Comment

Episode 23: Best & Worst Security Functions to Outsource & All Things Linux with Special Guest Tom Lawrence

Security Jabber, Episode 23

We were joined in studio by Tom Lawrence. He's the owner of Lawrence Systems, a Podcast Master, and knows everything about Linux. Tom was recently at Microsoft Ignite, and you're going to want to listen to some of his stories. The team and Tom also spent a segment discussing what the best and worst security functions to outsource are.

We're back to our weekly schedule starting October 16th, so catch us live in Studio 1 on the PodcastDetroit.com website or on-demand on iTunesGoogle Play in addition to SoundCloud.

Special Guest:
Tom Lawrence, Owner, Lawrence Systems
Tech Enthusiast, IT Business Owner, Entrepreneur, Open Source Advocate, Public Speaker, Podcaster & YouTube Creator.

Where you can find Tom
Lawrence Systems Website 
Facebook 
LinkedIn
YouTube
Sunday Morning Linux Review Podcast

Links From the Show

Buzzfeed - Three American Scientists Who Figured Out How Our Body "Clocks" Work Have Won The Nobel Prize In Medicine 

PC Mag - iPhone 8s splitting in half during charging

CNBC - Shake Shack Going Cashless

Reuters - Russian firm provides new internet connection to North Korea 

Free Code Camp - How I hacked hundreds of companies through their helpdesk

Dark Reading - Best and Worst Security Functions to Outsource

Comment

Comment

Episode 22

Comment

Comment

Episode 21: Just Patch with Special Guest Mark Phinick

Security Jabber, Episode 21

We got back into the studio this week after a short break. The team spent the first segment talking about malware hid in CC Cleaner and the fallout from the recent credit reporting agency data breach. We were then joined by special guest Mark Phinick for segments two and three. Mark gave us a couple of great stories, his insight on data security, and some really good advice. 

Special Guest: Mark Phinick, Global Sales Leader, Endpoint Security at IBM Security
Mark Phinick is a successful cybersecurity software sales leader with a consistent track record of building global, client-centric teams who exceed expectations. Throughout his career, he's partnered with CIOs and CISOs on optimizing their people, processes, and technology to protect critical assets and brand equity against cyber threats. 

Links from the Show

  1. Hackers hid malware in CCleaner software

  2. North Korean hackers are trying to steal bitcoin and other cryptocurrencies

  3. Credit Agency Breach

We're available on iTunesGoogle Play in addition to SoundCloud.

Comment

Comment

Episode 20: Tacos, Privacy, and WASTING Time

Security Jabber, Episode 20

In this week's episode, we open with Taco Bell opening a special location in the metro Detroit area and probably spend too much time thinking about tacos after. The team also covers a "story" about Microsoft's big win over the DNC hackers, spoiler alert they did but really didn't. 

We spent a good amount of time on the FBI's mega database which is more than likely housing some of your info. Finally, we closed out our show with a great discussion on the 10 time-consuming tasks security people hate.

  1. Detroit News - Boozy, fast-casual Taco Bell coming to Royal Oak
  2. The Hill - Microsoft wins major court victory against DNC hackers
  3. ZDNet - FBI can keep secret who's in its biometrics 'mega database,' says Justice Dept.
  4. Reuters - India and Pakistan hit by spy malware
  5. Dark Reading – 10 Time-Consuming Tasks Security People Hate

We're available on iTunesGoogle Play in addition to SoundCloud.

Comment

Comment

Episode 19: The One Where the Gang Covers lots of Random News

Comment

Comment

Episode 18: The Rise & Fall of a Hacker

Security Jabber, Episode 18

In this week's episode, we had really great discussions on topics ranging from hermit's to hackers. We opened the show with a story about the Northpond Hermit and how he alluded society for 26 years in the woods of Maine. Next up was drones as per the usual. The team then weighed in on the HBO hack and the dangers of unsecured printers. Finally, we ended the first segment with new regulations being proposed in the U.K. around smart car cyber protection.

Our main topic is about Marcus Hutchins, the British hacker that stopped WannaCry and rose to fame very quickly in the aftermath is now being charged in the U.S. for his role in a banking Trojan. The team had no shortage of opinions on this one.

We are on break until August 21st. What a great chance to catch up on any shows you missed.

We're available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 16: Black Hat Preview

Security Jabber, Episode 16

The team covered a lot of ground this week. We opened the podcast with a debate whether or not implanting a RFID chip in our hand is a good idea, spoiler alert, some of the guys think it's a conspiracy. A story from Forbes got us talking about Israel's position in the cyber security market as a country and in private industry. The first segment ended with a look at how Sweden potential leaked the private info of nearly all its citizens including vital military information.

