Look for any podcast host, guest or anyone
Showing episodes and shows of

Cybereason

Shows

Security Weekly Podcast Network (Video)Security Weekly Podcast Network (Video)Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they’re quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR’ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Show...2025-03-1051 minSecurity Weekly (Download Only)Security Weekly (Download Only)Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they’re quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR’ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Show...2025-03-1051 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they’re quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR’ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Show...2025-03-1051 minSecurity Weekly Podcast Network (Video)Security Weekly Podcast Network (Video)Funding, Trustwave/Cybereason, NVIDIA Morpheus AI SOC, and the job situation is bad - ESW #384This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-3842024-11-1654 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Funding, Trustwave/Cybereason, NVIDIA Morpheus AI SOC, and the job situation is bad - ESW #384This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-3842024-11-1654 minCyber Heroes CHCyber Heroes CH#4 Social Engineering, Deep Fakes und die menschliche PsycheIn dieser Folge spricht Milena mit Patrick Buchholz, Distribution & Channel Manager bei Cybereason und Podcasthost bei Zerteilte Zukünfte über Social Engineering, Deep Fakes und die menschliche Psyche.Du willst beim Roundtable von Cybereason dabei sein? Melde dich an: ch-info@cybereason.com.Hast du Themenwünsche, Anmerkungen oder Feedback? Du erreichst uns unter cyberheroes@infinigate.ch.Dies ist ein Podcast der Infinigate (Schweiz) AG.2024-07-0932 minCyberWire DailyCyberWire DailyEncore: What malicious campaign is lurking under the surface? [Research Saturday]Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed...2023-12-3023 minResearch SaturdayResearch SaturdayEncore: What malicious campaign is lurking under the surface?Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed...2023-12-3023 minTalking Cloud with an emphasis on Cloud SecurityTalking Cloud with an emphasis on Cloud Security50-The Talking Cloud Podcast-audio only - Guest - Zohar Alon - President, Product and R&D at CybereasonThis episode features our great friend, Zohar Alon. Geek at heart. Cyber and Cloud pioneer. Will always be Ex-Check Point. Loves building companies (Dome9), now leading Cybereason Product and R&D. Investing in great companies like Firefly, Adaptive Shield, Tamnoon, Laminar, Argon, Safe Base and Descope. Giving back to young entrepreneurs as much as possible. 2023-08-091h 08It\'s 5:05! Daily cybersecurity and open source briefingIt's 5:05! Daily cybersecurity and open source briefingEpisode #132 - Top 5 Cyberattacks in 2023, Malvertising, Cybereason, ChatGPT BannedHey, it's 5:05 on Tuesday, May 2nd. 2023. From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Katy Craig in San Diego, California, Ian Garrett in Arlington, Virginia, Olimpiu Pop in Transylvania, Romania and Marcel brown in St. Louis, Missouri. Let's get to it. Top 5 Most Dangerous New Cyberattacks for 2023🇦🇺 Edwin Kwan, Sydney, Australia ↗SANS Reveals Top 5 Most Dangerous Cyberattacks for 2023Malvertising on the Rise🇺🇸 Katy Craig, San Diego, California ↗Vietnamese Threat...2023-05-0212 minResearch SaturdayResearch SaturdayWhat malicious campaign is lurking under the surface?Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed...2022-07-3021 minDarknet DiariesDarknet DiariesEdIn this episode we hear some penetration test stories from Ed Skoudis (twitter.com/edskoudis). We also catch up with Beau Woods (twitter.com/beauwoods) from I am The Cavalry (iamthecavalry.org).SponsorsSupport for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk...2022-07-2641 minDarknet DiariesDarknet DiariesVoulnetThis is the story about when Mohammed Aldoub, AKA Voulnet, (twitter.com/Voulnet) found a vulnerability on Virus Total and Tweeted about it.SponsorsSupport for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you ho...2022-06-2832 minSWFL Business PodcastSWFL Business Podcast10: John Schlager, Lee Noriega, and Sam Curry from Inceptus and Cybereason"The temptation is to think the cost of ransomware as 'What's the ransom? How much do I have to pay?' That's just a fraction of it."Welcome to the SWFL Business Podcast, where we interview business owners in the Southwest Florida area to learn about their business and where they're heading.Today's guests are John Schlager (CEO) and Lee Noriega (COO) of Inceptus, and Sam Curry (CSO) of Cybereason.Do you know what ransomware is? You may have heard it in the news, especially when a major company like Target...2022-05-1944 minDarknet DiariesDarknet DiariesDaniel the PaladinDaniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.SponsorsSupport for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet.Support for this podcast comes from Cy...2022-05-171h 09Darknet DiariesDarknet DiariesPlayer Cheater Developer SpySome video game players buy cheats to win. Let’s take a look at this game cheating industry to see who the players are.SponsorsSupport for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while el...2022-04-1938 minChannel Journeys PodcastChannel Journeys PodcastStephan Tallent: The Pay as You Grow MSSP ProgramManaged Security Services Providers (MSSPs) are a vital component of a cybersecurity vendor’s partner ecosystem. When I wanted to learn how to build a best in class MSSP program, I turned to Stephan Tallent, VP of North America MSSPs at Cybereason. Stephan shares the details behind Cybereason’s new ‘Pay As You Grow’ program designed to nurture Managed Security Services Providers by providing greater licensing flexibility and reducing risk to the partner. This is a great concept that can be applied just as well to an MSP program.  