On the Season 2 debut of Lost Cultures: Living Legacies , we travel to Bermuda, an Atlantic island whose history spans centuries and continents. Once uninhabited, Bermuda became a vital stop in transatlantic trade, a maritime stronghold, and a cultural crossroads shaped by African, European, Caribbean, and Native American influences. Guests Dr. Kristy Warren and Dr. Edward Harris trace its transformation from an uninhabited island to a strategic outpost shaped by shipwrecks, colonization, the transatlantic slave trade, and the rise and fall of empires. Plus, former Director of Tourism Gary Phillips shares the story of the Gombey tradition, a vibrant performance art rooted in resistance, migration, and cultural fusion. Together, they reveal how Bermuda’s layered past continues to shape its people, culture, and identity today. You can also find us online at travelandleisure.com/lostcultures Learn more about your ad choices. Visit podcastchoices.com/adchoices…
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.
What happens when you realize your life's work is being used to destroy what you hoped to create? Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pioneered to unite people was dividing humanity through social media algorithms. The Reality Check: We don't just have 8 billion humans anymore. We have 800 billion AI systems learning our behavior 24/7 - "digital children" growing up without parental guidance. 🎯 KEY INSIGHTS: • The Translation Paradox: How unity technology became division engines • The Blind Men & Elephant: Ancient parable explaining why we misunderstand AI • Digital Parenting Crisis: Why we're raising 800 billion unguided AI systems • The Psychology of Manipulation: How AI exploits cognitive weaknesses • Four Futures Scenario: Humanity's possible paths with AI 🧠 AI MANIPULATION TACTICS REVEALED: Anchoring attacks that shape your thinking Belief perseverance traps that backfire fact-checking How algorithms turn gossip into social weapons 📖 ABOUT "RAISING AI": De Kai's book explores the question we should be asking: Not "Will AI replace us?" but "How do we raise AI ethically?" Written by Google's AI Ethics Council founding member, it reveals why current AI needs 15 million times more data than human children and provides a framework for ethical AI development. 🔬 DE KAI'S CREDENTIALS: • AI pioneer & Founding Fellow in computational linguistics • Independent Director of AI ethics think tank The Future Society • One of 8 inaugural members of Google's AI Ethics Council • Joint appointment at HKUST Computer Science & Berkeley's International Computer Science Institute • Electronic musician exploring AI creativity 💭 QUESTIONS ANSWERED: How translation tech became social manipulation? What makes AI behave like "unparented teenagers"? How to be a good "AI parent" in organizations? Why human-AI merger might be our best survival strategy? The Timeline is Accelerating. 99% of people are "frozen like deer in headlights" facing humanity's most disruptive transformation. Organizations ignoring AI governance face competitive extinction within five years. This isn't academic theory - it's a confession and warning from someone who helped create the systems now shaping global culture. Book: Raising AI: An Essential Guide to Parenting Our Future #AIEthics #GoogleTranslate #ArtificialIntelligence #MachineLearning #RaisingAI #TechnologyLeadership #AIGovernance #DigitalTransformation #FutureOfWork #AIStrategy #Innovation #TechLeadership #AICompliance #BusinessStrategy…
Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we never opted in. In this episode of SecureTalk, host Justin Beals sits down with Dr. Aram Sinnreich and Jesse Gilbert, co-authors of "The Secret Life of Data," to explore a revolutionary approach to digital security: data kindness. 🎯 KEY TOPICS COVERED: • Why our biggest security threat is social fragmentation, not just technical vulnerabilities • How tech companies profit from division (anger drives 5x more engagement than approval) • The food allergy transformation: how society changed practices organically in 20 years • Practical data kindness: simple actions that rebuild digital trust • Why cooperation is our best defense in an age of surveillance • How to reclaim agency over your digital life 🚨 CRITICAL INSIGHTS: We can't rely on tech companies (profit over people) or Congress (no data protection laws passed) Change must happen from the ground up through shared cultural practices Simple acts like unplugging smart devices for guests or consulting family before DNA uploads matter Divided societies are vulnerable societies—cooperation is a security strategy 👥 ABOUT THE GUESTS: Dr. Aram Sinnreich serves as a Professor and Graduate Director within the Communication Studies department at American University’s School of Communication. His research addresses the convergence of culture, law, and technology, focusing particularly on topics such as surveillance and privacy, intellectual property, digital rights, digital culture, democracy, governance, and music. Sinnreich has authored five books: Mashed Up (2010), The Piracy Crusade (2013), The Essential Guide to Intellectual Property (2019), the science fiction novel A Second Chance for Yesterday (2023; coauthored with Rachel Hope Cleves as R.A. Sinn), and The Secret Life of Data (2024; coauthored with Jesse Gilbert). Additionally, his writing has appeared in various publications including The New York Times, Billboard, Wired, The Daily Beast, and Rolling Stone. He is a core faculty member of the SOC doctoral program and the MA in Media, Technology & Democracy, regularly collaborating with SOC graduate students on research publications and projects. Jesse Gilbert is an interdisciplinary artist focused on the convergence of visual art, sound, and software design through his firm, Dark Matter Media. He previously served as the founding Chair of the Media Technology department at Woodbury University and has taught interactive software design at CalArts and UC San Diego. Since 2010, Gilbert's work has revolved around his innovative software, SpectralGL, which is an interactive listening instrument that creates real-time visual landscapes in response to sound. Drawing on his background as a composer, sound designer, and lifelong technologist, his creative output investigates the phenomenological aspects of listening through improvisation and collaborative dialogue. His work has been showcased at numerous concert halls, festivals, and projection-mapped installations worldwide. In 2007, Gilbert co-founded Dark Matter Media LLC to facilitate his independent creative projects and provide consultancy on emerging technologies across various public and private environments. From 2011 to 2017, he held the founding Chair position in the Department of Media Technology at Woodbury University and taught interactive software design at both CalArts and UC San Diego. After documenting the problems in their first book, Aram and Jesse recently published insights in Time Magazine and are working on a new book about building cooperative societies with kindness embedded in technology design. 🔗 CONNECT WITH SECURETALK: • Subscribe for weekly cybersecurity insights • Follow Justin Beals on LinkedIn • RESOURCES: Sinnreich, A., & Gilbert, J. (2025, April 3). How to be kind in a world that's always monitoring you. Time Magazine . https://time.com/7273469/data-monitoring-kindness-essay/ Sinnreich, A., & Gilbert, J. (2024). The secret life of data: Navigating hype and uncertainty in the age of algorithmic surveillance . MIT Press. Beals, J. (Host) . (2024, May 14) The Algorithmic Mirror: Reflecting on Data's Role in Modern Life. in Secure Talk Podcast, Ep 173 with Aram Sinnreich and Jesse Gilbert…
***Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here! https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&utm_medium=podcast&utm_campaign=gartner-boat-party Episode Description: When quantum computing pioneer Michele Mosca met Peter Shor in the 1990s, he thought quantum computing was "science fiction." Now, he's warning that we're just "a few quarters" away from quantum computers capable of shattering the encryption protecting our global financial system, government communications, and critical infrastructure. In this must-listen episode, the Oxford-educated mathematician and co-founder of Evolution Q breaks down why symmetric key infrastructure (SKI) and "cryptographic resilience" are essential as quantum computing advances faster than our security preparations. With remarkable clarity, Mosca explains how the nine-year NIST standardization process signals both progress and concerning delays in our quantum readiness. The interview explores why most organizations are unprepared, how quantum networks could provide a novel security solution, and what businesses should be doing now to protect their long-term data security. Mosca also details the latest breakthroughs in quantum error correction across ion traps, neutral atoms, and superconducting qubits that are bringing us closer to fault-tolerant quantum computing. Key Topics Covered: The evolution of quantum computing from theoretical concept to imminent reality How close we are to breaking modern encryption standards Evolution Q's innovative approach to quantum resilience The concept of symmetric key infrastructure (SKI) as a defense mechanism Recent breakthroughs in quantum error correction Why organizations need both defense-in-depth and cryptographic diversity The limitations of the NIST standardization process and what it means for security Episode Highlights: "I met Don Coppersmith... he told me he was helping a colleague improve his algorithm where you'd trap these atoms and you'd shine lasers on them, do exponentiation and then do a Fourier transform... I thought he was joking. I'd never heard of this before." "We look at it as an engineering challenge. Oh, how much does it cost to scale this up? By a factor of 10 or 100 or 1,000, but 1,000, it's like 10 bits of security... It's not that much of a security buffer. The one we're used to in cryptography between what we could break and those we can't, we want an enormous gap." About the Guest: Michele Mosca is the CEO and co-founder of evolutionQ, a start-up that provides scalable defense-in-depth with post-quantum cryptography (PQC) and quantum key distribution (QKD) software solutions for cryptographic resilience and quantum-safe security. Michele is a renowned expert in cryptography and among the world's leading experts at the intersection of quantum computing and cybersecurity. He has been instrumental in working with the business community to share the importance of cryptography as a critical cybersecurity control protecting both data and communications. Prior to evolutionQ, Michele was a founder of the world-leading Institute for Quantum Computing, a Professor in the Department of Combinatorics & Optimization at the University of Waterloo, and a founding member of the Perimeter Institute for Theoretical Physics. His work on quantum computing has been published widely in top journals and textbooks. Michele worked on cryptography during his BMath (Waterloo) and MSc (Oxford) and obtained his Doctorate (Oxford) in Quantum Computer Algorithms. He was appointed as a Knight in the Order of Merit by the Government of Italy in 2018. The Knighthood recognizes Michele’s contributions in quantum information science and digital security, as well as teaching and outreach. Connect and Learn More: Stay updated on quantum security developments: quantum-safe.ca Subscribe to SecureTalk on your favorite podcast platform Join the conversation with #QuantumSecurity #PostQuantumCryptography #QuantumThreat #CyberResilience…
In this riveting episode of SecureTalk, host Justin Beals welcomes back decorated military leader and security expert Mike LeFever, Executive Vice President of National Security at Concentric, to discuss the intersection of physical security, geopolitical instability, and the future of national defense. From the polarization of American politics to the innovative warfare tactics in Ukraine, this conversation offers cybersecurity professionals an essential perspective on how global security dynamics impact the digital landscape. ## Key Topics Covered: - 🔒 **Physical Security Crisis**: How political polarization has created new security challenges for high-profile individuals and organizations - 🌍 **Soft Power Erosion**: The concerning reduction in USAID and diplomatic initiatives and its impact on national security - 🇺🇦 **Ukraine's Tech Innovation**: Revolutionary drone warfare tactics and rapid adaptation changing the future of military strategy - 💻 **Information Warfare**: The growing "truth decay" problem and how disinformation campaigns are reshaping public discourse - 🏛️ **Constitutional Challenges**: Analysis of current governance issues and threats to democratic institutions - 🔍 **Leadership in Chaos**: Strategic insights for security professionals navigating turbulent times ## Episode Highlights: ### The Business of Protection LeFever discusses how Concentric provides comprehensive security for high-net-worth individuals, including physical security, intelligence products, due diligence, and privacy protection in an increasingly polarized environment where public figures face heightened threats. ### The Crisis in Governance The conversation examines concerning trends in the federal workforce, with both experts highlighting how dismissing experienced personnel creates institutional knowledge gaps and damages trust in critical security domains. ### The Value of Soft Power Drawing from his experience leading earthquake relief efforts in Pakistan, LeFever explains how humanitarian initiatives like USAID build crucial international relationships that enhance national security more effectively than purely kinetic operations. ### Innovations in Modern Warfare Analysis of Ukraine's remarkable technological adaptations against Russia, showcasing how smaller forces can effectively counter larger opponents through rapid innovation and precision drone strikes. ### Leadership Wisdom LeFever shares invaluable advice for security leaders navigating chaos: maintain strategic focus on end goals while building resilience against tactical disruptions. ## About the Guests: **Mike LeFever** is Executive Vice President of National Security at Concentric, providing comprehensive physical and privacy security solutions. His distinguished military career included leadership roles in counterterrorism and diplomatic security initiatives across multiple global hotspots. **Justin Beals** is the host of SecureTalk and a recognized expert in cybersecurity strategy and implementation. ## Connect & Learn More: - Visit www.securetalk.com For more episodes…
