory CSF changes •Positive and negative aspects of government involvement in cybersecurity…

1 StoryCorps @ RSAC: Keep Our Eyes On the Horizon 7:41
7:41
Spill senere
Spill senere
Lister
Lik
Likt7:41
There are more chips being made then there are people on the planet now, Paul Kocher, President and Chief Scientist of the Cryptography Research Division of Rambus, tells RSA CTO Zulfikar Ramzan in this StoryCorps @ RSAC podcast. Technology evolves so quickly that we don’t even know what challenges and threats we may face from what we’re developing now. “To me information security has to co-evolve with the development of information technology,” Ramzan says. “To me this is part of a longer journey with many, many interesting factors.” How can we always keep our eye on the horizon and make sure we are implementing the fundamentals? Where do the challenges of the future lurk, and where can we find inspiration and optimism in the face of adversity? You can hear more of their conversation here.…

1 StoryCorps @ RSAC: The Answer Was You Have a Conference 7:30
7:30
Spill senere
Spill senere
Lister
Lik
Likt7:30
It took a long time for the RSA algorithm to grow from theory to practice – almost 20 years from the time it was invented until it was widely deployed. In this StoryCorps @ RSAC podcast, Jim Bidzos, the founder, CEO and Chairman of Verisign, and former RSA CEO, strolls down memory lane with Burt Kaliski, SVP and CTO of Verisign, and the Founding Scientist of RSA Laboratories. The two discuss the creation of RSA the company and of the RSA Conference, which evolved from a small gathering to a global event that people from the highest levels of industry and government would attend. Along the way, people would contact them telling them they’d found a way to break the RSA algorithm, and would share it for a price. So they created the RSA Factoring Challenge. You can listen to their conversation on the impact of RSA on the connected digital world here.…
Even as a child, Chris Young, Senior VP and general manager of Intel Security Group, was interested in building. And it was the combination of problem-solving, innovation and building that drew him to technology. On the other hand, “I so didn’t choose it,” Mischel Kwon, president and CEO of MKA Cyber tells him. A chance encounter in a shopping mall, where she was asked to take a test by a computer school, changed her life. They talk about technology as a great equalizer, and how bringing more diverse groups into the cybersecurity fold comes with challenges as our nation talks more openly about its divisive past and as the industry embraces inclusion across class, race and gender lines. You can hear more of their conversation here.…

1 StoryCorps @ RSAC: The Kind of Folks You Run Into 7:56
7:56
Spill senere
Spill senere
Lister
Lik
Likt7:56
What did two cybersecurity luminaries study to get into the industry? Turns out, Bruce Schneier, CTO of Resilient Systems and Hugh Thompson, a member of the RSA Conference Program Committee, took very different paths to where they are today. Thompson came from the world of math, and Schneier moved through rolls in startups and government and has wound up at Harvard University, as a fellow at the Berkman Center for Internet and Society. “I find that now, being able to be in such a heady soup of smart people doing things that I never thought would be interesting, and having it affect what I’m doing is absolutely fricking fantastic,” Schneier tells Thompson. “The best compliment I ever get is when someone says you changed the way I think,” he says. You can hear more of their conversation here.…
This month's podcast features Dave Martin, Technology and Innovation Leader, IT Risk and Cybersecurity at GE, and John Stewart, Senior VP and Chief Security and Trust Officer, Corporate Security Programs Organizations, Cisco, in conversation about the roads they took to where they are today, leading cybersecurity programs for some of the world's biggest companies.…
Velkommen til Player FM!
Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.