KEY TAKEAWAYS Here are 8 of the many thin...2022-04-1347 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)CISO Priorities 2022 - CSP #62For security leaders, it can be hard to catch a break when faced with the increasingly challenging task of defending their organizations from evolving threats while simultaneously fighting the battle of the budget in an effort to do more with less. What issues should CISOs be prioritizing, and how can they get the most bang for their buck with regard to minimizing potential risks and maximizing potential outcomes? CISO Stories Podcast hosts Sam Curry, CSO at Cybereason, and Todd Fitzgerald, VP of Strategy at the Cybersecurity Collaborative, are joined by an esteemed panel of accomplished security leaders to discuss...2022-03-221h 02Darknet DiariesDarknet DiariesAdamAdam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part of the team. But a strange series of events took him in another direction, that definitely didn’t make him happy.SponsorsSupport for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams...2022-03-2251 minהדשא של השכן - פודקאסטהדשא של השכן - פודקאסט#20 Business Operations - Cybereasonבואו נדבר קצת על  Business Operations, תפקיד משמעותי מאוד שהתפתח אצל הרבה חברות במשק ההייטק שצמחו בקצב מהיר, אומרים שצרות של עשירים הם באמת צרות, אז אפשר להגיד שהתפקיד הזה נבנה כדי לפתור את אותן צרות, שבמהותו נוצר כדי לבנות תשתיות חזקות של תהליכי הביזנס וניהול בחברה כדי שיוכל לצמוח חזק ככל שיידרש. ואם כבר לדבר על תקפיד כה מרכזי אז ברור שבחברת ההייטק מהחזקות כיום בהייטק הישראלי - Cybereason ובכדי שגם יהיה מעניין, אירחנו את עדי ינקוביץ שעובדת כ business operation בחברה שהולכת לעשות לכם הרבה סדר במהות התפקיד, איך היא מגדירה הצלחה בתקפיד כזה? למה היא כל כך אוהבת את התפקיד? ואיך ההצלחה שלה תלויה באופי היזמי שלה ובפתיחות של ההנהלה בארגון?אתם עוד פה? קדימה שימו פליי!לו״ז לפרק:1:30 - קצת על עדי, החברה והתפקיד7:30 - הסבר על התפקיד והעבודה ביום יום10:00 - אתגר שהיה לה וכיצד היא פתרה אותו18:30 - למה בחרת בתפקיד?21:00 - מה צריך לעשות כדי להגיע לתפקיד?23:30 - האם זה אותו תפקיד בכל מקום?25:30 - מאני-טיים28:30 - טיפ ותובנות סיום_____לכל החדשות והשאלות שלכם:להאזנה | מדעי הדשא - הצצה לאקדמיה, תואר בכל פרקבפייסבוק | הדשא של השכן - פודקאסטבלינקדאין | The Neighbor's Lawn podcast ____הגשה ועריכה: ליעד לוי ויובל אינצה2022-03-0531 minDarknet DiariesDarknet DiariesSpam BotnetsThis episode tells the stories of some of the worlds biggest spamming botnets. We’ll talk about the botnets Rustock, Waledac, and Cutwail. We’ll discover who was behind them, what their objectives were, and what their fate was.SponsorsSupport for this show comes from Juniper Networks (hyperlink: juniper.net/darknet). Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper Secure Edge can help you keep your remote workforce seamlessly secure wherever they are. ...2022-02-081h 09Nexsys - Innovazione e FormazioneNexsys - Innovazione e FormazioneCybereason e il guardiano del faroC’era una volta l’antivirus, quel software che proteggeva da software malevoli, basato su impronte virali aggiornate quotidianamente. Poi gli attaccanti si sono evoluti sempre più e di conseguenza gli strumenti di protezione.Oggi è necessaria una soluzione che si affidi all’analisi comportamentale: Cybereason si basa sulla tecnologia EDR (Enterprise detection and response), traccia l’attività e produce report su quello che accade ai file, pc, rete.Il team di Nexsys, partner ufficiale Cybereason, può affiancare il cliente garantendo un servizio proattivo di monitoring, investigation, prevention e remediation.2022-02-0206 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)When Should You Just Do It Internally or Hire a Consultant? - John Iatonna - CSP #54With the talent shortage expected to last many years into the future, when a new cybersecurity skill is needed that is available within the current team, what do you do? Should you hire someone externally, or bring in a consultant? What are the pitfalls of each approach? Join John as he discusses his experience in making these tough decisions.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/12/CISOSTORIES_John_Iatonna_Article.pdf   Iatonna, J. 2019. Develop from Within or Hire a...2022-01-2527 minDarknet DiariesDarknet DiariesTeaMp0isoNTeaMp0isoN was a hacking group that was founded by TriCk and MLT (twitter.com/0dayWizard). They were responsible for some high profile hacks. But in this story it’s not the rise that’s most interesting. It’s the fall.SponsorsSupport for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.2022-01-251h 00Cybersecurity UnpluggedCybersecurity UnpluggedBrand Narratives and Awareness in CybersecurityKyle Flaherty is the SVP of global marketing for Cybereason and a tech executive who is known for launching high-profile technology startups with four successful exits. In today's episode of Cybersecurity Unplugged, Flaherty discusses: The impact of Cybereason's brand; Importance of brand campaign awareness Effective brand campaigns to focus on and why.  2022-01-1924 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Designing a Shared Vision with IT and the Business - Scott King - CSP #53The locus of control has been slipping away from IT teams (and by default Security teams), and this "challenge" to IT governance has accelerated post-covid with a more distributed workforce. The fact that IT governance is eroding as easily and quickly should tell IT and infosec teams that they need to ditch their legacy models of service delivery and adopt an approach that addresses the current business needs and digital transformations many companies are undertaking. The security implications of this are significant in that security programs are not typically sized nor funded to deal with one technology approach yet...2022-01-1825 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Moving to the Cloud? Don't Forget Hardware Security! - Steve Orrin - CSP #52While the cloud computing infrastructure is designed to be very agile and flexible, transparency to where the information is being processed is very important due to global privacy and security concerns. Steve discusses approaches to remaining compliant with the various laws (i.e., restricting where the data may reside) when moving to the cloud.