Look for any podcast host, guest or anyone
Showing episodes and shows of

Audra Streetman And Madeleine Tauber

Shows

The Security DetailThe Security DetailEp. 5: Browser Security with Fletcher Oliver, Chrome Browser Customer EngineerBrowser security is crucial for protecting personal information and preventing malicious attacks, ensuring safe and private online experiences. In Episode 6 of The Security Detail, Chrome browser customer engineer Fletcher Oliver shares some of the top browser security risks and how to defend against them. We also discuss SURGe research that examines security risks associated with Chrome browser extensions.    Links: - Chrome Safety: https://www.google.com/chrome/safety/ - Chrome Safe Browsing: https://support.google.com/chrome/answer/9890866 - Chrome Enhanced Safe Browsing: https://support.google.com/accounts/answer/11577602...2024-10-0217 minThe Security DetailThe Security DetailEp. 4: Application Security with Tanya Janca, head of community and education at SemgrepApplication security is crucial for protecting sensitive data and ensuring the integrity and trustworthiness of software systems against cyber threats. In this episode, Tanya Janca, head of community and education at Semgrep discusses the importance of “shifting left” in the software development lifecycle, along with the best and worst practices in DevSecOps. Tanya has been coding and working in IT for more than 25 years and is the best-selling author of the book ‘Alice and Bob Learn Application Security’. You can follow Tanya on social media under the handle @SheHacksPurple.   Resources:  Semgrep website: https://semgrep.de...2024-09-0447 minThe Security DetailThe Security DetailEp. 3: International Law and Cyber Operations with François Delerue, Assistant Professor of Law at IE UniversityInternational law establishes norms and frameworks to ensure that States conduct their activities in a manner consistent with principles of sovereignty, responsibility, and human rights. In this episode, François Delerue, Assistant Professor of Law at IE University, discusses the application of international law to cyber operations, including the challenges with attribution and the threshold for cyberwarfare.  Resources:  - François Delerue's biography: https://francoisdelerue.eu/ - Cyber Operations and International Law: https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE - Tallinn Manual 2.0: https://www.cambridge.org...2024-08-0752 minThe Security DetailThe Security DetailEp. 2: LLM Research and CISO Liability with Liz Wharton, founder of Silver Key StrategiesIn episode two of The Security Detail, Audra interviews Liz Wharton, founder of Silver Key Strategies, about her research on using large language models (LLMs) to analyze SEC 8-K filings and other public reporting to gain cybersecurity insights. Liz is an attorney who has two decades of legal, public policy, and business experience, including in cybersecurity. The interview also covers the heightened liability security executives face when reporting material incidents to the US Securities and Exchange Commission (SEC).    Resources:  SURGe Minicon talks at .conf24: https://conf.splunk.com/sessions/catalog.html?search=minicon#/ 2024-07-2426 minThe Security DetailThe Security DetailEp. 1: Veterans in Cybersecurity with Tom Marsland, board chair of VetSecVeterans bring invaluable skills in leadership, problem-solving, and discipline to the field of cybersecurity, making them highly sought-after candidates in the industry. In this episode, Tom Marsland, board chair of VetSec, explains how the non-profit helps veterans and transitioning military members find employment in the industry.  Resources:  VetSec: https://vetsec.org/ Veterans Affairs locations: https://www.va.gov/find-locations/ Til Valhalla Project: https://tilvalhallaproject.com/ Operation Code: https://operationcode.org/ Hiring our Heroes: https://www.hiringourheroes.org/ USO Careers: https://www.uso.org/careers/ ...2024-07-1024 minThe Security DetailThe Security DetailEp. 9: Top Cybersecurity Skills According to Past Interview GuestsIn episode 9 of The Security Detail, hear from past interview guests about what they consider to be the most important cybersecurity skill for future practitioners.    2024-04-2410 minThe Security DetailThe Security DetailEp. 8: Emerging Technology Predictions from Past Interview GuestsIn episode 8 of The Security Detail, hear from past interview guests about their predictions for emerging technology, like artificial intelligence and quantum computing.  Resources:  Cipher Brief article: https://www.thecipherbrief.com/how-ai-is-helping-the-u-s-unravel-chinas-dangerous-hacking-operation   2024-04-1014 minThe Security DetailThe Security DetailEp. 7: MITRE ATT&CK framework featuring Adam Pennington, MITRE ATT&CK LeadThe MITRE ATT&CK framework provides a standardized taxonomy and knowledge base of adversary tactics, techniques, and procedures (TTPs), enabling organizations to enhance threat detection, response, and mitigation strategies effectively. In this episode, Adam Pennington tells us about the origins of the ATT&CK project, how organizations can effectively leverage it, and the journey that led Adam to his current role as the project's leader.     