The Role of OSINT in Social Engineering and How to Manage Your Human Attack Surface
Steve Bowcut's guest for episode S4E20 is Matt Polak. Matt is the CEO and Founder of Picnic Corporation. Picnic is a cybersecurity firm providing enterprise-wide protection from social engineering. The topic for this episode is The Role of OSINT in Social Engineering and How to Manage Your Human Attack Surface. Matt explains the role of social engineering in today's cyber attacks and talks about why it is so successful. Drawing on his vast experience, he shares what information hackers look for as they plan for an attack and how organizations can use OSINT to protect their people and systems. About our Guest Matt Polak is a subject matter expert in intelligence collection, having spent his career applying these skills to intractable growth and competitive strategy challenges for Fortune 500 customers. Matt's extensive experience and expertise in human intelligence inspired Picnic's creation to protect people from open-source intelligence gathering by hackers. Be sure to listen and learn how to manage and reduce your human attack surface.
December 12, 2022
How you can Identify the Security Posture of Your Devices Automatically
Our guest for Episode S4E19 is Dr. Carmit Yadin, the Founder & CEO at DeviceTotal—the industry’s first universal repository platform providing security data for devices enabling companies to assess current risks that deployed devices post and potential future risks arising from adding new devices to their networks. The topic for this fun and informative conversation is how you can automatically identify the security posture of your devices. Dr. Yadin explains how the ever-increasing number of connected devices creates a challenge for organizations trying to assess their security posture. She delves into the need for context to understand risk and identifies how organizations can “automatically” identify risks associated with their devices. About our Guest Dr. Carmit Yadin is a renowned leader, researcher, author, and speaker with extensive business and technical skills in cybersecurity and intelligence. As a cyber expert and business development specialist in this highly demanding sector, her intellectual knowledge and understanding of the cyber world enable her to stand out in a globally competitive market. After serving in an elite Israel Defense Forces unit for cyber intelligence, she spent the last decade working with leading high-tech companies in the cyber industry. Tune in to learn how you can prioritize response using contextual risk and take proactive steps with sound security recommendations
November 28, 2022
AI-driven Anomaly Detection and Predictive Threat Intelligence
In Episode S4E18, Thomas Pore, the Senior Director of Product for LiveAction—a leader in network security and performance visibility—talks with Steven Bowcut about some of the benefits of AI-driven anomaly detection and predictive threat intelligence. In this podcast, you'll learn how LiveAction's AI-driven anomaly detection and predictive threat intelligence can help you detect and prevent security incidents before they happen. Tom discusses the primary advantages these two technologies bring to the SOC; then, the conversation turns to how LiveActions' ThreatEye integrates with SIEM, SOAR, and threat intelligence tools. About our Guest As the Senior Director of Product for LiveAction, Thomas Pore leads strategic product marketing, partnering with product management and customers to better protect organizations from events impacting network and application performance and security. He is a technical evangelist in network security and performance. For almost 20 years, Thomas has held several positions at LiveAction, including network monitoring and security advisor. He also led strategic sales engineering and post-sale technical teams over his career. Listen to learn more about the benefits of using AI-driven anomaly detection and predictive threat intelligence in your cybersecurity strategy.
November 21, 2022
The Security Maturity Model profile for Digital Twins
In Episode S4E17, Frederick Hirsch, an independent consultant and a co-author of the IoT Security Maturity Model (SMM) Practitioner’s Guide, speaks with the host, Steve Bowcut, about the SMM profile for Digital Twins. Frederick explains digital twins and gives some practical examples of how they are used. Steve and Frederick explore some of the security issues related to digital twins, including how they can help solve complex security challenges. Frederick provides an excellent overview of the purpose of the IoT Security Maturity Model (SMM) Practitioner's Guide, the SMM Digital Twin Profile, and SMM mappings. Resources Mentioned A page with links to the various SMM documents and other resources: https://www.iiconsortium.org/smm/ A brochure summarizing OMG organization and its consortia: https://www.omg.org/memberservices/OMG-brochure.pdf About our Guest Frederick Hirsch is an independent consultant. He is a co-author of the IoT Security Maturity Model (SMM) Practitioner’s Guide, the SMM Digital Twin Profile, the Retail Profile, and the SMM 62443 Mappings. He is co-chair of the joint ISA IIC Contributing group as well as the SMM Mining Profile team. In addition to his SMM work, Frederick is also a co-chair of the IIC Trustworthiness Task Group. He co-authored the IIC Trustworthiness Framework Foundations document and has written papers on Trustworthiness for the IIC Journal of Innovation. He is also a co-author of the IIC Industrial Internet of Things Security Framework. Don't miss this informative overview of the IoT Security Maturity Model Practitioner’s Guide and the SMM Digital Twin Profile.
November 12, 2022
The Application Security Skills Gap
In Episode S4E16, our guest is Abhay Bhargav, the Founder of we45 — a focused Application Security Company, and the Chief Research Officer of AppSecEngineer — an elite, hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. The topic Steve Bowcut and Abhay discuss is The Application Security Skills Gap. Abhay gives an informative view of the scope of the skills gap for application security and explains why he thinks the shortage of skilled security professionals is occurring. Steve and Abhay discuss the skills gap's impact on organizations and what they can do to solve this issue. About our Guest Abhay started his career as a breaker of apps in pen testing and red-teaming, but today is more involved in scaling AppSec with Cloud-Native Security and DevSecOps. He has created some pioneering works in the area of DevSecOps and AppSec Automation, including the world’s first hands-on training program on DevSecOps, focused on Application Security Automation. Abhay is active in the research of new technologies and their impact on Application Security, specifically Cloud-Native Security. He is the architect of a leading Vulnerability Management and Correlation Product, Orchestron, from we45. He is a speaker and trainer at major industry events and has authored two international publications on Java Security and PCI Compliance. Don't miss this insightful look into the application security skills gap.