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Steve_Orrin_Article.pdf   Orrin, S. 2019. Why Hardware Matters in Moving Securely to The Cloud. In CI...2022-01-1122 minDarknet DiariesDarknet DiariesMarqThis is the story of Marq (twitter.com/dev_null321). Which involves passwords, the dark web, and police.SponsorsSupport for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.View all active sponsors.2022-01-1146 minB2B Marketing PodcastB2B Marketing PodcastEpisode 46: Cybereason’s Kyle Flaherty on future-proofing your tech marketingIn this week’s episode, David Rowlands, senior editor at B2B Marketing, sat down with Kyle Flaherty, senior VP marketing at Cybereason. To kick off the New Year, Kyle explores the changing future of the tech marketing landscape. This podcast is the final instalment in a series of four which have helped inform our full report, sponsored by Twogether. Download the report by clicking the link below! https://www.b2bmarketing.net/en-gb/free-downloadable-guides/future-tech-marketing-and-revenue-performance-whats-impacting-growth-20222022-01-0729 minThe Context PodcastThe Context PodcastRansomware For Claris FileMaker DevelopersMore information about Ransomware.https://www.knowbe4.com/ransomwareMethods of attack: https://attack.mitre.org/Email attack example: https://youtu.be/v-ITcpD1KcQhttps://www.nomoreransom.org/en/index.htmlhttps://www.cisa.gov/stopransomwarehttps://www.justice.gov/criminal-ccips/file/872771/downloadhttps://www.nsi.org/2021/02/15/employee-cyber-security-awareness-ransomware-wave/https://www.coveware.com/blog/ransomware-marketplace-report-q4-2020https://www.cybereason.com/hubfs/dam/collateral/ebooks/Cybereason_Ransomware_Research_2021.pdfhttps://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdfknowbe4.comRansomware | KnowBe4Ransomware history, prevention tips, removal, FAQs, information on different strains, current news and...2022-01-051h 26CISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Privacy Hunger Games: Change The Rules - Samantha Thomas - CSP #51Information is meant to be shared with others- others that is with a need to know. CISOs may find that their organization is sharing with other entities without proper procedures in place. What if there are 90 of these organizations? Join this podcast to learn from a healthcare CISO who tackled this dilemma and subsequently changed a government law!   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Samantha_Thomas_Article.pdf   Thomas, S. 2019. Privacy Hunger Games: Change the Rules. In...2022-01-0423 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Server Room to War Room: Enterprise Incident Response - Dawn-Marie Hutchinson - CSP #50In many organizations, the CISO will be looked at as the leading expert in incident response, but often has little involvement in the selection, planning, and training for the Enterprise Incident Management Program. Listen to Dawn-Marie, who has navigated organizations as a CISO during crisis and consultant to “play like you practice.”   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Dawn-Marie_Hutchinson_Article.pdf   Hutchinson, D. 2019. Server Room to War Room…Enterprise Incident Response. In CISO COMPASS: Navigating Cybersec...2021-12-2828 minHashtag Realtalk with Aaron BreggHashtag Realtalk with Aaron BreggEpisode 59 - Preparing for a Ransomware AttackIn this episode I had a chance to talk with Israel Barak about a listener submitting topic, 'How do I prepare for a ransomware attack?'. Israel is the CISO for Cybereason and has intricate knowledge of ransomware and cybersecurity dating back to his days in the Israeli Defense Force.Using his extensive knowledge we talked through his concept of having different security 'pillars' to help navigate the lifecycle of ransomware: Security Hygiene - Checklists are in security hygiene - you don't build a program around ransomwarePeople - Executive L...2021-12-2259 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)CISO Shortlist: Key Issues to Cover for Todays CISOs - Leon Ravenna - CSP #49As if CISOs don’t have enough to focus on, here’s a few more items that should be top of mind – KAR Global CISO, Leon Ravenna, dives into Cyber Insurance and why D&O requirements may be on the horizon, regulatory burdens and what to expect out of the US Government, how the intersection of Security and Privacy is impacting CISOs, and a little security buzzword bingo and how to deal with the latest “fads” like CASB, ZTNA, SASE and more…   Show Notes: https://securityweekly.com/csp49 This segment is sponsored by Cybereason. V...2021-12-2128 minFedScoop RadioFedScoop RadioElevating the role of cyber teamsDefense against cyberattacks is more than just updating technology and patching systems. While an organization can have the process and technology in place, the right cybersecurity culture is paramount, says Cybereason Chief Security Officer Sam Curry. “The biggest problem in cybersecurity is a people problem,” Curry tells Francis Rose on The Daily Scoop Podcast. “It’s people on offense and it’s people on defense. If I have to characterize, on defense, the single biggest thing that would help most security departments, it is better alignment with the mission.” This podcast is sponsored by Cybereason and underwritten by FedScoop. Guest: Sam Curry, C...2021-12-2013 minEn Liten Podd Om ItEn Liten Podd Om ItELPOIT #347 - EvilPotatoeScript.exeOm Shownotes ser konstiga ut (exempelvis om alla länkar saknas. Det ska finnas MASSOR med länkar) så finns de på webben här också: https://www.enlitenpoddomit.se    Avsnitt 347 spelades in den 14 december och eftersom att Nya Zealand vad det första landet med kvinlig rösträtt ( https://nzhistory.govt.nz/politics/womens-suffrage ) så handlar dagens avsnitt om: INTRO: - Alla har haft en vecka... David har haft puls. Björn har träffat sin mamma, och grejjat lite hemma. Johan har fått skrämsel kring Covid på grund av ett födelsedag...2021-12-161h 12CISO Stories Podcast (Audio)CISO Stories Podcast (Audio)The Future Is Now: Model-Driven Security Using Data Science - Jim Routh - CSP #48Cybersecurity talent shortages are well documented and asking experience cybersecurity professionals to spend countless hours on routine tasks does not promote retention. The adversaries are leveraging data science to attack our enterprises and consumers, and we need to find a better way. This session explores the experience of creating over 300 models using data science, machine learning, and automated incident response to increase the security posture for a major organization.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Jim_Routh_Article.pdf 2021-12-1427 minThe Other Side Of The FirewallThe Other Side Of The FirewallApache Log4Shell VulnerabilityWhat's up, everyone! In this episode, Ryan, Shannon, and LeVon discuss the recently discovered Apache Log4Shell vulnerability and how far spread it is. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️  Thanks! Article: Cybereason Releases Vaccine to Prevent Exploitation of Apache Log4Shell Vulnerability (CVE-2021-44228)  https://www-cybereason-com.cdn.ampproject.org/c/s/www.cybereason.com/blog/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228?hs_amp=true&fbclid=IwAR056VNGvCbMVq0WR0xQxidHIZkn8tx_8RNaC-BKZA0jWW0-F-buU02L4Jk Socials: Website - www.theothersideofthefirewall.com YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Faceb...2021-12-1311 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)CISOs Need Training Too! - Candy Alexander - CSP #47The CISO has trained the workforce and completed the security awareness month annual training. Well, done! Is training done for the year? No. But what about the CISO? How does the CISO ensure that the proper skills are maintained for the CISO to be able to continue to lead the security organization? Join this podcast to learn from the multiple term-elected ISSA International President.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Candy_Alexander_Article.pdf   Alexander, C. 2019. CI...2021-12-0725 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)No Senior Management Buy-in, No Success - Chris Apgar - CSP #46Are you reporting the same risks each year to management? This may be indicative of a lack of incentive or buy-in from senior management to fund the investments. Join this podcast to learn how to show senior management that funding these initiatives is more than risk avoidance and a cost to the bottom line.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/10/CISOSTORIES_Chris_Apgar_Article.pdf   Apgar, C. 2019. Security and Senior Management – Buy-In Is Critical to Success. In CISO...2021-11-3024 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Skills I Needed to be a First-Time CISO - Richard Kaufmann - CSP #45Infosec skills don't necessarily transfer to CISO skills, but CISO skills are 100% transferable to whatever your infosec career looks like. Growth begins outside of your comfort zones, so some of the CISO skills you can work on now include executive storytelling, internal coalition building, and how to be comfortable being uncomfortable…   Show Notes: https://securityweekly.com/csp45 This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!   Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twit...2021-11-2323 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Which Approach Wins: Compliance or Risk? - Mark Burnette - CSP #44Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be present, but is this enough? Is it really security? Join this podcast as the differences between compliance and true security are discussed.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/11/CISOSTORIES_Mark_Burnette_ArticleV1.pdf   Burnette, M. 2019. The Benefits of Focusing on Risk vs Compliance. In CISO CO...2021-11-1623 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Who Is Your SOC Really For? - Ricardo Lafosse - CSP #43Managing the volume of security events and continuous threat intelligence can be daunting for the largest of organizations. How do you increase the effectiveness of a Security Operations Center (SOC) and share this information across the organization for greater efficiency and adoption?   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/07/CISOSTORIES_Ricardo_LaFosse_Article.pdf   Lafosse, R. 2019. Success Implementing A Shared Security Center. In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pg 159. Fitzgerald, T. CR...2021-11-0930 minResearch SaturdayResearch SaturdayAn incident response reveals itself as GhostShell tool, ShellClient.Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT...2021-11-0618 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)Do You Know where Your Data Is? - William Miaoulis - CSP #42Data is everywhere today as users are working remotely, storing information in the cloud, downloading to USB drives and so on. Join this podcast to learn from a Healthcare CISO and some of the typical common events which take place to expose sensitive information.   To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2021/07/CISOSTORIES_William_Miaoulis_Article.pdf   Miaoulis, W. 2019. Do You Know Where Your Data Is? In CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers, 1st Ed, pg...2021-11-0225 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)The Nexus of Security, Privacy and Trust - Allison Miller - CSP #41Allison Miller, CISO at Reddit, discusses the challenges across stakeholders from end-users to service providers in addressing the nexus of Security, Privacy and Trust? Should they be equally weighted? In what circumstances does the need for one outweigh the need for the others? What does the future hold for our efforts to find the right balance between them?   Show Notes: https://securityweekly.com/csp41 This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them!   Visit https://securityweekly.com/csp for all the la...2021-10-2622 minCybersecurity UnpluggedCybersecurity UnpluggedBuilding Brand Trust Through Contact and ExposureSam Curry is the chief security officer at Cybereason. He has devoted his career to empowering defenders in cyber conflict and fulfilling the promise of security enabling a safe, reliable, connected world. In this episode of Cybersecurity Unplugged, Curry discusses: Financing and building up an agile cybersecurity company; Improving company recognizability and trust by using commercial media, streaming and Cybereason's signature owl; How SMBs can increase visibility into indicators of compromise. 2021-10-2022 minCYBER SECURITY SUMMITCYBER SECURITY SUMMITCyber Security Summit Webinar August 2021 - Ransomware Unplugged: What does the most recent cyber plague mean?Sam Curry explores the reasons behind the sharp rise in ransomware attacks and the difficult questions brought on by this threat. Should an organization ever pay the ransom? What damage is risked from an attack, not only to revenue but to brand, morale, and insurance premiums? And most importantly, what can an organization do to recover from such an attack, or make sure it doesn’t happen in the first place?    