Player FM - Internet Radio Done Right
27 subscribers
Checked 18d ago
Tilføjet eight år siden
Indhold leveret af RSA Conference. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af RSA Conference eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !
Gå offline med appen Player FM !
Podcasts der er værd at lytte til
SPONSORERET
T
The 85 South Show with Karlous Miller, DC Young Fly and Chico Bean
1 ICE CUBE in the Trap! | 85 South Show Podcast 52:43
52:43
Afspil senere
Afspil senere
Lister
Like
Liked
52:43West Coast legend Ice Cube pulls up to the trap to talk about his new album and kick it one good tine with Karlous Miller, Chico Bean, DC Young Fly and Clayton English! Off the rip they start talking about DC being in the New Friday movies. Cube takes it all the way back to how he started in Compton and Karlous asks about the lyrics to "Today Was A Good Day!" The squad talks about The Big 3 and the struggle to build an all new league. Cube talks about how the govt opposition to his early music and talks about how he got involved in developing a political plan for Black People. From Mike Epps to Bernie Mac, the conversations sways to talking about how comedians impact the movies. Cube talks "All About The Benjamins" and tells a crazy story from the time he was filming Anaconda with J Lo. This is the coldest podcast! || 85 SOUTH App : www.channeleightyfive.com || Twitter/IG : @85SouthShow || Our Website: www.85southshow.com See omnystudio.com/listener for privacy information.…
Election Security: Best Practices and Emerging Threats
Manage episode 445318861 series 1237183
Indhold leveret af RSA Conference. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af RSA Conference eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system. This podcast explores the critical issue of election security, emphasizing the need for a collaborative and proactive approach. Join this talk as we delve into the bipartisan nature of election threats, highlighting the shared vulnerabilities faced by campaigns across the political spectrum. We discuss actionable steps that individuals, campaigns, and organizations can take to enhance their cybersecurity posture. Speakers: Andrew Schoka, Founder, VoterGuard Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC
…
continue reading
169 episoder
Manage episode 445318861 series 1237183
Indhold leveret af RSA Conference. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af RSA Conference eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system. This podcast explores the critical issue of election security, emphasizing the need for a collaborative and proactive approach. Join this talk as we delve into the bipartisan nature of election threats, highlighting the shared vulnerabilities faced by campaigns across the political spectrum. We discuss actionable steps that individuals, campaigns, and organizations can take to enhance their cybersecurity posture. Speakers: Andrew Schoka, Founder, VoterGuard Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC
…
continue reading
169 episoder
Alle episoder
×R
RSA Conference
1 Father and Son, CISO and Psychologist: Navigating the Digital Age 29:36
29:36
Afspil senere
Afspil senere
Lister
Like
Liked
29:36Richard Bird and Xavier Bird are father and son. Richard has spent 3 decades in technology and cybersecurity. Xavier, like most of Gen Z, is a digital native. He also happens to be a doctoral candidate in psychology who has focused his attention on adolescent counseling and the impact digital experiences have on the development of self-image among children consuming a steady diet of feeds and streams from video games to influencers. From the pitfalls of “algorithmic parenting” to the ripple effects of social media culture on identity formation. Tune in to this podcast as this father and son duo unpack the nuanced interplay of privacy, security, and mental health in the digital age. Speakers: Richard Bird, Senior Fellow, Executive Member, CyberTheory Zero Trust Institute, CyberEd.io. Xavier Bird, Psychology Doctorate (PsyD) Candidate, University of Denver Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC…
R
RSA Conference
1 Inside the RSAC Program Committee: Device Security & Accessibility 24:08
24:08
Afspil senere
Afspil senere
Lister
Like
Liked
24:08As we approach RSAC 2025, we're excited to bring together the Program Committee Members (PCMs) from our Device Security & Accessibility track. Tune into this podcast to learn what Device Security and Accessibility means, what topics the PCs saw trending in the submissions, and what people can look forward to learning about at the Conference. Speakers: Justin Merhoff, Director of Security, Deque Systems Maggie Morganti, Senior Director of Product Security, WorldPlay Smitha Sriharsha, Sr Manager Platform Security Engineering, F5 Networks Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Jingle All the Way to Safety: Cyber Security Tips for the Holidays 22:19
22:19
Afspil senere
Afspil senere
Lister
Like
Liked
22:19As the holidays approach, many are well into their shopping sprees. It's an exciting time to prepare for the holiday season and spend time with loved ones. However, with cyberattacks on the rise, we can expect a significant increase in cyberattacks during this season. Join this podcast to explore safety and security tips for online shoppers, learn about current cyberthreats, and discover actionable steps to protect yourself from becoming a victim of cybercrime. Speakers: Bailey Marshall, Customer Engineer, Security, Google Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Cyber Resilience for SMEs: Practical Data Privacy and Security Strategies 19:25
19:25
Afspil senere
Afspil senere
Lister
Like
Liked