November 07, 2022
In Episode S4E15, Steve Bowcut talks about encrypted collaboration with István Lám, the co-founder and CEO at Tresorit—a global leader in cloud encryption. István explains why staying in control of your data is important when collaborating with others and shares how Tresorit’s end-to-end encryption technology protects email and documents. He discusses Tresorit's idea of Zero Knowledge and why it's important. About our Guest István Lám is a cryptographer, computer scientist, entrepreneur, and Tresorit’s co-founder and CEO. István earned his MSc degree with top honors at the Budapest University of Technology and Economics. As a researcher, he worked on cryptographic key sharing and distributed systems. While still at university, István co-founded Tresorit. Today, Tresorit provides end-to-end encrypted collaboration and file-syncing tools for more than 10,000 businesses globally. Be sure to listen to learn more about how to collaborate safely and protect your privacy.
October 22, 2022
Zero Trust Network Access
In Episode S4E14, Steve Bowcut talks about Zero Trust Network Access with two well-informed guests. On the show are two executives from the cybersecurity firm Syxsense, Mark Reed, CTO, and Dave Taylor, CMO. The term Zero Trust is sometimes misapplied or misunderstood in the security industry, so our guests thoroughly describe what the term means and how they use it in their business. Mark and Dave explain the role of a zero trust strategy in today’s endpoint protection and what it takes to be successful at zero trust, then talk about some of the challenges organizations face when implementing a Zero Trust strategy. Steve gets them to elaborate on how the new module recently announced by Syxsense enables endpoint compliance with Zero Trust Network Access policies. About Our Guests Mark Reed is a highly energized Software Developer and the CTO of Syxsense. He began his career as a Technical Support Manager at Intel before moving into a role as a Deployment Engineer, traveling to companies all over the world to help with new software infrastructure and implementation. Eventually, he worked his way up to a leadership role and now manages a team of software engineers while helping to push forward new innovations and being involved in all aspects of product development - from backend database design, web services, user interfaces, and client/server/cloud communications. Mark loves to travel, extreme sports and fitness, and spending time with his wife and four sons. He lives in Salt Lake City, Utah. Dave Taylor is a successful tech entrepreneur with five exits under his belt. Having started his career as a Product Manager at Intel Corporation, Dave has now run marketing as CMO at seven successive companies. He has always focused on demand generation - working closely with sales teams to hit revenue growth targets. Dave counts the recruitment and retention of amazingly high-performing marketing teams as his top skill. Born and raised in Boston, Dave has lived in the UK, South Africa, the Middle East, and all over the US, and he now resides in Utah and Montana. Be sure to listen in to learn more about the current state of zero trust network access.
September 19, 2022
Unified Communications Solutions
In Episode S4E13, our guest is Tom Reilly, the President of Commend Americas. This discussion focuses on Unified Communications Solutions. We talk about what they are, how organizations use them, and what providers of these solutions should be doing to protect the networks they reside on and the data they have a stewardship to protect. The host, Steve Bowcut, asks Tom to explain the cybersecurity protocols solution providers should use to protect infrastructure and data. Tom elaborates on Commend America's "privacy and security by design" process and the international compliance standards companies should adhere to. About our Guest As the President of Commend Americas, Tom leads a team focused on reinventing the use of unified communications solutions for safety, security, and operational efficiencies. Tom is a seasoned executive leader with more than 14 years of business development, operational strategy, and sales expertise. Prior to Commend, Tom spent ten years at Ernst & Young in increasingly senior strategy and management positions, providing insights and direction on modern technology and business transformations to help global organizations achieve sustained business results and ongoing innovation. He holds a Bachelor of Science in Management from Binghamton University. Listen to this week’s episode to learn more about Unified Communications Solutions.
September 12, 2022
How to Move Cybersecurity From a Cost Center to a Revenue Enabler
In Episode S4E12, our guest is Jim Nitterauer, Director of Information Security at Graylog. In a fun and informative conversation, BSM's Steve Bowcut and Jim discuss how organizations can move cybersecurity from a cost center to a revenue enabler. Steve asks Jim to: Discuss some of the costs organizations face trying to protect their systems, infrastructure, and data. Explain why security isn't typically viewed as a revenue enabler like other software costs often are. Tell us why and how security can increase revenue. Talk specifically about the costs that log management can reduce or eliminate. About our Guest Jim Nitterauer and his teams are responsible for IT Services, Security, and Compliance across the Graylog organization. He holds CISSP and CISM certifications in addition to a Bachelor of Science degree with a major in biology from Ursinus College and a Master of Science degree with a major in microbiology from the University of Alabama. He is well-versed in ethical hacking and penetration testing techniques and has been involved in technology for more than 25 years. Listen to this week's episode to learn more about how security can enable revenue.
June 20, 2022
How Managed Security Service Providers Can Help Protect Against Ransomware
In Episode S4E11, our guest is Ray Steen, Chief Strategy Officer of the IT managed services firm, MainSpring. In a fascinating and informative discussion, BSM's Steve Bowcut and Ray talk about: The common vulnerabilities threat actors exploit to launch a ransomware attack. The relationship between the size of a business and the likelihood it will be a victim of Ransomware. What small businesses and SMBs can do to protect against a ransomware attack, and what should they do if they are victimized. How MSSPs can assist their clients before and after an attack. About our Guest Ray Steen is the CSO of DC-Metro-based IT managed security services firm, MainSpring. Ray has more than 20 years of experience in strategy, consulting, and communications. At MainSpring, he oversees high-level consulting with new and existing clients, professional services engagements, and strategic partnerships. Don't miss this informative discussion about Ransomware.
June 06, 2022
A10 Networks 2022 DDoS Threat Report
In Episode S4E10, our guest is Paul Nicholson, Senior Director of Product Marketing for A10 Networks. Paul gives us insight into the new 2022 A10 Networks DDoS Threat Report. We talk about what you can expect to learn from the report, the methodology used, and critical findings. Paul explains A10’s ability to precisely track the origins of DDoS weapons activity as we discuss some of the activities A10 discovered leading up to the war in Ukraine. About our Guest Paul Nicholson brings 25 years of experience working with Internet and security companies in the U.S. and U.K. In his current position, Paul is responsible for global product marketing, technical marketing, and analyst relations at San Jose, Calif.-based security, cloud, and application services leader A10 Networks. Don't miss this informative look into what the 2022 A10 Networks DDoS Threat Report offers.