Speaker:   SAM CURRY   Chief Security Officer, Cybereason   Sam Curry is CSO at Cybereason. Curry was also CTO and CISO for Arbor Networks (NetScou...2021-09-0257 minCISO Stories Podcast (Audio)CISO Stories Podcast (Audio)CISO Roundtable: Ransomware Attacks and the True Cost to Business - CSP #28A recent global research report conducted by Cybereason, titled "Ransomware: The True Cost to Business", revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization’s brand, unplanned workforce reductions, and little in the way of relief from cyber insurance policies. An esteemed panel of subject matter experts will examine the research findings and discuss how organizations can better prepare to defend against and respond to a ransomware attack. The event was produced as a live webinar ve...2021-07-3058 minAugmentAugmentSimpplr, Unybrands,Cybereason, Flymachine,Untitled Ventures, Railsbank, Cardless, The Moot Group (TMG), Great Question, BHyve, Mobile.dev, Acelerate, Stytch, Multiplier and Proper raise funds | Clubhouse has launched its direct messaging feature | Microsoft has unveiled Windows 365 | Deskimo has launched in Singapore and Hong Kong | Bevy has acquired EventtusInvite-only social audio app, Clubhouse, has launched its direct messaging feature- Backchannel- for all users, which allows them to slide into a one-on-one chat mode or a group text format.Microsoft has unveiled Windows 365 that takes the OS to the cloud to offer a personalized PC experience for users and organizations, a new approach to cloud computing amid hybrid working.Simpplr has raised a $32M Series C from Tola Capital. Simpplr will use the new funds to develop its platform, expand its development team, and scale up to serve worldwide commercial clients.Crayhill...2021-07-1505 minResearch SaturdayResearch SaturdayExhibiting advanced APT-like behavior.Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.2021-06-2621 min20MinuteLeaders | The Human Zero Day20MinuteLeaders | The Human Zero DayEp457: Yossi Naar | Chief visionary officer and Co-founder, CybereasonYossi Naar, Chief Visionary Officer and Co-Founder of Cybereason -  a leader in EDR and next-generation antivirus solutions for enterprises. Yossi is an accomplished software developer and expert in technology architecture, machine learning, big data analytics, and visualization. During his 20 years of industry experience, Yossi has designed and built many products, from cutting-edge security platforms for the defense industry in Israel to big data platforms. His products have been deployed worldwide and used by Fortune-500 companies on a daily basis. Since he founded Cybereason in 2012 the company raised almost $400 million from investors like Softbank, Lockheed Martin, CRV, and Spark C...2021-06-2023 minData Protection GumboData Protection Gumbo094: Handling Data Breaches in 2021 - CybereasonSam Curry, Chief Security Officer at Cybereason enlightens us on how to keep your organization security aware especially while remote, dropping some gems for Chief Information Security Officers and why security breaches are on the rise in 2021.2021-05-1835 minDarknet DiariesDarknet DiariesCybereason - Molerats in the CloudThe threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats. SponsorsThis episode is sponsored by Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in your hands. Their future-ready attack platform gives defenders the wisdom to uncover, understand, and piece together multiple threats. And the precision focus to end cyberattacks instantly – on computers, mobile devices, servers, and the cloud. They do all this through a variety of tools they’ve devel...2021-04-0657 minPrivacy PleasePrivacy PleaseS2, E58 - Lodrina Cherne, Principle Security Advocate at CybereasonSend us a textThis week on Privacy Please we are joined by the one and only Lodrina Cherne, a forensics and computer security guru!This episode really hit home for us. Please enjoy this awesome conversation involving random banter, humor, deep conversations around what privacy means, how Lodrina started out, policies, Cybereason, Apple's warrant canary, WWE, PGP encryption, weightlifting, the pandemic, and much more!   LinkedIn Bio: https://www.linkedin.com/in/lodrinacherne/Show notes and links:  Security at Cybereason https://www.cybereason.com/TELI program at the...2021-03-171h 18The PR BunkerThe PR BunkerThe PR Bunker - Kyle Flaherty CybereasonThe PR Bunker - Kyle Flaherty Cybereason by Don Martelli2021-03-1212 minCyber WireCyber WireThe Kimsuky group from North Korea expands spyware, malware and infrastructure. [Research Saturday]Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the...2021-01-3000 minResearch SaturdayResearch SaturdayThe Kimsuky group from North Korea expands spyware, malware and infrastructure.Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including...2021-01-3017 minSecurity All InSecurity All InTatu Ylonen- Founder of SSH Communications SecurityTatu and Sam discuss how the SSH protocol became “viral” when Tatu first created it in the mid-’90s. What led Tatu to dive, head first, into a field he knew little about when he first created SSH. What is the link between security and communication, and what fascinates Tatu so much about language and the […] The post Tatu Ylonen- Founder of SSH Communications Security appeared first on Malicious Life.2020-10-2817 minSecurity All InSecurity All InSpecial Interview: Sam Curry- CSO at CybereasonThe tables are finally turned, as Sam finds himself in the hot-seat. We join Sam’s brother, Red Curry, as he interviews Sam to find out more about their childhood, Sam’s journey into security, and his inspirations. What’s the significance we put on stories? What does it mean to “take in the strays”, and taking care […] The post Special Interview: Sam Curry- CSO at Cybereason appeared first on Malicious Life.2020-10-1435 minSecurity All InSecurity All InStephanie Helm- Director at MassCyberCenter at MassTechHow did a fascination with languages lead to a decades-long career in Cryptology? Sam and Stephanie talk about her experience joining the Navy in the 1980’s, and how it eventually led her to the halls of the NSA. What’s the importance of finding the right path, and balancing passion for work with personal life? And […] The post Stephanie Helm- Director at MassCyberCenter at MassTech appeared first on Malicious Life.2020-09-3000 minSecurity All InSecurity All InWayman Cummings- Director, Threat