The Secure Talk podcast reviews the latest threats, tips, and trends related to cybersecurity, cryptocurrencies, and compliance. Host Mark Shriner interviews leading cybersecurity and cryptocurrency executives to discuss best practices related to IT security, data protection, cryptocurrency investment and usage.
In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. He emphasizes the economic incentives behind security design, the concept of decoupling for enhanced security, and addresses the role of public awareness and policy in cybersecurity. Schneier also touches on the pervasive nature of hacking, the importance of building resilient systems, and the integration of computers into every aspect of our lives, highlighting the increasing importance of security by design.
Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group show that Security-Noteworthy Extensions (SNE) are a significant issue as they have a pervasive presence in the Chrome Web Store for years and affect almost 350 million users. In this great discussion we talk about the threat capabilities of nefarious code executed by plugins in the Chrome Browser. We also talk about the perverse incentives at Alphabet in managing the Chrome Web Store. They need to make plugins that have powerful capabilities, easy to deliver and sticky. But this creates the opportunity for powerful cybercrime tools, easily installed that are rarely inspected. Fundamentally we ask 'who is responsible for security in the “app” economy'?Research: https://arxiv.org/abs/2406.12710
In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance.Peters shares insights from her extensive experience at the Department of Health and Human Services, and addresses the nature of HIPAA regulations, the importance of risk analysis and workforce training, as well as the intricacies of regulatory compliance. The conversation dives deep into the intersection of innovation, healthcare privacy, and security, offering valuable advice for businesses and stakeholders in the rapidly evolving landscape of cybersecurity and healthcare regulations.
In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquired. This is a 9x increase over the past five years affecting over 145 million people.Patient Healthcare Information is the most sensitive, valuable and prolific security challenge of the present day.Thankfully, we have this information due to the oft-maligned HIPAA law. Truly innovative for its time and often updated due to its popularity, it is a great accomplishment in privacy law.However, like most laws, its implementation for a business can be fraught. Consulting on HIPAA has become its own industry with an army of consultants and legal experts. In this episode of Strike Graph we are going to delve into the 2nd edition of “The Practical Guide to HIPAA Privacy and Security Compliance.” with the authors Rebecca Harold and Kevin Beaver. The discussion highlights the importance of a comprehensive approach to HIPAA compliance, common myths, and challenges facing healthcare organizations today. The episode also addresses the growing threat of cybercrime, the evolving landscape of data security, and practical steps organizations can take to safeguard patient information. A must-listen for professionals navigating the complex world of healthcare data security.
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic Jones ex-Scotland Yard and Executive Chairman of Concentric as they share their deep experience in crisis management. Their valuable insights were gleaned as Mike LeFevre commander, Office of the Defense Representative to Pakistan during the killing of Osama Bin Laden and as Roderick Jones served for Scotland Yard’s Special Branch focused on international terrorism. Their insights delve into four key phases of crisis management—911 moments, second and third-order effects, steady state, and the road to normalcy—while underscoring the importance of leadership, preparation, and external relationships. They also highlight the critical need for cyber risk management in today's evolving threat landscape. This episode also covers their book, 'End Game First: A Leadership Strategy for Navigating a Crisis,' which serves as a guide for cybersecurity leaders.
What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edinburgh. This episode traces the early anonymity problems that the US military and libertarian-minded computer scientists were attempting to solve. How they created a partnership and worked together to invent a solution that could provide global privacy at the dawn of the information age. Ben provides powerful insights into the motivations behind its invention and the future of our connected world.
"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'AngeloJoin us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.
98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information.How can understanding human psychology help your cybersecurity defense?On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono, a behavioral scientist from social-engineer.com. We explored how nonverbal communication and emotional triggers play crucial roles in cyber threats. This insightful discussion reveals that our trust and cooperative nature, while beneficial, can also be exploited by skilled attackers. Dr. Marono’s ability to blend her academic research with practical cybersecurity applications is a testament to the power of multidisciplinary knowledge. Her insights on preference for trust and how nonverbal communication plays a part in that can help transform the people in your organization into a primary defense mechanism. Don't miss out on these valuable insights for enhancing your security approach!