May 30, 2022
SOC 2 Compliance for VaaS Providers
In Episode S4E9, our guest is Ben Rowe, Cloud & Security Architect for Arcules. We discuss System and Organization Controls (SOC) level 2 type 2 certification in video-as-a-service (VaaS) and other cloud-based security systems providers. Ben gives us a high-level overview of what the SOC audit covers, and we dive into why physical security SaaS providers need to pursue SOC 2 attestation. He explains the process for achieving SOC 2 Type 2. About our Guest Ben Rowe serves as the Cloud & Security Architect for Arcules, where he is instrumental in guiding the design and security of the Arcules suite of services. He has a vast amount of experience with a wide range of systems within entertainment, industrial automation, and IT. This is an important topic, so don't miss this discussion about System and Organization Controls for cloud-based security platforms.
May 23, 2022
A Modern Approach to VMS
In Episode S4E8 Steve Bowcut, Editor at Brilliance Security Magazine, and John Rezzonico, CEO at Edge 360, discuss what it means to build a Video Management System using modern IT processes and solutions. They examine why VMS solutions have historically been slow to adopt advanced IT practices. John provides an explanation of the benefits of containerization and why physical security video system users should look for a fully containerized VMS. About our Guest As CEO at Edge360, John is responsible for the global operations of the company. He brings more than 30 years of security innovation and mission-critical military leadership to the organization, and his experience and leadership are focused on developing and delivering technology-driven business services and solutions, providing outstanding client service, and driving profitable revenue growth. A Marine Corps Veteran, John served as an Intelligence Chief. He supervised, trained, and managed a diverse group of Intelligence Marines and produced various intelligence products for combat operations during Operation Iraqi Freedom. He served as the Battalion surveillance and reconnaissance asset manager, successfully implementing multiple surveillance systems in a combat environment. To better understand how a modern VMS can provide improved security and a better user experience, don't miss this episode of the Brilliance Security Magazine Podcast.
May 16, 2022
Understanding and Communicating Cyber Risk
Our topic for Episode S4E7 is Understanding and Communicating Cyber Risk. Our guest is Greg Spicer, CRO and Co-Founder of Ostrich Cyber-Risk. BSM's editor, Steve Bowcut, asks Greg to: Discuss the importance of prioritizing mitigation and remediation efforts. Explain some crucial elements of risk scoring; what should be considered in the scoring process? Explain how the concept of “proximity-blindness” impacts risk analysis. Discuss some of the challenges security teams face when communicating with organizational leaders, and how can they be overcome? And more. About our Guest Greg Spicer has several years of experience in cybersecurity, working with organizations to provide solutions to their cybersecurity challenges. He has worked in many sectors, including Legal, Finance, Insurance, Manufacturing, and Healthcare. He was most recently CRO of Braintrace, a Salt Lake City MDR provider, before their successful sale to Sophos in July 2021. Greg is now the CRO and Co-Founder of Ostrich Cyber-Risk, a leading Cybersecurity Performance Management Provider that offers organizations a simple-to-use but comprehensive cybersecurity risk assessment and reporting application that allows you to manage a security program within a single view. Their methodology drives action and communication among the critical stakeholders to quickly identify and address cyber business risk within an organization. Don't miss this informative discussion about how to understand and communicate cyber risk.
May 10, 2022
Supply chain security: What to expect in the next year
The topic for Episode S4E6 is supply chain security and what to expect in the next year. Our guest is Farshad Abasi, Founder and Chief Security Officer of Forward Security. In a fun and interesting conversation, Farshad and Steve Bowcut cover: What supply chain attacks are and how they happen, including some examples Why supply chain attacks are such a serious threat What the industry can expect regarding supply chain attacks in the next year What preventative measures organizations should take to protect against supply chain attacks And more About our guest: Farshad Abasi is an innovative technologist with over twenty-four years of experience in software design and development, network and system architecture, cybersecurity, management, and technical instruction. With a keen interest in security from the start, he has become an expert in that aspect of computing and communication over the last twenty years. He started Forward Security in 2018, with a mission to provide world-class information security services, particularly in the Application and Cloud security domains. Don't miss this fascinating conversation about an important topic: Supply chain security.
April 11, 2022
IIC's foundational document for Artificial Intelligence—The Industrial IoT Artificial Intelligence Framework
In Episode S4E5, we have as our guests two individuals who are distinguished by their work with the Industry IoT Consortium (IIC). Bassam Zarkout—Executive Vice President IGnPower Inc. and the Chief Editor of the Industrial IoT Artificial Intelligence Framework (IIAIF). Wael Diab—Chair IIC Industrial AI Task Group and Secretary IIC Steering Committee. About the IIC Since its founding in 2014, the IIC has helped build a technical foundation for the Industrial IoT. They work to help organizations take advantage of IoT technology and achieve positive outcomes. They are focused on driving technology innovation that fosters business transformation. Their services are targeted toward helping members drive business value in the core verticals of IT, Networks, Academia & Research, Manufacturing, Energy & Utilities, and Healthcare. They provide best-practice frameworks and liaisons with Standards Development Organizations. Topics we cover: The purpose of the Industrial IoT Artificial Intelligence Framework Examples of some applications for AI in IIoT The value proposition AI can enable in next-generation industrial IoT (IIoT) systems Perceptions regarding ethics, confidence, trustworthiness of AI About our guests: Bassam Zarkout is the Chair of the Digital Transformation working group at the Industry IoT Consortium. He is an Ottawa-based technology executive with 30+ years of experience in technology organizations in Canada, the US, and Europe, including 8 years in executive C-positions, mainly as CTO. Bassam is the founder of IGnPower, an IIoT and AI strategy consulting practice. He has authored and contributed to multiple peer-reviewed papers and frameworks covering Digital Transformation, Industrial AI, Trustworthiness, Data Protection, and IoT Security. He is also a veteran of the Information Assets Governance space, including Electronic Records Management, RegTech, Content Management, and Electronic Discovery, and has led research with US DoD in the area of assisted security and privacy classifications of content. Wael Diab is a business and technology strategist with over 885 patents to his name in the fields of networking and ICT. Wael has BS and MS degrees in EE and BA in Economics from Stanford, and an MBA with honors from Wharton. He is a published author, having authored the book Ethernet in the First Mile: Access for Everyone. In 2011, Wael was recognized by the David Packard Medal of Achievement and Innovator Award for his leadership in Green Technology. He has been active in standardization and related activities for two decades. He chairs ISO/IEC JTC 1/SC 42, the international standardization committee on artificial intelligence (AI). Wael is also chairing the AI track of the 22nd Global Standards Collaboration meeting (GSC-22). Don't miss this opportunity to learn more about AI in security and IIoT applications.
