This episode is an interview with intelligence analyst Judy Towers and Michael Goedekr, CEO of hackdefnet, conducted over the summer at DEFCON 25 in Las Vegas (2017). Judy and Michael share their thoughts on threat intelligence, risk analysis, dealing with C suite executives and more.
My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!
Another year, another wave of security incidents and threat models to keep the cybersecurity industry busy. So there was plenty to discuss and share as the InfoSec community flocked to San Francisco for the annual RSA Conference last month.
A view from the escalator as I descend into the bowels of RSAC 2017.
As always, the latest trends in the industry were addressed. Large data breaches, quickly growing threat models, security education, political hacking, and the risks posed by the Internet of Things were common threads throughout many of the keynotes, sessions, workshops, expos, and general chatter among attendees.
RSAC has more of a trade show feel compared to other security conferences so I’ve learned over the years that it’s best to approach the conference as an opportunity to meet and network with industry experts. This year I spent less time attending the talks and more time meeting with the players in the industry who are there to make deals and form partnerships.
However, I did catch several enlightening talks and panel discussions featuring the likes of ex-CIA operative Valerie Plame, security guru Bruce Schneier, researcher Rob Graham, people-security expert Masha Sedova, and security consultant Jeff Carr. Also enjoyed the entertaining keynotes by Late Night host Seth Meyers and astrophysicist Neil deGrasse Tyson.
Throughout the week I was lucky to catch up with several industry professionals representing some of the top tier firms in the cybersecurity sector who shared their take on the challenges and trends facing cybersecurity firms, their clients, and end users.
This episode of the podcast features interviews collected at RSAC 2017.
This episode breaks down last week’s online Q & A between Twitter CEO Jack Dorsey and infamous NSA whistle blower Edward Snowden on Periscope. The event, promoted by the organizers of the campaign Pardon Snowden, featured a lengthy discussion on privacy and the role of social media in sharing user data with law enforcement and intelligence agencies.
Jacob Young – who submitted a question to Snowden and had it answered, sorta.
The event also included questions from Twitter users. Jacob Young, a software engineer and privacy advocate, was one of the lucky users who submitted a question and had it answered by Snowden during the event. Jacob joins the podcast to give his reaction to Snowden’s answer to his question and also shares his thoughts on mass surveillance, privacy and more.
If you are curious about the Snowden Q&A in question and want to view the event in it’s entirety, here’s a link to the Periscope video: https://www.periscope.tv/w/1vOxwgnXeYLxB
Jon aka “@wvualphasoldier” is a security researcher, consultant, policy advisor and former US military PSYOP soldier. He served on and off the battlefield in Iraq and Afghanistan. We discuss the recent Shadow Brokers auctioning of computer network exploits which are alleged to have been stolen from NSA linked security firm, Equation Group.
TOPICS INCLUDE: Shadow Brokers, Equation Group, NSA, PSYOP, atmospherics, military intelligence, deception operations, propaganda, patriot hackers, The Jester, ISIS, Junaid Hussain (aka TriCk), Edward Snowden, Zipa Dux, insider threat vs. outside attacker theories, attribution, @thegrugq, Takashi Shimura, Rashomon and more!
He joins Vince to discuss attribution in the wake of the DNC email leaks which are being attributed to cyber espionage by Russian intelligence agencies. Jeff recently wrote a medium post in response to attribution of the DNC hacks to the Russian government.
TOPICS INCLUDE:
Coastguard radioman :: stylistic analysis :: Shlomo Argamon :: Attribution :: Sony Pictures hack :: North Korea :: Russian hackers :: language analysis :: DNC leak/hack :: Thomas Rid :: Crowdstrike :: Fire Eye :: APTs :: cyber espionage :: Ukraine :: Swift on Security