Resources:  Mitre ATT&CK website: https://attack.mitre.org/ .conf24 agenda: https://conf.splunk.com/  ATT&CKCon Presentations: https://attack.mitre.org/resources/learn-more-about-attack/ ATT&CK Evaluations Program: https://mitre...2024-03-2736 minThe Security DetailThe Security DetailEp. 6: Electric featuring Robert M. Lee, CEO and Co-Founder of DragosCybersecurity is crucial for the electric sector to safeguard critical infrastructure from cyber threats and potential disruptions, ensuring the reliable and secure delivery of electricity to homes, businesses, and essential services. In episode 6, Robert M. Lee, CEO and Co-Founder of Dragos provides an overview of the top cyber threats facing electric utilities and the role that Dragos plays in strengthening ICS and OT resilience.   Resources:  Dragos Community Defense Program: https://www.dragos.com/community/community-defense-program/ Dragos 2023 OT Cybersecurity Year in Review report: https://www.dragos.com/ot-cybersecurity-year-in-review/ SANS Instructor Biography: https://www.sans.org/pr...2024-03-1354 minThe Security DetailThe Security DetailEp. 5: Food and Agriculture featuring Jonathan Braley, director of the Food and Ag-ISACThe food and agriculture industry is a critical sector that represents nearly a fifth of US economic activity. Businesses in this sector also rely on other important industries such as water, transportation, and energy. In this episode, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry, as well as the various services offered through the ISAC.    Resources:  Food and Agriculture ISAC website: https://www.foodandag-isac.org/ Cybersecurity Guide for Food and Ag Small and Medium Enterprises: https://www.foodandag-isac.org/resources CISA publication on Chinese-manufactured UAS: https://www...2024-02-2821 minThe Security DetailThe Security DetailEp. 4: Elections with Marci Andino, senior director, Election Infrastructure Information Sharing and Analysis Center (EI-ISAC)In this episode of The Security Detail, we explore the complex domain of election cybersecurity with Marci Andino, senior director of the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). From international interference threats to localized phishing attacks, discover the varied challenges election offices face and the strategies deployed to safeguard the integrity of electoral processes.   Resources: EI-ISAC Resources: https://www.cisecurity.org/ei-isac Marci Andino Bio: https://safeelections.org/marci-andino/ EI-ISAC's Essential Guide to Election Security: https://essentialguide.docs.cisecurity.org/en/latest/index.html How Investigators Solved the Biden Deepfake Robocall Mystery (B...2024-02-1423 minThe Security DetailThe Security DetailEp. 3: Media with Runa Sandvik, security researcher and founder of GranittCybersecurity is crucial for journalists and newsrooms to safeguard sensitive information, protect sources, and ensure the integrity of their reporting in an increasingly digital and interconnected media landscape. Episode 3 of The Security Detail features an interview with Runa Sandvik, a security researcher and founder of Granitt, a consulting firm that focuses on digital security for journalists and other at-risk people.   Resources:  Granitt Website Runa's Website Follow Runa on X Runa's blog posts Tor Project Google Summer of Code Security Expert: Apple's Lockdown Mode Still Defeats Commercial Spyware Columbia Journalism Review profile on Runa Citizen La...2024-01-3121 minThe Security DetailThe Security DetailEp. 2: Water with CISA's Amy Thomas, cyber risk analyst and Noah Powers, RVA program lead, penetration testing capabilitiesWater treatment facilities are part of the critical infrastructure that supports essential services. A cyberattack on these facilities could disrupt the supply of clean water, leading to severe consequences for public health, safety, and the economy. In this episode, two representatives from the US Cybersecurity and Infrastructure Security Agency, or CISA, share strategies to defend the water sector from cyberattacks. They also provide an update on CISA's investigation into an Iranian-linked campaign targeting Israeli-made Programmable Logic Controllers (PLCs) at a number of US water utilities. Resources:  CISA Risk and Vulnerability Assessments program CISA Security Advisors Top Ten Cybersecurity M...2024-01-1721 minThe Security DetailThe Security DetailEp. 1: Tour of Cyber Coalition 2023, NATO’s flagship cyber defence exerciseSeason 2 of The Security Detail kicks off with an inside look at Cyber Coalition 2023, NATO's flagship cyber defence exercise. Audra Streetman traveled to Tallinn, Estonia to tour the exercise and interview creators and participants about the knowledge and collaboration needed to defend the Alliance from cyber threats.    Links:  Cyber Coalition 2023 NATO Blog 2024-01-0310 minThe Security DetailThe Security DetailEp. 