Segment two was a preview of Black Hat and the results the attendee survey. Next week we'll have several guests on that attended Black Hat 2017 and hear all about what they saw. We closed out the show with a discussion on connected toys and the security risks they pose to families.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 15: Threat Hunting Returns

Comment

Comment

Episode 14: Energy Sector Threats

Security Jabber, Episode 14

On this week’s episode, we discussed the legality and ethics regarding drone software. The main topic covered was recent “revelations” that over a hundred energy plants have been comprised, including several nuclear facilities. We wrapped the show talking about Todd’s sweet retro gaming setup.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 13: Threat Hunting

We had a packed studio this week with special guest Mark Ernest to talk about threat hunting. In the opening segment, we spoke about how E-Cigarettes might be bad for your health and really bad for your data security, the new Atari gaming console, and North Korea. The last story about Crimeware-as-a-Service was a good one. You wouldn't believe the amount of havoc that is being offered by the bad guys.

In segment two we dove into the weeds with Mark on the concept of threat hunting and how it's rapidly evolving to become a significant part of building a security posture. The team was so into the topic we didn't even break for segment three.

Comment

Comment

Episode 12: Cyber Insurance

Security Jabber, Episode 12

Guest: David Derigiotis, Corporate Vice President at Burns & Wilcox
Corporate Vice President and Director of Professional Liability leading a team of highly specialized brokers and underwriters. Focus on professional, cyber, and executive liability risks and coverage solutions for clients nationally. Burns & Wilcox, the Kaufman Financial Group’s flagship organization, is North America’s leading independent wholesale insurance broker and underwriting manager. Burns & Wilcox offers wide-ranging and comprehensive solutions to serve retail insurance brokers and agents of all sizes, from the large houses to the more than 30,000 independent brokers and agents worldwide.
David’s Social: LinkedIn | Twitter



Comment

Comment

Episode 11: Incident Response, What Can You Do?

Security Jabber, Episode 11

Guest: Ray Davidson, Program Manager for Michigan Cyber Civilian Corps
The Michigan Cyber Civilian Corps (MiC3) is a group of trained cyber security experts who volunteer to provide expert assistance to enhance the State’s ability to rapidly resolve cyber incidents when activated under a Governor declared State of Emergency. The group includes volunteers from government, education, and business sectors.

The MISSION of MiC3 is to work with government, education, private sector organizations, and volunteers to create and implement a rapid response team to be activated under a Governor declared cyber State of Emergency and to provide mutual aid to the government, education, and business organizations in the State of Michigan.

Ray’s Social: LinkedIn | Twitter

Links from This Week's Episode

Comment

Comment

Episode 10: Let’s Talk About Cyber Security, What’s in the News This Week

Security Jabber, Episode 10

Security Jabber - Episode 10
LET’S TALK ABOUT CYBER SECURITY, WHAT’S IN THE NEWS THIS WEEK

Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

The Jabber Team was down as few hosts, but we still had a great show. We discussed new ways companies are using connected devices to reach you and why late people might be onto something. Finally, we really dove into cyber security policy, the IT security talent shortage and ways to address it.

Links from the Show

Comment

Comment

Episode 9: Part 3: Data Protection – Breach Response. The True Measure of Your Protection

Security Jabber, Episode 9

Security Jabber - Episode 9
Part 3: Data Protection – Breach Response. The True Measure of Your Protection.

Special Guest: Russ Gordon, Global IT Risk Management and Security, BorgWarner
Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

On this week’s podcast, we wrapped our data protection series with special guest, Russ Gordon, Global IT Risk Management and Security, BorgWarner. We started the show with a discussion around the record jail sentence given to an extradited Russian hacker. The team also covered new developments in the InterContinental Hotels Group (IHG) hack, where over 1,175 properties in the U.S. and Puerto Rico are affected.

In the second segment, we covered what to do when there’s a breach. The team weighed in on a recent study about how CISO’s are failing to keep pace with data breaches and how they prepare for data breaches. We also covered some of the ways to quantify risk and limit damages post-breach through a few different strategies.

