Jeff Reed is Senior Vice President of Product for Cisco’s Security Business. He oversees product management, customer success and technical marketing for the industry’s leading security portfolio.
I interviewed Jeff at the RSA Security Conference in San Francisco earlier this year and we discussed what’s new with CISCO including their recent acquisition of Duo Security, 2FA, cloud security, zero trust, how Jeff got into security, and his prediction on when we can expect the robot apocalypse.
Patrick Knight is Senior Director of Cyber Strategy and Product Management at Veriato. For over 17 years Patrick has worked for major security leaders developing products and guiding online security policies, including encryption, network intrusion detection and anti-malware threat protection technologies. At Veriato, he is helping organizations across the globe protect sensitive data from risks posed by insiders. Prior to entering the online security industry, he spent 12 years in national security in the U.S. Intelligence Community.
Patrick joined me to speak about insider threats and discuss some of the findings in the recently released Insider Threat Program Maturity Model report by Veriato. The report provides insight into how organizations today are addressing the threat of insiders. By looking at how factors like program support, budget, the presence of a formal team, and privacy impact program maturity, this report can provide a better understanding of what conditions are necessary to achieve the most effective program possible.
The Insider Threat Program Maturity Model provides organizations with a way to benchmark their current ability to monitor, detect, mitigate, and respond to insider threats. The Maturity Model also helps to determine a path to further mature the existing program towards a metrics-centric, optimized program.
Adam Kujawa, Director of Malwarebytes Labs, is a computer scientist with experience in reverse engineering and malware analysis. He has worked at a number of United States federal and defense agencies, helping these organizations reverse engineer malware and develop defense and mitigation techniques. Adam has also previously taught malware analysis and reverse engineering to personnel in both the government and private sectors.
Josh Mayfield is Director of Security Strategy at Absolute. Josh works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
Marcus J. Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. He describes himself as a hacker who helps people not suck at cybersecurity. He started his technology voyage in U.S. Navy Cryptology and later went on to refine his knowledge while working at the National Security Agency (NSA).
Marcus sat down with me at the RSA Security Conference in San Francisco in March to discuss his path to a career in cybersecurity, the NSA, Edward Snowden, his book Tribe of Hackers, the future of the cybersecurity industry and much more.
Rachel discusses (and demonstrates) the art of “vishing” and social engineering. She placed 2nd twice in the Social Engineering Capture the Flag competition at DEFCON 24 and DEFCON 25 and has become a popular speaker and advocate for personal and organizational safety through social engineering awareness.
My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!
This episode is on Dataminr, a New York-based startup, which is authorized to analyze the entire Twitter “Firehose” of all live tweets and offer clients advanced social media analytics as a service in the form of digests and news updates.
Exclusive access to information and data feeds, which include Twitter’s raw live tweets, allows Dataminr to filter the data to identify important events and business trends as they unfold and also act as an early warning system for major events like terrorist attacks, natural disasters and other public emergencies.
Dataminr is Twitter’s only data partner that is also allowed to resell the complete stream of tweets and their clients include large hedge funds, mainstream news outlets, public relations firms, publicly traded corporations and major government entities including, law enforcement and intelligence agencies.
The DHS, FBI, and CIA have used the service to help with tracking criminals and terrorists, but have also drawn the ire of the ACLU, who have challenged the use of Dataminr’s services by government agencies to monitor domestic protests.