19:25SMEs often face significant hurdles in protecting their data due to limited resources and expertise. This podcast explores practical strategies to help SMEs strengthen their cybersecurity posture. Attendees will learn how to implement scalable solutions, leverage training and mentorship programs, and stay informed about emerging threats. By enhancing their cyber resilience, SMEs can improve compliance, build trust with customers, and ultimately drive business growth. Speakers: Praise Ayodele, Graduate Researcher, University of Central Missouri Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Governing AI Innovation: Balancing Ethics and Compliance 27:16
27:16
Afspil senere
Afspil senere
Lister
Like
Liked
27:16As AI rapidly integrates into our lives, it presents both immense opportunities and significant risks. This podcast explores the urgent need for robust governance frameworks to ensure AI is used responsibly. We will delve into ethical guardrails, risk mitigation strategies, and best practices inspired by academic AI principles. Join us to discover how to harness AI's power while upholding your organization's values. Speakers: Brian Warshawsky, Director, Research Ethics and Compliance, University of California, Berkeley Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Election Security: Best Practices and Emerging Threats 20:48
20:48
Afspil senere
Afspil senere
Lister
Like
Liked
20:48In today's digital age, the integrity of our elections faces unprecedented threats from malicious actors. Our U.S. local elections are particularly vulnerable to these global threats, making it more crucial than ever to build cybersecurity resilience to safeguard our election security system. This podcast explores the critical issue of election security, emphasizing the need for a collaborative and proactive approach. Join this talk as we delve into the bipartisan nature of election threats, highlighting the shared vulnerabilities faced by campaigns across the political spectrum. We discuss actionable steps that individuals, campaigns, and organizations can take to enhance their cybersecurity posture. Speakers: Andrew Schoka, Founder, VoterGuard Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Securing Sovereignty: How Technology is Strengthening Tribal GC Elections 21:39
21:39
Afspil senere
Afspil senere
Lister
Like
Liked
21:39Tribes are modernizing their Tribal General Council elections using cutting-edge technology. From traditional in-person voting to mobile platforms & blockchain-based systems, we discuss the security measures in place to ensure election integrity. Learn how Tribes are collaborating with MS-ISAC and EI-ISAC to prevent cyber threats, while also addressing challenges unique to Tribal elections. Speakers: Mackenzie Quick, Cybersecurity Analyst, Suquamish Tribe Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Navigating the Evolving Threat Landscape: Cybersecurity in Retail and Fashion 16:09
16:09
Afspil senere
Afspil senere
Lister
Like
Liked
16:09Join us for an in-depth discussion on the cybersecurity threats facing the retail and fashion industries. We'll explore the top trends for 2024 and 2025, including AI, e-commerce fraud, ransomware, and supply chain compromise. Our expert guest will share real-world examples of cyberattacks targeting the retail and fashion value chain, shedding light on the tactics used by threat actors. We'll also discuss predictions for 2026 and explore strategies for mitigating these risks and safeguarding your organization. Speakers: Alexandra Forsyth, Retail, Fashion and Cyber Security Expert, A.F's RetailGuide Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 The World of AI: Governance and Application 31:04
31:04
Afspil senere
Afspil senere
Lister
Like
Liked
31:04Speakers: Arti Raman, CEO and Founder, Portal26 Dane Sherrets, Senior Solutions Architect, HackerOne Kacy Zurkus, Senior Content Manager, RSA Conference AI has been implemented in almost every organization and AI governance helps ensure that AI is being used ethically and unbiasedly. We will explore the multifaceted world of AI, focusing on governance and applications. Join this podcast as we unfold the challenges and opportunities associated with AI technologies, examining the need for responsible governance, diverse applications across industries, and necessary measures for navigating the evolving landscape.…
R
RSA Conference
1 Elevate & Innovate: Success Tips for Women Entrepreneurs 17:31
17:31
Afspil senere
Afspil senere
Lister
Like
Liked
17:31Join us for an insightful discussion featuring one of our Program Committee members as she shares her experiences in building a startup. Inspiring women entrepreneurs to take risks demands that we also help them navigate the sometimes-tumultuous path to securing funding. We'll talk about what makes a successful pitch and how to engage with potential investors. We will also highlight some of the ideas we would love to see come through the RSAC 2025 Call for Submissions. Tune in to this podcast to learn practical tips and strategies to craft compelling submissions and get inspired to contribute your voice at RSA Conference 2025. Speakers: Gadalia Montoya Weinberg O'Bryan, Founder & CEO, Dapple Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 RSAC 2025: Call for Submissions Tips 21:55
21:55
Afspil senere
Afspil senere
Lister
Like
Liked
21:55Summer is coming to an end and fall is approaching, which means RSAC 2025 Call for Submissions will be opening soon. Each year, RSA Conference receives an incredible amount of submissions from speakers globally, but what makes a submission stand out to the Program Committee? As you explore topics and ideas, we want to share some helpful tips to keep in mind when submitting your presentation. Join this podcast with Program Committee member, John Elliot, who will share some helpful tips and guidance to those interested in submitting their ideas for RSAC 2025. Speakers: John Elliott, Principal Consultant, Withoutfire and Pluralsight Author Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Secure by Design: Transforming the Software Security Landscape 24:29
24:29
