HACKED: Into the minds of Cybersecurity leaders show

HACKED: Into the minds of Cybersecurity leaders

Summary: We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Talking cybersecurity with nexus IT Security group
  • Copyright: All rights reserved

Podcasts:

 The profession of Penetration Testing with John Strand | File Type: audio/mpeg | Duration: 00:30:35

In this episode of HACKED, Ben talks with the owner of Penetration Testing firm, Black Hills Information Security about the business and profession of pen testing and their incident response card game

 Talking Artificial Intelligence and Bots with David Yakobovitch from the HumAIn Podcast | File Type: audio/mpeg | Duration: 00:55:02

In this podcast, Ben chats with David Yakobovitch, a Data Scientist and host of the HumAIn Podcast. The conversation covers the ethics behind Artificial Intelligence, Robots and the importance of higher education in the field.

 Paul McGough from Qwyit talks about the evolution of InfoSec and what’s important in today’s market | File Type: audio/mpeg | Duration: 00:37:24

Paul McGough is an industry veteran having been on the forefront of cybersecurity with the government in the 80’s. He has seen the evolution of hackers, the profession, and how skills are defined. We also debate certifications vs. experience and how it plays into todays job market. Paul shares some great ideas on how complexity may not be the best option for security. We dive into the company he co-founded, Qwyit, how they have simplified processes (in IoT and Telecom) and the importance of encryption. Learn more about Qwyit’s solution at Qwyit.com.

 Aaron Rinehart talks Chaos Engineering, ChaoSlinger, and objective monitoring of security components | File Type: audio/mpeg | Duration: 00:40:31

We dive deep into Chaos Engineering’s use in security and Aaron Rinehart’s brain child, ChaoSlinger. Aaron dives into the impact of objective monitoring for security components and techniques for learning how components actually function in the environment. We also dive into the difference between building a program based on regulations vs. building as an engineering discipline. You can find more on Aaron Rinehart and ChaoSlinger on LinkedIn at Aaron Rinehart and on Twitter @aaronrinehart.

 Travis Baker talks about recruitment at a unicorn Infosec firm | File Type: audio/mpeg | Duration: 00:47:38

Travis Baker and Ben go back in forth about recruitment techniques given the unique landscape of the security profession. We talk about how candidates are consumers, techniques for proactive recruitment, effectively identifying key skills, non-traditional talent, and why culture can make or break your recruitment efforts. We also dive into effective relationships between the hiring team and HR/Talent acquisition and how candidates can be smart consumers as they navigate the job market.

 Allen Burzen talks the evolution of data breaches, post breach response, and sharing breach insight | File Type: audio/mpeg | Duration: 00:33:12

Allen Burzen experienced first-hand the impact of having your identity stolen. He has now taken his misfortune and made it his mission to help others who have been impacted in a similar way. Having lead a post-breach incident response team, he shares insight to the evolution of data breaches, how they are advancing, how to build and test a post breach response, and why, as a community, we need to talk about these sensitive issues.

 E.J. Hilbert talks FBI Cyber Crime unit, why education is lagging, and so much more | File Type: audio/mpeg | Duration: 00:53:30

Come take a dive into the minds and motivations of Black Hats from across the world. E.J. Hilbert shares stories and insights of his time in the cyber crime unit of the FBI, being on the forefront of identify and financial data theft, and working with Max Popov, a Ukrainian prisoner shackled to a conference room desk at Ant City. We also dive into Infosec education and why higher education has been slow to adopt it as a major as well as why physical/personnel security and information security are one in the same. If you want to read more about E.J.’s time with Max Popov and Ant City, here is the link: https://www.wired.com/2016/05/maksym-igor-popov-fbi/

 Chris Barnes shares everything you need to know about cybersecurity for SMB’s | File Type: audio/mpeg | Duration: 00:33:15

Ben chats with Chris Barnes about the importance of cybersecurity for small to mid-sized business. Chris talks about his SMB advisory practice, threat landscape for SMB’s, ways to build an effective program with few to no resources, and the importance of a trusted advisor when building a program. During Overrated/Underrated, we get his take on security vulnerabilities with Amazon Alexa/Google Home and building backdoors into applications.

