Jeff Reed is Senior Vice President of Product for Cisco’s Security Business. He oversees product management, customer success and technical marketing for the industry’s leading security portfolio.
I interviewed Jeff at the RSA Security Conference in San Francisco earlier this year and we discussed what’s new with CISCO including their recent acquisition of Duo Security, 2FA, cloud security, zero trust, how Jeff got into security, and his prediction on when we can expect the robot apocalypse.
Patrick Knight is Senior Director of Cyber Strategy and Product Management at Veriato. For over 17 years Patrick has worked for major security leaders developing products and guiding online security policies, including encryption, network intrusion detection and anti-malware threat protection technologies. At Veriato, he is helping organizations across the globe protect sensitive data from risks posed by insiders. Prior to entering the online security industry, he spent 12 years in national security in the U.S. Intelligence Community.
Patrick joined me to speak about insider threats and discuss some of the findings in the recently released Insider Threat Program Maturity Model report by Veriato. The report provides insight into how organizations today are addressing the threat of insiders. By looking at how factors like program support, budget, the presence of a formal team, and privacy impact program maturity, this report can provide a better understanding of what conditions are necessary to achieve the most effective program possible.
The Insider Threat Program Maturity Model provides organizations with a way to benchmark their current ability to monitor, detect, mitigate, and respond to insider threats. The Maturity Model also helps to determine a path to further mature the existing program towards a metrics-centric, optimized program.
Adam Kujawa, Director of Malwarebytes Labs, is a computer scientist with experience in reverse engineering and malware analysis. He has worked at a number of United States federal and defense agencies, helping these organizations reverse engineer malware and develop defense and mitigation techniques. Adam has also previously taught malware analysis and reverse engineering to personnel in both the government and private sectors.
Josh Mayfield is Director of Security Strategy at Absolute. Josh works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
Sivan Rauscher is the Co-Founder and CEO of SAM Seamless Network. Previously, Sivan worked at Comsec Global, overseeing cyber projects and high-level strategic consulting in Israel and Europe. Prior to Comsec Global, she served as a Captain and project manager in the Israeli Intelligence Corps. Sivan holds a master’s degree from the Interdisciplinary Center in Herzliya.
In this interview we discuss Sivan’s experience in the Israeli Intelligence Corps, her work at SAM Seamless Network, securing IoT devices at home, artificial intelligence, the future of cybersecurity and more!
Marcus J. Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. He describes himself as a hacker who helps people not suck at cybersecurity. He started his technology voyage in U.S. Navy Cryptology and later went on to refine his knowledge while working at the National Security Agency (NSA).
Marcus sat down with me at the RSA Security Conference in San Francisco in March to discuss his path to a career in cybersecurity, the NSA, Edward Snowden, his book Tribe of Hackers, the future of the cybersecurity industry and much more.
This episode’s guest is North Carolina based security researcher and podcast host Charles Tendell. He joins the podcast to discuss his path to a career in cybersecurity, his experience dealing with Hurricane Florence, Hacker’s List, social engineering, political correctness, virtue signaling, racism, dating apps, cybersecurity pet peeves, Twitter drama, laying the pipe and more!
Benjamin Caudill and Spencer Gietzen of Rhino Security Labs join me to discuss their research on Amazon Web Services privilege escalation vulnerabilities. Spencer recently revealed their AWS research on the Rhino Security Labs blog. Rhino is also rolling out a new open source AWS post-exploitation framework, designed for offensive security testing against AWS environments called Pacu. We also discuss how Ben and Spencer both found their way into the information security industry, pet peeves and more!