From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. From the early days of modems and personal computers Alejandro was deeply interested in connective computing. The early days of exploring BBS’s, telecom networks and digital modems revealed Alejandro’s talent and expertise for understanding vulnerabilities in systems. Later as a professional “red teamer”, by searching for paid vulnerabilities in common systems like Google Chrome, Alejandro was approached by a “friend of a friend” to perform some analysis. That analysis was an attempted hack on Alejandro by a North Korean operative.Tune into this intriguing episode as we chat with Alejandro about his journey as a professional cybersecurity hacker. How he was attacked, and how he responded by hacking North Korea. What does it take to hack an entire country? Alejandro Caceres, the mastermind behind a massive cyber attack on North Korea, tells all in this gripping episode of SecureTalk.#cybersecurity #databreach #northkorea
What are the essential principles for successful CISO leadership? In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' and the newly released 'Privacy Leader Compass,' Todd shares his journey from a computer programmer to a cybersecurity leader and touches on critical topics from his books. The discussion delves into the evolution of the CISO role, and his approach to CISO strategy, including different methodologies such as incident-driven and vision-driven approaches.Todd also provides an insider perspective on the renowned SolarWinds hack and the lessons it offers for improving security measures. With over 20 years of experience as a Chief Information Security Officer, Todd's insights offer invaluable guidance for navigating the complexities of cybersecurity.
If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero.The conversation also explores his early influences, the role of a CTO, the evolving challenges in data security, and the importance of adaptive leadership. Purandar shares insights on the effectiveness of current encryption algorithms, the impact of quantum computing, and the development of AI-driven solutions for data security. We also review the LastPass breach, highlighting the importance of strong encryption practices and the ongoing evolution of cybersecurity threats. This episode is a must-listen for cybersecurity experts and enthusiasts looking to stay ahead in the rapidly changing information security landscape.
On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectively. Additionally, discussions explore device compliance, self-healing hardware capabilities, and strategies against ransomware. The podcast also touches on business continuity planning involving remote users, the challenges posed by ransomware attacks, considerations for AI integration, and privacy implications within the cybersecurity sector.
Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and security leaders through effective security posture scoping.Delve into aligning security with business goals, evolving CISO roles, compliance challenges, and the impact of AI. Understand the importance of risk acceptance in corporate decision-making, the role of AI in security, multi-factor authentication, and the real-world implications of security breaches. Explore cybersecurity risk management with expert Chris Hodson and Strike Graph CEO Justin Beals.
Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jesse Gilbert.Highlights include:1. The real implications of the TikTok ban examined from a cybersecurity lens.2. Unpacking how our digital habits are influenced by algorithms we seldom understand.3. Exploring avenues for ethical data management and the role of individuals in data stewardship.Join us for a deep dive into the interconnected world of data, security, and societal transformation. Your thoughts on reshaping our digital futures are welcome!
How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. Through the lens of "The Three Truths," Scott demystifies common misconceptions about cybercrime and unveils strategies to navigate the minefield of digital threats. Tune in to this thought-provoking episode and empower yourself with the knowledge that could be the difference between being a victim and a victor in the cyber realmAs cybersecurity experts and enthusiasts, how do you evaluate your practices in light of these insights?
Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incidents, pioneering social engineering frameworks, and collaborations with agencies like MI5 and the FBI. Gain insights into ego suspension, nonverbal communication, and defense strategies against social engineering, emphasizing empathy, education, and technology in cybersecurity.
In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a champion of cybersecurity and democracy. The episode takes a compelling turn as we explore a riveting case study on a data breach involving Carta and Linear. Discover how internal governance and public narratives play crucial roles in securing data and maintaining trust.
The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass. The episode covers the 23andMe data breach, Microsoft government email hacks, the Whitworth University ransomware attack, and insights on the LockBit ransomware takedown. It highlights breach responses, risks of consumer DNA data, and evolving cybercrime operations.
This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. The conversation covers Alex’s background in law enforcement and cyber security, the progression of cybercrime from Zeus Trojan to ransomware, the entrepreneurial approach of cybercriminals in the development of ransomware operations, and the increasing complexity of cybercriminal organizations. The interview delves into the functioning of Lockbit, its business-focused model with customer support and blog site, and its resilience in resurfacing after takedowns. Furthermore, the conversation touches on the shifting landscape of cybercrime, the interplay between cybercriminal organizations and nation-states, and the challenges in combating cybercrime, including the use of cryptocurrency for money laundering. As the conversation concludes, Alex provides insights into the professional and adaptive nature of cybercriminals, emphasizing their vigilance in understanding the actions of cybersecurity professionals. Overall, the interview offers valuable insights into the complex world of cyber threats, the role of threat intelligence, and the ongoing battle between cybercriminals and law enforcement.
Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challenges faced, and the importance of communication and disaster recovery plans in the event of a ransomware attack. The discussion also highlights the significance of having a multi-faceted approach to protecting data, including paper backups and encrypted data storage. The guest, Rafael, emphasizes the need for founders and small to mid-sized businesses to prioritize effective communication and response plans, as well as the potential vulnerabilities and risks they should be aware of in the cybersecurity landscape.
In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 year career in the FBI fighting cybercrime, his transition to academia, and his insights on cybersecurity. Key points include advice for those interested in career paths like cybersecurity or FBI, Paul’s perspective on a Microsoft security breach, and understanding Western Governors University’s competency-based education approach.
How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabilities, and patient privacy. We are speaking with Stephen Ferrell, a leader in security for the life sciences space. We’ll highlight the significance of GAMP and its risk-based approach. Finally, they analyze the 23andMe data breach and the risks associated with DNA data.
In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on security and how StrikeGraph helps organizations identify and operationalize the right security practices. They also discuss the impact of AI on security and the growing demand for security standards and certifications. Justin outlines his plans for SecureTalk, which include continuing to make security an approachable conversation and bringing in experts to discuss the future of security.The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3.
In this episode of Secure Talk, Chris talks about self-sovereign identities, zero-knowledge credentials, and crypto wallets, and explains how personal will unlock AI digital assistants.
Verida https://www.verida.io/
Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving. He also talks about what founders should look for when selecting a funding partner.
Massdriver https://www.massdriver.cloud/
The Secure Talk Podcast https://securetalkpodcast.com/
Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software. Stephen explains how IriusRisk helps its customers and also talks about the changing regulatory and threat landscapes related to cybersecurity.
IriusRisk https://www.iriusrisk.com/
The Secure Talk Podcast https://securetalkpodcast.com/
Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures. Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space.
Leostream https://leostream.com/
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Dr. Shira Brezis is the CEO & Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors. Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving.
Redefine https://redefine.net/
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Chris Piche is the CEO and Founder of Smarter AI. Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles.
Smarter AI https://smarterai.camera/
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security. He also explains why companies make a decision to use Service Now and how they select a partner to assist their digital transformation.
Windward Consulting https://windward.com/
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers. He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi-chain transactions with a single signature, a single transaction fee, and a single click. Lasha explains what this means for the wider NFT ecosystem. He also discusses topics such as digital sovereignty and the present and future state of cryptocurrencies, blockchains, and NFTs.
Rarify Labs https://www.rarifylabs.com/
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Sean Falconer is the Head of Marketing & Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy strategies fail and how to fix them. He also talks about the danger of using tools such as ChatGPT and how web applications can limit their threat surface by using tools to protect and encrypt data.
Skyflow https://www.skyflow.com/
The Partially Redacted Podcast https://www.skyflow.com/podcast
The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
David Sinclair is the Founder and CEO of 4Freedom Mobile. David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data. He also explains some best practices to prevent being tracked and to protect your personal information.4Freedom Mobilehttps://4freedommobile.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Nick Harrahill is the Director of Customer Support at Spin.ai. In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications. He gives examples of the most common attacks and introduces some best practices to counter such attacks.Spin.aihttps://spin.aiReport on SaaS Application Riskshttps://spin.ai/saas-application-risk-report/ The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture. In this episode, Darren talks about how to engage your team in cybersecurity to build a secure by-default company and how to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust. He also gives advice on cybersecurity education and how to choose a VPN provider.Carbidehttps://carbidesecure.com/company/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Aviv Grafi is the Founder and CTO of Votiro. In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents.Votirohttps://votiro.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform. On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best practices for securing APIs and the various apps that they connect with.FireTailhttps://www.firetail.io/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thoughts about creating an effective organizational culture and building a Teal Organization.GoodAccesshttps://www.goodaccess.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy. He discusses topics including identity management, data discovery, cloud security, and vulnerability management.Sonrai Securityhttps://sonraisecurity.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/Youtubehttps://youtu.be/9rxhtvuQac4