14: Cybersecurity Career Advice from Past Interview GuestsWrapping up Season 1 of The Security Detail, episode 14 features interviews with a number of past guests about the best advice they've received in their career along with the failures they've learned the most from.  Stay tuned for Season 2 of The Security Detail, which kicks off on January 3, 2024 with an episode about Cyber Coalition 2023, NATO's flagship cyber defense exercise. Audra Streetman traveled to Tallinn, Estonia to tour the exercise and interview creators and participants about the knowledge and collaboration needed to defend the Alliance from cyber threats.  2023-12-1322 minThe Security DetailThe Security DetailEp. 13: Energy featuring Joe Slowik, threat intelligence manager at HuntressCybersecurity in the energy sector is crucial for safeguarding critical infrastructure, preventing potential disruptions to power grids, and mitigating the risk of cyberattacks that could have severe economic, environmental, and societal consequences. In this episode, Joe Slowik, threat intelligence manager at Huntress, discusses the top cyber threats to the energy sector.    Resources:  Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology (Mandiant) Attaining Focus: Evaluating Vulnerabilities In The Current Threat Environment Exorcising the Ghost in the Machine: Debunking Myths Around Supply Chain Intrusions Assessing The...2023-11-2921 minThe Security DetailThe Security DetailEp. 12: Defence with Luke O’Brien, principal engineer for cyber defence at NATOCybersecurity is crucial for the defence industry as it safeguards sensitive information, intellectual property, and critical infrastructure from cyber threats, ensuring the integrity and resilience of military technologies. In this episode, Luke O’Brien, NATO's principal engineer for cyber defence explains NATO’s unique approach to cybersecurity.   Resources:  NATO Cyber Defence NATO Malware Information Sharing Platform (MISP) NATO Crisis Management Exercise 2023 (CMX23) 2023 NATO Summit in Vilnius NATO Rapid Reaction Team Albania weighed invoking NATO’s Article 5 over Iranian cyberattack (Politico) 2023-11-1517 minThe Security DetailThe Security DetailEp. 11: Geopolitics with Dmitri Alperovitch, executive chairman at Silverado Policy AcceleratorCybersecurity has become a critical element in geopolitics, shaping international relations as nations grapple with the challenges of protecting their digital infrastructures and safeguarding national security in an interconnected world. In this episode, Dmitri Alperovitch, Executive Chairman at Silverado Policy Accelerator, discusses the intersection between cybersecurity and geopolitics and the evolving role of cyber in modern conflict.   Resources: World on the Brink: How America Can Beat China in the Race for the Twenty-First Century Geopolitics Decanted podcast by Silverado Follow Dmitri on X Infamous Chisel report 2023-11-0135 minThe Security DetailThe Security DetailEp. 10: Aviation featuring Richard Waine, head of SecOps at easyJetCybersecurity in aviation is paramount as it safeguards critical systems, ensuring the safety of passengers and the integrity of flight operations. In this episode, Richard Waine, head of SecOps at easyJet, discusses the aviation cyber threat landscape and how easyJet is tackling a range of technical and policy issues.  Resources:  easyJet.com Aviation ISAC 2023-10-1817 minThe Security DetailThe Security DetailEp. 9: Education featuring Brett Callow, threat analyst at EmsisoftThe cyber threat landscape for education has evolved rapidly, with ransomware attacks and data breaches targeting schools and universities, highlighting the critical need for robust cybersecurity measures in the sector. In this episode, Brett Callow, threat analyst at Emsisoft, shares his observations about the cybercrime ecosystem and how schools and universities can best defend against these attacks.    Resources:  Unpacking the MOVEit Breach: Statistics and Analysis (Emsisoft) The State of Ransomware in the US: Report and Statistics 2022 (Emsisoft) Protecting Our Future: Partnering to Safeguard K-12 Organizations from Cybersecurity (CISA) 2023-10-0427 minThe Security DetailThe Security DetailEp. 8: Cloud Security featuring Sean Heide, technical research director at Cloud Security AllianceCloud security is essential to safeguarding sensitive data and ensuring the reliability of digital services in an increasingly interconnected and data-driven world. In this episode, Sean Heide shares some of the top threats to cloud computing that he's seeing as technical research director at the Cloud Security Alliance.    Resources: CSA's 2022 Top Threats to Cloud Computing report CIS Critical Security Controls Shared Responsibility Model in the Age of Cloud  2023-09-2023 minThe Security DetailThe Security DetailEp. 7: Financial Services featuring Paul Trueman, executive VP of segments in cyber and intelligence at MastercardCybersecurity in the financial sector is of paramount importance due to the highly sensitive and valuable nature of the data and transactions involved. In this episode, Paul Trueman, the executive vice president of segments in cyber and intelligence at Mastercard, shares insights from his extensive experience in the industry and provides advice on navigating challenges.  