Cyber Security Dispatch artwork

Cyber Security Dispatch

42 episodes - English - Latest episode: over 5 years ago - ★★★★★ - 7 ratings

Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.

Technology News Tech News
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Why Controlling Time Matters

January 29, 2019 22:24 - 38.2 MB

An Interview with Arun Sood, CEO of SCIT Labs Cyber Security Dispatch: Season 3, Episode 2 Show Notes: Welcome back to the Cyber Security Dispatch. This is the first in the new series of interviews focused on innovative technology in cyber security where we talk about new solutions to protect our data and systems. Today on the show we welcome Arun Sood, CEO of Self Cleansing Intrusion Tolerance (SCIT) Labs. He is the co-inventor of all six SCIT technology patents that are based on the r...

On The Internet, Nobody Knows If You’re A Dog - An Interview with Christian Folini

January 03, 2019 17:27 - 56 minutes - 51.5 MB

Key Points From This Episode: How Christian came to study both Medieval History and Computer Science. Learn more about Christian’s unique PhD in German Mysticism. Christian shares his unique passion for global cyber security theory. Are their links between Medieval history and what is happening with the internet today? Discover more about the balkanization of the internet and net neutrality. Parallels between Medieval social connections and internet social connections. Christian’s view on op...

Are Patient Records Really Private? An Interview with Stephanie Crabb, Founder of Immersive

September 10, 2018 18:51 - 49 seconds - 33.7 MB

Key Points From This Episode: How Stephanie ended up in the cyber security profession. An introduction to the challenges that face cyber security in the healthcare sector. The intersection of the individual, the governmental and the business sectors. Major differences between GDPR and HIPAA. The competitive element to the monetization of data across industries. Interstate influence with regards to healthcare regulation. Building uniform national and international standards for healthc...

Keeping Cyber Attacks from Blowing Stuff Up-An Interview with Erfan Ibrahim, CEO of The Bit Bazaar

August 29, 2018 17:25 - 52 minutes - 48 MB

Key Points From The Episode: Erfan’s professional background and how this sets him apart. The problem with businesses’ drive towards interconnectivity. Creating a hardened, layered defense as opposed to merely a perimeter. How these concerns fit into a real life utility configuration. The importance of institutional architecture beyond personnel. Shifting common mental models of security and how it relates to confidentiality. The benefits of prioritizing ‘hyper-quiet’ networks. The i...

Human-centric Security - An Interview with Richard Ford Chief Scientist at Forcepoint

July 13, 2018 14:30

Interview with Richard Ford Chief Scientist at Forcepoint: Cyber Security Dispatch: Show Notes: In this episode of the Cyber Security Dispatch, we talk with Dr. Richard Ford the Chief Scientist of Forcepoint. Dr. Ford has been in the industry for quite a while and he has seen the industry through the lens of many different job descriptions, which gives him a grounded perspective of the entire business. Through his grounded perspective he talks about the current problems that plague the sec...

Peering Into the Dark Places - An Interview with Michael Marriott of Digital Shadows

July 11, 2018 16:23 - 25 minutes - 23.7 MB

Key Points From This Episode: An introduction to the work of Michael and Digital Shadows. Explaining the dark web and how it functions. Recent developments in the dark web market places. The service that Digital Shadows offers to its clients. Looking at file storage and the problems that these services create. How Michael’s organization goes about protecting other organizations from threats. Removing the criminal value of identifiers such as SS numbers. Some of the interesting ways customers...

Three Pillars of Data: Protection, Transparency, and Control - An Interview with Eve Maler of Forgerock

July 05, 2018 14:30

Interview with Eve Maler of Forgerock: Cyber Security Dispatch: Show Notes: On today’s episode of the Cyber Security,  we welcome Eve Maler, VP of Innovation & Emerging Technology at Forgerock’s Office of the CTO. Eve and I talk about all things data. We start of with GDPR: why it is such a widespread Data Regulation, how different people approach it, and how it can be treated as either a way to accumulate penalties or an opportunity to gain customers’ trust. Then we talk about the steps o...