Grayson Milbourne is the Security Intelligence Director for OpenText. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses the advantages of a multi-layered approach to cybersecurity. Grayson also provides recommendations for cyber awareness and training.OpenText Cybersecurityhttps://www.opentext.com/products/cyber-securityThe Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing data analytics and business intelligence, how to become more data curious, and discusses some important trends in technology. He also explains how cybersecurity professionals can benefit from making data more accessible.Night Shift Developmenthttps://www.nightshiftdevelopment.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
W. Curtis Preston, AKA Mr. Backup, is an expert in backup & recovery systems, a space he has been working in since 1993. He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it All Podcast. Curtis is also the Chief Technical Evangelist at Druva, a data protection as a service company. In this episode of The Secure Talk Cybersecurity Podcast, we talk with Curtis about data protection as a service (DPaaS), backup basics, and the importance of having an incident response plan. Curtis also talks about the recent trend toward backups being a priority target for hackers.Druvahttps://www.druva.com/Backup Centralhttps://www.backupcentral.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity. She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories.SIEMonsterhttps://siemonster.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming & White Box Audits to improve the security and competitiveness of their platforms. We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities. RealVNChttps://www.linkedin.com/company/realvnc/https://www.facebook.com/realvnchttps://twitter.com/realvnchttps://www.youtube.com/user/RealVNCLtdhttps://www.reddit.com/r/realvnc/Cure53https://cure53.deThe Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast. Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM). He also discusses the latest threat landscape and provides some useful guidance for healthcare providers.CORL Technologieshttps://corltech.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos. Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data.Kuderna Financialhttps://www.kudernafinancial.com/The Kuderna Podcasthttps://www.kudernafinancial.com/the-kuderna-podcastThe Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds.In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity. Stratahttps://www.strata.io/Hexahttps://hexaorchestration.org/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Joe Gross is the Director of Solutions Engineering at Graylog. Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities. Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models.Graylog https://www.graylog.org/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity. Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection.Cyolohttps://cyolo.io/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Ganesh Krishnan is the Co-Founder and CEO of Anzenna. Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian. He also launched Avid Secure in 2017 which was acquired just 18 months later. In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust.The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed.Syxsensehttps://www.syxsense.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach. His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE. In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester. He also shares some tips for business owners and consumers on how to improve their cybersecurity posture.TCM Securityhttps://academy.tcm-sec.com/Heath on Social Media:LinkedIn - https://linkedin.com/in/heathadamsTwitter - https://twitter.com/thecybermentorYouTube - https://www.youtube.com/c/thecybermentorTwitch - https://twitch.tv/thecybermentorThe Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies.ID.mehttps://www.id.me/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.Pulsar Securityhttps://www.pulsarsecurity.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.Phinity Risk Solutionshttps://www.phinityrisk.com/The Secure Talk Cyber Security Podcasthttps://securetalkpodcast.com/
Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces. Nick also co-hosts the Managing Up podcast. In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams.Symhttps://symops.com/The Managing Up Podcasthttps://www.managingup.show/The Secure Talk Cyber Security Podcasthttps://securetalkpodcast.com/
Neatsun Ziv is the Co-Founder and CEO of Ox Security, a company that helps other organizations to prevent attacks across their software supply chain. Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&R) framework.Ox Securityhttps://www.ox.security/The Secure Talk Cyber Security Podcasthttps://securetalkpodcast.com/
Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software. Laura shares best practices related to cyber security education, content development and delivery, and secure software development.SafeStack Academyhttps://safestack.io/The Secure Talk Cyber Security Podcasthttps://securetalkpodcast.com/Thank you for listening to the Secure Talk Cyber Security Podcast!
Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space.BigIDhttps://bigid.com/The Secure Talk Podcasthttps://securetalkpodcast.com/Thank you for listening to The Secure Talk Cyber Security Podcast!
Luis Valenzuela is Director, Data Loss Prevention & Data Governance for InComm Payments. He is also a CISSP and PMP. Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights and advice related to transitioning to a career in cybersecurity, career advancement and the importance of continual leadership and subject matter-specific learning. InComm Paymentshttps://www.incomm.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that allow for automated responses to various threats.Guruculhttps://gurucul.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.comThank you for listening to The Secure Talk Cybersecurity Podcast!
Steve Orrin, Federal Chief Technology Officer & Senior Principal Engineer for Intel talks about how he works with various government agencies to develop and deliver cybersecurity solutions. He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government is implementing Zero Trust across all agencies, how AI is affecting cybersecurity and the cyber threat landscape, and gives some great book recommendations related to sci-fi and cybersecurity.Intelhttps://www.intel.com/Intel Government Cybersecurityhttps://www.intel.com/content/www/us/en/government/cybersecurity.htmlThe Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/Thank you for listening to The Secure Talk Cybersecurity Podcast!