April 04, 2022
A Novel Approach to Security Bug Bounties
In Episode S4E4, we have two guests. We talk with Jonatan Altszul, CEO at BitTrap and Ariel Futoransky, BitTrap’s CTO. Our topic is A Novel Approach to Security Bug Bounties. BitTrap helps companies find breaches faster by installing wallets with risk-adjusted bounties. When an attacker cashes a wallet, they notify the company of the breach so they can take remediation actions to patch it. Some of the topics we cover include: Why bug bounties are necessary What works and what can be improved BitTrap's novel approach to bug bounties A little about our guests: Jonatan Altszul has been building companies in the Cybersecurity Industry for over 30 years. In the past, as a founder of Core Security Technologies, Jony developed the first automated penetration testing software product, earning the loyalty of clients such as Apple, Cisco, Department of Homeland Security, NSA, NASA, Lockheed Martin, and DARPA. As a founder of Disarmista, Jony developed some of the most popular cybersecurity products for the largest companies in the Industry. As co-founder and CEO, Jony now leads BitTrap, where he combines his many years of experience in Cybersecurity, leveraging his expertise in Attacker Behavior with his passion for building companies and defining product new categories. Ariel Futoransky is curious about science & technology, its future, and how it will continue to impact society. A founder of Core Security Technologies, Disarmista, and BitTrap. He is a researcher, programmer, entrepreneur and has made contributions to cryptography, Cybersecurity, and blockchain. Don't miss this opportunity to learn more about a new way to use security bug bounties.
March 14, 2022
Product Supply Chain Security
In this episode, our guest is Slava Bronfman, CEO and Co-founder at Cybellum and we talk about product supply chain security. Cybellum provides a product security platform, enabling teams to manage security across the entire product lifecycle - from highly detailed SBOMs to automatic vulnerability management, ongoing incident response, and continuous monitoring. We touch on: Cybersecurity risks, such as open-source or supply chain software Some things product manufacturers can do to detect and remediate vulnerabilities The future for product supply chain security A little about our guest: Slava Bronfman is an experienced cybersecurity entrepreneur. As CEO and Co-founder at Cybellum, he is responsible for the business, sales, and marketing operations, working with manufacturers and asset owners worldwide on implementing risk assessment solutions. As part of founding Cybellum’s development of a novel cybersecurity risk assessment technology, Slava is also the official representative of the Standards Institution of Israel in the ISO 21434 standard technical committee. He served as an officer in Israel’s elite intelligence corps unit 8153 in a leading product management position and holds an M.Sc. in Computer Science and a B.Sc. in Information Systems, both Cum Laude. Don't miss this insight into the world of product supply chain security.
March 07, 2022
Automated Controls for Compliance - How and Why
In Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance - How and Why. Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How automated controls can affect compliance. Leading practices for effective Data Security & Privacy Compliance. And more. David Vincent has over twenty-five years of experience delivering Security, Audit, Risk, & Compliance services while employed with some of the largest professional service-providing firms in the world – Arthur Andersen, KPMG, PwC, and IBM. He has delivered hundreds of ERP Security Risk & Compliance Assessments & Remediation services, and over 100 GRC (governance, risk, and compliance) technology solution implementations. Additionally, he was the North America GRC Practice Leader for IBM, PwC, and Corporater. Be sure to listen to this informative discussion about automated controls and compliance.
February 28, 2022
The Future of Ransomware and Trends in Data Security
In Episode S4E1 our guest is Purandar Das, CEO and Co-Founder at Sotero. We discuss the future of ransomware and explore some recent trends in data security. We touch on topics such as: Anomaly detection at the data level Machine-learning in ransomware protection Possible future trends for ransomware Sotero offers the first field-level, universal data protection platform allowing you to consolidate all your data instances, applications, and security products into one easy-to-manage environment. Purandar Das is an experienced executive with a demonstrated history of success in the information technology and services space. He is skilled in Technology & Business Development as well as Enterprise Software, Enterprise Architecture, Agile Methodologies, and Customer Relationship Management (CRM). He was formerly the CTO at Infogroup, MobileMessenger, and Epsilon. Purandar gives us his thoughts on REvil and sheds some light on what we can do to protect sensitive data and curtail ransomware attacks. Be sure and listen to this important data protection discussion.
February 14, 2022
Labor Shortage for IT and OT Cybersecurity
In Episode S3E14 our guest is Jeff Macre - a Cybersecurity Project Manager at 1898 & Co. and we discuss the critical labor shortage, or skills gap, current in the areas of IT and OT cybersecurity. 1898 & Co. is part of Kansas City, Missouri-based engineering firm Burns & McDonnell - one of countries largest engineering firms - and Jeff is responsible for leading successful projects that bring real value to Burns & Mac clients. During his career, Jeff has successfully led more than 300 projects throughout many of the critical infrastructure sectors including Electric, Water, and Transportation. He holds a master’s degree in business administration and a bachelor’s degree in business technology management. Included among many industry-related certifications Jeff holds are Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Project Management Professional (PMP). Outside of his work for 1898 & Co. Jeff is a Professor at the University of Central Florida (UCF) teaching various classes within the Cybersecurity program. This is a don't miss episode for anyone struggling to staff a security team or anyone aspiring to work in this field. Jeff offers his unique perspective on the effects of the labor shortage, what can be expected in the future, and what organizations can do to mitigate the detrimental effects of the shortage of skilled cybersecurity workers. Don't miss this critical discussion with Jeff Macre of 1898 & Co.