Afspil senere
Afspil senere
Lister
Like
Liked
24:29Secure by design has many core principles, including manufacturer accountability, radical transparency, and leadership-driven security prioritization. Secure by design is critical for organizations as it minimizes risks and vulnerabilities within an enterprise. Join us as we discuss a transformative approach to software development and cybersecurity. Listeners will gain insights into how this initiative is reshaping the tech industry's approach to security, moving from reactive measures to proactive, built-in safeguards. Speakers: Vaibhav Malik, Partner Solutions Architect, Cloudflare Surya Prakash, Senior Vice President, Global Financial Corporation Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Healthcare Cybersecurity: The Intersection of Patient Safety & Clinical Resiliency 29:50
29:50
Afspil senere
Afspil senere
Lister
Like
Liked
29:50Healthcare sectors need to implement a strong cybersecurity team, proactive strategies, and security awareness training, but how do they do that while prioritizing patient care? Enter the need for clinical resiliency. Join this podcast to learn actionable takeaways for building a team medical providers who also understand both the impact of cyberattacks on hospitals and how to achieve resilience in the face of an attack to ensure patient safety and care quality. Speakers: Christian Dameff, Emergency Physician and Clinical Informatics Fellow, University of California San Diego Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Guardians of Cybersecurity: Deploying IoT Devices via Drones and Dropboxes 23:05
23:05
Afspil senere
Afspil senere
Lister
Like
Liked
23:05Drones are becoming more common in skies around the world. While the initial reaction seems to be focused on privacy concerns, which are very valid, there should also be a higher focus on what someone can do with a relatively lightweight drone. Having it carry a hacking device or it being a hacking device itself is something that has not been talked about enough. Speakers: Brad Ammerman, Senior Director of Security, Prescient Security Alex Thines, Senior Security Consultant, Prescient Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 The CISA Zero Trust Maturity Model and the Five Pillars in Practice 18:44
18:44
Afspil senere
Afspil senere
Lister
Like
Liked
18:44In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to learn how to use and adapt CISA Zero Trust Maturity Model and it’s five security pillars in practice. Join this podcast to hear real-world examples of challenges, benefits, and approaches about the model. Speakers: Jason Garbis, President, Numberline Security Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 The Fundamentals: Policymakers on Cybersecurity 14:01
14:01
Afspil senere
Afspil senere
Lister
Like
Liked
14:01In case you missed out on the Bird Of Feather Session during RSA Conference 2024, here is your chance to hear about the educational resources on cybersecurity fundamentals that policymakers need to keep up in the rapidly changing regulatory environment. Learn how preparing them will support strong policies and equitable participation in the global digital economy. Join this podcast to hear some approaches and resources, as we discuss ways to build community to fill this strategic gap. Speakers: Diana Burley, Vice Provost Research & Innovation, American University Tatyana Sanchez, Content and Programming Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 The Impact of AI for Cybersecurity on the Healthcare Sector 34:45
34:45
Afspil senere
Afspil senere
Lister
Like
Liked
34:45In today’s digital world, organizations are increasingly impacted by AI for the good and bad. AI is being used in the healthcare industry for a variety of reasons. Despite AI being a resource for the healthcare sector it also comes with challenges. Join this podcast as we discuss: • How the healthcare can prepare for combatting AI-driven cyber threats • What steps should be taken now, next weeks, next months • Strategy for adoption of AI for cybersecurity • Upskilling your team • Realistic expectations…
R
RSA Conference
1 Shielding Small Businesses: Tips for Defending Against Cyber Threats 17:35
17:35
Afspil senere
Afspil senere
Lister
Like
Liked
17:35We engage in a dynamic discussion our guests who will share their experiences in cyber and thoughts on the cyber risks for small businesses where there is a crucial gap in the cybersecurity market. Focusing on the unmet needs of small businesses, guests will discuss the importance of providing support and solutions tailored to this underserved sector accompanied by use cases and real-world examples. Speakers: Tiffiny Bryant, Information Security Analyst, Shipt Inc. Nick Gipson, CEO, Gipson Cyber, Jordyn Short, Collaborator, Stats on Stats Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Inclusion Research: Women in CyberSecurity (WiCyS) 20:05
20:05
Afspil senere
Afspil senere
Lister
Like
Liked
20:05Diversity, Equity, and Inclusion (DEI) has long been talked about in an effort to diversify the workforce, but what are organizations really doing to change organizational culture. Understanding different perspectives on inclusion is key to informing how to create effective change to help attract and retain talent. Join this podcast to learn about the findings of inclusion research that Women in CyberSecurity (WiCys) have conducted. Speakers: Lynn Dohm, Executive Director, Women in CyberSecurity (WiCyS) Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 DevSecOps Insights and Exciting Horizons 25:29
25:29
Afspil senere
Afspil senere
Lister
Like
Liked