Using the New Toys to Solve the Legacy Issues - An Interview with Scott Laliberte of Protiviti

July 02, 2018 14:30 - 21.4 MB

Key Points From This Episode: Find out more about Scott and his background in the industry. Using newer technologies to mitigate risk issues. The importance of measuring vulnerability and patch programs. Speaking in business terms versus technical terms. Addressing patching and hardening caused performance issues. Resolving a CISO’s mandate versus the line of business mandate. What are the guiding principles of organization collaboration? Getting the business to realize that they are the bra...

CISO’s are Goal Keepers, All Guts No Glory - An Interview with Giovanni Vigna of Lastline

June 29, 2018 14:30 - 23 minutes - 21.8 MB

Key Points From This Episode: Vendor tools: Who should we be routing detections to? The importance of giving the right information to the right people. Tips for dealing with technical superiority and buzz word trends. How small companies can establish their own technical superiority. Why no one really believes how great you tell them you are. What the next generation of software programmers are looking at. How cyber security has become a cross-disciplinary concern. What it takes to educate t...

Who is Watching the Watchers - An Interview with Marton Illes of Balabit.

June 27, 2018 14:30 - 21 minutes - 19.8 MB

Key Points From This Episode: Martin’s background and the current climate of privileged access management. Managing the changing roles of privileges within hierarchical organizations. How the inevitable shift to the cloud is changing cyber security concerns. Who watches the watchers? What is the freedom of a super-user? Points of friction within and without organizations around admin roles. The increasing space of AI and what that means for job creation. The lack of development in cyber secu...

The Cloudbased Browser - An Interview with Scott Petry, CEO of Authentic8

June 18, 2018 15:30

Interview with Scott Petry, CEO of Authentic8: Cyber Security Dispatch: Show Notes: On today’s episode we are joined by Scott Petry, the CEO and cofounder of Authentic8 and Founder of Postini. Scott Petry’s work on Postini is quite impactful since the company became associated with Google eight years after it was created. In this episode we talk about silo and Authentic8’s goals of ensuring customer privacy. We also discuss how some companies use complex and technical words to deceive cust...

Everybody’s Phishing - An Interview with Joe Gray of Advanced Persistent Security

June 15, 2018 17:30 - 24 minutes - 22.4 MB

Key Points From This Episode: Learn more about phishing for awareness and what this entails. How Joe helps companies set up phishing engagements against their employees. Incident response and why phishing attempts are never going to be 100% effective. Assuring those who have been phished that their credentials aren’t necessarily useable. The difference between pen testing and red teaming in light of Haroon Meer’s work. Why less black box pen testing and more white box red teaming could be th...

Treat the Disease - An Interview with Jason Brvenik CTO of NSS Labs

June 14, 2018 18:59

Interview with Jason Brvenik, CTO OF NSS labs: Cyber Security Dispatch: Show Notes: On today’s episode we welcome Jason Brvenik the Chief Technology Officer of NSS Labs. He has spent 20 years in practicing a wide variety attributes within cybersecurity and has played a major role in his previous company, Sourcefire. We talk about a central development from NSS, EDR: Endpoint Detection and Response, and perspectives from a business related cybersecurity company. Jason explains the two engag...

Privacy Within the Digital Ecosystem - An Interview with Pam Dixon of World Privacy Forum

June 12, 2018 18:14 - 25 minutes - 23.2 MB

Key Points From This Episode: The current privacy landscape and an introduction to GDPR. Unpacking GDPR and what it will mean. The future of terms, conditions and consent forms. Locating the issue of privacy within a larger context of human rights. The privacy issue and the distance it has to go to catch up with other social concerns. The role of industry in the progress of the privacy issue. Imagining an affirmative, multifaceted approach towards privacy. Privacy’s relationship to identity ...

How Bad is IOT Security? - An Interview with Stephen Cobb and Tony Anscombe from ESET

June 07, 2018 15:30 - 29 minutes - 27.4 MB

Key Points From This Episode: An introduction to our guests and their roles at ESET. What brings our guests to RSA. High detection, low maintenance and avoiding false positives. Resistance to the cloud and what the slow migration means for security. The obvious relationship between cyber security and the Internet of Things. Practical and safe application of IOT in the home. Targeted attacks and specific ransomware. Looking at how these products in our homes can be leveraged by cyber criminal...

