Look for any podcast host, guest or anyone
Showing episodes and shows of

Frank Breedijk

Shows

CISO praatCISO praatSPECIAL: Frank Breedijk over security incidentenIs een storing onder kwade actor een incident in de zin van informatiebeveiliging?Enige tijd geleden hebben we daar op LinkedIN een stevige discussie over gevoerd en heb ik er een poll tegenaan gegooid. De meningen zijn verdeeld.Een CISO waar ik een tegengestelde mening van leek te hebben was Frank Breedijk, top-CISO van Schuberg Philis. Daarom nodigde ik Frank uit voor een CISO praat special over wat nu eigenlijk een informatiebeveiligingsincident is.Is daar altijd kwaadaardige opzet voor nodig? Hoe strak moeten we eigenlijk beschikbaarheid, integriteit en vertrouwelijkheid van informatie interpreteren? 2025-06-1658 minThe International Risk PodcastThe International Risk PodcastEpisode 217: The Risks and Opportunities of AI with Frank BreedijkToday we discuss the risks and opportunities of AI with Frank Breedijk. Dominic and Frank discuss the biases of AI, whether AI will pose an imminent threat to jobs or not, whether AI usage can be ethical or not, environmental consequences of AI, the rise of scams with AI usage, and much much more!Tune in now!Frank Breedijk is the Chief Information Security Officer (CISO) at Schuberg Philis. In this role he has three objectives, (1) making Schuberg Philis more secure, (2) making our customers more secure, and (3) developing Schuberg Philis' security business. Building relationships with...2025-03-2435 minDoes Logistics Matter?Does Logistics Matter?Episode 028 - Cyber Threats In Supply Chain And LogisticsAnswering YES to the question today is Frank Breedijk, Chief Information Security Officer at Schuberg Philis. In this episode, we talk about: * How hackers hack into corporate systems and installations * Examples of actual cybersecurity attacks in supply chain and logistics * What you can do to prevent being hacked * And what you need to do when you do get hacked Please enjoy my conversation with Frank Breedijk Do you want to be a guest on the Does Logistics Matter? Podcast? Send us an e-mail to podcast@logisticsmatter.com.2022-10-3041 minDoes Logistics Matter?Does Logistics Matter?Episode 028 - Cyber Threats in Supply Chain and LogisticsAnswering YES to the question today is Frank Breedijk, Chief Information Security Officer at Schuberg Philis.In this episode, we talk about:How hackers hack into corporate systems and installationsExamples of actual cybersecurity attacks in supply chain and logisticsWhat you can do to prevent being hackedAnd what you need to do when you do get hackedPlease enjoy my conversation with Frank BreedijkDo you want to be a guest on the Does Logistics Matter? Podcast? Send us an e-mail to podcast@logisticsmatter.com.2022-10-3041 minChaos Computer Club - archive feedChaos Computer Club - archive feedIOT: International Outage Technology (Disclosure of DIVD-2022-00009) (MCH2022)DIVD researcher Jelle (aka SchizoDuckie) has a hobby. He likes to find credentials in places where they don't belong, like GitHub and Postman. And this hobby has gotten him into many places he should not have, like the Dutch Tax office and many larger company. But, in February 2022 he found an account with an even bigger reach, an account who's abuse could mean trouble for our national critical infrastructure. His simple GitHub query uncovered a secret that could switch off a country, now what... While Jelle is enjoying his vacation his DIVD colleagues, Chris van 't Hof, Célistine Oosting a...2022-07-2418 minThe Ransomware FilesThe Ransomware FilesKaseya and REvilThe REvil ransomware gang's attack against the US software company Kaseya in 2021 is not only amongst the largest ransomware attacks of all time, but it's also one of the most intriguing. It involves the use of zero-day software vulnerabilities known only to a handful of people, a race between attackers trying to snare ransom payments and defenders developing a patch, and a secret operation that hacked back against the REvil hackers. And in the end, a rare action happened: Someone was actually arrested. This episode of The Ransomware Files also coincides with the release of new technical information from...2022-04-0446 minransomware – The Security Ledger with Paul F. Robertsransomware – The Security Ledger with Paul F. RobertsEpisode 220: Unpacking The Kaseya Attack And Securing Device Identities on the IoTIn this episode of the podcast, sponsored by Trusted Computing Group we dig deep on this week’s ransomware attack on the Kaseya IT management software with Adam Meyers of CrowdStrike and Frank Breedijk of the Dutch Institute of Vulnerability Disclosure. Also: Tom Laffey, a product security strategist at Aruba, a Hewlett Packard Enterprise firm, and co-chair of the Network Equipment working group at TCG about how that group is adapting its technology to make it easier for new generations of connected devices to attest to their integrity. The post Episode 220: Unpacking The Kaseya Attack And Securing De...2021-07-0952 minCyberheldenCyberheldenCyberhelden 27 - KaseyaAfgelopen weekend werden we opgeschrikt door wat mogelijk de grootste ransomware aanval ooit had kunnen worden. De Russische groep REvil misbruikte een kwetsbaarheid in Kaseya VSA beheersoftware die door duizenden ICT beheerders gebruikt wordt om hun klanten te beheren. Ik praat met cyberhelden Wietse Boonstra en Frank Breedijk van DIVD die uitvoerig vertellen over hun rol in het stoppen van de aanval.2021-07-0837 minNOS op 3 Tech PodcastNOS op 3 Tech PodcastDuizenden bedrijven te hacken door bug in Citrix en Trump vs Apple0:00 Duizenden bedrijfsnetwerken kunnen kinderlijk eenvoudig worden gehackt door een kwetsbaarheid in software van Citrix. Misschien gebruik jij dat ook wel bij jouw bedrijf of werkgever. Het lek kan ernstige gevolgen hebben, vertelt onderzoeker Frank Breedijk, oprichter van het Nederlands Security Meldpunt. 22:08 Moet Apple een achterdeurtje inbouwen in iOS, zodat veiligheidsdiensten je telefoon kunnen ontgrendelen? De Amerikaanse president Trump vindt van wel. Hij is boos op Apple omdat hij vindt dat het bedrijf niet meewerkt in het onderzoek naar een terreurverdachte. Apple kijkt daar anders naar, in de podcast hoor je beide kanten. 29:59 Het is heel vervelend als jouw gezicht opduikt...2020-01-1647 minFIRSTCON PodcastFIRSTCON Podcast2011.6: Frank Breedijk & Ian Southam of Schuberg PhilisFrank Breedijk and Ian Southam talk to Chris John Riley about their upcoming presentation, "The road to hell is paved with best practices." Do you achieve compliance through security or security through compliance? Frank and Ian are both mission critical engineers with Schuberg Philis. See their presentation on Friday, 17 June 2011 at 1330 in the Rock Track.2011-06-1600 minDEF CON 18 [Video] Speeches from the Hacker Convention.DEF CON 18 [Video] Speeches from the Hacker Convention.Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy WayAs part of his job as Security Engineer at Schuberg Philis, Frank Breedijk performs regular security scans. The repetitive nature of scanning the same customer infrastructure over and over again made him decide to look for a more automated approach. After building his first scanning scheduler he realized that it actually does not make sense to look at all findings every time they are reported. It would be much better to only investigate the deltas between the scans. The philosophy behind Seccubus was born.In his presentation Frank will demonstrate Seccubus by performing scans of a live demo...2010-10-0830 min