25:29Tune in as RSAC 2024 DevSecOps Program Committee Members discuss the trends pulled out from the DevSecOps track. Join this podcast to hear the latest trends, their significance, and what track submissions are telling us about today’s cybersecurity landscape and much more. Speakers: Akira Brand, Application Security Engineer, Akira Brand Consulting Jennifer Czaplewski, Senior Director, Target Chris Romeo, Chief Executive Officer, Devici Tatyana Sanchez, Content & Program Coordinator, RSA Conference Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Changing the End Game: AI-Powered Security Solutions 25:07
25:07
Afspil senere
Afspil senere
Lister
Like
Liked
25:07How can we ensure we drive product security from the get go? How can we provide security assurance throughout the protect detect and response lifecycle of our services and solutions? How can AI empower our defenders? Leaders from Microsoft and Google will share insights on how AI can improve security efficiencies for the entire product lifecycle. We review real world examples from cloud security solution providers that can benefit the broad security community and defenders. Speakers: Heather Adkins, Vice President, Security Engineering, Google Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft Aanchal Gupta, CVP, Microsoft Tatyana Sanchez, Content and Programming Coordinator, RSA Conference…
R
RSA Conference
1 Neglected Essentials: The Overlooked Basics of Cloud Security 19:03
19:03
Afspil senere
Afspil senere
Lister
Like
Liked
19:03This podcast shares research that reveals how many of the most common cloud security risks—despite being tied to basic security guidelines such as the Principle of Least Privilege—are widely overlooked in organizations of all sizes, even in those with a high maturity level in terms of cloud security. We'll explain why that is and investigate approaches to reduce your risk. Speakers: Neil Carpenter, Principal Technical Evangelist, Orca Security Bar Kaduri, Research Team Leader, Orca Security Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
R
RSA Conference
Many organizations have fallen victim to data breaches and exposure. It is crucial to strengthen security as the rise of cyberattacks increases. What are some strong measurements to reduce the risk of data exposure? Join the RSAC 2024 Governance, Risk, and Compliance Program committee as they discuss what decision-makers need to think about from a compliance perspective. Speakers: Elliott Franklin, Chief Information Security Officer, Fortitude-RE James Lugabihl, VP Security - Governance Risk & Compliance, ADP Jamie Sanderson Reid, Director, Cyber Governance Risk & Compliance (GRC), The AES Corporation Tatyana Sanchez, Content and Programming Coordinator, RSAC Kacy Zurkus, Senior Content Strategist, RSAC…
R
RSA Conference
Protecting data is a critical key when developing products, systems, or services. What are some privacy measures to consider? Join us for a discussion on the overview of Privacy By Design and how to implement it into practice. Speakers: Kim Wuyts, Manager Cyber & Privacy, PwC Belgium Tatyana Sanchez, Content and Programming Coordinator, RSAC…
R
RSA Conference
1 What's Trending in Privacy & Data Protection? 29:37
29:37
Afspil senere
Afspil senere
Lister
Like
Liked
29:37With differing privacy approaches that expand many geographies, more organizations are focused on building a strong privacy program. Is it time for Privacy by Design? And where exactly is the intersection between privacy and security? Join the RSAC 2024 Privacy & Data Protection Program Committee for insights into why privacy was a strong trend in the RSAC 2024 submissions. Speakers: John Elliott, Principal Consultant, Withoutfire & Pluralsight Author Laura Koetlze, VP, Group Research Director, Forrester Research Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
What does the cybersecurity workforce of the future looks like, and more importantly, how do we get there? Join us for a discussion on embracing the resilience and brilliance of black women is cyber, all part of the Black Women in Cyber Collective, who are working to protect our privacy and secure our world while also fostering opportunities to expand open pathways into cyber careers. Speakers: Shinesa Cambric, Principal Product Manager, Microsoft Mari Galloway, CEO & Founding Board Member, Cyberjutsu Talya Parker, Founder, Black Girls in Cyber Kacy Zurkus, Senior Content Strategist, RSA Conference…
R
RSA Conference
Recent studies have found that SMS users increasingly do not trust the confidentiality and integrity of SMS, with users also reporting that they can not trust the true identity of the sender. Cybercriminals are able to exploit the weaknesses of this authentication tool, yet it continues to be a technology widely used and relied upon for perceived security in mobile messaging. Join this podcast to learn more about the weaknesses in SMS texting and why it might be time to move on to more robust security technologies. Speakers: Tatyana Bolton, Security Policy Manager, Google Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 You Can’t Have Zero Trust Without API Security 20:06
20:06
Afspil senere
Afspil senere
Lister
Like
Liked
20:06Zero Trust Security is often associated with network access and identity access management. However, while those solutions are important and necessary, the evolution in infrastructure and the onset of new attack surfaces require us to expand our perspective and include the API layer in security strategies. Join this podcast to hear industry influencers speak to the origins and evolution of the Zero Trust Framework, why Zero Trust must include the API layer for holistic and resilient security, what each participant sees as the future of Zero Trust, and how the latest reference architecture serves to guide security experts. Richard Bird, CSO, Traceable Chase Cunningham, CSO, Ericom Software Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 The Great Debate of a Cybersecurity Skills Gap 27:21
27:21
Afspil senere
Afspil senere
Lister
Like
Liked