Security in the Cloud - An Interview with Ratinder Ahuja, CEO of ShieldX

June 04, 2018 20:19 - 32 minutes - 29.4 MB

Key Points From This Episode: The beginnings of ShieldX and the time leading up to this. The arrival of the cloud and the effect of ‘east-west’ security. Implications for the lack of orchestration for traditional systems. Reducing the total cost of ownership in addressing these scenarios. Transferring the security of on-premise systems to the larger, cloud scale. The logistics of migrating your security to any of the large cloud services. The futility of an agent based approach to cloud secu...

From One CISO to Another, Get Back to the Basics - An Interview with Jaya Baloo CISO of KPN

May 30, 2018 15:07 - 19 minutes - 18.2 MB

Key Points From This Episode: Learn more about the 2012 KPN hack and its impacts on cyber security today. Riding the security rollercoaster: How to sustainably manage vulnerabilities and incidents. Dealing with the known knowns, the known unknowns and the unknown unknowns… How KPN works to reduce the window of opportunity for a potential hack to take place. How does KPN ensure that security becomes embedded in different organizations. Jaya shares more about the impact of cyber security when ...

The Making of a Cyber Hero - An Interview with Gary Berman, CEO of CyberMan Security.

May 29, 2018 18:40 - 47 minutes - 43.4 MB

Key Points From This Episode: An introduction to Gary and his professional life. The tragic turn that Gary’s company took after it was hacked from the inside. How Gary and his wife handled the crimes that were committed against their company. The change of career that followed the downfall of the company. The hacks that persisted ten years after Gary left his original career. The decision to turn his lack of cyber knowledge into a lesson for anyone. The birth of the Cyber Heroes comic! Looki...

Hacking The Pentagon - An Interview with Lisa Wiswell of Grimm & HackerOne

May 15, 2018 19:33 - 37 minutes - 34.1 MB

Key Points From This Episode: Discover how Lisa entered the field of cyber security. How Lisa came to work as a “bureaucracy hacker” at the Pentagon. Learn more about the aims and direction of the DARPA program. Lisa shares more about DARPA’s flagship program titled PlanX. Find out more about the intricate links between Cybercom and the NSA. Hear what Lisa believes is the problem with standards and compliance. How to ensure mature cyber security ecosystems today? Lisa’s thoughts. Hacking the...

How to Make Security Analysts' Lives Easier - An Interview with John Cassidy CEO and founder of King & Union

May 14, 2018 14:30 - 11 minutes - 10.7 MB

Key Points From This Episode: The latest product John and King & Union have launched called Avalon. Avalon’s target market and the space it occupies in security operations. What differentiates Avalon from other similar products. Entering a crowded market and integrating into existing systems. The architecture of securing information for a large company. Housing these systems and the cloud services Avalon uses. The experience of venture capitalism and the start-up game. Building the team at K...

The Black Report, The Human Behind the Hack - An Interview with David Smith of Nuix.

May 11, 2018 20:39 - 22 minutes - 20.7 MB

Key Points From This Episode: David’s current position at Nuix and his background in the US Secret Service. Some information on the Black Report and it’s defining characteristics. The biggest realizations David has had working for Nuix. Underestimating the human factor in current cyber attacks. Better understanding the profiles and motivations of hackers. The evolution of the mind of the attacker and how things stay the same. Possible ways to go about testing and preparing for attacks. David...

Preserving Your Social Brand: The New Threat Factor - An Interview with Mike Price, CTO of ZeroFox

May 09, 2018 21:03 - 11 minutes - 10.9 MB

Key Points From This Episode: Learn more about Mike, his background in the industry and his role at ZeroFOX. Find out why security never appears to be top of mind when it comes to social. Are people more welcoming of digital intruders versus in-person intruders? Mike shares his views on social interaction from an enterprise perspective. How ZeroFOX assists companies who are being harmed by behavior on social. Why is crypto mining such a big issue right now and are consumers at a security ris...