Episode Summary: In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbots, creating a new frontier in information warfare that bypasses human readers to directly corrupt the technology we rely on for information. Key Insights: Leading AI chatbots repeated Russian disinformation 33% of the time when tested on key geopolitical topics The Pravda network has expanded from 50 to over 150 websites specifically designed to influence AI training data Modern disinformation operations now prioritize "LLM grooming" over targeting human readers Even when AI systems attempt to debunk false claims, they often cite unreliable sources, further legitimizing them Human oversight remains essential as these networks constantly evolve to evade automated detection Notable Quotes: "Bad actors are targeting AI models to get their information to appear in those responses, but they're also weaponizing AI to produce disinformation at scale." - McKenzie Sadeghi "What is changing is really the delivery of the disinformation... it's reaching a much larger audience and an audience that's not targeted as specifically because now practically anyone is using ChatGPT or other chatbots." - Isis Blachez "This network does not invest any money or resources into spreading its content online... It's sort of serving as a centralized hub. And as a result, it appears very high not only in search results but also in chatbot responses." - McKenzie Sadeghi Resources: Sadeghi, M., & Blachez, I. (2025, March 6). A well-funded Moscow-based global disinformation network. NewsGuard Reality Check. https://www.newsguardrealitycheck.com/p/a-well-funded-moscow-based-global…
In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies. Episode Insights: Postman's Strategic Position : Learn why Sam joined Postman in September 2024 and how they're positioned to be the connective tissue for the emerging AI agent ecosystem APIs as Agent Infrastructure : Sam explains how Postman's catalog of hundreds of thousands of documented APIs creates the perfect foundation for AI agent interactions Security by Design : Discover how Postman is embedding security throughout the API lifecycle - from conception to deployment The Human Factor in Security : Why security remains a collaborative responsibility across organizations and how to foster a security-minded culture Next-Gen Challenges : Sam's perspective on balancing innovation with fundamental security hygiene concerns like supply chain vulnerabilities "I see such a larger ecosystem that's really going to get built here beyond what's out in the market today," says Sam, discussing how Postman will facilitate human-agent collaboration in building the next generation of applications. Sam brings unique insights from his previous roles at technology giants like Palo Alto Networks and NVIDIA, where he once demonstrated an early chatbot prototype to Jensen Huang himself. His experience taking products through rigorous FedRAMP certification processes provides a valuable perspective on enterprise-grade security implementation. This episode offers essential insights for developers, security professionals, and technology leaders interested in the intersection of APIs, AI, and enterprise security in today's rapidly evolving digital landscape.…
In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people, and processes. The conversation explores real-world examples like the Change Healthcare breach, why security frameworks often fall short, and how building a culture of security requires connecting protection of company assets to personal security concerns. Key Topics The Change Healthcare breach: How a single oversight led to a $2.9 billion loss despite substantial technology investments Why frameworks like CIS are great starting points but insufficient on their own How the "Ring of Security" approach addresses the complete attack surface Building a security culture that resonates with employees on a personal level Why a business impact analysis is critical but often missing from frameworks The importance of understanding your data before implementing AI solutions Notable Quotes "When you do the root cause analysis on headline breaches, nearly all of them started somewhere outside the technology." - Bryant Tow "Even if you do your technology perfectly, you're leaving half of your attack surface open." - Bryant Tow "Strategy drives governance. Governance drives operation." - Bryant Tow About the Guest Bryant Tow serves as Chief Security Officer at LeapFrog Services, where he assists clients with comprehensive security programs including strategy, governance, and operations. Previously, he owned Cyber Risk Solutions and served on the Department of Homeland Security Sector Coordinating Council. His "Ring of Security" concept emphasizes that cybersecurity is an organizational problem that uses technology as just one tool in the solution. Resources Mentioned The "Ring of Security" concept CIS Framework limitations Business Impact Analysis AI Readiness Assessment Department of Homeland Security Sector Coordinating Council SecureTalk is hosted by Justin Beals, focusing on cybersecurity strategy, governance, and best practices for organizations of all sizes.…
In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-resistant cryptography, this conversation tracks the incredible journey of cybersecurity infrastructure. ### Key Highlights: - **The Birth of Edge Networks**: How Akamai transformed from emergency content delivery savior to cybersecurity powerhouse - **Massive Security Scale**: Processing 26 billion web attacks monthly and analyzing 7 trillion DNS queries daily - **Zero Trust Evolution**: Why identity-aware proxies are replacing traditional VPNs for enterprise security - **Micro-segmentation Explained**: Creating "mini-firewalls" at every endpoint to contain breaches and limit attack radius - **Bot Attack Revolution**: The evolution from simple DDoS to sophisticated credential abuse and account takeover attempts - **API Security Challenges**: Why APIs have become the new security frontier as other defenses improve - **Client-Side Security**: How PCI DSS v4 is forcing new approaches to JavaScript security monitoring - **Quantum-Resistant Future**: Akamai's implementation of NIST-approved quantum-resistant cryptography ### Notable Quotes: "If you had our auto rules applied during the Log4J incident, you wouldn't have had to take any action during Christmas - it would have been protecting you automatically." - Joe Gronemeyer "At some point I think it was in 2011-2012, is when we would start looking at the traffic coming in and protecting websites from attacks as well. So applying security at the edge, keeping the bad actors away from your servers." - Joe Gronemeyer ### About Our Guest: Joe Gronemeyer serves as a Solutions Engineer at Akamai Technologies with nearly a decade of experience. Previously, he spent 13 years at Accenture as a Senior Manager leading digital solutions for Fortune 500 companies across pharmaceuticals, consumer goods, and telecommunications industries. He holds a BS in Industrial and Systems Engineering from Georgia Tech and is CISSP certified. ### Resources Mentioned: - Web Application Firewall (WAF) technology - Zero Trust Network Access (ZTNA) - Enterprise Application Access - Client-Side Access and Compliance (formerly Page Integrity Manager) - OWASP Top 10 for web, API, and AI security - PCI DSS version 4 compliance requirements - NIST standards for quantum-resistant cryptography *Don't miss our next episode where we'll continue exploring cutting-edge cybersecurity approaches for enterprise organizations.* #EdgeSecurity #ZeroTrust #MicroSegmentation #APIProtection #WAF #PCICompliance #QuantumCryptography #CyberDefense…
In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital financial crimes. Key Topics Discussed: The meaning behind Furneaux's book title "There's No Such Thing as Crypto Crime" and why traditional investigation skills remain relevant The fundamental differences between Bitcoin and newer cryptocurrencies like Ethereum and Solana How blockchain technology actually helps investigators through its open ledger system The mechanics behind "rug pulls" and other crypto-related scams The role of mining in cryptocurrency ownership and value How TRM Forensics tools help trace illicit cryptocurrency transactions The concerning rise of human trafficking in crypto scam operations How AI is transforming both criminal schemes and investigation techniques Notable Quotes: "There is no such thing as a crypto-only crime. There is no new criminal category. There is just a new payment mechanism." - Nick Furneaux "The Bitcoin source code is some of the most beautiful code ever written. It is extraordinary... and it's never been hacked." - Nick Furneaux "We're in a situation now where the victim is a victim, and the scammer is a victim." - Nick Furneaux on trafficking in scam compounds About Nick Furneaux: Nick Furneaux is a digital forensics expert, cryptocurrency investigator, and cybersecurity specialist. He has worked in digital forensics for many years and is known for his expertise in cryptocurrency investigations. He has served as a trainer and consultant for law enforcement agencies and private organizations on matters related to digital forensics and cryptocurrency tracing. He is the author of *There’s No Such Thing as Cryptocrime* (2024) and *Investigating Cryptocurrencies* (2018). He has trained thousands of investigators in the essential skills needed to track cryptocurrencies involved in criminal activities. Currently, he works as a Blockchain Intelligence Expert and Master Trainer at TRM Labs and serves as an advisor to the Board of Asset Reality. Resources Mentioned: Book: "There's No Such Thing as Crypto Crime" by Nick Furneaux (link) Book: "Investigating Cryptocurrencies" by Nick Furneaux (link) TRM Forensics Investigative Toolkit This episode provides invaluable insights for cybersecurity professionals, financial investigators, and anyone interested in understanding cryptocurrency's role in modern digital crime investigations. SecureTalk is hosted by Justin Beals, bringing you expert conversations with the leading minds in cybersecurity. #Cryptocurrency #BlockchainForensics #CryptoInvestigation #Cybersecurity #DigitalForensics #Bitcoin #Ethereum #CryptoScams #FinancialCrime…
In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWARE" attack - a persistent malicious instruction that can be injected into ChatGPT's long-term memory, potentially leading to data exfiltration and other security risks. Key Topics Covered Johann's journey from Microsoft development consultant to becoming a leading red team expert specializing in AI security The discovery of ChatGPT's memory system vulnerability and how it could be exploited How traditional security concepts like the CIA security triad (Confidentiality, Integrity, Availability) apply to AI systems The development of "SPAIWARE" - a persistent prompt injection attack that can leak user data Command and control infrastructure using prompt injection techniques The challenges of securing agentic AI systems that can control web browsers and execute tasks The evolving relationship between security researchers and AI companies like OpenAI Notable Quotes "I think using this system is just so important because it can help you. They are so powerful. I started using it daily. But the security mindset of course too, because I use it for my productivity, but I always use it for trying to find the flaws and trying to understand how it works." - Johann Rehberger "What I did basically was use that technique and then insert that instruction in memory. So that whenever there's a conversation turn, the user has a question, ChatGPT responds. Every single conversation turn will be sent to the third-party server. So this is where the word spyware basically kind of came from." - Johann Rehberger "The better the models become, the better they follow instructions, including attacker instructions." - Johann Rehberger About Johann Rehberger Johann Rehberger is the Red Team Director at Electronic Arts with extensive experience in cybersecurity. His career includes roles at Microsoft, where he led the Red Team for Azure Data, and Uber, where he served as Red Team Lead. Johann is known for his pioneering work in AI security, specifically identifying and responsibly disclosing vulnerabilities in large language models like ChatGPT. Resources Mentioned Johann's blog on machine learning security (https://embracethered.com/blog/index.html) Black Hat Europe presentation on ChatGPT security vulnerabilities LLM Owasp Top 10 vulnerability classifications Connect With Us Follow SecureTalk for more insights on cybersecurity trends and emerging threats. Visit our website at www.securetalkpodcast.com for more episodes and resources. #AISecurityRisks #PromptInjection #ChatGPT #Cybersecurity #AIVulnerabilities #RedTeaming #SecureTalk…
What if there was a way to precisely predict the risk of a major data breach when sharing information? In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the IEEE, and with leadership positions at both the Department of Homeland Security and U.S. Census Bureau, Garfinkel offers unparalleled insights into how mathematics is creating an entirely new frontier in privacy protection in his new book “Differential Privacy”. Differential privacy is a reliable mathematical framework that quantifies privacy risk or the potential for a major breach. It can transform how organizations understand, measure, and control data exposure. Yet most security, compliance, and legal professionals haven't grasped its revolutionary implications for measuring and predicting a major privacy breach. Join Justin and Simson as they reveal: - How differential privacy allows organizations to calculate privacy risk with mathematical precision - Why this new field of privacy research eliminates guesswork when combining and distributing sensitive data - The revolutionary balance between data utility and privacy protection that was previously impossible - How forward-thinking organizations are using these mathematical formula to unlock data value safely This isn't abstract theory – it's a practical revolution in how we approach data sharing. Garfinkel, who literally wrote the book on "Differential Privacy," shares real-world examples from his work with the U.S. Census Bureau, where differential privacy enabled the release of valuable population data while mathematically predicting individual privacy. In his book, Simson breaks down complex mathematical concepts into clear, actionable insights for security leaders, compliance officers, and legal counsel. Listen now to discover how differential privacy is creating a future where data-sharing decisions are based on mathematical certainty rather than best guesses and crossed fingers. Link to Simson's book: https://mitpress.mit.edu/9780262551656/differential-privacy/…
