Look for any podcast host, guest or anyone
Showing episodes and shows of

Chris Daly Of Active Cyber

Shows

Active Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netGeorge Barnes, Former NSA Deputy Director, Reflects On Cybersecurity Challenges With Active CyberSend us a textAt the beginning of each year, for the past 10 or more years, I am excited to get the invite from my friend Larry Gordon to make the trek to the University of Maryland to attend the annual, day long forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective. This year's agenda for the 20th Forum was loaded with interesting topics and speakers. The luncheon keynote, delivered by the former Deputy Director of NSA, George Barnes, especially grabbed my interest and I was delighted that George accepted my offer to do a...2025-02-2455 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netLearn How OneTier and Vantiq Are Collaborating To Deliver Full Coverage Zero Trust Solution In This Discussion in the Active Cyber ZoneSend us a textI received a call a while back from my good friend, Jim Rice, who wanted to introduce me to a company with whom he had been collaborating on a solution. Jim has a knack to be on top of the next big market wave – in this case it was zero trust – and so I was eager to hear more about the solution. Jim introduced me to Chris Romeo, the CEO of OneTier who is partnered with Vantiq – Jim’s employer. When I heard more from Chris, I learned that this solution was all-encompassing, covering...2024-11-051h 02Active Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Zone Panel Discussion About New CISA Software Acquisition Guide - Why It Is Important And What You Need to Do About ItSend us a textThe CISA Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle product was developed in response to the core challenges of software assurance and cybersecurity transparency in the acquisition process, focusing primarily on software lifecycle activities. The Software Acquisition Guide focuses on the “Secure by Demand” elements by providing recommendations for agency personnel, including mission owners and contracting staff or requirements office to engage in more relevant discussions with their enterprise risk owners (such as CIOs and CISOs) and candidate suppliers such...2024-08-2145 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Zone Interview with Ron Perez, Intel Chief Security Architect, on Confidential ComputingSend us a textChris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design. 2024-08-1255 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netAlison King, VP of Forescout Technologies, Talks About Government Cybersecurity Policy on the Active Cyber™ ZoneSend us a textAlison King, VP of Government Affairs of Forescout Technologies, joins Chris Daly in the Active Cyber Zone to discuss government policies across a range of cyber topics and technologies. Ali was deeply involved in the crafting of multiple federal cyber reports and doctrinal materials durng her time as a civil servant. Now she leads Forescout's government policy efforts for the progress still being made in improving active cyber defenses through the public-private cooperative initiatives for cyber.2024-07-1746 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netLearn About the Cybersecurity Maturity Model Certification (CMMC) From Two Government ExpertsSend us a textThe  Cybersecurity Maturity Model Certification (CMMC) is a DoD initiative to help secure the supply chain of controlled unclassified information (CUI). Run out of the DoD CIO office, and required through DoD acquisition provisions, it requires contractors and integrators to meet stringent security measures to protect CUI. Learn about the CMMC process, how it evolved, its status today, and some things you can do to prepare for and pass the CMMC assessments, including some tools you will need such as KDM Analytics' Blade RiskManager. 2024-07-151h 07Active Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netLearn How Ransomware Affects Government Agencies In This Active Cyber™ Interview with Jason Baker of GRITSend us a textI like returning each year to the AFCEA Technet Cyber Conference as it always has a lively exhibit hall and interesting panels and discussions. It is also focused quite a bit on government issues and solutions, although not exclusively, as members of the IC, DoD, and other federal agencies provide their insights into the trending cyber issues of the day. As a member of the media, I sometimes receive requests for interviews and this year I received one from GuidePoint Security for Jason Baker, a senior member of the GuidePoint Research...2024-07-1030 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netLearn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™Send us a text Vulnerability management programs form the foundation of most managed security services and SOC efforts. Despite a plethora of scanning and discovery tools, I remember as a former SOC Manager how difficult it was to maintain comprehensive visibility of managed assets and to provide quick reaction to detected vulnerabilities. Remediation efforts were often laborious and it was difficult in many instances to know what to prioritize first. So I got excited when I ran across Nucleus Security at a conference this past summer and saw how they are helping organizations take vulnerability management to t...2023-12-0450 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netLearn the Fundamentals of Managed Security Services Providers in this podcast interview wwith Members of Securely Managed LLCSend us a textChris Daly sits down with two members of Securely Managed LLC to discuss the day-to-day operations of a MSSP and a SOC as a service. Richard Cozart, Security Architect, and Michael Staley, SOC Director, go over the ins and outs of running 24/7 managed security services and review some of the fundamental technologies that make a SOC go.2022-09-0125 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Discusses Cyber Readiness With Sajay Rai - CEO of Securely Yours LLCSend us a textActive Cyber sits down with Sajay Rai - CEO of Securely Yours - to discuss what it takes to be "cyber ready." Sajay dives into the consulting offerings of Securely Yours, describes the foundational standards and guides for becoming cyber ready, and discusses how different customers in different industries at different levels of maturity look at cyber readiness a little differently. 