November 29, 2021
Cybersecurity Red Flags
In Episode S3E13, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. Corey is the primary contributor to the Secplicity Community, which provides daily videos and content on the latest security threats, news, and best practices. A Certified Information Systems Security Professional (CISSP), Corey enjoys "modding" any technical gizmo he can get his hands on and considers himself a hacker in the old sense of the word. In this fascinating conversation, Corey discusses the security red flags that could make an organization attractive to hackers. Corey offers some important and valuable things security teams can do to help avoid becoming the victim of a cyber attack. Don't miss this exciting and informative interview with Corey Nachreiner, CSO at WatchGuard Technologies.
November 15, 2021
Automotive Cybersecurity Risks
Episode S3E12 features an informative conversation with Slava Bronfman, the Co-founder and CEO at Cybellum. Cybellum is a global leader providing integrated cyber solutions for the leading device manufactures, including automobiles. We discuss the cybersecurity risks associated with the automotive industry and what can be done to mitigate those risks. In his role as CEO at Cybellum, Slava is responsible for the business, sales, and marketing operations, working with manufacturers and asset owners worldwide on implementing risk assessment solutions. He served as an officer in Israel’s elite intelligence corps unit 8153 in a leading product management position and holds an M.Sc. In Computer Science, Cum Laude, and a B.Sc. in Information Systems, Cum Laude. Join us for this fascinating episode and enjoy the conversation.
October 25, 2021
Smartphone-related Security Threats
In Episode S3E11 our guest is Dr. Bill Anderson, President of CIS Mobile. Dr. Anderson is a security industry executive with extensive leadership experience founding, funding, and operating security software companies. He has previously served as Vice President, Technology Investments at Allied Minds where he managed a portfolio of information security, quantum, and semiconductor design companies. Bill has held executive roles in product management and marketing at several public and private technology companies and is an expert on security in the mobile ecosystem. During this fascinating conversation, Bill gives us an overview of some current and recent threats related to smartphones and explains some of the methods government users have historically used to protect against smartphone-related threats - and the challenges with those methods. To wrap it up, Dr. Anderson give us some very specific recommendations for protecting government users of commercial smartphones. If you use a smartphone, and who doesn't, you are sure to find this episode interesting.
October 04, 2021
What the Future Holds for the “New” Workplace
In Episode S3E10, our guest is Julian Lovelock. Julian is currently Vice President of the Global Business Segment responsible for workforce identity management solutions at HID Global. Part of his role includes sparking new innovation leading to the development of new products and services. Julian moved to the United States from London in 2006 following the acquisition of ASPACE Solutions, where he was CTO and co-founder. He holds a Bachelor of Engineering in Electrical and Electronic Engineering from the University of Aston, UK. We discuss the idea of identity being the new perimeter, and Julian explains what it means to digitally transform the management of identities and the associated cyber and physical access credentials for the workplace. Julian walks us through some of the current technological trends for authentication and some of the best practices in securing workplaces and networks. Don't miss this informative interview with Julian Lovelock, Vice President of Global Business Segment at HID Global.
September 07, 2021
Industry IoT Consortium's Trustworthiness framework foundations
In Episode S3E9 we depart from our normal format and interview four guests at once. The panel for this episode is made up of Karen Quatromoni, the Director of PR at Object Management Group, and three co-chairs of the Trustworthiness Task Group for the Industry IoT Consortium, they are: Marcellus Buchheit - Co-founder and Chairman of the Board at WIBU-Systems. Frederick Hirsch - An independent consultant in the area of trustworthiness and security. Bob Martin - Leads the supply chain and security efforts within MITRE, a non-profit organization that runs federally funded research and development centers. We discuss the business need and context for trustworthiness and how it relates to safety and security, what a trustworthy supply chain means and how companies can gain assurance of trustworthiness from their downstream partners, IICs Trustworthiness Framework, and more. Please join us for this informative and relevant conversation around trustworthiness, safety, and security.
August 23, 2021
10 keys to preventing ransomware
In Episode S3E8, our guest is Corey Nachreiner, Chief Security Officer at WatchGuard Technologies. Corey is a front-line cybersecurity expert for nearly two decades; he regularly contributes to security publications and speaks internationally at leading industry trade shows like RSA. He has written thousands of security alerts and educational articles. Corey is the primary contributor to the Secplicity Community, which provides daily videos and content on the latest security threats, news, and best practices. A Certified Information Systems Security Professional (CISSP), Corey enjoys "modding" any technical gizmo he can get his hands on and considers himself a hacker in the old sense of the word. In this fascinating conversation, Corey discusses the current state of ransomware as we delve into what double and even triple extortion attacks mean to businesses. Corey provides ten important and valuable keys for preventing ransomware. Don't miss this exciting and informative interview with Corey Nachreiner, CSO at WatchGuard Technologies.
August 16, 2021
Cybersecurity Awareness Training - Why It Works
In Episode S3E7 our guest is Zack Schuler. Zack is the founder and CEO of NINJIO – a global cybersecurity awareness company that teaches employees and their families how not to get hacked. Zack is an authority on cybersecurity, employee engagement, and related tech issues. He has written for Forbes, HR Dive, Dark Reading, and many other outlets. In this fun and entertaining episode, we discuss where the idea for NINJIO came from and how it got started. Zack gives us an overview of the various cybersecurity training programs NINJIO offers. They cover more essential topics than you might think. We spend some time talking about the importance of developing a culture of cybersecurity awareness within companies, and Zack offers some great ideas about how leaders can accomplish just that. If you'd like to learn more about cybersecurity awareness training and how it can help you at work and home, don't miss this episode of the Brilliance Security Magazine Podcast.
July 19, 2021
In Episode S3E6 our guest is Brian Hajost, President and Founder of SteelCloud, a company that develops technology for automated remediation of endpoints to effectively meet compliance mandates. In this fun and informative conversation, Brian delves into what it means for organizations to meet the various compliance mandates they are subject to. He addresses the Cybersecurity Maturity Model Certification (CMMC) and how enterprises can automate remediation of their endpoints. A little about our guest: Brian Hajost is the President & CEO of SteelCloud, a company that develops technology for automated remediation of endpoints to various security benchmarks. Brian’s technical career has spanned over thirty years, primarily with leading-edge technologies in regulated industries. He holds eight patents in IT security and two patents in mobile security. He is an active contributor to the DC Chapter of the Armed Forces Communications and Electronics Association (AFCEA), currently serving a board member.