Intelligence, Incident Response, Security operations at UnisysSam and Wayman chat about their chaotic childhood, starting gangs, and climbing mountains. How does sharing information despite disagreement improves our security and society as a whole? And what did Wayman learn falling from the ceiling of a printer room, trying to “hack” into his school’s server room? The post Wayman Cummings- Director, Threat Intelligence, Incident Response, Security operations at Unisys appeared first on Malicious Life.2020-09-1500 minThe Innovation Engine PodcastThe Innovation Engine Podcast170. Security is a Sound Investment with Sam Curry | Growth and EvolutionWhat role does security play in the growth of a business? Sam Curry is a podcaster, the Chief Security Officer of Cybereason, and a visiting fellow at the National Security Institute. Sam has been through a lot of growth in his career, working for two startups in the 90’s, one of which sold to security giant McAfee. Hear Sam talk about the importance of breaking out of your box and becoming a lifelong learner to make an impact at the leadership level, and how investing in security is not about making a return on your investment but ma...2020-09-0243 minSecurity All InSecurity All InGuy Golan – Group CISO at PerformantaSam and guy talk about their passion for stories, and how Guy’s journey in Africa led him into the field of security The post Guy Golan – Group CISO at Performanta appeared first on Malicious Life.2020-09-0200 minSecurity All InSecurity All InAndreas Schneider – Group CISO at TX GroupConquering and exploring the world was Andreas’ first goal as a child, playing strategy games such as Risk and Civilization. Andreas and Sam talk about how this passion led to computers and eventually security. From securing mainframes to securing the biggest media group in Switzerland- what has Andreas learned over the years that helped shape […] The post Andreas Schneider – Group CISO at TX Group appeared first on Malicious Life.2020-07-1300 minSecurity All InSecurity All InKeith Barros – CISO at Seton HallFirst encountering computer technology with the Sinclair Spectrum, Keith Barros, Seton Hall CISO, went all-in on security early in his life. Join Sam and Keith for a discussion of American history, what history can teach us about modern security, how Keith’s passion for photography shapes his view on the world, and his advice for anyone […] The post Keith Barros – CISO at Seton Hall appeared first on Malicious Life.2020-06-1200 minSecurity All InSecurity All InEd Amoroso – Founder and CEO at TAG CyberEd and Sam discuss Ed’s journey into security, his beginning at Bell Lads, and the experiences that shaped his understanding of socializing, and the value of soft skills for a CISO. The post Ed Amoroso – Founder and CEO at TAG Cyber appeared first on Malicious Life.2020-05-1400 minSynthetic Snake Oil: Online Security TipsSynthetic Snake Oil: Online Security TipsDP68 Ransomware Protection Tools To ConsiderWhen people aren’t scamming you through sleazy phone calls, hackers are getting into your computer and locking particular data behind an encryption and demanding money. This type of scam is called Ransomware and is one of the largest problems people face today. While in some cases, ransomware is usually targeting small or medium sized businesses, that doesn’t mean it can’t go after individuals. As such, it’s smart for not only average people, but companies to invest in some ransomware protection for their PCs. Here are some of my suggestions. Firs...2020-02-0500 minEnterprise Security Weekly (Video)Enterprise Security Weekly (Video)Cybereason, Swimlane, Citrix Scanner - ESW #170This week in the Enterprise Security News, Paul and Matt cover the following stories: Cequence CQ botDefense, Optimizing Your IT Spend as You Move to the Cloud, Cybereason Launches Free Emotet-Locker Tool, Swimlane Version 10.0, Cisco Launches IoT Security Architecture, AV Vendors Continuing Support for Products Under Windows 7, Citrix and FireEye Launch IoC Scanner, StackRox Announces Google Anthos Support, Sophos Introduces Intercept X for Mobile, New Cisco/AppDynamics Integration, CloudKnox Security Raises Funding, and Magnet Forensics Unveils New Solution to Simplify Remote Forensics Investigations. Visit https://www.securityweekly.com/esw for all the latest episodes! Show...2020-01-2933 minSecurity All InSecurity All InS2:E7 Kelley Misata, Ph.D. – Founder and CEO at Sightline SecurityKelley is an inspiring strategic leader and speaker with 15+ years of experience in information security, marketing, and communications.  She has successfully bridged technical and nontechnical audiences and initiatives to build productive conversations and strategies in information security focusing on the intersections of people, processes, technology. Her discussion with Sam reveals her interesting path to […] The post S2:E7 Kelley Misata, Ph.D. – Founder and CEO at Sightline Security appeared first on Malicious Life.2019-12-1100 minSecurity All InSecurity All InS2:E6 Anton Chuvakin — Settling into the fascinating world of Google CloudAnton is a recognized security expert in the field of SIEM, log management, and PCI DSS compliance. He is an author of books “Security Warrior”, “PCI Compliance”, “Logging and Log Management” and a contributor to “Know Your Enemy II”, “Information Security Management Handbook” and others.  