 Sandra Crosswell, CISO @sonicwall, talks Red Teams, hiring pen testers and much more | File Type: audio/mpeg | Duration: 00:38:35

Sandra Crosswell, CISO/CSO @sonicwall joins the HACKED podcast. We dive deep into Red Teams and all sorts of penetration testing topics. She gives an inside look to her role and the challenges of being the first individual in the seat. Additionally, she shares her thoughts on the talent gap and hiring penetration testers. During Overrated/Underrated, we get her opinion on hacking certifications and black hats moving into corporate roles.

 Joshua Danielson, CISO at Copart, gets grilled on all sorts of Infosec topics. | File Type: audio/mpeg | Duration: 00:20:43

On this episode of HACKED: Into the Minds of Cybersecurity Leaders, Ben gets to grill Joshua Danielson (CISO at Copart) on all sort of topics in Infosec. We discuss end user training programs, vulnerabilities and vulnerability management, establishing effective relationships with the C-suite, and the future of the CISO role. During Overrates/Underrated, Josh shares a different view on penetration testing and the mac ROOT vulnerability.

 Brett Kelsey-VP at McAfee talks autonomous vehicles, the talent gap, and future security solutions | File Type: audio/mpeg | Duration: 00:42:31

Brett Kelsey, VP and Chief Technology Strategist at McAfee, gives an alternative view on the security talent gap. We dive deep into security challenges with IoT and autonomous vehicles, ethics behind ransomware, and solutions that have potential to shake up the industry. During overrated/underrated, Brett shares his opinion on public cloud and the Amazon Key.

 Todd Thomas chats about security and compliance in healthcare and AI solutions | File Type: audio/mpeg | Duration: 00:21:58

On this episode, we chat with Todd Thomas. Todd is the CIO at Austin Radiological Association and has been in the healthcare industry for over 20 years. We chat about compliance and how that impacts IT strategy, AI tools, and how security solutions can impede caregivers workflow. During overrated/underrated, we get his take on every IT role being a security position and ransomware within healthcare.

 SMU’s CSO, George Finney discusses security theories, teaching cyber, and security awareness | File Type: audio/mpeg | Duration: 00:37:52

On this episode of HACKED, we pick the mind of Southern Methodist University’s Chief Security Officer and prolific Author, George Finney. George discusses academic cybersecurity theories such as the Happy Gilmore Effect and how cybersecurity fits into Maslow’s Hierarchy of Needs. We also talk about security awareness and end user training techniques. During overrated/underrated, we get his take on physical penetration tests and the importance of certifications.

 Brian Clinkenbeard, the best hacker you have never heard of | File Type: audio/mpeg | Duration: 02:33:54

Brian Clinkenbeard, the best hacker you have never heard of, takes a deep dive into the technology and root cause of the biggest breaches in history. Having hacked into Texas Instruments mainframe in the mid 80’s, we get a view into the creation of hacking and identity theft. This one is for you die-hard security professionals – filled with stories that will make you think deeply and question everything. All of Brian’s quirky personality traits shine through with his real-world examples of technology and security challenges. If you are pro-technology and question the importance of end user training, tune in.

 Aaron Blackstone talks threat intelligence, growth in the security profession, and talent retention | File Type: audio/mpeg | Duration: 00:51:04

On this episode of HACKED, we are joined by Aaron Blackstone who is the CISO for the Texas Department of Public Safety. With a background in the military and the FBI, he rose to the CISO level in under nine years. We talk about threat intelligence, how he grew into the CISO role so quickly, and ways to retain top talent. During overrated/underrated, we get his thoughts on Blockchain and BYOD.

Comments

Login or signup comment.