27:21For years, the cybersecurity industry has supported the narrative that there is a major skills gap, but some have been questioning whether the issues is an actual dearth of qualified candidates who possess the skills needed to fill open roles or an abundance of candidates with some transferable skills who aren't being given an opportunity to gain experience. Join this podcast in which we'll engage in the great debate of whether there actually is a cybersecurity skills gap.…
R
RSA Conference
1 Cybersecurity Community: Fortifying Defense Through Education and Sharing 13:03
13:03
Afspil senere
Afspil senere
Lister
Like
Liked
13:03Cyber leaders are unique in their necessity to share. Building community, leveraging best practices with organizations in the same industry is paramount to successfully protecting from threats. This podcast will delve into the world of the cybersecurity community and share some strategies, technologies, and best practices that CISOs can use to enhance the overall security posture of the organization. We'll focus on the importance of collaboration, communication, and relationship-building in cybersecurity.…
R
RSA Conference
1 Misconfigurations and the Business Implications of AI 17:26
17:26
Afspil senere
Afspil senere
Lister
Like
Liked
17:26In the race to develop the most powerful generative AI tools, businesses must take steps to avoid the inherent risks of this emerging tech. AI involves sharing massive quantities of data, so even a single misconfiguration can have serious repercussions. What are the new risks and broader business implications of AI that arise as organizations venture to harness its power? This podcast will examine that question and discuss the recent leak of 38 terabytes of data by AI engineers, as well as risk mitigation strategies that should be front of mind for developers and engineers looking to build more AI solutions.…
R
RSA Conference
1 Threat Modeling - Using the DIPP Method (Detect, Identify, Protect, Prevent) 16:38
16:38
Afspil senere
Afspil senere
Lister
Like
Liked
16:38Threat modeling is a process that is essential for organizations to use to combat threats, and for mitigating risks. Threat intelligence is a component that can be applied as a method for use with threat modeling to ensure that all risks and vulnerabilities are being properly assessed and techniques are used to protect assets. In this podcast, we'll discuss threat modeling and implementing threat intelligence to identify threat behavior and eliminate risks. Speakers: Tanisha L. Turner, Senior Security QA Engineer, Security Engineering Productivity, Elastic Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Security Testing at Scale for Cloud Native Technology 17:40
17:40
Afspil senere
Afspil senere
Lister
Like
Liked
17:40Cyberattacks have been growing in frequency and severity over the past decade and have increased exponentially with the adoption of cloud-native technology. The pressure is on for organizations to prioritize building and implementing a security testing strategy to avoid becoming the latest cyberattack headline. Speakers: Caroline Wong, Chief Strategy Officer, Cobalt Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Avoiding Costly Toolset Purchase and Resource Spend for Enterprise-Wide Threat Modeling 16:46
16:46
Afspil senere
Afspil senere
Lister
Like
Liked
16:46Threat modeling at an enterprise scale can be costly to implement, scale and maintain, but there are ways in which you can curtail spend in two key areas – threat modeling toolsets cost and resourcing cost. This podcast will discus key spend considerations including purchase model for OOTB software and services as well as resource allocation and required updates. Speakers: Karen Harris, Architect, Threat Modeling Program Lead, JP Morgan Chase Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 How to Be a Threat Modeling Subject Matter Expert 14:26
14:26
Afspil senere
Afspil senere
Lister
Like
Liked
14:26What is threat modeling and where does it fit in to the overall development process? In this podcast, we'll discuss what threat modeling is, when threat modeling activities are essential, and the skills needed to become a threat modeling expert. Speakers: Ashwini Siddhi, Senior Principal Product Security Advisor, Dell Technologies Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 CMMC: DoD's 3rd Party Supply Chain Risk Management (SCRM) Program 26:24
26:24
Afspil senere
Afspil senere
Lister
Like
Liked
26:24The Department of Defense (DoD) is implementing a 3rd Party Supply Chain Risk Management program that will require companies that receive their sensitive information to implement NIST SP 800-171 and then undergo a 3rd Party Cybersecurity Maturity Model Certification (CMMC) event. This podcast will discuss the ripple effects of the requirements and the extent of the impacts. Speakers: Matthew Titcombe, CEO, Peak InfoSec Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Are Password Managers Still Not Improving Password Habits? 18:35
18:35
Afspil senere
Afspil senere
Lister
Like
Liked
18:35Password Managers are required by for employees at most companies, but are they designed to encourage good password hygiene? We conducted a comprehensive study with users who trusts the most popular passwords managers offered in the industry. We discovered that many users are still ignoring password reset notification from their Password Managers and aim to explain why that is the case. Speakers: David Ng, Director of Product Management, Salesforce Jacky Ho, Director of Technology Regulatory Advisory, USB AG…
R
RSA Conference
1 The People-Centric Security Framework - A People Protection Perspective 21:05
21:05
Afspil senere
Afspil senere
Lister
Like
Liked
21:05Well-known frameworks and lots of advice exist to help people protect data, privacy, and devices, but minimize the implication of human factors. This podcast will discuss the PCSF and highlight the ways in which it will help organizations move one step closer to having people recognized as the new enterprise edge. The PCSF complements, and does not replace, an organization’s risk management process and cybersecurity program. Speakers: Lucia Milică Stacy, VP, Global Resident Chief Information Security Officer, Proofpoint Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Tomorrow's Cyber Workforce Requires Access to Cyber Education Today 17:16
