show episodes
 
C
Cyber Security Inside

1
Cyber Security Inside

Tom Garrison and Camille Morhardt

Unsubscribe
Unsubscribe
Weekly
 
Cyber Security is no longer a topic that is addressed only by programmers and coders. CISOs and their executive peers need to think about “cyber security” differently. In this podcast, Tom Garrison, Vice President and GM of Client Security Strategy and Initiatives, and co-host Camille Morhardt, Director of Security Initiative & Communications, will discuss relevant topics in clear, easy to understand language. This podcast is intended for security experts and businesspeople alike. We will ha ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Loading …
show series
 
In this episode of Cyber Security Inside What That Means, Camille Morhardt jumps into the non-fungible token (NFT) conversation with Mic Bowman, Senior Principal Engineer at Intel. The conversation covers: - What an NFT is, with several examples - How an NFT is purchased and traded - How owning an NFT is different from owning the asset the NFT is c…
 
In this episode of Cyber Security Inside, Camille and Tom get into the biggest cybersecurity topics of the past year with Maribel Lopez, Founder and Principal Analyst at Lopez Research. The conversation covers - The large scale attacks on infrastructure this year on a wide range of companies. - Where the attacks were occurring to have the biggest i…
 
In this episode of Cyber Security Inside What That Means, Camille talks with Roman Zhukov, Product Security Manager at Intel about Security Champions and their roles in product development. The conversation covers: - What a Security Champion is, and what they do in a product team. - How the role of a Security Champion has changed over time with new…
 
In this episode of Cyber Security Inside, Camille and Tom revisit the best pieces of cybersecurity advice from experts they have interviewed throughout the year 2021. This advice is for users, companies, and manufacturers. They talk about: - Always being prepared for the worst-case security scenario, such as the SolarWinds attack. - Accountability …
 
In this episode of Cyber Security Inside, Camille talks with undergraduate students Ifesi Dimma Onubogu, Isabella Siu, and Sarah Schaber, Princeton-Intel 2021 Alumni and participants in the Research Experience for Undergraduates Program. The conversation covers: - How undergraduate students got interested in the field of cybersecurity and privacy, …
 
Have you been hearing about the new Infrastructure Bill that passed Congress? Are you curious about what moves the government is making to address the semiconductor shortage? In this episode of Cyber Security Inside, Camille and Tom get into the Infrastructure Bill recently signed into law with Jason Oxman, President and CEO, Information Technology…
 
In this episode of Cyber Security Inside, Camille and Tom discuss the intent behind and the possible implications of the CHIPS Act and how it could impact the shortage of semiconductors. Their guest is Ollie Whitehouse, Group CTO for NCC Group. Among the topics they discuss: - What is the CHIPS Act? - If the CHIPS Act is passed, how will it impact …
 
In this episode of What That Means, Camille discusses data anonymization with Kristin Ulrich, Senior Solutions Specialist at SAP for HANA architecture. Find out why data privacy should matter to you. The conversation covers: - What data anonymization means - The difference between pseudonymization and anonymization - What questions you need to ask …
 
In the spirit of Thanksgiving Tom and Camille highlight the work their guests are doing that they are thankful for — including ethical considerations of AI, why the race for AI is one of most important for humankind, and how academia and the cyber security industry can work together. The conversation covers: - Leading thoughts on AI - Ethical consi…
 
The kinds of personal information we put out there may seem safe today, but what about five, ten, twenty or thirty years down the line? On this episode of #CyberSecurityInside, Tom and Camille are joined by guest Alex Ionescu, a founder of Windsider Seminars & Solutions Inc. and the previous VP of Endpoint Engineering at CrowdStrike, to talk about …
 
In Episode 80, Josh Amishav talks about the pyschological warfare that is being waged against various ransomware gangs, developments to Darkside, REvil and Blackmatter, Russia's handling of cyber criminals, using stealer log combo lists as part of your OSINT investigations and more. For more information, including the show notes check out: https://…
 
Supply chain security has taken on new importance, especially in a post-COVID world; from healthcare to finance, the cybersecurity threats posed to people’s lives are very real. On this episode of Cyber Security Inside, Tom and Camille are joined by Rick Martinez, Sr. Distinguished Engineer, Office of CTO at Dell Technologies, and John Boyle, Cyber…
 
In Episode 79, Josh Amishav chats with Mike Murr about the science behind social engineering, micro-expressions, FACS, which is the Facial Action Coding System, Common mistakes made during SE engagements, manipulation techniques and more. For more information, including the show notes check out: https://breachsense.io/podcast…
 
There are infinite vulnerabilities out there that make us susceptible to instances of cyberattack, and as of this year, we’re on track to have identified 20,000 of them. While there’s a whole risk mitigation ecosystem in place, CVE (formerly known as the Common Vulnerabilities and Exposures Program) has played a huge role in establishing a dictiona…
 
In Episode 78, Josh Amishav does a solo adventure to talk about the thought process behind launching the Breachsense Darkweb API. The three main takeaways from the episode are: How ransomware has become a life and death issue What effect shutting down the REvil gang has had The 3 most common initial attack vectors used in ransomware attacks For mor…
 
Why would a tech employee turn to e-crime? Well, often it has to do with feelings of discontentment within their jobs or their lives. How, then, can companies best mitigate insider threats? On this episode of #CyberSecurityInside, Tom and Camille are joined by guest Rick Jordan, CEO and Founder of ReachOut Technology, to take a deep dive; if you’re…
 
In Episode 77, Josh Amishav talks with Nate Warfield about threat intel, CTI League and cloud risk. My three main takeaways from the episode are: How to use tags to easily search Shodan for systems vulnerable to specific CVEs The most common threats the medical sector faces A couple of interesting techniques he uses to collect threat intel For more…
 