CISOs On the Tight Rope Balancing Act- An Interview with Simon Gibson, CISO at Gigamon

May 07, 2018 19:21 - 25 minutes - 23 MB

Key Points From This Episode: Some of Simon’s background and the areas in which he has worked. The work Simon did at Bloomberg the and role of financial services in security. The rising value of data and how this fits into an organization’s security. The continuous role of a CISO in maintaining security over time. Balancing risk preparation with cost effectiveness. The easy ways to make sure your company is not very exposed to attack. Matching your security practices to your company and it’s...

Keeping the Lights On - An Interview with Arthur House, Chief Risk Officer for The State of Connecticut.

May 07, 2018 18:04 - 38 minutes - 35.2 MB

Key Points From This Episode: Arthur’s background in International Relations and role in the Obama administration. The new challenge that cyber security poses to the state commission. Highlights from the important process of Connecticut cyber security report. The meetings that followed this report process and what contributed to its success. Differences between public utilities and the general business sector. Responding to the ongoing and evolving challenge of cyber crime. The idea of cyber...

A Postcard From the Future - An Interview with Dr. Ron Ross

May 01, 2018 18:11 - 58 minutes - 45 MB

Key Points From This Episode: •    Dr. Ross’ job specifics and NIST’s role in cyber security. •    The current climate of cyber danger and how this relates to the internet of things. •    Cyber resiliency as compared with the idea of cyber security. •    Counter measures and tactics that typify cyber resiliency. •    The characteristics of diversity and homogeneity in security systems. •    The idea of deception as a tactic in defense. •    Dynamism and reconfiguration in the ongoing...

The Nightmare of IOT Vulnerabilities - An Interview with Stefano Zanero & Roberto Clapis

April 06, 2018 13:27 - 27 minutes - 25.7 MB

On today’s episode we host a conversation with Roberto Clapis and Stefano Zanero from Secure Network in Milan. We tackle the issue of IOT device security and try to break down just where companies and users are at with this issue currently. We get a background to Stefano and Roberto’s work and their interest in security as well as little peak inside their presentation from The Black Hat Convention. One of the main takeaways from the discussion is the idea of communication between security an...

Air Gaps Are Like Unicorns - An Interview With Galina Antova

March 26, 2018 22:50 - 21 minutes - 16.8 MB

In this episode, Air Gaps Are Like Unicorns, we talk with Galina Antova. One of the co-founders of Claroty, a fast growing security startup in the world of industrial control systems. She shares her experience working to protect these critical systems and the journey that led her to found Claroty.

Focusing on What Matters an Interview with Justin Berman CISO of Zenefits

March 05, 2018 18:12 - 34 minutes - 31.2 MB

Key Points From This Episode: Justin’s studies, consulting work and path to his current role at Zenefits. Calculating risk return for defense and attack and how Justin approaches this. Why better general security at other companies benefits everyone. Justin’s approach to defending against advanced persistent threats. Why security needs to talk more about the less sexy sides of their work. The hottest new strategies and technologies according to Justin. The role and appropriate time for autom...

Deception as A Strategy An Interview with Rick Moy from Acalvio

February 28, 2018 19:47 - 15 minutes - 14.2 MB

    Well Rick, thanks for joining us. Just introduce yourself. My name is Rick Moy. I'm the chief marketing officer at a company called Acalvio Technologies. We are a Deception 2.0 company. We are creating a distributed deception platform that brings automated deceptions at scale and authenticity to organizations of any size. The goals is to make it easy to manage, deploy, and implement deception strategies in the network in order to do a better job of detecting attackers who have gotten p...

What The Future Of The Internet Looks Like and How We Can Secure It Humanely - An Interview with Andrea Little Limbago, Chief Social Scientist at Endgame

February 12, 2018 21:48 - 26 minutes - 23.9 MB

Key Points From This Episode: Andrea's journey from academia to cyber security. Why cyber security is also a retention challenge. How companies can protect their employees from burnout. What happened to the utopian idea of the internet? State sovereignty and the balkanize internet or splinter net. The implications of China’s new social credit system. Learn more about GDPR and the control over your own data. Does Russia’s internet look different to the rest of the internet? The effects of th...