His blog securitywarrior.org was one of the most popular in […] The post S2:E6 Anton Chuvakin — Settling into the fascinating world of Google Cloud appeared first on Malicious Life.2019-12-1100 minSecurity All InSecurity All InS2:E5 Adam Shostack – Consultant and advisor delivering strategic security and privacy innovationSam spoke with Adam Shostack about being an entrepreneur, technologist, author and game designer, focused on improving security outcomes for customers and the industry as a whole. Adam has created a wide variety of companies and organizations, software, new analytic frameworks, as well as books, games and other forms of communication at startups and at […] The post S2:E5 Adam Shostack – Consultant and advisor delivering strategic security and privacy innovation appeared first on Malicious Life.2019-11-2500 minSecurity All InSecurity All InS2:E4 Clay Carter – Global Product Security Leader at Xylem Inc.Clay Carter proves to be an energetic and driven security executive with experience leading organizations through periods of creation, scale, and turnaround. Sam and Clay talk about his passion for technology and pride and his deep technical expertise across architecture, engineering, security, software, networks, and infrastructure. The post S2:E4 Clay Carter – Global Product Security Leader at Xylem Inc. appeared first on Malicious Life.2019-11-2500 minSecurity All InSecurity All InS2:E3 Nick Vigier – CxO Advisor | CISO | CIO | Security InnovatorNick is a technology and security leader focused on innovation to drive business results. In his 15 years of security leadership, he has focused on building high-performance teams to ensure security is a business driver rather than a cost center. His focus on all areas of security ranging from physical security to risk management through […] The post S2:E3 Nick Vigier – CxO Advisor | CISO | CIO | Security Innovator appeared first on Malicious Life.2019-11-2500 minSecurity All InSecurity All InS2:E2 Thomas Johnson – CISO at ServerCentral Turing Group (SCTG)Tom talked with Sam about his path to CISO. As CISO for ServerCentral Turing Group (SCTG),  Tom is responsible for security, governance, compliance, and maintaining a culture of security and IT Risk awareness across the entire organization. Many of his company’s clients are in regulated industries, have compliance requirements or simply take the security of their data seriously.  The post S2:E2 Thomas Johnson – CISO at ServerCentral Turing Group (SCTG) appeared first on Malicious Life.2019-10-0300 minSecurity All InSecurity All InS2:E1 Dianna (Lee) Morikawa – Computer & Network Security VP of SalesDianna starts off Season 2 of Security All-in to chat with Sam about her career path from the medical field to security.  Dianna discusses how her experiences in the computer and network security industry with a strong business development professional background have helped her achieve executive positions. The post S2:E1 Dianna (Lee) Morikawa – Computer & Network Security VP of Sales appeared first on Malicious Life.2019-10-0300 minWorld Wide Technology - TEC17World Wide Technology - TEC17Cyber Threats with CybereasonOne of the most serious cyber threats in the last few years is Soft Cell.  This cyber threat has been targeting telecommunication companies for years.  In 2018 it was spotted and identified by Cybereason.  In this new TEC17 podcast from World Wide Technology (WWT) Matt Berry from the WWT Security practice and two experts from Cybereason,  Israel Barak and Maor Franco, discuss what the Soft Cell threat is and why it is so important.  Our experts also discuss why Soft Cell is a threat to other verticals besides telecommunications, how enterprise organizations can assess if they are vulnerable to the Soft...2019-08-0627 minSecurity All InSecurity All InMichael Miora – SVP & Global CISO at Korn FerryMichael and Sam talk about the path from Mathematics to Astrophysics, to cybersecurity. How does one secure satellite transmission, when the technology of the time allows only for a trickle of information to come back down to earth? They further discuss how Michael got drawn into cybersecurity and what takes precedence when it comes to […] The post Michael Miora – SVP & Global CISO at Korn Ferry appeared first on Malicious Life.2019-01-0700 minSecurity All InSecurity All InKevin Fielder- CISO at Just EatSam and Kevin chat about what it takes to be the first CISO in an organization that’s growing its security, where biology and security meet, and why IoT is such a funny term. The post Kevin Fielder- CISO at Just Eat appeared first on Malicious Life.2018-11-2700 minSecurity All InSecurity All InChris Castaldo – Sr. Director of Cybersecurity at 2UChris recalls the time he built a Tandy computer with his grandfather, and how that got him on the path to security. He explains his passion for education, tells of his time in the military, and offers advice to up and coming security professionals. The post Chris Castaldo – Sr. Director of Cybersecurity at 2U appeared first on Malicious Life.2018-10-2200 minSecurity All InSecurity All InDon Welch – Chief Information Security Officer at Penn State UniversityDon Welch talks about the path from Army Special Operations IT to being CISO for Penn State University. Don also tells about starting the cybersecurity education program at West Point, and how being a CISO for a major university is almost like securing a small city. The post Don Welch – Chief Information Security Officer at Penn State University appeared first on Malicious Life.2018-10-0200 minSecurity All InSecurity All InRoland Cloutier – SVP, CSO at ADPSam and Roland discuss their continued passion for security, and how that keeps them going on a day to day basis and the power they draw from looking at the big picture and thinking about what you’re trying to accomplish beyond protecting a company and solving problems. The post Roland Cloutier – SVP, CSO at ADP appeared first on Malicious Life.2018-10-0100 minResearch SaturdayResearch SaturdayICS honeypots attract sophisticated snoops.Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:https://www.cybereason.com/blog/industrial-control-system-specialized-hackers  Learn more about your a...2018-09-2223 minSecurity All InSecurity All InCecil Pineda- CISO and Managing Director at Cyber Watch SystemsCecil and Sam talk about Cecil’s journey from the Phillipenes to Dallas, his love of the Dallas Cowboys, the Y2K panic, and pentesting in the early 2000’s The post Cecil Pineda- CISO and Managing Director at Cyber Watch Systems appeared first on Malicious Life.2018-08-0900 minSecurity All InSecurity All InJohn Roskoph – VP Cyber Security / CISO, Tropicana Entertainment IncJohn and Sam talk about “War Games” and other inspirations in the life of a security professional, how working at Comcast was like “holding on to a flying plane”, and how hobbies like archery help to keep John focused. The post John Roskoph – VP Cyber Security / CISO, Tropicana Entertainment Inc appeared first on Malicious Life.2018-07-2600 minSecurity All InSecurity All InBill Dennings – Chief Operating Officer, Uphold IncBill Dennings and Sam reminisce about their first meeting, Bill’s history in the Marines, what he’d learned, and how it ultimately led