How do you secure a nation? Hint: look for the risks to the most critical infrastructure. In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sweeping changes to federal security requirements, Kolasky provides an insider's perspective on what these shifts mean for contractors, the Defense Industrial Base, and organizations managing critical infrastructure. Drawing from his experience protecting everything from elections to the electrical grid, Kolasky offers rare insights into: The future of the Cybersecurity Maturity Model Certification (CMMC) program How companies can prepare for evolving compliance standards The relationship between FedRAMP and other security frameworks Emerging hybrid threats to national security Supply chain vulnerabilities and third-party risk management Whether you're a federal contractor navigating new requirements or a security professional concerned about critical infrastructure protection, this conversation provides essential guidance during a time of unprecedented change in the national security landscape.…
In a groundbreaking conversation on SecureTalk, legal scholar James Boyle explores the complex landscape of artificial intelligence and biological innovation, challenging our understanding of personhood and consciousness. Drawing from his recent book “The Line: Artificial Intelligence and the Future of Personhood”, Boyle dissects the potential future of artificial general intelligence and biological engineering through the lens of legal and ethical frameworks. We shine a light on how our current technological advancements are forcing us to reexamine fundamental questions about what constitutes a "person" – a journey that parallels historical shifts like human rights and the evolution of corporate personhood. Boyle also delves into the equally provocative realm of biological engineering, where technologies like CRISPR are blurring the lines between species and challenging our ethical boundaries. He warns that we're entering an era where genetic modifications could fundamentally alter human capabilities, raising critical questions about ownership, consent, and the rights of an invention. For cybersecurity professionals, AI researchers and corporate leaders, Boyle's legal insights offer a crucial roadmap for navigating the complex ethical terrain of emerging technologies, emphasizing the importance of proactive, critical thinking in shaping our technological future. You can find the book here: https://scholarship.law.duke.edu/faculty_books/9/…
If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabilities that could lead to the next headline-making breach. Security reviews have become the speed bump on the road to innovation that everyone acknowledges is necessary, but few have figured out how to navigate efficiently. Development teams push for velocity while security teams pull the emergency brake, creating tension that reverberates throughout organizations. Today, we're joined by Dimitri Shvartsman, co-founder of Prime Security and prior Head of Cybersecurity at PayPal, to discuss how enterprise organizations are innovating security solutions to reduce the time to feature delivery. We'll explore how AI tools can actually enable rather than impede innovation and examine practical approaches to integrating AI security tools earlier in the development lifecycle. Whether you're a CISO trying to balance security with business needs, a developer tired of security roadblocks, or a product leader navigating these competing priorities, this conversation will give you actionable insights to transform security from a bottleneck into a business enabler.…
In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly being used to diagnose and treat mental health conditions. He highlights the alarming implications of leveraging AI in psychiatry, the historical intersection of these two fields, and the potential pitfalls and ethical challenges this marriage presents. He also delves into the technical, policy, and philosophical dimensions of using AI in psychiatry, bringing attention to various case studies and real-world applications such as emotion-recognition technology and AI-driven triage systems like those used by the Crisis Text Line. Daniel's insights present a compelling narrative, urging a cautious yet hopeful approach to adopting AI technologies in areas as sensitive as mental health, underscoring the need for transparency, privacy, and ethical considerations. Book: Oberhaus, Daniel. The Silicon Shrink: How Artificial Intelligence Made the World an Asylum. MIT Press, 2025. (Link)…
Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure. In this episode of Secure Talk, host Justin Beals talks with Terence Bennett, a former Naval Intelligence Officer and now the CEO of DreamFactory. They discuss Terence's intriguing path from an early interest in the military to a successful career in cybersecurity. He recounts his origin story, which is grounded in a lifelong dedication to service, racing sailboats at the naval academy, his experiences aboard the USS Paul Hamilton, and pivotal roles in intelligence during major geopolitical events such as the Arab Spring and the Bin Laden raid. The conversation covers topics including red teaming, the impact of digital transformation on intelligence, and the necessity of security by design in today’s fast-changing digital environment. Especially of interest is Terence’s new work on cybersecurity by marrying AI developed API’s with effective network segmentation. This episode serves as a valuable resource for cybersecurity professionals, providing a distinct viewpoint on the blend of military experience and cyber defense strategies.…
In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valuations of organizations like OpenAI. What does DeepSeek mean to the AI landscape, and how does it fit into the fundamentals of machine learning and the future of information systems? Our discussion delves deeply into the synergy of AI advancements and the pressing need for robust security measures. Micah and Josh share their journey in striking the delicate balance between innovation and safety, offering invaluable insights for anyone in the tech and cybersecurity field. As AI continues to revolutionise industries, cybersecurity experts must adapt and evolve. Tune in as we examine the potential and challenges presented by cutting-edge AI models. This episode is essential listening for those striving to stay ahead in the ever-evolving landscape of AI-driven cybersecurity. Join us and be part of the conversation shaping the future of technology!…
In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's books, “Tech Humanist” and 'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Moving Too Fast.' Their engaging discussion shines a light on the power of systems thinking, the significance of thoughtful decision-making in the tech industry, and the vital balance between achieving business objectives and enhancing the human experience. This episode is a delightful must-listen for cybersecurity professionals who are excited to navigate the important intersection of technology, ethics, and human dignity in our ever-evolving digital world. Books: O'Neill, Kate. What Matters Next: A Leader's Guide to Making Human-Friendly Decisions In a World That's Moving Too Fast (2025) Tech Humanist: How You Can Make Technology Better for Business and Better for Humans (2018)…
In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called " Cryptography" that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of effective encryption. They delve into Panos's early interest in computing, starting with a ZX Spectrum and his recent book on cryptography, which aims to make complex algorithms accessible to those with a high school level of mathematics. The conversation traverses the critical role of cryptography in our digital lives, the potential impacts of quantum computing, and the practical aspects of key management in modern web applications. Panos also shares captivating stories from the history of the Enigma machine and discusses the ongoing arms race in cryptography. Perfect for cybersecurity experts, this episode offers a rich blend of historical anecdotes, technical insights, and future-looking perspectives. Book: Louridas, Panos. (2024) Cryptography. MIT Press. 00:00 Welcome to SecureTalk 00:28 The Importance of Cryptography 02:21 Introducing Panos Louridas 03:41 Panos Louridas' Journey into Computing 06:11 The Evolution of Cryptography 12:13 The Enigma Machine and Its Legacy 19:03 Security by Obscurity: A Fallacy 22:32 Speculations on NSA Backdoors 23:21 Government Contributions to Cryptography 24:51 Evolution and Security of AES 27:10 Challenges in Generating Randomness 28:15 Quantum Computing and Cryptography 33:45 Key Management in Modern Web Applications 36:53 TLS and AES: Understanding Their Relationship 39:01 The Human Factor in Cryptography 40:38 Making Cryptography Accessible 42:58 Conclusion and Final Thoughts…
In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could assume secret control of an individual's computer from a centralized control. The “I Love You” virus spread to over 50 million computers, creating the world's largest botnet. Michael Tiffany and his co-founders were aware of these types of cyber attacks and wanted to ensure the Internet worked for businesses wanting to connect with consumers. They founded Human Security, one of the first companies to combat botnet activity for major brands and today a very powerful cybersecurity company for major corporations. In this episode of Secure Talk, host Justin Beals interviews Michael Tiffany, co-founder of Human Security and the current leader of Fulcra Dynamics. Michael shares his early experiences with computers and his journey into cybersecurity, discussing topics the founding of Human Security as a solution for botnets, ad fraud, and early “Know Your Customer” challenges. He explains his current company, Fulcra's mission to empower individuals by unifying their personal data and promoting privacy and control in the age of AI. Listen as Michael reflects on the ethical responsibilities in technology and shares his vision for a future where individuals have sovereignty over their data. 00:00 Introduction to SecureTalk 00:32 Host's Journey into Computer Science 01:39 Introducing Michael Tiffany 03:12 Michael Tiffany's Early Experiences 15:26 The Birth of Human Security 20:56 Challenges and Innovations in Cybersecurity 27:11 Fulcra Dynamics: Empowering Personal Data 37:22 Vision for the Future of AI and Data Sovereignty 43:59 Conclusion and Final Thoughts…
Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators. I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography. In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods. We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography. 00:00 Welcome to SecureTalk: Introduction and Host Introduction 00:33 The Role of Security in Business Growth 01:55 Introducing Dr. Bill Anderson: A Security Expert 03:57 Dr. Anderson's Journey into Cryptography 05:35 The Evolution of Security and Cryptography 08:11 Understanding Business and Technology Landscapes 13:56 Mattermost: A Secure Collaboration Platform 22:01 The History and Methods of Cryptography 25:01 Understanding Public and Private Keys 25:58 Digital Signatures and Authentication 27:12 The Open Research Model in Cryptography 28:31 Challenges in Cryptographic Security 31:02 Quantum Computing and Cryptography 35:38 The Future of Cryptographic Systems 42:04 NIST's Role in Quantum-Safe Cryptography 49:41 Conclusion and Final Thoughts…
Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vulnerability scanning to internal systems could be left running post a services engagement. And in the process they invented an ‘always on’ threat intelligence solution. In 2022 eSentire added storied private equity firm Warburg-Pincus to their cap table and achieved unicorn status with a valuation of one billion dollars. In this engaging episode of SecureTalk, host Justin Beals invites Eldon Sprickerhoff, a seasoned cybersecurity expert and founder of eSentire, to share his journey. Eldon graduated with a computer science degree from Waterloo University in 1991 and went on to establish a leading managed security services provider. During the conversation, Eldon reflects on his early career concerns and the macroeconomic challenges he faced during a recession. He also shares insights from his book, *Committed*, which explores the realities of startup life. The discussion highlights essential strategies for navigating the cybersecurity marketplace, the importance of founder-led sales, and the significant challenges and opportunities within the cybersecurity field. Tune in to gain valuable perspectives on entrepreneurship, real-time vulnerability scans, and the impact of AI and quantum computing on cybersecurity. Link to the Book: Commited: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders https://sutherlandhousebooks.com/product/committed/…
In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the defense industrial base, and the phased compliance requirements for various certification levels. The conversation emphasizes the necessity of CMMC for federal contractors, including those in non-traditional sectors like medical equipment manufacturing, along with the associated costs and procedures. Stephen also shares insights from his experience conducting a self-assessment for CMMC compliance, offering practical advice for organizations aiming to achieve certification. This episode is essential for cybersecurity professionals who want to understand the latest federal compliance standards and prepare their organizations accordingly.…
Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and effective privacy practices. But we are in the midst of a massive proliferation of generative AI models. Since the technology is so nascent our expectations of privacy are being reshaped. An AI model is fundamentally a mathematical representation of a large data set. Its probabilistic function will create information depending on the prompts it can be given. Deep in the model the data used to ‘train’ it still leaves a fingerprint of the source information. What are the expectations for privacy, copyright and safety to those of us that have shared information on the internet? In this episode of Secure Talk, host Justin Beals engages in a comprehensive discussion with Dan Clarke, about the significant impact of AI. The conversation begins with Dan’s early days in computing and follows his journey into developing AI governance. They explore the transformative effects of AI in comparison to historical technological innovations, as well as the risks and biases that are inherent in AI systems. Additionally, they discuss current and future legal compliance issues. Dan shares personal anecdotes related to privacy challenges and the applicability of AI, emphasizing the importance of transparency, thorough risk assessment, and bias testing in AI implementations. This episode provides valuable insights for anyone interested in the ethical and responsible use of AI technology in today's applications. 00:00 Welcome to SecureTalk: Exploring Information Security 00:32 The Evolving Landscape of Privacy and AI 01:47 Introducing Dan Clark: AI Privacy Leader 03:10 Dan Clark's Journey: From Intel to Privacy Advocacy 04:14 The Impact of AI: Paradigm Shifts and Privacy Concerns 06:08 Personal Data and Privacy: A Real-Life Story 08:45 The Importance of Data Control and Fairness 13:10 AI Governance and Legal Responsibilities 21:02 Current Laws Impacting AI and Privacy 26:47 Legal Basis for Data Usage 27:01 Introduction to Truio and InnerEdge 27:29 The Birth of Truio: Addressing GDPR 28:39 AI Governance and Federal Privacy Law 30:48 Transparent AI Practices 31:58 Understanding AI Risks and Transparency 36:52 AI Use Cases and Risk Assessment 44:57 Bias Testing and AI Governance 50:39 Concluding Thoughts on AI and Governance Link: https://get.truyo.com/ai-governance-training…
In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive background, including being a senior risk analyst for Computer Sciences Corporation in the development of one of the first cloud hosting platforms. He also shares his experience as a virtual Chief Information Security Officer (vCISO) and the growth and success of CyberHoot. The conversation highlights CyberHoot's innovative use of positive reinforcement methods in their approach to automated training and examines the role of artificial intelligence (AI) in both creating and combating cybersecurity threats. They also discuss the future of AI in security training and provide practical steps that companies can take to enhance their cyber resilience. 00:00 Introduction to SecureTalk 00:34 The Importance of Security Awareness Training 03:18 Craig Taylor's Journey into Cybersecurity 05:25 The Evolution of Technology and AI 15:30 The Role of Virtual CISOs 21:48 Building CyberHoot: From Services to Product 25:17 The Ineffectiveness of Shock Collars and Negative Reinforcement 26:21 The Power of Positive Reinforcement in Training 27:21 Challenges with Fake Email Phishing 27:51 Cyberhoots' Approach to Phishing Simulations 28:50 Gamification and Positive Outcomes 30:26 The Anxiety Around Cybersecurity Training 31:39 The Problem with Traditional Phishing Tests 33:13 Emerging Best Practices in Cybersecurity 38:53 The Role of AI in Phishing and Cybersecurity 45:16 Future Perspectives and Rapid Content Creation 48:46 Conclusion and Final Thoughts…
In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rely on cloud-based Identity Management solutions for further security. How was Identity Management born, and where is it heading? We discuss the early days of networked computing. How Eric recognized in 1995, while at Berkley, the opportunity of the Internet to break out of academic communities and become a space for business. In a moment of inspiration, he realized that the missing feature was security. To be successful a ‘web powered’ business needed to manage its users and their identities. Eric founded Securant Technologies in 1995 and developed some of the first Web Access Management products. Securant Technologies was acquired by RSA in 2001. Eric continued to stay at the forefront of Identity Management by working on SAML, the gold standard of shared authentication. Today, Eric is developing Strata and exploring how enterprise organizations are harmonizing multiple Identity Providers from Okta to Microsoft. Tune in to learn about the critical advancements shaping the trusted identity landscape from a leading expert and present innovator. 00:00 Introduction to SecureTalk 01:51 Challenges in Identity Management 03:16 Introduction to Eric Olden 04:33 Eric Olden's Early Experiences with Computing 08:39 The Birth of Identity Management Solutions 17:11 The Origin of SAML 23:13 Reflections on SAML Evolution 23:56 Introduction to OAuth and Identity Standards 26:22 The Vision Behind Strata 30:15 Challenges in Identity Management 33:12 Exploring Self-Hosted Identity Solutions 40:07 The Importance of Authentication and Authorization 46:39 Concluding Thoughts on Identity Standards…
Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways? In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his passion for making cybersecurity accessible to both experts and the general public by employing storytelling techniques. Key topics include multifactor authentication, explained through 'Cinderella' and password security inspired by 'Alibaba and the 40 Thieves.' Luca's insights are based on his acclaimed article 'Cyber Security of Fairy Tales.' This episode provides a fresh perspective on engaging non-expert stakeholders and underlines the importance of a social-technical approach to cybersecurity. 00:00 Introduction to SecureTalk 00:34 Host's Background and Passion for Storytelling 03:07 Introducing Luca Vigano 04:49 Luca's Journey in Cybersecurity 06:47 The Power of Storytelling in Teaching Security 08:10 Fairy Tales and Cybersecurity 18:43 Cinderella and Multi-Factor Authentication 34:06 Alibaba and the 40 Thieves: Lessons in Security 40:30 Show vs. Tell in Security Education 44:39 Future Work and Conclusion Article: Luca Viganò, The cybersecurity of fairy tales, Journal of Cybersecurity , Volume 10, Issue 1, 2024, tyae005, https://doi.org/10.1093/cybsec/tyae005…
In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by the inefficiencies in current application security reviews that slowed down software delivery. Idan explains opportunities to improve the application security posture throughout the software development lifecycle, emphasizing their methods for deep code analysis and extended Software Bill of Materials (SBOMs). The conversation also covers the role of AI in security, the significance of automation, and the integration of graph data models for effectively visualizing and managing security threats. 00:00 Welcome to SecureTalk 00:32 Introduction to Application Security 01:44 Meet Idan Plotnik 02:52 Idan’s Journey in Cybersecurity 04:31 Early Encounters with Computers and Security 08:44 Military Service and Professional Growth 12:19 Founding Apiiro and Innovations in Security 14:06 Challenges in Modern Software Development 15:33 Comprehensive Security Measures 19:47 Understanding the Risk Landscape 24:35 Understanding Risk in Software Architecture 25:30 The Role of AI in Software Security 26:29 Translating Code into Components 27:50 The Importance of Software Inventory 31:47 The Limitations of SBOMs 40:02 Automation in Security Design 46:00 The Power of Graph Data Models 48:35 Conclusion and Final Thoughts…
It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity? Join us on Secure Talk for an in-depth exploration of the complex world of privacy with esteemed sociologist and author James B. Rule. In this episode, he draws parallels between past and present institutional power. He discusses his latest book, “Taking Privacy Seriously: How to Create the Rights We Need While We Still Have Something to Protect “where he delves into the intricacies of privacy laws, the implications of personal data commercialization, and the notion of "personal decision systems." James presents 11 practical privacy reforms, highlighting the importance of informed consent and strong data protection measures. This episode offers cybersecurity experts valuable historical context, actionable insights, and thought-provoking discussions on how to balance privacy with technological advancement. Join the conversation on how we can protect what truly matters. Join us as we examine the challenges and potential reforms related to privacy in the digital age, highlighting recent legislative successes such as California's new privacy laws. James advocates for the establishment of national institutions dedicated to promoting privacy. He also discusses the ethical dilemmas faced by technology and policy leaders in striving to find the right balance between the utility of personal data and the protection of individual privacy. This episode is essential for cybersecurity experts interested in privacy reform and the history of personal data usage. Book: “Taking Privacy Seriously: How to Create the Rights We Need While We Still Have Something to Protect” https://www.ucpress.edu/books/taking-privacy-seriously/paper 00:00 Introduction to SecureTalk 00:32 Exploring the Complexities of Privacy 01:21 Introducing James B. Ruhle 02:56 James B. Ruhle's Journey into Privacy 06:55 Historical Perspectives on Privacy 09:10 Modern Privacy Challenges and Solutions 15:48 The Concept of Lawful Basis 23:59 Personal Decision Systems 26:26 Proposed Privacy Reforms 36:56 Public Events and Privacy Issues 42:55 Conclusion and Final Thoughts…
Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, Steve Jobs, Bill Gates, etc are raised up as the new messiah by thousands of worshipers. Is it really so difficult to see the tendency of the billionaire technology founders to prey on our hopes and fears? In a thought-provoking episode of Secure Talk, host Justin Beals interviews Greg Epstein, the Humanist Chaplain at Harvard and MIT, and a New York Times bestselling author about his upcoming book, "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why It Desperately Needs a Reformation." They discuss the intricate relationship between technology, ethics, security, and human experience, challenging traditional perspectives on cybersecurity. Through engaging conversations about societal equity, community connections, and the ethical implications of technology-induced isolation, Greg and Justin shed light on the profound cultural and existential impact of technology on modern life. The discussion delves into the psychological and emotional aspects of the tech world, drawing parallels with religious structures and highlighting the need for a balance between technological engagement and ethical responsibility. Book: "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why it Desperately Needs a Reformation" https://mitpress.mit.edu/9780262049207/tech-agnostic/…
My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses and didn’t make us more secure. When we were done I was certainly glad to show off our new ‘certification’ but I wondered how I could implement great security and create value for my company. In this compelling episode of Secure Talk, host Justin interviews Bob Chaput, a seasoned CISO and cybersecurity leader with a rich background in the healthcare sector. The conversation traverses Bob’s extensive career, from his early days at GE to establishing Johnson & Johnson’s first information security program. Bob shares profound insights from his book, 'Cyber Risk Management as a Value Creator,' illustrating the shift of cybersecurity from a defensive necessity to a strategic business driver. They explore the critical role of governance, regulatory accountability, and the implementation of risk management frameworks like the NIST cybersecurity framework. Using real-world cases like Equifax’s post-breach recovery, Bob elucidates the tangible business value of robust cybersecurity measures. Learn about budgeting for cybersecurity, fostering organizational engagement, and integrating security into business operations for enhanced resilience and customer trust. This episode is a treasure trove for experts looking to transform their cybersecurity approach into a strategic advantage. Book: Enterprise Cyber Risk Management as a Value Creator https://bobchaput.com/enterprise-cyber-risk-management-as-a-value-creator/ 00:00 Welcome to SecureTalk: Introduction and Host Overview 00:41 The Importance of Scope in Cybersecurity 02:58 Introducing Bob Chaput: Cybersecurity Expert 04:45 Bob Chaput's Career Journey 08:17 Enterprise Cyber Risk Management as a Value Creator 12:20 The Role of Regulations and Accountability in Cybersecurity 17:26 Strategic Approach to Enterprise Cyber Risk Management 21:33 Risk and Opportunity Assessment in Cybersecurity 26:47 Leveraging Security Practices for Business Value 27:58 The Impact of Cybersecurity on Business Value 28:56 Clearwater's Role in Enhancing Cybersecurity 31:03 The ECRM Budget Philosophy 32:59 Maxims for Effective Cyber Risk Management 35:59 Building a Team Sport Culture in Cybersecurity 40:47 Foundational Components of ECRM 44:19 Challenges in Third-Party Risk Management 49:25 Clearwater's Journey and Future Prospects…
In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and venture capitalists that think carefully about who they are investing in, why it is a durable venture and how to create the best impact for everyone. In this episode of Secure Talk, host Justin Beals welcomes Rey Kirton from Forge Point Capital to discuss venture capital's unique role in the cybersecurity industry. Rey shares his journey from consulting to venture capital, outlining the importance of building meaningful long-term relationships with companies he invests in. He explains how Forge Point Capital develops investment theses and highlights the value of solution-based, data-driven AI applications. The conversation delves into the significance of listening to customer feedback, industry patterns, and emerging themes like edge computing and AI in cybersecurity. The episode is a must-listen for founders and investors navigating the current market landscape, offering insights into building successful business partnerships and understanding evolving technology trends. 00:00 Welcome to SecureTalk 00:36 Introducing Our Guest: Ray Kirton 01:30 Rey Kirton's Career Journey 02:25 Venture Capital Insights 05:14 The Role of ForgePoint Capital 06:55 Investment Strategies and Challenges 17:01 AI in Cybersecurity 21:45 Leveraging Proprietary Data for AI and Data Science 23:19 The Rise and Fall of Blockchain and Crypto Hype 28:10 Understanding Venture Capital Dynamics 34:31 Future Trends in Technology and Investment 37:56 Advice for Aspiring Founders 39:09 The Importance of Customer Feedback 42:47 Building Strong Investor Relationships…