Kevin Dominik Korte is the President of Univention North America. Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements between private enterprises and schools.Univentionhttps://www.univention.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
André Keartland is a solutions architect at Netsurit. He has been working in the IT industry for almost 30 years. As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnostic, André has become recognized as an authority on the Microsoft solution stack and has implemented a large number of Microsoft on-premise, cloud, and hybrid products and solutions, including Azure and Microsoft 365.In this episode of The Secure Talk Podcast, André shares his thoughts about the value of the Microsoft security stack and give suggestions on how to optimize many of the security related tools and settings that are included in M365.Netsurithttps://netsurit.com/Thank you for listening to The Secure Talk Cybersecurity Podcast!https://securetalkpodcast.com/
Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-first application services. As the CTO of Opti9, Sagi is responsible for product development, and research and development (R&D). He has extensive experience in all aspects of the cloud and interconnection industries, including infrastructure, networking, software development, automation, platforms, security, global network buildouts, and compliance. In this episode Sagi explains the differences between backups, disaster recovery, and cyber resilience and talks about benefits of working with a managed security service partner (MSSP).Opti9https://opti9tech.com/The Secure Talk Podcasthttps://securetalkpodcast.com Thank you for listening to The Secure Talk Cybersecurity Podcast!
Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service. Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is primarily focused on serving the start-up and small-medium enterprise (SME) market. He also details the critical ingredients that comprise an effective MSSP offering.Prior to SolCyber, Scott built the Asia-Pacific-Japan (APJ) business at Symantec where he ran the global Managed Security Service, and the Symantec and Accenture Joint Venture. He then transitioned to FireEye pre-IPO to create their global MSS business and led the development of the APJ market.SolCyberhttps://solcyber.com/The Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya. He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. In this episode Amot talks about embedded device security, the vaccine approach, and introduces some of the key aspects of Sternum IoT's autonomous security and observability platform. Sternum IoThttps://www.sternumiot.com/Thank you for listening to The Secure Talk Cybersecurity Podcast.
Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management.Pascal talks about the importance of cyber security training, how to provide it in an engaging manner, and how best to measure the results.Eggheadshttps://eggheads.ai/Live Interactive Example of Chat Based Instruction(Hint: You will need to respond to the questions.)https://eggheads.ai/chat/l9pw61xez1vThank you for listening to the Secure Talk Cybersecurity Podcasthttps://securetalkpodcast.com/
Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows. Jonathan explains the difference between data security posture management (DSPM) and cloud security posture management (CSPM) and the important attributes of each.Jonathan also talks about his experience in various cybersecurity related roles spanning 16 years including investigations, incidence response, and how visibility and automation are becoming increasingly important.https://www.flowsecurity.com/
Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services. Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscape. He also makes some predictions about key changes in IT security space for 2023 including the rise of cyber insurance.https://leapfrogservices.com/
Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure. He also introduces some best practices for monitoring and improving an organization's compliance and security posture.https://www.logicgate.com/
Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp. Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks about some of the findings in the Theta Lake's recently released report that surveyed over 500 global compliance and security leaders on this topic.https://thetalake.com/
Dr. Danny Rittman, CTO at GBT Technologies, is an R&D technology expert with who has years of experience researching and developing new forms of cybersecurity. In this episode we discuss some critical flaws with traditional firewalls, intrusion & detection systems (IDS), and encryption methods, and introduce some best practices for protecting networks and IoT devices.GBT Technologieshttps://gbtti.com/
Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Security Solutions 2022 Global SMB Ransomeware Survey.Grayson also explains how he monitors the threat landscape in order to ensure the efficacy of OpenText Security Solutions' products.
Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Raveed also talks about cyber crime as a service on the dark web and vulnerability detection.https://ke-la.com/
Jack Naglieri is the CEO and Founder of. Panther Labs. Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’s open-source platform called StreamAlert to solve this problem before leaving to start Panther.In this episode Jack explains the issues of legacy SIEMs, the benefits of serverless architecture, and talks about leading Panther and the evolution of Panther's platform.https://panther.com/
Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training programs.KnowBe4www.knowbe4.com/
Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. After retiring from the Army Stephen founded and then sold a cyber recruiting company. He has led multiple cybersecurity practices and continues to lead clients through disaster and change at Avant Communications. In this episode of the Secure Talk Podcast, Stephen talks about cybersecurity in the military, how he transitioned from a platoon leader to a cyber security leader, and provides some great advice for members of the U.S. military that would like pursue a career in cybersecurity after separating from the military.Avant Communications https://goavant.net/Hiring Our Heroeshttps://www.hiringourheroes.org/DOD Skillbridgehttps://skillbridge.osd.mil/
As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines and years of practical experience in building agile security and compliance teams, and modern day Security Operation Centers.In this episode of Secure Talk, George talks about the importance of physical security, strategies for securing hybrid IT operations, trends with DevSecOps, best practices for identifying security talent, how security certifications can be used as a sales asset, SIEMs, logs, and more.www.sumologic.com
Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets.Strike Graph’s flexible platform helps customers create a scalable security and compliance program that builds trust at every stage of growth and helps organizations to become certified quickly and easily with SOC 2, ISO 27001, HIPAA, and PCI DSS compliance.https://www.strikegraph.com/
Huxley Barbee is the Security Evangelist at runZero.Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so. He also provides some great tips for new CISOs and for home cyber protection.https://www.runzero.com/
Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto technology will dominate in the future, and the current state of affairs with blockchains and crypto.https://rubic.exchange/
Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security.Noname Securityhttps://nonamesecurity.com/Noname Security's 4-Hour API Workshophttps://nonamesecurity.com/workshopSecure Talk Podcasthttps://securetalkpodcast.com/
John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler. John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets.