17:16
Afspil senere
Afspil senere
Lister
Like
Liked
17:16The cybersecurity community has had lots of conversations about workforce development, but it's time to take action. Learn about the efforts to bring cybersecurity education to the K-12 sector as part of the effort to narrow the skills gap and build the next generation of cyber defenders. Speakers: Laurie Salvail, Executive Director, CYBER.ORG Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Cybersecurity Risk in Today’s Telehealth Smart Home 16:46
16:46
Afspil senere
Afspil senere
Lister
Like
Liked
16:46In order to mitigate the risks in telehealth devices, healthcare delivery organizations need to identify threats. Join this podcast to hear practical steps to implement a more robust security strategy rooted in standards and best practices that include how to use NIST Frameworks and the work being done by the NCCoE Healthcare team. Speakers: Anahi Santiago, CISO, ChristianaCare Kacy Zurkus, Senior Content Manager, RSAC This podcast is sponsored by Quantinuum. Quantinuum uses the power of quantum computing to keep organizations ahead of cyber risks by providing quantum-computing-hardened encryption keys to provably harden existing security measures.…
R
RSA Conference
1 Driving Resilience: A Discussion on the US National Cybersecurity Strategy 30:32
30:32
Afspil senere
Afspil senere
Lister
Like
Liked
30:32The White House published the US National Cybersecurity Strategy that outlines a five-pillared approach to dismantling threat actors, enabling partnerships, and investing in resilience. But what does all that mean for cyber defenders? This podcast will examine the strategy in depth to help listeners both realize the vision and understand roles, responsibilities, and resources in cyber. Speakers: Brandon Pugh, Director, Cybersecurity and Emerging Threats, R Street Institute Megan Stifel, Chief Strategy Officer, Institute for Security and Technology Kacy Zurkus, Senior Content Manager, RSA Conference…
R
RSA Conference
1 Digital Identity as an Attack Surface 15:23
15:23
Afspil senere
Afspil senere
Lister
Like
Liked
15:23Within the last decade, fraud and cyberattacks have become increasingly focused on exploiting digital identity. The exposure of digital identity as an attack surface has implications for individuals, enterprises, and even our societal structures. In this session we discuss the state of identity-based attack vectors and what the security community is doing to address them. Speakers: Gadalia Montoya Weinberg O'Bryan, CEO, Dapple Security Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Tracers in the Dark: A Discussion with Andy Greenberg 26:04
26:04
Afspil senere
Afspil senere
Lister
Like
Liked
26:04In the story of Gyge’s Ring, Plato asserts that if humans had the power to be invisible, they would act without consequence. In his book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, Greenberg details the truth of Plato’s claim as he recounts stories of criminal activity on the dark web, where people believed they were acting anonymously without the risk of getting caught. Join this podcast to hear Greenberg discuss his favorite scenes in the book that reveals how researchers and investigators were able to trace cryptocurrency exchanges. Speakers: Andy Greenberg, Senior Writer, Wired Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
1 Pulling Back the Curtain on the Dark Web Payment Card Landscape 20:04
20:04
Afspil senere
Afspil senere
Lister
Like
Liked
20:04Intrigued by the dark web payment card landscape? Join us for this RSAC 365 podcast to hear about how the dark web payment card landscape was affected by the Russia-Ukraine war, exploring everything from the magecart infections/e-skimmers, which are used to steal the payment card data to “checkers”, which are tools used by cybercriminals to check the stolen payment cards for validity and 3-D bypass methods, and the tools cybercriminals. Get a sneak peak at the upcoming “Crypto Drainer” report, which details this as-a-service tool cybercriminals use to trick crypto centric individuals into providing access to their wallets. Speakers: Ilya Volovik, Senior Manager - Payment Fraud Intelligence Team, Recorded Future Kacy Zurkus, Senior Content Manager, RSAC…
R
RSA Conference
Cybersecurity and the resiliency of space assets are a priority because of the critical infrastructure services they provide. This session will discuss the attack vectors and mitigation approaches of exploits that can impact them as well as how the cyber security and space asset resiliency range will be used to test and validate their confidentiality, integrity, and availability. Speakers: Barbara Grofe, Lead Designer, Spartan Corp Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 Critical Infrastructure at Risk: Uncovering the Danger of insecure-by-design Control System Software 28:42
28:42
Afspil senere
Afspil senere
Lister
Like
Liked
28:42In this podcast, we will uncover the realities of insecure control systems software in critical infrastructure. From discovering zero-days to exposing vulnerabilities in built-in features, we'll explore the role of both vendors and operators in safeguarding our essential utilities. By the end, listeners will have a new perspective on the need to implement strong security practices into the foundation of the control systems that make modern life possible. Don't miss out on this crucial conversation about the current state and the future of our critical infrastructure! Speakers: Brian Foster, GMS Cybersecurity Lead, South California Edison Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 A Quantum-Ready Board: Governance and Cyber Risk Oversight 21:44