"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly the advent of AI has created some spectacular progress and failures. In the realm of patient care AI tools can have a powerful impact and there is little room for error. How do professionals in the Medical Device and Medical Software space prepare their solutions for the market? In the latest episode of SecureTalk, Justin is joined by Dr. Paul Campbell, who serves as the Head of Software and AI at the UK's Medicines and Healthcare products Regulatory Agency (MHRA). Dr. Campbell discusses his journey from pharmacy to becoming a prominent figure in healthcare IT and regulated software. The conversation covers the development of AI in healthcare, the global standardization of regulations, and the MHRA’s innovative initiatives such as AI Airlock, which are driving progress in medical technology. The discussion also delves into the vital role of data representation, ethical considerations in AI, and the complexities of implementing advanced technologies in real-world medical settings.…
Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How do we feed and support this powerful partnership? In this episode of SecureTalk, host Justin Beals welcomes Jason Healey, a senior research scholar at Columbia's School for International and Public Affairs. Jason, a pioneer in the field of cyber threat intelligence and former intelligence officer, discusses his extensive career and the evolution of cyber defense from the late 1990s to today. Topics include the origins of cybersecurity, the challenges of cyber warfare and policy, and the balance between defense and innovation. Jason elaborates on the critical role of metrics such as mean time to detect in measuring cybersecurity effectiveness and emphasizes the importance of harmonizing regulations and frameworks in the U.S. A detailed analysis of recent cyber incidents and the necessity for more robust cyber policies underlines the insightful conversation, making it essential listening for cybersecurity professionals.…
I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever-changing security environment, how do security leaders engage product teams in effective practices? Join us on Secure Talk with Naomi Buckwalter, the Senior Director of Product Security at Contrast Security. Throughout our conversation, Naomi shares her intriguing journey into the field of cybersecurity, from her early interest in tech and her educational background to landing a significant role at Vanguard Financial and eventually becoming a thought leader in cybersecurity. She explains the critical distinction between secure architecture reviews and secure code reviews and delves into the importance of trust and collaboration between developers and security engineers. Naomi also emphasizes the importance of inclusive hiring and discusses how she has successfully integrated individuals from non-traditional backgrounds into cybersecurity roles. As the founder of Cybersecurity Gatebreakers she helps technology teams find “young-in-career” talent ready to make an effective contribution. A poignant part of the discussion revolves around the concept of 'sec-splaining,' the need for excellent communication, and why security should be seen as a service to the business. This conversation is a must-listen for cybersecurity experts looking to enhance their understanding of team building and effective security management for software development. ----- Additional Resources: Books: "The Smartest Person in The Room" by Christian Espinosa https://christianespinosa.com/books/the-smartest-person-in-the-room/ "Five Disfunctions of a Team" by Patrick Lencioni https://www.amazon.com/Five-Dysfunctions-Team-Leadership-Fable/dp/0787960756…
The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet? In this episode of SecureTalk, host Justin Beals interviews David Holtzman, the brains behind the global domain name registration system and a former NSA analyst. They delve into the history and evolution of the DNS, discussing how it transformed from a single 'host.txt' file to a robust global system impacting millions of domain names. David shares his thoughts on decentralization, the potential of blockchain technology, and the future of cybersecurity in the wake of quantum computing. They also touch on the implications of AI, the cyclical nature of tech fads, and the importance of innovative yet secure solutions in today's rapidly evolving cyber environment. This episode is a must-listen for cybersecurity experts interested in the complex interplay between technology, governance, and security.…
It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event. Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and former Head of Policy at the U.S. Election Assistance Commission, shares his extensive expertise on managing election security and the intricate relationship between technology and trust in the electoral process. They explore the complexities of pre-vote misinformation, the robustness of various voting systems, and how the integrity of election results is maintained amidst emerging cybersecurity threats. Mark also highlights Pendulum's new tool, ElectionIQ, which aids businesses in navigating election-related risks. The discussion sheds light on the vital role of trust and participation in sustaining democracy, making it a must-listen for cybersecurity professionals seeking to understand the current landscape of election integrity.…
In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. They delve into the multifaceted world of security work, bridging personal experiences and professional insights. Goodwin, a professor and chair of the Department of Art and Art History, and Schwarzschild, director of creative writing at SUNY Albany both had family members who worked in the security field that required secrecy. The shared formative experiences blossomed into a discussion about families and the impact of jobs on security. Realizing that the security field has been rapidly growing, they used expertise in the humanities to explore security jobs and their impact on individuals, families and our community at large. The podcast covers their methods of capturing authentic experiences through interviews and photography, bringing a human touch to a field often viewed through a critical or technical lens. Danny and Ed recount their past roles in security and detail compelling stories from their book, including experiences of border patrol agents, military security and cybersecurity professionals. The discussion also touches on the companion exhibition for “Jobs / Security” and their plans for expanding the project globally. This episode is a must-listen for those interested in the intersection of security and humanity. Book: 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. (2024) https://mitpress.mit.edu/9780262048699/jobsecurity/ Exhibition: Job Security: Voices and Views from the American Security Industry. August 12- December 9, 2024 - University at Albany SUNY https://www.albany.edu/museum/exhibitions/job-security-voices-and-views-american-security-industry…
How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress? In this week's episode of SecureTalk we host an Associate Professor of Digital Media at Brock University, to discuss the intersection of cybersecurity and the humanities. Our guest's recent works include, 'Hacking the Humanities' and 'The Language of Cyberattacks,' delve into how digital culture, app development, and natural language processing intersect with cybersecurity. Listen in as we discuss William Gibson predicting the future of the internet and our examination of the cultural consequences of cybersecurity, emphasizing the need for broader digital literacy, the evolving landscape of internet privacy, and how speculative fiction can inform ethical questions and possible futures. They also touch on real-world incidents like the 'Parlor tricks' hack, demonstrating how programming literacy can empower individuals to navigate and influence the digital ecosystem. The conversation underscores the vital role of humanistic perspectives in understanding and shaping the cybersecurity landscape.…
In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. He emphasizes the economic incentives behind security design, the concept of decoupling for enhanced security, and addresses the role of public awareness and policy in cybersecurity. Schneier also touches on the pervasive nature of hacking, the importance of building resilient systems, and the integration of computers into every aspect of our lives, highlighting the increasing importance of security by design.…
Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group show that Security-Noteworthy Extensions (SNE) are a significant issue as they have a pervasive presence in the Chrome Web Store for years and affect almost 350 million users. In this great discussion we talk about the threat capabilities of nefarious code executed by plugins in the Chrome Browser. We also talk about the perverse incentives at Alphabet in managing the Chrome Web Store. They need to make plugins that have powerful capabilities, easy to deliver and sticky. But this creates the opportunity for powerful cybercrime tools, easily installed that are rarely inspected. Fundamentally we ask 'who is responsible for security in the “app” economy'? Research: https://arxiv.org/abs/2406.12710…
In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance. Peters shares insights from her extensive experience at the Department of Health and Human Services, and addresses the nature of HIPAA regulations, the importance of risk analysis and workforce training, as well as the intricacies of regulatory compliance. The conversation dives deep into the intersection of innovation, healthcare privacy, and security, offering valuable advice for businesses and stakeholders in the rapidly evolving landscape of cybersecurity and healthcare regulations.…
In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquired. This is a 9x increase over the past five years affecting over 145 million people. Patient Healthcare Information is the most sensitive, valuable and prolific security challenge of the present day. Thankfully, we have this information due to the oft-maligned HIPAA law. Truly innovative for its time and often updated due to its popularity, it is a great accomplishment in privacy law. However, like most laws, its implementation for a business can be fraught. Consulting on HIPAA has become its own industry with an army of consultants and legal experts. In this episode of Strike Graph we are going to delve into the 2nd edition of “The Practical Guide to HIPAA Privacy and Security Compliance.” with the authors Rebecca Harold and Kevin Beaver. The discussion highlights the importance of a comprehensive approach to HIPAA compliance, common myths, and challenges facing healthcare organizations today. The episode also addresses the growing threat of cybercrime, the evolving landscape of data security, and practical steps organizations can take to safeguard patient information. A must-listen for professionals navigating the complex world of healthcare data security.…
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years. What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic Jones ex-Scotland Yard and Executive Chairman of Concentric as they share their deep experience in crisis management. Their valuable insights were gleaned as Mike LeFevre commander, Office of the Defense Representative to Pakistan during the killing of Osama Bin Laden and as Roderick Jones served for Scotland Yard’s Special Branch focused on international terrorism. Their insights delve into four key phases of crisis management—911 moments, second and third-order effects, steady state, and the road to normalcy—while underscoring the importance of leadership, preparation, and external relationships. They also highlight the critical need for cyber risk management in today's evolving threat landscape. This episode also covers their book, 'End Game First: A Leadership Strategy for Navigating a Crisis,' which serves as a guide for cybersecurity leaders.…
What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edinburgh. This episode traces the early anonymity problems that the US military and libertarian-minded computer scientists were attempting to solve. How they created a partnership and worked together to invent a solution that could provide global privacy at the dawn of the information age. Ben provides powerful insights into the motivations behind its invention and the future of our connected world.…
"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.…
98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information. How can understanding human psychology help your cybersecurity defense? On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono, a behavioral scientist from social-engineer.com. We explored how nonverbal communication and emotional triggers play crucial roles in cyber threats. This insightful discussion reveals that our trust and cooperative nature, while beneficial, can also be exploited by skilled attackers. Dr. Marono’s ability to blend her academic research with practical cybersecurity applications is a testament to the power of multidisciplinary knowledge. Her insights on preference for trust and how nonverbal communication plays a part in that can help transform the people in your organization into a primary defense mechanism. Don't miss out on these valuable insights for enhancing your security approach!…
From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. From the early days of modems and personal computers Alejandro was deeply interested in connective computing. The early days of exploring BBS’s, telecom networks and digital modems revealed Alejandro’s talent and expertise for understanding vulnerabilities in systems. Later as a professional “red teamer”, by searching for paid vulnerabilities in common systems like Google Chrome, Alejandro was approached by a “friend of a friend” to perform some analysis. That analysis was an attempted hack on Alejandro by a North Korean operative. Tune into this intriguing episode as we chat with Alejandro about his journey as a professional cybersecurity hacker. How he was attacked, and how he responded by hacking North Korea. What does it take to hack an entire country? Alejandro Caceres, the mastermind behind a massive cyber attack on North Korea, tells all in this gripping episode of SecureTalk. #cybersecurity #databreach #northkorea…