John explains the ins and outs of cybersecurity-focused hardware destruction and electronic waste recycling and shares best practices for device deposal for both businesses and consumers. He also talks about how companies insure that their private or personal data cannot be accessed after device disposal.
As a special “thank you” to the Secure Talk Podcast listeners, John is offering a free copy of his book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World. In order to receive a free copy of John’s book, please follow this link and fill out the details of where you would like the book sent: https://eridirect.com/insecurity-of-everything-book/
ERI https://eridirect.com/
Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness. He created the Security Culture Framework (SCF), is the author of Build a Security Culture and co-author of the The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer.
Kai talks about the role of security and culture assessments, simulated phishing campaigns, how to spot phishing emails, and best practices for security awareness training.
https://www.knowbe4.com/ https://www.securityculturebook.com/
Secure Talk Podcast www.securetalkpodcast.com https://securetalkpodcast.com/creating-a-security-oriented-culture-with-kai-roer/
Fausto Lendeborg, Co-Founder & CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and prevents misconfiguration of applications of apps being developed. He also introduces concepts such as the shared responsibility model, and policy as code, and explains the importance of scaling across multi-cloud environments, and time to remediation.
At the beginning of the discussion Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus.
www.secberus.com
Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a customizable DNS service that allows subscribers to block malware, ads, and IoT telemetry.
Yegor and I talk about his background, lessons learned from life and launching several businesses, rebounding from failures and more. Yegor also explains the ins and outs of the various VPN providers and how to choose a reliable provider and use a VPN in a secure manner.
https://windscribe.com/
https://blog.windscribe.com/
https://controld.com/
Secure Talk Podcast https://securetalkpodcast.com/how-to-choose-a-vpn-and-more-with-yegor-sak-founder-of-windscribe/
Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats.
https://team-cymru.com/
www.securetalkpodcast.com
Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software composition analysis (SCA) and runtime application self-protection (RASP) tools.
https://www.contrastsecurity.com/ https://www.contrastsecurity.com/developer
Secure Talk Podcast https://securetalkpodcast.com/security-risks-with-open-source-software-steve-wilson-chief-product-officer-at-contrast-security/
Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities. He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner.
https://www.tenacitycloud.com/
Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories. He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security professionals can scale and have greater visibility of code commits.
Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises.
https://apiiro.com/ https://apiiro.com/secrets-insights-2022/
Secure Talk Podcast shorturl.at/BJKL2
Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack. He also shares some stories about his guests and also gives advice on how to protect your personal information.
What the Hack Podcast https://podcasts.apple.com/us/podcast/id1571482669
Secure Talk Podcast https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/
Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.
Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.
Polymer www.polymerhq.io/
Secure Talk Podcast https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/
Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity.
https://nordsecurity.com/
https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/
Chaim Mazal, SVP of Technology & CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.
www.kandji.io
www.securetalkpodcast.com
Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare.
Geoff talks about how he does research for his books and how he finds information sources who are willing to talk. He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.
Geoff also provides an introduction to North Korea’s Lazarus Group and explains how they are organized and how their main mission is to find ways to make money via cybercrime. Geoff also touches on how crypto currency is being used by both cybercriminals and police organizations, cyber surveillance by western countries, and also gives some great book recommendations and tips for improving one’s cybersecurity posture.
Lazarus Heist Podcast https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads
Lazarus Heist Book https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X
Geoff White's homepage https://geoffwhite.tech/
Secure Talk Podcast www.securetalkpodcast.com
Gabriele Musella, Co-Founder & CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading.