The Current State Of Protecting Industrial Systems and Safeguarding Civilization Today-An Interview with Joe Slowik, Adversary Hunter at Dragos

February 07, 2018 21:12 - 27 minutes - 25.6 MB

Key Points From This Episode:   •    Learn more about Joe Slowik and his non-traditional CS Background. •    Joe gives his overview of the current thought around industrial controls. •    Find out how we defend industrial control systems today. •    How can attacks be actualized to impact an ICS environment? •    Script locking and reevaluating credential storage and credential use. •    Adopting a strategic perspective and designing network defense. •    Discover more about the Perd...

Uncle Sam is Learning New Tricks - An Interview with Steve Orrin, CTO of Intel Federal

February 02, 2018 21:31 - 26 minutes - 24.5 MB

In this interview, we talk with Steve Orrin, CTO of Intel Federal and take a deep dive into how government agencies are speeding up and changing their process for adopting new technology.

CSD Interview with Ray Mastre - Director at PwC

January 31, 2018 20:09

     Yeah. So, if you can just introduce yourself, your name, where you're from, and where we are just so we can have it for the tape. My name's Ray Mastre. I'm a director with Price Waterhouse Coopers, and I'm at the San Francisco ISACA Conference. Awesome. Thanks. I heard you've been with PWC for a while. I've been with PWC for almost 14 years. I'm a little bit of a PWC dinosaur. Lifer. Exactly. Lifer. Always curious how people ended up in cyber security. I was an IT guy at Penn S...

What We Didn't Predict, Can Still Hurt Us, An Interview with Internet Hall of Famer Paul Vixie

January 20, 2018 20:52 - 30 minutes - 27.8 MB

Paul's perspective having been leading some of the efforts that shaped how the modern internet works today. We talked about how such complex and multi partied ecosystem is always going to create problems and issues we couldn't imagine and how we as a global community are still struggling to solve them.

CSD Interview with Alya & Elena from Aleada Consulting

January 18, 2018 20:33

     Cyber Security Dispatch sat down with Alya Gennaro and Elena Elkina to talk about the current state of privacy. Alya and Elena run the Women in Security and Privacy organizations and are cofounders of Aleada Consulting which focuses on helping clients understand and manage their privacy challenges. We covered some of the emerging issues in privacy including GDPR, and what individuals and companies can do to control their privacy.     Full Transcript coming soon!     Alya Gennaro i...

CSD Interview with Randy Henry - Senior GRC Specialist at SoFi

January 18, 2018 20:12

    Full transcript coming soon!

CSD Interview with Marta O'Shea - SVP & IT Audit Director at Wells Fargo

January 18, 2018 19:57

    IT Vulnerabilities – What an IT Auditor should be thinking about and  why vulnerabilities are such a hot topic, what the risks are, things to think about when designing an audit approach including vulnerability identification, prioritization, remediation solution selection, ongoing sustainment controls and reporting. Check back soon for the full interview and transcript! Securely, CSD

CSD Interview with Raj Patel - Palo Alto CISO

January 18, 2018 19:55

    Raj Patel Chief Information Security Officer, City of Palo Alto ISO 27002-ISMS, COP, CRISC, CGEIT, ITIL Multiple award-winner and innovative information technology executive with 30+ years of experience in public and private sectors (at the City of Palo Alto, Oracle Corp., Sun Microsystems, Solectoron Corporation and Kaiser Permanente) in leading cyber security and digital innovation, Since joining the City of Palo Alto in 2012, he has institutionalized 3 years IT strategy with a bold v...

Last Week In Cyber Security - 10-16-17

October 16, 2017 19:27

From GDPR to North Korean cyber power, here's what happened last week.

Last Week in Cyber Security 10-04-17

October 05, 2017 01:15

Equifax, and why the US needs more cyber soldiers. Here's what happened last week.

Corporate Espionage and the New War on Privacy

April 13, 2017 14:00

To hell with thieves.

Conducting Business Across Borders

March 17, 2017 14:00

Six Steps for Protecting Company Interests

Twitter Mentions

@paulvixie 1 Episode
@vrybdpkt 1 Episode
@imscottpetry 1 Episode
@justinmberman 1 Episode
@ronrossecure 1 Episode