Thursday, July 19, 2018

Episode 206 – The Front Porch w/@wendynather @securityincite @jwgoerlich

Episode 206 - The Front Porch….   Welcome to the first of an occasional series of episodes featuring conversations with a variety of interesting people from both inside and outside of information security.   In this inaugural episode you...

Episode 205 – LIve from BSides Atlanta!

We recorded this episode as the closing keynote at BSides Atlanta on May 5th, 2018. We want to give a big round of thanks to the organizers, volunteers, sponsors, and attendees of BSides Atlanta for a great venue and...

Episode 204 – Evaluating Your Security Program: Communications Plan

Episode 204 - Evaluating Your Security Program: Communications Plan   Why Evaluate Your Program Part of annual policy review If you don’t evaluate you will never improve Continual review will help protect your budget Awareness and Education is...

Episode 203 – Evaluating Your Security Program: Threat Mapping

Show Notes   Episode 203 - Evaluating Your Security Program: Threat Mapping   Why Evaluate Your Program Part of annual policy review If you don’t evaluate you will never improve Continual review will help protect your budget Awareness...

Episode 202: -Evaluating Your Security Program : Awareness & Education

Episode 202 - Evaluating Your Security Program: Awareness & Education   Why Evaluate Your Program Part of annual policy review If you don’t evaluate you will never improve Continual review will help protect your budget Awareness and Education...

Episode 201 – Celebration

We're going to use this episode to allow the cast to talk about reaching 200 episodes and you'll hear what *really* happened on the Lost Episode.   We will be back in 2018 with more episodes.  Until then be...

Episode 200 – Building a Security Strategy – Part III

Episode 200 - Building A Security Strategy - Part III Recap Strategy vs Policy Understand the business of your Business Know who your stakeholders really are Capability = (Tech + Service) * Process Crawl, Walk, Run It Takes...

Episode 199 – Building a Security Strategy – Part II

Episode 199 - Building A Security Strategy - Part II Recap Strategy vs Policy Understand the business of your Business Know who your stakeholders really are Capability = (Tech + Service) * Process Crawl, Walk, Run It Takes...

Why the Best Defense Is a Good Offensive Security Strategy

When many people think about offensive security, they picture a mysterious figure wearing a hoodie, sitting behind a black-and-green terminal, diligently typing away as he probes enterprise networks. But the cybersecurity world has evolved well beyond this Hollywood hacker...

Google hit with $5.1b fine in EU’s Android antitrust case

This could mean the end of free Android. In the meantime, Google plans to appeal.

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

This bill making its way through Congress would allow law enforcement to more easily uncover location data for cell phones from mobile carriers in an emergency.

IDG Contributor Network: Hack like a CISO

I have written several times over the last couple of years about how the role of today’s CISOs have changed and are now more tuned to support business activities and the management of enterprise risk. Serving an organization as...

Cisco patches critical vulnerabilities in Policy Suite

One of the worst security flaws permits attackers to act as root and execute arbitrary code.