21:44
Afspil senere
Afspil senere
Lister
Like
Liked
21:44There is a general lack of quantum risk awareness among board members. The emergence of powerful quantum computers are an impending threat to our digital ecosystems — e.g. mobile phones and internet — because they can conceivably crack classical encryption. A quantum algorithm with that capability already exists; yet, quantum risk management is not a standard topic discussed at board meetings. Speakers: Maëva Ghonda, Host, Quantum AI Institute Podcast and Senior Fellow of HQS Quantum Simulations Dr. Lily Chen, Project Leader, Mathematician, Cryptographic Technology Group, NIST Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 Ransomware Operators Can Circle Defenses: Proactive Defense Strategies 28:54
28:54
Afspil senere
Afspil senere
Lister
Like
Liked
28:54Ransomware Operators have not only increased the ransoms they demand but are also using additional coercion techniques to perform multifaceted extortion attacks. Between us, we have worked on several ransomware incidents observing closely the challenges that organizations face while battling and remediating ransomware incidents. Based on the learnings from responding to such incidents, we will share our learnings and thoughts on the ransomware attack life cycle, practical security controls and enforcement measures to defend against and limit the impact of ransomware attacks. Speakers: Anurag Khanna, Manager, CrowdStrike Services Thirumalai Natarajan, Senior Manager, Mandiant Consulting Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 Beyond MFA: Why Multi-factor Alone Is Not a Fail-Safe for Identity Protection 22:49
22:49
Afspil senere
Afspil senere
Lister
Like
Liked
22:49Most organizations have moved beyond the insecure username and password access control a long time ago and started using multifactor authentication. But as Yahoo, Deloitte, and LinkedIn know, MFA won’t always save the company from a data breach. Not only has MFA access been defeated multiple times by attackers, but users hate it. It’s cumbersome, annoying, increasingly exploitable. In this podcast Violet Sullivan and Jessica Smith will discuss the evolution of MFA, why and how it can be exploited, and what organizations can and should do to address access control in a way that keeps their data security and users happy. Speakers: Jessica Smith, Vice President of Client Services, AllClear ID Health Violet Sullivan, Esq. CIPP/US, Vice President of Client Engagement, Redpoint Cybersecurity Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 Transcendent Tango: The Role of Cryptography in Establishing Zero Trust Identity 12:08
12:08
Afspil senere
Afspil senere
Lister
Like
Liked
12:08In the same way that the tango begins with foundational steps, the layering of device, application/workload, and user identity forms the foundation of Zero Trust security. Each intentional step weaving to create an intricately coordinated pattern. Join us as we take a look at the cryptographic dance between keys and identity that forms the basis of and maintains Trust in a Zero Trust world. Speakers: Karen Reinhardt, Principal Engineer, Cryptographic Services, The Home Depot Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 Analyst Experience: SOC Analysts Finally Escape The Shackles Of Bad UX 21:58
21:58
Afspil senere
Afspil senere
Lister
Like
Liked
21:58Security analysts must fight both attackers and the products and services they rely on to drive their detection and response capabilities because of a lack of usability of security tools and processes. This podcast explains an emerging cybersecurity technology trend: analyst experience (AX). Join us to understand how AX can enable your team to find more effective security tools, build better workflows, and help security analysts make faster, more accurate decisions. Speakers: Allie Mellen, Analyst, Security and Risk, Forrester Research Jeff Pollard, Vice President & Principal Analyst, Forrester Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 September Spotlight: From Hacker Kid to Cyber Pro 14:54
14:54
Afspil senere
Afspil senere
Lister
Like
Liked
14:54Back in 2017 New America and The Christian Science Monitor hosted then 14-year-old and CEO of VannTechCyber LLC, Paul Vann. He was indeed a rising star in the field, but where is Vann now? Join this RSAC 365 podcast as we shine a spotlight on the making of a cyber professional. We’ll feature Paul Vann, who’s now a senior at the University of Virginia and a Developer at Cyborg Security. Vann will inspire listeners with his story of growing from a “hacker kid” to a developer working on a malware analysis tool as well as his goals and aspirations for a future in the industry. Speakers: Paul Vann, Student, University of Virginia Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 Overcoming Barriers to Intelligence Sharing 15:15
15:15
Afspil senere
Afspil senere
Lister
Like
Liked
15:15When it comes to defending critical infrastructure from cyber threats, understanding the threat landscape is critical to assessing risk and implementing a robust security strategy. Threat intelligence enables organizations to identify and react to threats, and we know that having the right attack surface intelligence informs the processes and procedures needed to quickly recover. Yet, intelligence sharing remains a problem for defenders. In this podcast we'll explore the value in public/private partnerships, the barriers to threat intelligence, and how organizations can collaborate to overcome those barriers and improve resilience. Speakers: Erin Miller, Executive Director, NCC/Space ISAC Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 What Could a U.S. Federal Data Privacy and Security Law Look Like? 21:08
21:08
Afspil senere
Afspil senere
Lister
Like
Liked