June 14, 2021
The Importance of Encryption in Today’s Data-dependent World
In Episode S3E5, we talk with Purandar Das, CEO and Co-Founder at Sotero - Sotero offers the first field-level, universal data protection platform. We talk about the importance of data, the data lifecycle, and why it is essential to encrypt data at each stage of the lifecycle. We discuss the idea of data time-to-value, and why it is important, and the current state of today's encryption technologies. Join us for a fascinating conversation. Purandar Das is an experienced executive with a demonstrated history of success in the information technology and services space. He is skilled in Technology & Business Development. He is experienced in Enterprise Software, Enterprise Architecture, Agile Methodologies, and Customer Relationship Management (CRM). He was formerly the CTO at Infogroup, MobileMessenger, and Epsilon.
May 17, 2021
Application Security: the Importance of Collaboration, Automation, and Infrastructure as Code
In Episode S3E4, we talk with Abhay Bhargav, founder of we45 - an Application Security Company and he is also the Chief Research Officer of AppSecEngineer - a hands-on online training platform for AppSec, Cloud-Native Security, Kubernetes Security, and DevSecOps. We talk about why it's important to foster a culture of collaboration between security and engineering teams, and what can happen if you don't collaborate. We discuss the role of automation in DevSecOps and how it can be implemented. Finally, we touch on Infrastructure as Code (IaC). Please join us for an interesting conversation. Abhay Bhargav started his career as a breaker of apps, in pen testing and red-teaming, but today is more involved in scaling AppSec with Cloud-Native Security and DevSecOps He is a pioneer in the area of DevSecOps and AppSec Automation, including the world’s first hands-on training program on DevSecOps, focused on Application Security Automation. In addition to this, Abhay is active in his research of new technologies and their impact on Application Security, specifically Cloud-Native Security.
April 19, 2021
Cybersecurity for Physical Access Control in the Cloud
In Episode S3E3, we talk with Kim Loy, Chief Product Officer at ACRE, a global networking and security solution leader. We probe whether cloud-based physical access systems have lived up to their expected adoption by end-users. We look at some of the potential cybersecurity risks associated with exposing physical access data and controls to the internet and discuss how these concerns have been addressed. Kim offers a view of the Cloud Security Shared Responsibility model from a physical access control perspective. Join us for a fascinating and informative discussion with Kim Loy, who has more than 25 years of security industry senior management experience and has achieved significant success within a wide variety of global enterprises. As Chief Product Officer for ACRE, Kim is responsible for overseeing the company’s brands, strategic product planning, and cybersecurity strategy. In addition, Kim provides direction for messaging strategy and communications development. Prior to her role at ACRE, she served as the Director of Technology and Communications for Vanderbilt International in Dublin, Ireland, where she managed the global R&D, Product Management, and Marketing Communications teams. Kim has held senior positions with GE Security, G4S, Xtralis, and Pelco by Schneider Electric. These global positions have provided her with extensive international experience, including time living in England, France, Belgium, and Ireland. Kim also serves on the Security Industry Association Board of Directors.
March 29, 2021
Zero Trust for Open Banking
In Episode S3E2 we talk with Jasen Meece, CEO at Cloudentity — a cloud-based provider of dynamic fine-grained authorization and governance solutions. We dive into zero trust for open banking APIs and uncover some of the threats associated with that market. We look at a new partnership just announced between Cloudentity and Axway, a leading API integration platform provider. With previous roles at Oracle, KPMG, and IBM, Jasen has 20+ years of leadership experience in IT driving both internal and external facing organizations. Jasen is a dynamic, results-oriented executive who leverages technology products and services to achieve business value-based transformation.
March 15, 2021
Potential Security Risks Within Legacy Databases
In Episode S3E1 we talk with Greg Wendt, Executive Director of Security at Appsian. The focus of the conversation is data and compliance as it relates to Enterprise Resource Planning (ERP) software. We uncover some of the potential security risks associated with legacy databases and what can be done to protect sensitive data in a post-COVID world. Greg Wendt is an Oracle® PeopleSoft security expert. During his 23-year career, he has been recognized as a leader in data security, application architecture, and business operations. He served as an ERP Application Architect at Texas Christian University where he was responsible for TCU’s PeopleSoft system and was Chairman of the Higher Education User Group’s multinational Technical Advisory Group (HEUG TAG). Greg has led criminal justice and cybersecurity courses focusing on hacking techniques.
January 22, 2021
Benefits of Using FIDO Authentication
In this episode, we examine Fast ID Online (FIDO) standards-based authentication that ends reliance on passwords, protects user credentials, and resists phishing attacks. FIDO supports the remote pandemic-era workforce by ensuring critical data residing on home-based systems and mobile devices remains secure and uncompromised. Our guest, Steven Humphreys, CEO of Identiv, answers questions such as: Why are home networks so much more vulnerable to malicious attacks than corporate networks? Why is the use of passwords no longer advisable? What devices are FIDO2 security keys compatible with? Join us for a fascinating conversation that may change how you authenticate online.
December 15, 2020
Security and Compliance for Today's Collaboration Tools
In this episode, we take a look at how companies can protect sensitive data while using modern collaboration tools. Our guest is Devin Redmond, CEO, and Co-Founder of Theta Lake, the recognized leader in collaboration security and compliance for Cisco WebEx, Microsoft Teams, RingCentral, and Zoom. Listen to learn how Theta Lake’s AI helps security and compliance teams more effectively scale their risk detection and the workflows for communication security, data loss protection, and supervision of modern video, voice, and unified collaboration systems.
December 07, 2020
The Cybersecurity Poverty Line and the Nine Cybersecurity Habits to Protect Your Future
In Episode S2E20, we examine the cybersecurity poverty line and its relationship with the industry-wide skills gap. We talk with George Finney, a CISO that believes people are the key to solving our cybersecurity challenges. We discuss the habits organizations need to create to build a culture of cybersecurity awareness. George talks about his new book, Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future. You won't want to miss this fascinating discussion.
