SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
1
Fireside Chat With Phil Venables, CISO at Google Cloud
34:05
34:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:05
In this fireside chat, we speak with Phil Venables, Chief Information Security Officer of Google Cloud. Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Offic…
…
continue reading
1
Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project
30:37
30:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:37
In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transpar…
…
continue reading
1
Fireside Chat: Abhishek Arya, Head of Google's Open Source Security Team
31:33
31:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:33
In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google’s open source and supply chain security teams. We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, research priorities, and much more. Session recoredef for …
…
continue reading
1
Palo Alto Networks Talks IT/OT Convergence
20:58
20:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:58
In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT governance structures, process integrations for IT/OT secur…
…
continue reading
1
Fireside Chat With Former Netflix Security Chief, Jason Chan
33:19
33:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:19
Enjoy this fireside chat with Jason Chan, former head of information security at Netflix and operating advisor, Bessemer Venture Partners. Jason joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on the state of vulnerability management and software development, multi-cloud deployments and expanding attack surfaces, the cyber st…
…
continue reading
1
Fireside Chat With Steve Mancini, Guardant Health
32:02
32:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:02
In this interview from SecurityWeek's 2022 Threat Hunting Summit, Steve Mancini, head of Information Security at Guardant Health, discusses his personal mission to help secure healthcare data in the cancer research space and how threat hunting and threat intelligence fits into a modern cybersecurity program. Mancini discusses a career in the cybers…
…
continue reading
1
Fireside Chat With Katie Moussouris, Luta Security
31:44
31:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:44
In this fireside chat from SecurityWeek's CISO Forum, Luta Security chief executive Katie Moussouris shares lessons from her work creating bug bounty and vulnerability disclosure programs for some of the biggest organizations in the world. Join this session to learn about the value -- and pitfalls -- of bug bounty programs, best practices around ma…
…
continue reading
1
Fireside Chat With Fidelity CISO, Adam Ely
35:04
35:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:04
Enjoy this engaging fireside chat on security leadership with Adam Ely, Chief Information Security Officer at Fidelity Investments. At SecurityWeek's 2022 CISO Forum, SecurityWeek's editor-at-large Ryan Naraine hosted a discussion with Adam on the role of the modern CISO, the challenges of building a mature risk management program, communications c…
…
continue reading
1
Should CISOs Care About Cyberwarfare?
46:15
46:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:15
For the modern CISO, it's impossible to avoid news headlines and warnings about 'cyberwar' and nation-state APT attacks that require urgent attention. From the latest zero day exploit discovery to advisories from intelligence agencies, security leaders are often overwhelmed and unable to filter through the noise to make informed decisions. In this …
…
continue reading
1
Fireside Chat With Shane Huntley, Google Threat Analysis Group (TAG)
28:36
28:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:36
Enjoy this exclusive fireside chat with Shane Huntley, head of Google's TAG (Threat Analysis Group). In this session from SecurityWeek's Threat Intelligence Summit, we have a frank discussion on the science of threat intelligence, the cloudy nature of the APT landscape, the surge in big-game ransomware and nation-state malware activity worth tracki…
…
continue reading
1
News Podcast: Pipedream/Incontroller ICS Malware Designed to Target ICS
12:24
12:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:24
[Breaking News Podcast] Sergio Caltagirone, VP of Threat Intelligence at industrial cybersecurity firm Dragos, discusses the U.S. government's joint advisory on the discovery of rare custom malware known as Pipedream/Incontroller, which is capable of doing damage to ICS/SCADA installations. Follow SecurityWeek on LinkedIn…
…
continue reading
1
Fireside Chat With McDonald’s CISO Shaun Marion
39:58
39:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:58
In this security leadership fireside chat, McDonald’s CISO Shaun Marion joins SecurityWeek’s Ryan Naraine to discuss the role of the modern CISO, the challenges of building a mature risk management program, securing multi-cloud deployments, supply chain anxieties, and much more. (Source: SecurityWeek’s 2022 Attack Surface Management Summit) Follow …
…
continue reading
1
Spotlight Podcast: F5's Corey Marshall Discusses Zero Trust
13:29
13:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:29
On this special edition of SecurityWeek's spotlight podcast, Corey Marshall, Director of Security Architecture at F5, discusses how Zero Trust can be used as a powerful strategy to help businesses stay secure amidst rapid digital transformation and expanding network attack surface. Follow SecurityWeek on LinkedIn…
…
continue reading
1
Thomas Rid on Cyberwar, Attribution and the Crypto Debate
28:01
28:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:01
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins Ryan Naraine on the podcast to discuss his new book, the lack of nuance in the crypto debate and the future of global cyber conflict. Follow SecurityWeek on LinkedInبقلم Security Conversations
…
continue reading
1
Jeremiah Grossman on the Attacker-Defender Mentality
29:50
29:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:50
Infosec veteran and former CEO of WhiteHat Security Jeremiah Grossman joins Ryan Naraine on the podcast to talk about the parallels between jiu-jitsu and computer security and the ongoing cat-and-mouse game between attackers and defenders. Follow SecurityWeek on LinkedInبقلم Security Conversations
…
continue reading
1
Podcast: Why Are Hospitals Such a Prime Ransomware Target?
21:13
21:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:13
Mike Hanley, Director of Duo Labs at Duo Security, joins Ryan Naraine on the podcast to talk about the state of security in the healthcare sector and why hospitals are such a prime target for ransomware attacks. Follow SecurityWeek on LinkedInبقلم Security Conversations
…
continue reading
1
Inside the Epic Turla Cyber-Espionage Campaign
16:30
16:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:30
Director of Kaspersky Lab Global Research & Analysis Team Costin Raiu joins the podcast to discuss the latests discoveries surrounding the Epic Turla cyber-espionage campaign. Raiu talks about the infection mechanisms used by the malware and provides a global look at victim data.Disclosure: Ryan Naraine is also a Kaspersky Lab employee. Follow Secu…
…
continue reading
1
Bluebox Labs Explains Android 'Fake ID' Vulnerability
15:53
15:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:53
Chief Technology Officer at Bluebox Security Jeff Forristal joins the podcast to discuss a significant Android vulnerability that lets hackers create a malicious application by copying the ID of a legitimate application to gain the same special privileges of the legitimate app. Follow SecurityWeek on LinkedIn…
…
continue reading
1
Talking 'Suits and Spooks' with Jeffrey Carr
20:49
20:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:49
Jeffrey Carr, founder of Taia Global Inc. and creator of the Suits and Spooks conference series, joins the podcast to talk about the evolution of the event and the marriage of business intelligence and cyber-security issues. Follow SecurityWeek on LinkedInبقلم Security Conversations
…
continue reading