21:08Congress has tried for years to pass a comprehensive federal data privacy and security law without success, which impacts consumers, industry, and security. Meanwhile, other countries and multiple U.S. states have moved forward with laws. However, the bipartisan, bicameral American Data Privacy and Protection Act (ADPPA) could be an opportunity to change this. This podcast will cover why data privacy and security legislation is important and look at the R Street Institute’s report on reaching consensus on traditional roadblocks, specific aspects of the bill like data security, the bill’s current status and possible next steps, and remaining challenges. Speakers: Brandon Pugh, Resident Senior Fellow and Policy Counsel, Cybersecurity and Emerging Threats, R Street Institute Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 The Cyber Physical War: Does the Investment Match the Hype? 18:26
18:26
Afspil senere
Afspil senere
Lister
Like
Liked
18:26While there seems to be a growing awareness of the threats to the cyber-physical world with cybercriminals increasingly targeting industrial organizations within critical infrastructure, are current investments, regulations, and actions enough to stop attackers. In this podcast, we’ll have a follow up Q&A to the RSAC 2022 session, “The Cyber Physical War—Lessons from the Digital Front Line,” to understand what more must be done to protect industrial organizations. Speakers: Ian Bramson, Global Head of Industrial Cybersecurity, ABS Group Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 "Anatomy of Smart Living” - Limit Cyber Exposure by Embracing Mobility and IoT 19:30
19:30
Afspil senere
Afspil senere
Lister
Like
Liked
19:30We live very “smart” lives equipped to stay connected anywhere, any time. Getting connected is easy, securing it may be a fool’s errand if not approached properly. Say goodbye to the days of signature-based detection and say hello to IoT data anomaly and volatility predictive analysis for advanced “on the go” monitoring, detection and response. In this podcast, we will discuss novel approaches in using data analytics models from financial market trading systems (quant) to determine security volatility when faced with unprecedented and overwhelming volumes of data. We’ll propose potential solutions called the Cyber VIX and engineering concepts to test cyber defenses such as the “shake down test” and where failures and blind spots can be predicted and modeled. Speakers: Peter Tran, CISO & EVP Global Cyber and Product Security Solutions, InferSight LLC Kacy Zurkus, Content Strategist, RSA Conference…
R
RSA Conference
1 Incentivizing Collaboration and Promoting Zero Trust Adoption 23:20
23:20
Afspil senere
Afspil senere
Lister
Like
Liked
23:20Our world is becoming increasingly interconnected and more interdependent than ever before. We continue to see an increase in cybercrime, which brings us to an inflection point - who's responsible for addressing security in our integrated digital world and what should be the role of policymakers and industry regulators in promoting good cyber hygiene and incentivizing collaboration? Speakers: Shinesa Cambric, CISSP, CISA, CISM, CDPSE, Product Manager, Microsoft Jay Hira, Cyber Security Strategy and Transformation Director This podcast is sponsored by DNSFilter. DNSFilter offers industry leading threat protection for companies across the globe. Utilizing powerful artificial intelligence, we identify and block threats 7 days earlier than competitors.…
R
RSA Conference
1 Effective or Confusing: New Structures and Regulations in Cybersecurity 23:05
23:05
Afspil senere
Afspil senere
Lister
Like
Liked
23:05Over the course of the last two years, cybersecurity planning and thought leadership have picked up with a parallel increase in regulation, Congressional action, and government reorganization. The Cyberspace Solarium Commission recommended and got a National Cyber Director and incident reporting legislation through the hard work of the SASC, HASC, and HSGAC, but where do these changes leave us now? Is the National Cyber Director leading the federal government effort, or are government turf battles making leadership in cyber confusing? And what about incident reporting - how many new proposals have we seen, and which are the most critical to understand? Join us for a discussion of all of these issues and what the cybersecurity landscape might look like in a year or five years from now. Speakers: Tatyana Bolton, Policy Director, Cybersecurity and Emerging Threats, The R Street Institute Kacy Zurkus, Content Strategist, RSAC…
R
RSA Conference
1 What is DevSecOps and why is it important? 18:23
18:23
Afspil senere
Afspil senere
Lister
Like
Liked
18:23Integrating security into the development lifecycle can be a challenge, especially for those who don’t understand why security matters to development and operations. What’s the ROI of DevSecOps? What are the key KPIs? Join us for an insightful conversation that explains why DevSecOps is important while shining a spotlight on some DevSecOps bloopers to avoid. Our guests will also expose the cost of bad DevSecOps and offer suggestions for how to measure developers on security. Speakers: Keenan Skelly, CEO, Shadowbyte Stephanie Simpson, Vice President of Product, SCYTHE…
R
RSA Conference
1 Affirming LGBTQ Populations in Virtual Health through DevSecOps & Software Integrity 30:55
30:55
Afspil senere
Afspil senere
Lister
Like
Liked
30:55Virtual health providers create favorable conditions for the LGBTQ population's access to healthcare, an influx of electronic personal health information, and massive increases in cyber threats. Using software flaws, bad actors increasingly target healthcare systems to steal, monetize, and affect availability of data. This session explores software integrity and DevSecOps approaches to secure highly interconnected digital healthcare systems. Speakers: Safi Mojidi, Head of InfoSec, FOLX Health Kacy Zurkus, Content Strategist, RSA Conference…
Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.