November 30, 2020
2020 State of Virtual Appliance Security Report
Thousands of virtual appliances are being distributed with known, exploitable, and fixable security flaws and often on outdated operating systems. Organizations depend on virtual appliances for securing cloud workloads, firewalls, secure gateways, and encryption. To help the cloud security industry keep pace with demand, Orca Security released the “2020 State of Virtual Appliance Security Report,” which analyzed 2,218 virtual appliance images from 540 software vendors for known vulnerabilities, to identify risks and provide an objective assessment score and ranking. As the enterprise migrates to the cloud at a rapid pace, the security of virtual appliances has fallen dramatically behind. In this episode, we talk with Yoav Alon, Chief Technology Officer at Orca Security, and examine what went into creating this report and some of its top findings.
November 23, 2020
Mobolize and Akamai Enable Security on Mobile Devices
Mobolize, the recognized leader for providing an on-device Data Management Engine that provides security, connectivity, and optimization on mobile devices, recently announced a partnership with Akamai, the intelligent edge platform for securing and delivering digital experiences, to offer security to mobile devices for enterprises. The addition of mobile protection adds an extra layer of proactive security controls and threat protection to quickly and uniformly block malicious web traffic for the growing use of mobile devices as employees work from home. In Episode S2E18 we explore this new partnership as we speak with Colleen LeCount, Chief Revenue Officer at Mobolize, and Tim Knudsen, VP Product for Enterprise Security Products at Akamai. We uncover how this relationship will affect security and device performance for enterprise mobile device users.
November 10, 2020
Converging Fraud, Risk, and IT Teams
Episode S2E17 is an informative discussion about how financial institutions are fairing in their quest to converge fraud, risk, and IT teams. We look at the state of the financial industry as it relates to fraud and how the pandemic has affected financial institutions. We examine some of the pain points banks suffer as they attempt to converge risk management solutions as well as the benefits of this convergence. As our guest, we have Matt Tengwall, the General Manager of Verint Fraud & Security Solutions. He shares his unique insight into how technology often leads the way as financial institutions grapple with fraud, risk, and IT convergence.
October 26, 2020
Cashless Payment Services and Preventing Fraud
In episode S2E16 we talk with Eric Solis, the CEO of MovoCash, and discuss how consumer demand for cashless payment is changing society and how financial institutions can offer competitive digital services while preventing fraud. We examine the "state of the industry" as it relates to cashless payments and bank fraud. We talk about the need for new banking standards and look at whether or not a government-backed digital dollar is a good idea. Eric describes a better way of making cashless payments than just handing over a credit or debit card number that gives merchants access to your entire credit limit or bank balance.
October 19, 2020
Cybersecurity and Compliance Challenges Faced by SMBs, with Karen Walsh
In episode S2E15 we have a fascinating discussion with author and compliance expert, Karen Walsh. We dive into some of the cybersecurity and compliance challenges faced by small to medium-sized businesses. Karen shares her expert insight into what SMBs need to know to protect their data, stay in compliance, and understand what is really important. In her characteristically charming way, she sorts through some of the industry's hyperbole and rhetoric to expose some simple cybersecurity and compliance truths. Karen is working on a new book and offers some insights into what we can expect when it is published.
October 12, 2020
Designing 360° Cameras with Cybersecurity In Mind
From adopting secure configurations with measures to protect and control access to cameras, to managing security threats with vulnerability scans during integration, and even ensuring the integrity and security of products over the supply chain with regular audits, in episode S2E14 we talk about designing 360-degree surveillance technology with the cybersecurity needs of end-users in mind. Our guest is Jon Marsh. Vice President of Product at Oncam. Jon is responsible for Oncam’s overall product development. He spearheads the technology, design, and delivery of products, and ensures that the development of new solutions fit customer needs. Join us for an interesting conversation about what camera manufacturers can and should be doing to protect their end user's network.
October 05, 2020
A Discussion about Security by Design with Arcules and Milestone Systems
In episode S2E13 we talk with two experts about how physical security solutions must be designed with cybersecurity in mind. You can think of this as security for security. Nigel Waterton is Chief Revenue Officer, for Arcules, and Tim Palmquist is Vice President Americas, for Milestone Systems. Together we uncover some interesting ways that Arcules uses the concept of Security by Design to bake cybersecurity elements into their cloud-based physical security solutions. We also talk about the unique relationship between Arcules and Milestone Systems. A relationship that provides each company with strategic advantages in the marketplace.
September 28, 2020
How We Can Effectively Restart Operations While Protecting Our Employees’ and Citizens’ Health and Safety
To say that the COVID-19 pandemic has disrupted operations around the world is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With social distancing and other measures helping to curtail the spread, organizations are turning their attention to a critical question: “How do we effectively restart operations while protecting our employees’ and citizens’ health and safety?” In episode S2E12 we talk with Alan Stoddard, Vice President and General Manager, Verint Situational Intelligence Solutions. He says adjusting to these new conditions demands a pragmatic approach that addresses the potential risk to employees in various environments while also delivering a degree of confidence to customers that an organization is taking a meaningful, proactive posture to keep people safe and healthy. Also, as circumstances change, obtaining the insight to adapt to those changes, and implementing workplace health and safety tools are crucial for businesses to stay one step ahead and remain agile.
September 21, 2020
API Protection - The Overlooked Business Continuity Strategy
From financial services to education, nearly every industry relies on API feeds to remain competitive and generate revenue. In S2E11 former team leader of an elite Israeli Defense Forces (IDF) cyber unit and current CEO of Salt Security, Roey Eliyahu, cautions that API security must be part of an organization’s business continuity strategy. If left unprotected, a breach could have catastrophic repercussions for both revenue and brand reputation. Listen to this episode to hear Roey explain how attackers choose which APIs to target, how they execute attacks, and how to protect against these threats.