Gabriele also shares his recommendations for business reading, insights on running a startup, and more!
https://coinrule.com/
Book Recommendations Traction; How any startup can achieve explosive growth Notes on Startups, or How to Build the Future
Secure Talk Podcast securetalkpodcast.com
Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.
https://raysecur.com/ https://raysecur.com/mail-security-report-2021/ https://raysecur.com/case-study/presidential-candidate/
www.securetalkpodcast.com
Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity & access management, security as a service, and best practices for prioritizing investments in cybersecurity.
www.techdemocracy.com www.securetalkpodcast.com
Justin Beals, Founder & CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.
www.strikegraph.com
Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption. Dan also discusses some of the issues related to the gender gap in technology.
CipherStash.com debuggingdiversity.com
Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions. Kiran's also shares his experience related to training for and participating in several marathons.
https://www.blusapphire.com/
Jeff Williams Co-Founder & CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.
Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science. After working at a major crypto hedge fund, he decided to drop out of college and founded Injective Labs together with Albert Chon (CTO). Injective Labs is the core contributor behind the decentralized exchange protocol Injective.
Injective is currently the fastest growing exchange platform reaching $1 Billion in trading volume within the first 30 days of release. For context, it took Coinbase a year to accomplish the same feat. Unlike Coinbase, Injective is entirely controlled by users meaning that all new markets are actually chosen by users. Injective collects zero revenue and uses any fee generated to be distributed back to their users via its unique decentralized token model.
https://injectiveprotocol.com/
Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.
https://www.blockwaresolutions.com/
Mike McNeil, CEO & Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO).
https://fleetdm.com/
Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.
The company has a current market share of 20.95% and is backed by top-tier investors including Polychain Capital, Pantera Capital, Lightspeed Ventures and Breyer Capital.
Yubo learned about crypto in early 2014, and by June of that year he launched his first company while still in high school. Five years later, Yubo sold the company for over $4M, and by that point had started two VC funds focusing on disruptive technologies, and blockchain and crypto.
https://parallel.fi/
Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.
https://www.tines.com/
Frances Zelazny, Co-Founder & CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure.
https://anonybit.io/
W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva. On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery.
Curtis also hosts the Restore it All podcast and maintains the Backup Central website.
Restore it All https://podcasts.apple.com/us/podcast/backup-centrals-restore-it-all/id1469663053
Backup Central https://www.backupcentral.com/
Druva https://www.druva.com/
Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs. Haseeb also talks about Bitcoin ATMs and crypto wallets.
https://www.efani.com/
Chris Kline, COO & Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banking regulations related to security and data protection.
Rohan Sathe, CTO & Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP. Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution.
https://nightfall.ai/
Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs.
https://www.safernetvpn.com/ https://safernetbusinessvpn.com/
https://ninjio.com/
James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and mentoring and motivation.
https://www.executech.com/
Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.
https://www.tromzo.com/
Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft.
https://www.riskiq.com/ www.securetalkpodcast.com
Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.
https://crowdsec.net/ www.securetalkpodcast.com
Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.
Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more!
https://reachoutit.com/ https://www.rickjordan.tv/ https://www.rickjordan.tv/liberty-lockdown/
Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel.
For more info, please visit: doppler.com
Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world. Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and "fathers of OpenStack," having launched and led successful cloud computing and hosting businesses for HP and Rackspace.
Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security.
https://spideroak.com/home/
Dr Spencer is the Chief Information Security Officer at Nomadix & GlobalReach.
Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world's largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.
A recognized thought leader in best-practice secure, seamless sign-on experience, and the use of Passpoint (Hotspot 2.0), Chris has been involved in the specification, and delivery of Next Generation Hotspots (NGH), and leads and co-leads several industry working groups for the Wireless Broadband Alliance (WBA), Hospitality Technology Next Generation (HTNG) and the Seamless Air Alliance (SAA). He has presented at HTNG, Barcelona 2015, at Mobile World Congress, the Wireless Broadband Alliance Global Congress, at Wi-Fi Now and on TV and radio.
Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space.
www.atakama.com
Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more!
clean.io https://www.clean.io/
Inbound Success Podcast https://inboundsuccesspodcast.com/
Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.
For more information about Scott and BVS, please visit. https://www.bvsystems.com/
For more information about the Secure Talk podcast, please visit: www.securetalkpodcast.com
Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.
Santosh Devaraj, CEO of TrustGrid™, talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applications of TrustGrid by different government agencies in Australia.
More at: http://trustgrid.com
Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure.
MetricStream https://www.metricstream.com/
Metric Streams GRC Summit https://www.grc-summit.com/2021
Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers.
https://smarteyetechnology.com/
Mark Testoni, CEO at SAP National Security Services (SAP NS2) shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.