The show  ends with an interview with special guest Russ Gordon.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 8: Part 2b: Data Protection - Layer 8, The Insider Threat

Security Jabber, Episode 8

Security Jabber - Episode 8
Part 2b of the Data Identification Series: Layer 8, The Insider Threat

Special Guest: Michael LipinskiCISO and Chief Security Strategist, Securonix
Guest Host: Jason Brown, Lab Manager / Guru of All Mystical InfoSec Things, CBI

The Security Jabber team took a little detour on our three-part series in Data Protection this week. We dove deeper into insider threats and how they just might be the biggest risk in securing data. The studio was full with again with multiple guests. Michael Lipinski, CISO and Chief Security Strategist, Securonix was our special interview host while Jason Brown, Lab Manager / Mystical Guru of All InfoSec Things, CBI also joined the team to give his perspective.

The show opened with a story about a hacker setting of all 156 emergency sirens in Dallas, is it a conspiracy, you’ll have to listen to find out. A recent release of NSA tools by the Shadow Brokers Group and how they can be used for Whitehat or Blackhat purposes is also discussed. Our second segment focused on seven ways hackers targeted your employees, the panel dove in and gave their personal experiences in using these methods when they do their Whitehat hacking. In our final segment, we interviewed Michael Lipinski from Securonix to learn about how behavioral analytics and new technologies like machine learning are changing our security practices for the better.

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 7: Part 2 of the Data Protection Series - Locking it Down

Security Jabber, Episode 7

Security Jabber - Episode 7
Part 2 of the Data Identification Series: Locking It Down

Special Guest: Joe Sturonas, Chief Technology Officer at PKWARE, Inc.
Guest Host: Brian VecciTechnical Evangelist, Varonis

In this week’s episode, we continue our three-part series focused on data protection with “Part 2: Data Protection, Locking it Down”. Our in-studio special guest and third segment interview this week is Joe Sturonas, Chief Technology Officer at PKWARE. Brian Vecci, last week’s guest, couldn’t get enough of the Jabber team and will be back for round two. 

We're also now available on iTunesGoogle Play in addition to SoundCloud.

Links from the Show

 

Comment

Comment

Episode 6: Part 1 of the Data Protection Series - Where Are Your Crown Jewels?

Security Jabber, Episode 6

Security Jabber - Episode 6
Part 1 of the Data Identification Series: Where Are Your Crown Jewels

Guest: Brian Vecci, Technical Evangelist, Varonis

In this week’s episode, we kick off the first leg of our three-part series in Data Protection, “Part 1: Data Identification, where are your Crown Jewels?”. The special guest this week is Brian Vecci, Technical Evangelist, Varonis whose LinkedIn mission statement might be one of the best I’ve seen, “Protecting you from insider threats, cyber attacks, and terrible sales presentations.” The team will also be discussing encoding data on DNA, the WikiLeaks Vault7 release, and you guessed it, more cow stuff; that’s just in the first segment! In segment two we’ll get deep into data identification and close out the show with an interview with Brian.

We're also now available on iTunes, Google Play in addition to SoundCloud.

Links from the Show

Comment

Comment

Episode 5: Build, Buy or Outsource - SOC Best Practices

Security Jabber, Episode 5

Security Jabber - Episode 5

Guest: Martin Bally, VP & CSO, Diebold Nixdorf

In this week’s episode, we tackle cows as big as elephants, not literally, but still fun. The team also will be talking about, “Build, Buy, or Outsource, Managed Services & Security Operations” with Mike Pearson, VP of Managed Services, CBI (formerly founder & CTO of SecureWorks) and special interview guest Martin Bally, VP & CSO, Diebold Nixdorf.

Comment

Comment

Episode 4: We interview Lance James, Chief Scientist for Flashpoint

Security Jabber, Episode 4

Security Jabber - Episode 4

Guest: Lance James, Chief Scientist at Flashpoint

A journey begins with a single step, our podcast begins with a single question and quickly finds a way to jump of the path to cover everything from patch Tuesday, to RSAC, and that time hackers “swatted” the wrong guy.

This week’s episode is jam packed with all things cyber security. We had Lance James, Chief Scientist at Flashpoint on from the get go and spoiler alert, he didn’t disappoint. The team dove into the stories of the week and among them was an update to Brian Krebs getting swatted in 2013, turns out Lance helped Brian track down the bad guys and help get justice served.

We also talked about the RSA Conference and what the future of cyber security looks like. There are plenty of links below so you can see the coolest booths, best bloggers, and how a few people left their WiFi vulnerable on the show room floor.

In segment three Lance reveals his connection with the hit show Mr. Robot, listen to find out what it is.

Links from this week’s stories

Comment

Comment

Teen hacks 150,000 printers

Comment