Resources:  FS-ISAC's Navigating Cyber 2023 report Digital Intelligence Index Digital Trust at the World Economic Forum Oxford Cyber Security for Business Leaders Programme 2023-09-0621 minThe Security DetailThe Security DetailEp. 6: Retail and Hospitality featuring Suzie Squier, president of RH-ISACThe cyber threat landscape for the retail and hospitality sector is marked by persistent and sophisticated attacks, targeting both customer data and financial information. With the widespread adoption of e-commerce and digital payment systems, threat actors exploit vulnerabilities in online platforms and point-of-sale systems to steal sensitive data and execute financial fraud. Additionally, the interconnected nature of supply chains in these industries presents further risks, demanding heightened cybersecurity measures to safeguard customer trust and protect against potential disruptions to business operations. In this episode, Suzie Squier, president of the Retail and Hospitality ISAC, shares the top concerns...2023-08-2218 minThe Security DetailThe Security DetailEp. 5: Healthcare featuring Zach Nelson, assistant VP of Health-ISAC’s Threat Operations CenterThreat actors continue to exploit vulnerabilities in healthcare systems, leading to data breaches, ransomware incidents, and disruptions in critical medical services. The sector's increased reliance on interconnected devices and electronic health records has amplified the risks, necessitating robust cybersecurity measures and constant vigilance to safeguard patient information and maintain the integrity of healthcare operations. In this episode, Zach Nelson, Assistant Vice President of Health-ISAC's Threat Operations Center, shares his insight on the top cyber threats to the healthcare sector.   Resources:  H-ISAC website FDA Guidance regarding cybersecurity in medical devices ...2023-08-0920 minThe Security DetailThe Security DetailEp. 4: The Public Sector featuring Dan Tripovich, assistant director-general standards, technical advice & research at the Australian Cyber Security CentreIn this episode of The Security Detail, Kirsty and Audra take a look at the cyber threat landscape for the public sector from an Australian perspective. The episode features an interview with Dan Tripovich, who is currently the Assistant Director-General Standards, Technical Advice and Research (STAR) within the Australian Signals Directorate’s Australian Cyber Security Centre Group. STAR Branch delivers ACSC’s flagship publications, including the Australian Government Information Security Manual, the Essential Eight and Protective Cyber Security guidance to the Australian public. Dan is also responsible for the delivery of the ACSC’s Research, International Standards and Technical Advice...2023-07-2629 minThe Security DetailThe Security DetailEp. 3: Manufacturing featuring Tim Chase, program director at the Global Resilience FederationThe manufacturing sector faces targeted attacks on critical infrastructure, including supply chain attacks and industrial espionage, which can lead to production disruptions and intellectual property theft. In this episode, Tim Chase, Program Director at the Global Resilience Federation (GRF), shares threat trends he’s observed from his leadership of the manufacturing ISAC.   Resources:  MFG-ISAC: https://www.mfgisac.org/ CPG Supply Chain Security Guides: https://www.mfgisac.org/cpg-supply-chain-security-guides Global Resilience Federation: https://www.grf.org/ CyManII: https://cymanii.org/ Recorded Future 2022 Report: https://www.recordedfuture.com...2023-07-1219 minThe Security DetailThe Security DetailEp. 2: Telecommunications featuring Ian Keller, cybersecurity advisor and former CISOThe telecommunications industry is responsible for our modern communications, including internet service providers, cable companies, and mobile operators. In this episode, cybersecurity advisor and ex-CISO Ian Keller explains why this sector is such an attractive target for state-sponsored adversaries along with his advice for CISOs. Ian Keller's website: https://iankeller.online/ The Troublemaker CISO blog: https://iankeller.online/blog/the-ciso-blog/ 2023-06-2719 minThe Security DetailThe Security DetailEp. 1: The Public Sector featuring Paul Kurtz, chief cybersecurity advisor at SplunkAs Splunk’s Chief Cybersecurity Advisor, Paul Kurtz is well-versed in today’s cyber threat landscape. In this episode, Kurtz shares lessons learned from his cybersecurity career, which began in the early 1990s in the US government, where he served at the White House on the National Security Council and Homeland Security Council.  Resources:  Paul Kurtz bio: https://www.splunk.com/en_us/blog/author/pkurtz.html Code Red virus: https://www.nsf.gov/discoveries/disc_videos.jsp?org=NSF&cntn_id=100075&media_id=51501 Nimda worm: https://www.sans.org/white-papers/95/ ...2023-06-1221 min