Michel is the CEO and Co-Founder of Airbyte.
He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day.
In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs & databases.
After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months.
https://airbyte.io/
Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security.
Social Links for Dr. Cole: YOUTUBE: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA TWITTER: https://twitter.com/drericcole FACEBOOK: https://www.facebook.com/DrEricCole/ INSTAGRAM: https://www.instagram.com/drericcole/
E-Books by Dr. Eric Cole: Threat Hunting: https://ar407.isrefer.com/go/mm2ythun Insider Threat: https://ar407.isrefer.com/go/mm2ytit/... Online Danger: https://www.onlinedanger.com
Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).
Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com.
Zaid's courses can be found in the following locations: www.udemy.com/user/zaidsabih/ zsecurity.org/courses/
Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology.
His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.
Alex Preukschat & Shannon Appelcline co-authors of Self-Sovereign Identity; Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications for individuals and organizations.
Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity; Decentralized digital identity and verifiable credentials by using the following coupon codes:
ssstsrt-489B ssstsrt-9707 ssstsrt-7BF1 ssstsrt-2ACE ssstsrt-089E
You can refer to this link: http://mng.bz/q98N
Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action.
Bina's book can be found here: https://www.manning.com/books/blockchain-in-action?query=block
Bina's online blockchain courses can be found here: https://www.coursera.org/specializations/blockchain
Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.
Neil's book can be found here: https://www.manning.com/books/api-security-in-action
Please use these coupon codes to receive a 30 percent discount. apisecrf-7175 apisecrf-CC64 apisecrf-2FFC apisecrf-41AE apisecrf-42FE
Neil's Twitter: @neilmaddog Neil's Blog: https://neilmadden.blog/
Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps.
Julien's book Securing DevOps can be found here: https://www.manning.com/books/securing-devops
Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast: scdvprf-A9D5 scdvprf-CB81 scdvprf-0C8B scdvprf-57E0 scdvprf-9DCB
These can be redeemed at: http://mng.bz/Qmre
For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20 at this link: http://mng.bz/zryB (good for two months)
Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo. Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.
Sedat's book can be found here: https://www.manning.com/books/street-coder
The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them
strsecr-0716 strsecr-029E strsecr-34DB strsecr-2304 strsecr-E12A
Sedat's Twitter feed: @esesci
Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security.
Laurentiu's book Spring Security in Action can be found here: https://www.manning.com/books/spring-security-in-action
Laurentiu's Youtube Channel: https://www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw
Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each.
As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation.
For more info, please visit: https://ondmarc.redsift.com/
Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.
Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk.
Cecilia can be contacted via: www.vedderprice.com/new-york
Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.
https://tomkranz.com/ http://www.siliconbunny.com/
Manning Publications has provided Secure Talk with five free copies of the e-book Making Sense of Cyber Security.
scrmcs-D9FB scrmcs-707E scrmcs-9E82 scrmcs-F6C2 scrmcs-4701
Please use this link to access: http://mng.bz/0ZPN
Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site
Coupon: podsectalk20
You can refer to this link: http://mng.bz/zryB
Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.
Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.
https://anchor.fm/yourcyberpath https://www.yourcyberpath.com/pdf
Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees. Gabby also introduces the Wizer platform and shares his thoughts on effective training programs.
For more information on Wizer's training programs please visit: www.wizer-training.com
CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks.
www.getcryptostopper.com
adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.
Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon's solutions work.
Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.
Jonathan Hiroshi Rossi, CEO & Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats.
https://www.sayauniversity.com/
Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.
João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.
adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.
Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.
Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.
Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson & Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.
Kip Boyle, founder and CEO of Cyber Risk Opportunities. Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).
Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks.
https://www.cyberriskopportunities.com/ https://www.firedoesntinnovate.com/
Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.
adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.
Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.
Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.
Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.
VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.
Trusona Founder & CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked. (This is part 2 of a 2 part podcast)
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy. (This is part 1 of a 2 part podcast)
Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking.
https://www.udemy.com/user/zaidsabih/
Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.
Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!
adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.
Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!
Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.
Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!
Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&A pre-acquisition and for post acquisition integration.
Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture.
Matt's blog can be found at: https://blogs.technet.microsoft.com/skypehybridguy/
Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.
In this episode we talk about GDPR. We explain what is GDPR, why it is important, and how to prepare.
In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!
In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.
Hiram and Mark discuss the importance of data protection and the tools, techniques, and processes used to protect an organisation's data.
In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.