As the technological landscape moves ever onward and upward, it can be difficult for legislation to keep up. How is security policy trying to keep in stride, especially when certain aspects are viewed differently around the globe? On this episode of What That Means, Camille is joined by Dr. Amit Elazari Bar On, Director, Global Cybersecurity Policy…
 
In Episode 76, Josh Amishav chats with Chris Dale about several techniques to associate a given asset back to a company. Three takeaways from the episode are: How to generate a custom wordlist for brute forcing your target A bunch of methods to correlate associated company assets via things like the DOM, JARM and TLS How to automate vulnerability d…
 
When gaming first began as a concept, there wasn’t any of the sort of connectivity we see today in terms of being able to play with others online; it was just a controller, a console, and a TV. Simple. Now, of course, the landscape has drastically changed. How has that affected cybersecurity? On today’s episode of What That Means, Camille is joined…
 
In episode 75, Jeff Man joins us to talk about his time in the NSA, PCI, Hak4Kidz and content creation. My 3 main takeaways were 1) What red teaming was like in the 80s 2) Why PCI gets a bad reputation and 3) His tips for giving great conference talks. For more information, including the show notes check out: https://breachsense.io/podcast…
 
As technology rapidly evolves, there is an ever-growing list of vulnerabilities that companies should take seriously with regard to security. So, why are so many of them still so immature in their attitudes towards protection? On this episode of #CyberSecurityInside, Tom and Camille are joined by guest Todd Weber, Operating Partner and Chief Techno…
 
Federated learning is relatively new, but it stands to have a huge impact on the machine learning landscape, especially as it applies to healthcare. On today’s episode of What That Means, Camille is joined by Olga Perepelkina, PhD, a Deep Learning Product Manager at Intel, to find out exactly how this field is projected to change the world. They co…
 
How do you get over the fear of betting on new trends? What makes a great leader? And how do you keep your chin up when your ideas are ridiculed? On this episode Tom and Camille go straight to the source and answer these questions with guest Mooly Eden - Board Member, Speaker, Former Intel Executive, and all-around fantastic innovator and leader. M…
 
In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information…
 
Threat modeling is a vital part of the product development process, and it truly never ends. Camille takes a deep dive on today’s episode of What That Means; she is joined by Jonathan "Jonny" Valamehr, Principal Engineer at Intel, and Dina Treves, Senior Very Large Scale Integration (VLSI) Engineer at Intel, to find out things like which thought pr…
 
Hacking is often associated with bad behavior, but there are some good guys out there who help to ensure products aren’t exploited by ill-intentioned parties. This is part of the offensive security research (OSR) process. On this episode of What That Means, Camille speaks with Jason M. Fung, Director, Offensive Security Research & Academic Research…
 
In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information…
 
Firmware-based attacks are some of the hardest to detect, which is what makes them so dangerous; once someone has control over your hardware, they can do just about anything. In this episode of Cyber Security Inside, CEO and founder of Eclypsium Yuriy Bulygin joins Tom and Camille to share his expertise on the topic, offering a comprehensive view o…
 
In episode 72, Nathan Sweaney joins us talk about the future of privacy. My 3 main takeaways were 1) Who's collecting our bluetooth and wifi signals 2) How to get your talk accepted to a security con and 3) How he used OSINT to steal (in air quotes) his twitter handle from a Nazi. For more information, including the show notes check out: https://br…
 
You may have played capture the flag as a kid, but did you know it’s a term that also applies to cybersecurity? Capture the flag (CTF) events ask teams to hack into devices in order to detect vulnerabilities, and in this episode of Cyber Security Inside, Camille Morhardt gets into the details with award-winning academics Ahmad-Reza Sadeghi, who is …
 
As we continue to navigate a global pandemic, the security of medical devices and hospitals is especially pertinent. Camille explores this timely topic in the latest episode of What That Means; she is joined by three well-versed guests to dig in - Matt Russo, who is Senior Director of Product Security at Medtronic, a major medical device manufactur…
 
In episode 71, Peter Taylor "The Fraud Guy" joins us talk about various aspects of fraud. My 3 main takeaways were 1) The common types of fraud he sees in his investigations 2) How Covid has influenced the fraud space and 3) Why aged shell companies and email addresses are so valuable For more information, including the show notes check out: https:…
 
We’re all familiar with home and auto insurance, but cyber security insurance? It’s vital to have if you’re a mid-size or above company looking to mitigate risk. In this episode of Cyber Security Inside, Malcolm Harkins joins Tom and Camille again to unpack it all. Now the Chief Security and Trust Officer at Epiphany Systems, Malcolm’s over thirty-…
 
In episode 70, Volodymyr "Bob" Diachenko joins us talk about his research around open databases. My 3 main takeaways were 1) How he finds open databases 2) How he stays on the legal side when verifying his research and 3) Some cyber hygiene tips to prevent allowing unauthorized access to your critical infrastructure For more information, including …
 
In this episode of What That Means, Camille is joined by Chloe Autio, who works in the Public Policy Group at Intel; she sheds light on the concept of responsible AI, a governance framework that takes ethics into account in the development and regulation of emerging technologies. A fascinating and timely topic, so be sure to tune in. We cover: - Wh…
 
In episode 69, James Linton joins us talk about his email pranking days and Business Email Compromise in general. My 3 main takeaways were 1) some tactical tips on how he gained rapport on the initial contact 2) common risks associated with email related fraud and 3) how to protect yourself against email scams For more information, including the sh…
 
At first glance, it might not seem like a sports background has anything to do with getting into a cybersecurity career. But according to Charlie Shreck, a former professional cricketer turned Head of Engineering for Redscan, there’s a lot of crossover between the two worlds. He speaks with Camille and Tom about the specific areas of overlap on thi…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login