September 14, 2020
Security Culture Report Finds a Large Gap Exists Between the Best and Worst Performers for Security Culture
In Episode S2E10 we talk with Perry Carpenter, Chief Evangelist, and Strategy Officer with KnowBe4. We discuss KnowBe4’s new research arm, KnowBe4 Research, and their first Security Culture Report that was recently released. In the 2020 “Security Culture Report”, data was collected from 120,050 employees in 1,107 organizations across 24 countries. There were a total of 17 industry sectors examined in detail. Results from this year’s report revealed a large gap between the best performers and the poor performers when it comes to security culture. The best performers were from Banking, Financial Services, and Insurance and the worst performers were from Education, Transportation, and Energy & Utilities. Security culture varies across industries. In the industry comparison report, all industries were compared according to their security culture scores and across each of the seven dimensions (Attitudes, Behaviors, Cognition, Communication, Compliance, Norms, and Responsibilities) of security culture. Download a copy of the report here.
September 07, 2020
Shadow Code: The Hidden Risk to Your Website
In Episode S2E9 we talk with Ameet Naik a security evangelist at PerimeterX. PerimeterX, a leading provider of application security solutions that keep digital businesses safe, recently released “Shadow Code: The Hidden Risk to Your Website.” This second annual survey of security professionals uncovers the extent and impact of third-party scripts and open-source libraries used in web applications across organizations. Join us for this fascinating discussion about Shadow Code and why it is a problem for developers.
August 31, 2020
Shoring Up Security in a WFH World
In Episode S2E8 we talk with Zeev Draer, vice president of corporate strategy for Niagara Networks, and we discuss some steps corporations can take to shore up their security posture in this new “work from home” world we find ourselves in. Zeev describes for us some of the operational differences between attackers and defenders - and why is that important.
August 24, 2020
COVID-19’s Impact on Business Security
In Episode S2E7 we have a delightful conversation with Adam Kujawa, Director of Malwarebytes Labs. Adam talks about Malwarebytes' insightful new report that was released on August 20, 2020. This report, titled "Enduring from Home: COVID-19’s Impact on Business Security," combines Malwarebytes telemetry with survey results from 200 IT and cybersecurity decision-makers from small businesses to large enterprises to unearth new security concerns in remote work environments. You'll not want to miss this episode, as Adam lays out some of the more interesting findings from this important report.
August 20, 2020
The State of DDoS Weapons
DDoS attacks continue to grow in frequency, intensity, and sophistication. Listen to this episode of the Brilliance Security Magazine Podcast to learn more about why DDoS attacks are increasing and what can be done. In Episode S2E6, we discuss the new A10 Networks report on the State of DDoS Weapons. Our guest is Paul Nicholson, Senior Director of Product Marketing for A10 Networks. Paul walks us through why this report is essential to the industry and the methodology used to collect the data reflected by the report's findings. We review many of the more interesting and significant results that can be found in the report.
August 17, 2020
What You Need to Know About Leakware
It’s no secret that cybercriminals are always upping the ante, but while ransomware is still in the spotlight, it's even more devastating cousin, leakware, doesn’t receive as much attention. In this episode, we talk with Nir Gaist, a senior information security expert and ethical hacker to learn more about leakware - what it is, how cybercriminals are leveraging it to increase ransom payments, and what can be done to prevent it.
August 10, 2020
Account Takeover Fraud
S2E4 is an exciting discussion with Will LaSala, the Director of Security Solutions, Security Evangelist, at OneSpan. Will offers his expertise to examine account takeover fraud, what it is, how it works, and how to avoid it. Recent news reports indicate that 15 Billion consumer credentials were found for sale on the dark web. And about 25% of the leaked credentials include account information related to banking and other financial services – making it extremely easy for hackers to conduct account takeover attacks on consumers’ financial accounts. Coupled with the current remote work conditions, consumers are prime targets for financial-related cyber-attacks in the coming weeks.
August 03, 2020
2020 State of the Public Cloud Security Report
S2E3 is a discussion with Avi Shua, Co-Founder and CEO of Orca Security. Avi takes us through some of the more interesting findings of this new industry report. This study shows that public cloud environments are rife with neglected workloads, authentication issues, and lateral movement risk The world of cybersecurity isn’t fair. Security teams need to secure everything, but attackers need only find one weak link. For most organizations, cloud workload security is dependent upon the installation and maintenance of security agents across all assets. This rarely happens, as this report shows. Listeners can download this complete report at: https://info.orca.security/2020-state-of-public-cloud-security-report
July 28, 2020
Essential COVID-19 Supplies via the Darknet
S2E2 is an in-depth look at how and what supplies, essential for preventing and treating COVID-19, end up on the darknet. We interview Dr. David Maimon, an Associate Professor in the Department of Criminal Justice and Criminology at Georgia State University. Dr. Maimon is engaged in a year-long study, funded by the National Science Foundation, which will allow researchers in Georgia State University’s Evidence-Based Cybersecurity Research Group (EBCS) to examine threats related to the sale of critical COVID-19 supplies via darknet markets.
July 28, 2020
IoT Revolution Leads to Increased Risk of Cyberattacks
Episode S2E1 is a fascinating interview with Hardik Modi from NETSCOUT. We talk about the IoT revolution and some interesting findings from NETSCOUT's latest industry report.
July 21, 2020
A Security Report Worth Reading
In this episode we talk about the new Malwarebytes 2020 State of Malware report and why I think you should read it.
February 11, 2020
Applying High Tech Security Technology for SMBs
Security technology will allow us to implement some pretty amazing defenses. The brightest technology minds around the world examine new and existing threats and vulnerabilities. Each new exploit brings the industry’s defensive methods and strategies to a sharper point. One of the practical problems that continually surfaces in security technology is one of application. It does little good to devise highly technical defensive solutions if they are, in the end, too complicated for average businesses to deploy and manage. Listen to what we learned about one company that addresses this problem every effectively.
January 30, 2020
Brilliance Security Magazine's Inaugural Foray in the World of Podcasts
Due to reader suggestions and the growing popularity of podcasts, we are adding this medium to Brilliance Security Magazine. Here you will find short but informative podcasts designed for security professionals and those interested in cyber and physical security.
January 27, 2020