him to security The post Bill Dennings – Chief Operating Officer, Uphold Inc appeared first on Malicious Life.2018-07-1200 minSecurity All InSecurity All InAnne Marie Zettlemoyer – Director of Cyber Strategy, Architecture, and Solutions, Freddie MacSam and Anne Marie Z sit down for a conversation about the similarities between finance and security, diversity, and Anne Marie’s history as an MMA fighter. The post Anne Marie Zettlemoyer – Director of Cyber Strategy, Architecture, and Solutions, Freddie Mac appeared first on Malicious Life.2018-06-2800 minSecurity All InSecurity All InAri Schwartz – former senior director for cybersecurity, U.S. National Security CouncilAri and Sam discuss the intricacies of working at the White House, and how cybersecurity is viewed in DC The post Ari Schwartz – former senior director for cybersecurity, U.S. National Security Council appeared first on Malicious Life.2018-06-1400 minSecurity All InSecurity All InEddie Schwartz – EVP Cyber Services, DarkMatterSam and Eddie reminisce about their early days in cybersecurity, the work they did after the RSA breach, and how Eddie’s theater background has served him in his security career. The post Eddie Schwartz – EVP Cyber Services, DarkMatter appeared first on Malicious Life.2018-05-3100 minSecurity All InSecurity All InBob Bigman- President, 2BSecure & former CIA CISOSam and Bob (former CISO of the CIA) alternate between the earliest days of infosec, when electromagnetic emanations were a huge concern, to how companies today deal with risk, and the simplicity of cyber hygiene The post Bob Bigman- President, 2BSecure & former CIA CISO appeared first on Malicious Life.2018-05-1800 minSecurity All InSecurity All InGary Hayslip – VP & global CISO, Webroot incComic books, information security, and family discussions of best security practices around the dinner table. Gary and Sam reminisce about their military careers and how they got started, as well as what they’ve learned about security from raising children and reading sci-fi novels. The post Gary Hayslip – VP & global CISO, Webroot inc appeared first on Malicious Life.2018-05-0200 minSecurity All InSecurity All InLaura Louthan – Founder, Angel CybersecurityCatch Sam and Laura have a lovely chat about compliance- the most bitter pill of the security world- and dive into how that makes us better security people. The post Laura Louthan – Founder, Angel Cybersecurity appeared first on Malicious Life.2018-04-2000 minSecurity All InSecurity All InScott Howitt- CISO, MGMOn our inaugural episode, we discuss with Scott the correlation between hockey and security, how the constant evolution of cybersecurity keeps newcomers to the field on their toes, and at what point in his career he decided he’s ready to go all-in on security. The post Scott Howitt- CISO, MGM appeared first on Malicious Life.2018-04-0600 minCharles TendellCharles Tendell#diversity, Echo-chambers And Being Wrong With @samjcurry Of @cybereasonIn cybersecurity we seem to have issues with a few things. The biggest is getting over what we may be doing wrong. Sam Curry of Cybereason.com joins the conversation.2017-11-0256 minModern Marketing Engine podcast hosted by Bernie BorgesModern Marketing Engine podcast hosted by Bernie BorgesMarketing Cyber Security Software through Account Based MarketingMike Volpe is the Chief Marketing Officer at Cybereason. I’ve had the privilege of knowing Mike for about ten years, and I consider him to be one of the brightest marketing minds. He combines inbound content, SEO, video, podcast and traditional marketing with account based marketing strategies to support the sales efforts at his current company, Cybereason. Mike is a very hands-on marketing executive. As a member of the founding team and CMO at HubSpot, he drove their growth from zero to 1,000 employees and 15,000 plus customers, as well as a successful IPO. Mike is also an ang...2017-10-1833 minSecurity All InSecurity All InStuxnet, part 1Where armies once fought with bullets and bombs, they now engage in clandestine, invisible warfare. In 2010 a virus was discovered that would change the world’s perception of cyber warfare forever. Dubbed Stuxnet, this malicious piece of code has a single focus- to stop to development of Iran’s nuclear program. Part one of this three […] The post Stuxnet, part 1 appeared first on Malicious Life.2017-08-3000 minCharles TendellCharles TendellGood Morning #BlackHat & the evolution of the #cybersecurity conversation Sam Curry of @cybereasonThere is a lot going on in cybersecurity and if youre not asking the right conversations, you may get lost, confused or worse someone may ask you for your advice. Sam Curry of Cybereason joins the conversation at Blackhat 20172017-07-2754 minCharles TendellCharles TendellThe #hacker community that brought down #petya and Beer With @0xAmit Of @cybereason #notpetyaThere's a growing trend in the cybersecurity community That is finally become more familiar. And more reminiscent of the hacker community some of us grew up in. In the wake of two of the largest ransomware attacks in modern history its turning out to be very good thing. ransomfree.cybereason.com2017-06-2848 minBusiness Security Weekly (Video)Business Security Weekly (Video)Amazon, Cybereason, and GreatHorn - Startup Security Weekly #45Why most startups fail, conference season tips, the question you need to ask before solving any problem, and when should you hit pause? Michael and Paul deliver updates from GreatHorn, Cybereason, Amazon, and more! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode45 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!2017-06-2752 minTraction: How Startups Start | NextView VenturesTraction: How Startups Start | NextView Ventures#33: How to Build a Marketing Team from Zero (Mike Volpe, Cybereason)This episode features two veteran marketers going deep into the ins and outs of building an initial marketing team from scratch. On the show today, Jay talks to Mike Volpe, CMO of Cybereason and former CMO of HubSpot. Follow Mike - http://twitter.com/mvolpe Follow Jay - http://twitter.com/jayacunzo Follow NextView - http://twitter.com/nextviewvc Check out Jay's other marketing show - http://unthinkable.fm Be sure to rate and review Traction on iTunes or wherever you get your podcasts. Thanks for listening!2016-12-0537 min