2022-08-2223 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netSajay Rai, CEO of Securely Managed LLC, Discusses MSSP Offerings with Active CyberSend us a textChris Daly of Active Cyber sits down with Sajay Rai, CEO of Securely Managed LLC, a top 250 MSSP, to discuss the challenges of being a MSSP. He reveals how he customizes offerings and partners with leading vendors to meet the changing needs of his diverse customer set. He also discusses his journey from security consulting to MSSP and how his sister company - Securely Yours, which focuses on security consulting - provides a synergy that benefits his customers from risk assessments to bootstrapping new companies into a cost-effective and resilient security posture. Learn...2022-08-1025 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber™ Interviews Djenana Campara - CEO of KDM Analytics - On How Integrated Software Assurance Can Reduce Cyber RiskSend us a text Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks - but ones that are critical to securing your business or government agency. Having specialized, automated tools that are seamlessly integrated using standard methods and interfaces can significantly reduce the complexity of these activities while increasing speed to capability. In particular, leveraging a software assurance ecosystem of integrated tools has proven to be an effective approach to managing security needs at an industrial scale. One example o...2021-10-2829 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActiveCyber.net Interviews Groupsense and Airgap Networks on Joint Offering for Ransomware Response ServiceSend us a textKurtis Minder, CEO of Groupsense - a digital risk protection services company , and Ritesh Agrawal, CEO of Airgap Networks - a cybersecurity vendor of the industry’s first agentless Ransomware Kill Switch, met with Chris Daly in this podcast by ActiveCyber.net to discuss their partnership to help companies fight ransomware. Clients can microsegment their networks to automatically stop the spread of ransomware during the incident mitigation lifecycle and have a detailed and tested ransomware “playbook” for mitigating the damage caused by these cyberattacks by integrating GroupSense’s Ransomware Response Readiness Subscription (R3S) servi...2021-08-0423 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActiveCyber.net Podcast Interview with Corey White of CyvatarSend us a textAs a former SOC Director, I can appreciate the value of a cyber platform that provides the hygiene and cleaning of the network. Although the mantra of "assume breach" is often valid, we still need to pay close and continuous attention to preventative measures. That is also the target area of Cyvatar who provides a "Cybersecurity-as-a-Service" offering. I got a chance to learn more about this offering from the start-up's co-founder - Corey White. Listen to the podcast to learn more about how Cyvatar's platform works and how the company's plans to "democratize"...2021-08-0325 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActiveCyber Interview with John Morgan, CEO of ConflueraSend us a textThis week is a busy week for those getting ready for Black Hat and Defcon. So I felt very lucky to land an interview with John Morgan - the CEO of Confluera, a cybersecurity start-up focused on endpoint detection and response. Learn how Confluera's innovative storyboarding platform provides enhanced insights for runtime threat detection and response. Find out why they are focused on the cloud and learn about how they differentiate in the crowded XDR market in this podcast interview with Chris Daly of ActiveCyber.net. 2021-07-2826 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Podcast: ADS and KDM Analytics Unveil New Risk Assessment ToolSend us a textDjenana Campara, CEO of KDM Analytics along with Steve Seiden, President of AcquireData Solutions (ADS) and Dr. Tony Barber discuss the features and benefits of the Blade Risk Assessment tool. Blade applies a model-based systems engineering approach to risk assessment while using NIST RMF controls to provide a strong foundation for developing mitigations for identified risk areas. ADS, with over 20 years of test engineering credentials, is well positioned to take Blade to the Operational Technology marketplace as it looks to merge OT and IT safety, security, and resiliency needs. Chris Daly of Active...2020-02-2131 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Podcast with John - Founder of New Augmented Reality Start-upSend us a textJohn D - the founder of AR start-up Virfiti - describes some of the use cases, technology and opportunities in the field of augmented reality in this interview with Chris Daly of Active Cyber.net. Learn how SLAM, Unity3D, meshed point clouds, blockchain, image recognition, social media all play together as John takes us through a technology journey that will become a disrupter and major change agent in our everyday lives.2019-08-0632 minActive Cyber Zone from ActiveCyber.netActive Cyber Zone from ActiveCyber.netActive Cyber Podcast with Air Force MG Earl Matthews (Ret) of Verodin, Inc.Send us a textChris Daly of Active Cyber and Major General Matthews discuss emerging cyber issues, the role of security instrumentation platforms such as Verodin, and emerging IoT security requirements.2019-07-2934 min