What are the essential principles for successful CISO leadership? In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' and the newly released 'Privacy Leader Compass,' Todd shares his journey from a computer programmer to a cybersecurity leader and touches on critical topics from his books. The discussion delves into the evolution of the CISO role, and his approach to CISO strategy, including different methodologies such as incident-driven and vision-driven approaches. Todd also provides an insider perspective on the renowned SolarWinds hack and the lessons it offers for improving security measures. With over 20 years of experience as a Chief Information Security Officer, Todd's insights offer invaluable guidance for navigating the complexities of cybersecurity.…
If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero. The conversation also explores his early influences, the role of a CTO, the evolving challenges in data security, and the importance of adaptive leadership. Purandar shares insights on the effectiveness of current encryption algorithms, the impact of quantum computing, and the development of AI-driven solutions for data security. We also review the LastPass breach, highlighting the importance of strong encryption practices and the ongoing evolution of cybersecurity threats. This episode is a must-listen for cybersecurity experts and enthusiasts looking to stay ahead in the rapidly changing information security landscape.…
On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectively. Additionally, discussions explore device compliance, self-healing hardware capabilities, and strategies against ransomware. The podcast also touches on business continuity planning involving remote users, the challenges posed by ransomware attacks, considerations for AI integration, and privacy implications within the cybersecurity sector.…
Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and security leaders through effective security posture scoping. Delve into aligning security with business goals, evolving CISO roles, compliance challenges, and the impact of AI. Understand the importance of risk acceptance in corporate decision-making, the role of AI in security, multi-factor authentication, and the real-world implications of security breaches. Explore cybersecurity risk management with expert Chris Hodson and Strike Graph CEO Justin Beals.…
Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jesse Gilbert. Highlights include: 1. The real implications of the TikTok ban examined from a cybersecurity lens. 2. Unpacking how our digital habits are influenced by algorithms we seldom understand. 3. Exploring avenues for ethical data management and the role of individuals in data stewardship. Join us for a deep dive into the interconnected world of data, security, and societal transformation. Your thoughts on reshaping our digital futures are welcome!…
How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. Through the lens of "The Three Truths," Scott demystifies common misconceptions about cybercrime and unveils strategies to navigate the minefield of digital threats. Tune in to this thought-provoking episode and empower yourself with the knowledge that could be the difference between being a victim and a victor in the cyber realm As cybersecurity experts and enthusiasts, how do you evaluate your practices in light of these insights?…
Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incidents, pioneering social engineering frameworks, and collaborations with agencies like MI5 and the FBI. Gain insights into ego suspension, nonverbal communication, and defense strategies against social engineering, emphasizing empathy, education, and technology in cybersecurity.…
In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a champion of cybersecurity and democracy. The episode takes a compelling turn as we explore a riveting case study on a data breach involving Carta and Linear. Discover how internal governance and public narratives play crucial roles in securing data and maintaining trust.…
The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass. The episode covers the 23andMe data breach, Microsoft government email hacks, the Whitworth University ransomware attack, and insights on the LockBit ransomware takedown. It highlights breach responses, risks of consumer DNA data, and evolving cybercrime operations.…
This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. The conversation covers Alex’s background in law enforcement and cyber security, the progression of cybercrime from Zeus Trojan to ransomware, the entrepreneurial approach of cybercriminals in the development of ransomware operations, and the increasing complexity of cybercriminal organizations. The interview delves into the functioning of Lockbit, its business-focused model with customer support and blog site, and its resilience in resurfacing after takedowns. Furthermore, the conversation touches on the shifting landscape of cybercrime, the interplay between cybercriminal organizations and nation-states, and the challenges in combating cybercrime, including the use of cryptocurrency for money laundering. As the conversation concludes, Alex provides insights into the professional and adaptive nature of cybercriminals, emphasizing their vigilance in understanding the actions of cybersecurity professionals. Overall, the interview offers valuable insights into the complex world of cyber threats, the role of threat intelligence, and the ongoing battle between cybercriminals and law enforcement.…
Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challenges faced, and the importance of communication and disaster recovery plans in the event of a ransomware attack. The discussion also highlights the significance of having a multi-faceted approach to protecting data, including paper backups and encrypted data storage. The guest, Rafael, emphasizes the need for founders and small to mid-sized businesses to prioritize effective communication and response plans, as well as the potential vulnerabilities and risks they should be aware of in the cybersecurity landscape.…
In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 year career in the FBI fighting cybercrime, his transition to academia, and his insights on cybersecurity. Key points include advice for those interested in career paths like cybersecurity or FBI, Paul’s perspective on a Microsoft security breach, and understanding Western Governors University’s competency-based education approach.…
How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabilities, and patient privacy. We are speaking with Stephen Ferrell, a leader in security for the life sciences space. We’ll highlight the significance of GAMP and its risk-based approach. Finally, they analyze the 23andMe data breach and the risks associated with DNA data.…
In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on security and how StrikeGraph helps organizations identify and operationalize the right security practices. They also discuss the impact of AI on security and the growing demand for security standards and certifications. Justin outlines his plans for SecureTalk, which include continuing to make security an approachable conversation and bringing in experts to discuss the future of security. The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3. In this episode of Secure Talk, Chris talks about self-sovereign identities, zero-knowledge credentials, and crypto wallets, and explains how personal will unlock AI digital assistants. Verida https://www.verida.io/…
Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving. He also talks about what founders should look for when selecting a funding partner. Massdriver https://www.massdriver.cloud/ The Secure Talk Podcast https://securetalkpodcast.com/…
Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software. Stephen explains how IriusRisk helps its customers and also talks about the changing regulatory and threat landscapes related to cybersecurity. IriusRisk https://www.iriusrisk.com/ The Secure Talk Podcast https://securetalkpodcast.com/…
Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures. Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space. Leostream https://leostream.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Dr. Shira Brezis is the CEO & Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors. Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving. Redefine https://redefine.net/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Chris Piche is the CEO and Founder of Smarter AI. Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles. Smarter AI https://smarterai.camera/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security. He also explains why companies make a decision to use Service Now and how they select a partner to assist their digital transformation. Windward Consulting https://windward.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers. He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi-chain transactions with a single signature, a single transaction fee, and a single click. Lasha explains what this means for the wider NFT ecosystem. He also discusses topics such as digital sovereignty and the present and future state of cryptocurrencies, blockchains, and NFTs. Rarify Labs https://www.rarifylabs.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Sean Falconer is the Head of Marketing & Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy strategies fail and how to fix them. He also talks about the danger of using tools such as ChatGPT and how web applications can limit their threat surface by using tools to protect and encrypt data. Skyflow https://www.skyflow.com/ The Partially Redacted Podcast https://www.skyflow.com/podcast The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
David Sinclair is the Founder and CEO of 4Freedom Mobile. David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data. He also explains some best practices to prevent being tracked and to protect your personal information. 4Freedom Mobile https://4freedommobile.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Nick Harrahill is the Director of Customer Support at Spin.ai. In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications. He gives examples of the most common attacks and introduces some best practices to counter such attacks. Spin.ai https://spin.ai Report on SaaS Application Risks https://spin.ai/saas-application-risk-report/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture. In this episode, Darren talks about how to engage your team in cybersecurity to build a secure by-default company and how to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust. He also gives advice on cybersecurity education and how to choose a VPN provider. Carbide https://carbidesecure.com/company/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Aviv Grafi is the Founder and CTO of Votiro. In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents. Votiro https://votiro.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/
Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach. His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE. In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester. He also shares some tips for business owners and consumers on how to improve their cybersecurity posture. TCM Security https://academy.tcm-sec.com/ Heath on Social Media: LinkedIn - https://linkedin.com/in/heathadams Twitter - https://twitter.com/thecybermentor YouTube - https://www.youtube.com/c/thecybermentor Twitch - https://twitch.tv/thecybermentor The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies. ID.me https://www.id.me/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you. Pulsar Security https://www.pulsarsecurity.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM. Phinity Risk Solutions https://www.phinityrisk.com/ The Secure Talk Cyber Security Podcast https://securetalkpodcast.com/…
Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces. Nick also co-hosts the Managing Up podcast. In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams. Sym https://symops.com/ The Managing Up Podcast https://www.managingup.show/ The Secure Talk Cyber Security Podcast https://securetalkpodcast.com/…
Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution. Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&R) framework. Ox Security https://www.ox.security/ The Secure Talk Cyber Security Podcast https://securetalkpodcast.com/…
Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software. Laura shares best practices related to cyber security education, content development and delivery, and secure software development. SafeStack Academy https://safestack.io/ The Secure Talk Cyber Security Podcast https://securetalkpodcast.com/ Thank you for listening to the Secure Talk Cyber Security Podcast!…
Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space. BigID https://bigid.com/ The Secure Talk Podcast https://securetalkpodcast.com/ Thank you for listening to The Secure Talk Cyber Security Podcast!…
Luis Valenzuela is Director, Data Loss Prevention & Data Governance for InComm Payments. He is also a CISSP and PMP. Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights and advice related to transitioning to a career in cybersecurity, career advancement and the importance of continual leadership and subject matter-specific learning. InComm Payments https://www.incomm.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that allow for automated responses to various threats. Gurucul https://gurucul.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com Thank you for listening to The Secure Talk Cybersecurity Podcast!…
Steve Orrin, Federal Chief Technology Officer & Senior Principal Engineer for Intel talks about how he works with various government agencies to develop and deliver cybersecurity solutions. He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government is implementing Zero Trust across all agencies, how AI is affecting cybersecurity and the cyber threat landscape, and gives some great book recommendations related to sci-fi and cybersecurity. Intel https://www.intel.com/ Intel Government Cybersecurity https://www.intel.com/content/www/us/en/government/cybersecurity.html The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/ Thank you for listening to The Secure Talk Cybersecurity Podcast!…
Kevin Dominik Korte is the President of Univention North America. Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements between private enterprises and schools. Univention https://www.univention.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
André Keartland is a solutions architect at Netsurit. He has been working in the IT industry for almost 30 years. As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnostic, André has become recognized as an authority on the Microsoft solution stack and has implemented a large number of Microsoft on-premise, cloud, and hybrid products and solutions, including Azure and Microsoft 365. In this episode of The Secure Talk Podcast, André shares his thoughts about the value of the Microsoft security stack and give suggestions on how to optimize many of the security related tools and settings that are included in M365. Netsurit https://netsurit.com/ Thank you for listening to The Secure Talk Cybersecurity Podcast! https://securetalkpodcast.com/…
Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-first application services. As the CTO of Opti9, Sagi is responsible for product development, and research and development (R&D). He has extensive experience in all aspects of the cloud and interconnection industries, including infrastructure, networking, software development, automation, platforms, security, global network buildouts, and compliance. In this episode Sagi explains the differences between backups, disaster recovery, and cyber resilience and talks about benefits of working with a managed security service partner (MSSP). Opti9 https://opti9tech.com/ The Secure Talk Podcast https://securetalkpodcast.com Thank you for listening to The Secure Talk Cybersecurity Podcast!…
Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service. Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is primarily focused on serving the start-up and small-medium enterprise (SME) market. He also details the critical ingredients that comprise an effective MSSP offering. Prior to SolCyber, Scott built the Asia-Pacific-Japan (APJ) business at Symantec where he ran the global Managed Security Service, and the Symantec and Accenture Joint Venture. He then transitioned to FireEye pre-IPO to create their global MSS business and led the development of the APJ market. SolCyber https://solcyber.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform. On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best practices for securing APIs and the various apps that they connect with. FireTail https://www.firetail.io/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thoughts about creating an effective organizational culture and building a Teal Organization. GoodAccess https://www.goodaccess.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy. He discusses topics including identity management, data discovery, cloud security, and vulnerability management. Sonrai Security https://sonraisecurity.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/ Youtube https://youtu.be/9rxhtvuQac4…
Grayson Milbourne is the Security Intelligence Director for OpenText Cybersecurity. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses the advantages of a multi-layered approach to cybersecurity. Grayson also provides recommendations for cyber awareness and training. OpenText Cybersecurity https://www.opentext.com/products/cyber-security The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing data analytics and business intelligence, how to become more data curious, and discusses some important trends in technology. He also explains how cybersecurity professionals can benefit from making data more accessible. Night Shift Development https://www.nightshiftdevelopment.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
W. Curtis Preston, AKA Mr. Backup, is an expert in backup & recovery systems, a space he has been working in since 1993. He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it All Podcast. Curtis is also the Chief Technical Evangelist at Druva, a data protection as a service company. In this episode of The Secure Talk Cybersecurity Podcast, we talk with Curtis about data protection as a service (DPaaS), backup basics, and the importance of having an incident response plan. Curtis also talks about the recent trend toward backups being a priority target for hackers. Druva https://druva.com/podcast Backup Central https://www.backupcentral.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity. She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories. SIEMonster https://siemonster.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming & White Box Audits to improve the security and competitiveness of their platforms. We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities. RealVNC https://www.linkedin.com/company/realvnc/ https://www.facebook.com/realvnc https://twitter.com/realvnc https://www.youtube.com/user/RealVNCLtd https://www.reddit.com/r/realvnc/ Cure53 https://cure53.de The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast. Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM). He also discusses the latest threat landscape and provides some useful guidance for healthcare providers. CORL Technologies https://corltech.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos. Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data. Kuderna Financial https://www.kudernafinancial.com/ The Kuderna Podcast https://www.kudernafinancial.com/the-kuderna-podcast The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds. In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity. Strata https://www.strata.io/ Hexa https://hexaorchestration.org/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Joe Gross is the Director of Solutions Engineering at Graylog. Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities. Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models. Graylog https://www.graylog.org/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity. Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection. Cyolo https://cyolo.io/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Ganesh Krishnan is the Co-Founder and CEO of Anzenna. Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian. He also launched Avid Secure in 2017 which was acquired just 18 months later. In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust. The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed. Syxsense https://www.syxsense.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Gabriele Musella, Co-Founder & CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading. Gabriele also shares his recommendations for business reading, insights on running a startup, and more! https://coinrule.com/ Book Recommendations Traction; How any startup can achieve explosive growth Notes on Startups, or How to Build the Future Secure Talk Podcast securetalkpodcast.com…
Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks. https://raysecur.com/ https://raysecur.com/mail-security-report-2021/ https://raysecur.com/case-study/presidential-candidate/ www.securetalkpodcast.com
Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity & access management, security as a service, and best practices for prioritizing investments in cybersecurity. www.techdemocracy.com www.securetalkpodcast.com
Justin Beals, Founder & CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture. www.strikegraph.com
Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption. Dan also discusses some of the issues related to the gender gap in technology. CipherStash.com debuggingdiversity.com…
Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions. Kiran's also shares his experience related to training for and participating in several marathons. https://www.blusapphire.com/…
Jeff Williams Co-Founder & CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.
Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science. After working at a major crypto hedge fund, he decided to drop out of college and founded Injective Labs together with Albert Chon (CTO). Injective Labs is the core contributor behind the decentralized exchange protocol Injective. Injective is currently the fastest growing exchange platform reaching $1 Billion in trading volume within the first 30 days of release. For context, it took Coinbase a year to accomplish the same feat. Unlike Coinbase, Injective is entirely controlled by users meaning that all new markets are actually chosen by users. Injective collects zero revenue and uses any fee generated to be distributed back to their users via its unique decentralized token model. https://injectiveprotocol.com/…
Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more. https://www.blockwaresolutions.com/
Mike McNeil, CEO & Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO). https://fleetdm.com/
Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot. The company has a current market share of 20.95% and is backed by top-tier investors including Polychain Capital, Pantera Capital, Lightspeed Ventures and Breyer Capital. Yubo learned about crypto in early 2014, and by June of that year he launched his first company while still in high school. Five years later, Yubo sold the company for over $4M, and by that point had started two VC funds focusing on disruptive technologies, and blockchain and crypto. https://parallel.fi/…
Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work. https://www.tines.com/
Frances Zelazny, Co-Founder & CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure. https://anonybit.io/
W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva. On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery. Curtis also hosts the Restore it All podcast and maintains the Backup Central website. Restore it All https://podcasts.apple.com/us/podcast/backup-centrals-restore-it-all/id1469663053 Backup Central https://www.backupcentral.com/ Druva https://www.druva.com/…
Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs. Haseeb also talks about Bitcoin ATMs and crypto wallets. https://www.efani.com/
Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya. He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. In this episode Amot talks about embedded device security, the vaccine approach, and introduces some of the key aspects of Sternum IoT's autonomous security and observability platform. Sternum IoT https://www.sternumiot.com/ Thank you for listening to The Secure Talk Cybersecurity Podcast.…
Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management. Pascal talks about the importance of cyber security training, how to provide it in an engaging manner, and how best to measure the results. Eggheads https://eggheads.ai/ Live Interactive Example of Chat Based Instruction (Hint: You will need to respond to the questions.) https://eggheads.ai/chat/l9pw61xez1v Thank you for listening to the Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/…
Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows. Jonathan explains the difference between data security posture management (DSPM) and cloud security posture management (CSPM) and the important attributes of each. Jonathan also talks about his experience in various cybersecurity related roles spanning 16 years including investigations, incidence response, and how visibility and automation are becoming increasingly important. https://www.flowsecurity.com/…
Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services. Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscape. He also makes some predictions about key changes in IT security space for 2023 including the rise of cyber insurance. https://leapfrogservices.com/…
Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure. He also introduces some best practices for monitoring and improving an organization's compliance and security posture. https://www.logicgate.com/…
Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp. Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks about some of the findings in the Theta Lake's recently released report that surveyed over 500 global compliance and security leaders on this topic. https://thetalake.com/…
Dr. Danny Rittman, CTO at GBT Technologies, is an R&D technology expert with who has years of experience researching and developing new forms of cybersecurity. In this episode we discuss some critical flaws with traditional firewalls, intrusion & detection systems (IDS), and encryption methods, and introduce some best practices for protecting networks and IoT devices. GBT Technologies https://gbtti.com/…
Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Security Solutions 2022 Global SMB Ransomeware Survey. Grayson also explains how he monitors the threat landscape in order to ensure the efficacy of OpenText Security Solutions' products.…
Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Raveed also talks about cyber crime as a service on the dark web and vulnerability detection. https://ke-la.com/…
Jack Naglieri is the CEO and Founder of. Panther Labs. Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’s open-source platform called StreamAlert to solve this problem before leaving to start Panther. In this episode Jack explains the issues of legacy SIEMs, the benefits of serverless architecture, and talks about leading Panther and the evolution of Panther's platform. https://panther.com/…
Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training programs. KnowBe4 www.knowbe4.com/
Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. After retiring from the Army Stephen founded and then sold a cyber recruiting company. He has led multiple cybersecurity practices and continues to lead clients through disaster and change at Avant Communications. In this episode of the Secure Talk Podcast, Stephen talks about cybersecurity in the military, how he transitioned from a platoon leader to a cyber security leader, and provides some great advice for members of the U.S. military that would like pursue a career in cybersecurity after separating from the military. Avant Communications https://goavant.net/ Hiring Our Heroes https://www.hiringourheroes.org/ DOD Skillbridge https://skillbridge.osd.mil/…
As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines and years of practical experience in building agile security and compliance teams, and modern day Security Operation Centers. In this episode of Secure Talk, George talks about the importance of physical security, strategies for securing hybrid IT operations, trends with DevSecOps, best practices for identifying security talent, how security certifications can be used as a sales asset, SIEMs, logs, and more. www.sumologic.com…
Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets. Strike Graph’s flexible platform helps customers create a scalable security and compliance program that builds trust at every stage of growth and helps organizations to become certified quickly and easily with SOC 2, ISO 27001, HIPAA, and PCI DSS compliance. https://www.strikegraph.com/…
Huxley Barbee is the Security Evangelist at runZero. Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so. He also provides some great tips for new CISOs and for home cyber protection. https://www.runzero.com/
Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto technology will dominate in the future, and the current state of affairs with blockchains and crypto. https://rubic.exchange/…
Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security. Noname Security https://nonamesecurity.com/ Noname Security's 4-Hour API Workshop https://nonamesecurity.com/workshop Secure Talk Podcast https://securetalkpodcast.com/…
John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler. John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets. John explains the ins and outs of cybersecurity-focused hardware destruction and electronic waste recycling and shares best practices for device deposal for both businesses and consumers. He also talks about how companies insure that their private or personal data cannot be accessed after device disposal. As a special “thank you” to the Secure Talk Podcast listeners, John is offering a free copy of his book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World. In order to receive a free copy of John’s book, please follow this link and fill out the details of where you would like the book sent: https://eridirect.com/insecurity-of-everything-book/ ERI https://eridirect.com/…
Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness. He created the Security Culture Framework (SCF), is the author of Build a Security Culture and co-author of the The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer. Kai talks about the role of security and culture assessments, simulated phishing campaigns, how to spot phishing emails, and best practices for security awareness training. https://www.knowbe4.com/ https://www.securityculturebook.com/ Secure Talk Podcast www.securetalkpodcast.com https://securetalkpodcast.com/creating-a-security-oriented-culture-with-kai-roer/…
Fausto Lendeborg, Co-Founder & CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and helps prevent cloud risk. He also introduces concepts such as the shared responsibility model, and Policy as Code, and explains the importance of scaling across multi-cloud environments, and time to remediation. Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus. www.secberus.com…
Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a customizable DNS service that allows subscribers to block malware, ads, and IoT telemetry. Yegor and I talk about his background, lessons learned from life and launching several businesses, rebounding from failures and more. Yegor also explains the ins and outs of the various VPN providers and how to choose a reliable provider and use a VPN in a secure manner. https://windscribe.com/ https://blog.windscribe.com/ https://controld.com/ Secure Talk Podcast https://securetalkpodcast.com/how-to-choose-a-vpn-and-more-with-yegor-sak-founder-of-windscribe/…
Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats. https://team-cymru.com/ www.securetalkpodcast.com
Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software composition analysis (SCA) and runtime application self-protection (RASP) tools. https://www.contrastsecurity.com/ https://www.contrastsecurity.com/developer Secure Talk Podcast https://securetalkpodcast.com/security-risks-with-open-source-software-steve-wilson-chief-product-officer-at-contrast-security/…
Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities. He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner. https://www.tenacitycloud.com/…
Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories. He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security professionals can scale and have greater visibility of code commits. Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises. https://apiiro.com/ https://apiiro.com/secrets-insights-2022/ Secure Talk Podcast shorturl.at/BJKL2…
Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack. He also shares some stories about his guests and also gives advice on how to protect your personal information. What the Hack Podcast https://podcasts.apple.com/us/podcast/id1571482669 Secure Talk Podcast https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/…
Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations. Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks. Polymer www.polymerhq.io/ Secure Talk Podcast https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/…
Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity. https://nordsecurity.com/ https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/…
Chaim Mazal, SVP of Technology & CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions. www.kandji.io www.securetalkpodcast.com…
Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare. Geoff talks about how he does research for his books and how he finds information sources who are willing to talk. He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain. Geoff also provides an introduction to North Korea’s Lazarus Group and explains how they are organized and how their main mission is to find ways to make money via cybercrime. Geoff also touches on how crypto currency is being used by both cybercriminals and police organizations, cyber surveillance by western countries, and also gives some great book recommendations and tips for improving one’s cybersecurity posture. Lazarus Heist Podcast https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads Lazarus Heist Book https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X Geoff White's homepage https://geoffwhite.tech/ Secure Talk Podcast www.securetalkpodcast.com…
Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more. For more information about Scott and BVS, please visit. https://www.bvsystems.com/ For more information about the Secure Talk podcast, please visit: www.securetalkpodcast.com…
Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.
Santosh Devaraj, CEO of TrustGrid™, talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applications of TrustGrid by different government agencies in Australia. More at: http://trustgrid.com…
Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure. MetricStream https://www.metricstream.com/ Metric Streams GRC Summit https://www.grc-summit.com/2021…
Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers. https://smarteyetechnology.com/
Mark Testoni, CEO at SAP National Security Services (SAP NS2) shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.
Michel is the CEO and Co-Founder of Airbyte. He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day. In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs & databases. After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months. https://airbyte.io/…
Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security. Social Links for Dr. Cole: YOUTUBE: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA TWITTER: https://twitter.com/drericcole FACEBOOK: https://www.facebook.com/DrEricCole/ INSTAGRAM: https://www.instagram.com/drericcole/ E-Books by Dr. Eric Cole: Threat Hunting: https://ar407.isrefer.com/go/mm2ythun Insider Threat: https://ar407.isrefer.com/go/mm2ytit/... Online Danger: https://www.onlinedanger.com…
Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com. Zaid's courses can be found in the following locations: www.udemy.com/user/zaidsabih/ zsecurity.org/courses/…
Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.…
Alex Preukschat & Shannon Appelcline co-authors of Self-Sovereign Identity; Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications for individuals and organizations. Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity; Decentralized digital identity and verifiable credentials by using the following coupon codes: ssstsrt-489B ssstsrt-9707 ssstsrt-7BF1 ssstsrt-2ACE ssstsrt-089E You can refer to this link: http://mng.bz/q98N…
Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action. Bina's book can be found here: https://www.manning.com/books/blockchain-in-action?query=block Bina's online blockchain courses can be found here: https://www.coursera.org/specializations/blockchain…
Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models. Neil's book can be found here: https://www.manning.com/books/api-security-in-action Please use these coupon codes to receive a 30 percent discount. apisecrf-7175 apisecrf-CC64 apisecrf-2FFC apisecrf-41AE apisecrf-42FE Neil's Twitter: @neilmaddog Neil's Blog: https://neilmadden.blog/…
Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps. Julien's book Securing DevOps can be found here: https://www.manning.com/books/securing-devops Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast: scdvprf-A9D5 scdvprf-CB81 scdvprf-0C8B scdvprf-57E0 scdvprf-9DCB These can be redeemed at: http://mng.bz/Qmre For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20 at this link: http://mng.bz/zryB (good for two months)…
Chris Kline, COO & Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banking regulations related to security and data protection.…
Rohan Sathe, CTO & Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP. Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. https://nightfall.ai/…
Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. https://www.safernetvpn.com/ https://safernetbusinessvpn.com/ https://ninjio.com/…
James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and mentoring and motivation. https://www.executech.com/
Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously. https://www.tromzo.com/
Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft. https://www.riskiq.com/ www.securetalkpodcast.com
Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks. CrowdSec is an open-source & collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks. https://crowdsec.net/ www.securetalkpodcast.com…
Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.
Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more! https://reachoutit.com/ https://www.rickjordan.tv/ https://www.rickjordan.tv/liberty-lockdown/…
Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel. For more info, please visit: doppler.com…
Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world. Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and "fathers of OpenStack," having launched and led successful cloud computing and hosting businesses for HP and Rackspace.…
Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security. https://spideroak.com/home/
Dr Spencer is the Chief Information Security Officer at Nomadix & GlobalReach. Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world's largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users. A recognized thought leader in best-practice secure, seamless sign-on experience, and the use of Passpoint (Hotspot 2.0), Chris has been involved in the specification, and delivery of Next Generation Hotspots (NGH), and leads and co-leads several industry working groups for the Wireless Broadband Alliance (WBA), Hospitality Technology Next Generation (HTNG) and the Seamless Air Alliance (SAA). He has presented at HTNG, Barcelona 2015, at Mobile World Congress, the Wireless Broadband Alliance Global Congress, at Wi-Fi Now and on TV and radio.…
Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space. www.atakama.com
Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more! clean.io https://www.clean.io/ Inbound Success Podcast https://inboundsuccesspodcast.com/…
Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo. Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders. Sedat's book can be found here: https://www.manning.com/books/street-coder The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them strsecr-0716 strsecr-029E strsecr-34DB strsecr-2304 strsecr-E12A Sedat's Twitter feed: @esesci…
Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security. Laurentiu's book Spring Security in Action can be found here: https://www.manning.com/books/spring-security-in-action Laurentiu's Youtube Channel: https://www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw
Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each. As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. For more info, please visit: https://ondmarc.redsift.com/…
Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.
Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk. Cecilia can be contacted via: www.vedderprice.com/new-york
Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic. https://tomkranz.com/ http://www.siliconbunny.com/ Manning Publications has provided Secure Talk with five free copies of the e-book Making Sense of Cyber Security. scrmcs-D9FB scrmcs-707E scrmcs-9E82 scrmcs-F6C2 scrmcs-4701 Please use this link to access: http://mng.bz/0ZPN Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site Coupon: podsectalk20 You can refer to this link: http://mng.bz/zryB…
Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.
Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry. https://anchor.fm/yourcyberpath https://www.yourcyberpath.com/pdf
Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees. Gabby also introduces the Wizer platform and shares his thoughts on effective training programs. For more information on Wizer's training programs please visit: www.wizer-training.com…
adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.
Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.
Jonathan Hiroshi Rossi, CEO & Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats. https://www.sayauniversity.com/
Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.
João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.
Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.
Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.
Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson & Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.
Kip Boyle, founder and CEO of Cyber Risk Opportunities. Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI). Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks. https://www.cyberriskopportunities.com/ https://www.firedoesntinnovate.com/…
Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.
adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.
Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.
VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.
Trusona Founder & CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked. (This is part 2 of a 2 part podcast)
Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy. (This is part 1 of a 2 part podcast)
Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking. https://www.udemy.com/user/zaidsabih/
Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.
adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.
Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!…
Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.
Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!
Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. Matt's blog can be found at: https://blogs.technet.microsoft.com/skypehybridguy/
In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!