Brakeing Down Security Podcast show

Brakeing Down Security Podcast

Summary: A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Bryan Brake, Amanda Berlin, Brian Boettcher
  • Copyright: Copyright 2020. All rights reserved

Podcasts:

 2020-046-solarwinds-fireeye-breaches-GE-medical-device-issues-and-2021_predictions | File Type: audio/mpeg | Duration: 52:02

2020-046-solarwinds-fireeye-breaches-GE-medical-device-issues-and-2021_predictions

 SPONSORED- Nathanael Iversen from Illumio, future of microsegmentation, | File Type: audio/mpeg | Duration: 36:30

What is the difference between having a proactive vs. reactive security strategy? What does micro-segmentation adoption look like as we head into the new year? What is the future of micro-segmentation?  Segmentation of database areas? Logs?

 2020-045-Marco Salvati, supporting open source devs, incentivizing leeching companies who don't give back- part2 | File Type: audio/mpeg | Duration: 44:33

What is Porchetta Industries? What is the current problem with supporting opensource projects? How are you working to solve the problem

 2020-044-Marcello Salvati (@byt3bl33d3r), porchetta industries, supporting opensource tool creators, sponsorship model | File Type: audio/mpeg | Duration: 29:18

What is Porchetta Industries? What is the current problem with supporting opensource projects? How are you working to solve the problem

 2020-043-Software_Defined_Radio-Sebastien_dudek-RF-attacks- IoT and car RF attacks | File Type: audio/mpeg | Duration: 31:42

Why we are here today? What kind of hardware or software do you need? Why would a security professional want to know how to use SDR tools and attacks? What other kinds of attacks can be launched? What are the current limitations to testing wireless and RF related systems? What about custom wireless implementations? I’m a wireless manufacturer of some kind of device. What are some things I could do to ensure that the types of attacks we discussed here cannot affect me?

 SPONSORED Podcast: Katey Wood from Illumio on deployment and using WIndows Filtering Platform | File Type: audio/mpeg | Duration: 42:53

SPONSORED Podcast: Katey Wood from Illumio on deployment and using WIndows Filtering Platform

 2020-042-Kim Crawley and Phillip Wylie discuss "Pentester Blueprint", moving into pentesting career | File Type: audio/mpeg | Duration: 01:10:39

topics discussed: Why did you write the book? What is a pentester? Skills needed Education of hacker Building a lab Kali linux Pentester Framework Docker OWASP Juice Box Vulnhub Overthewire PicoCTF Developing a plan Gaining experience Gaining employment How companies can hire better qualified candidates

 2020-041- Conor Sherman, IR stories, cost of not prepping for an incident | File Type: audio/mpeg | Duration: 01:17:47

man's search for meaning poor planning means poor performance in an incident SHIELD from MITRE RTO/RPO metrics 7 steps to building

 2020-040- Jeremy Mio, State of Ohio Election Security | File Type: audio/mpeg | Duration: 01:03:35

intro discuss updates between the 2018 show and this month How has Ohio standardized IT and Security management? Voting chain of custody best practices

 2020-039-Philip Beyer-leadership- making an impact | File Type: audio/mpeg | Duration: 56:39

making an impact knowing when to start making changes in the organization best methods to encourage org change management and build out your security program

 SPONSORED PODCAST: Neil Patel, Illumio on Microsegmentation, and adopting the Zero Trust philosophy | File Type: audio/mpeg | Duration: 33:18

Neil Patel (Sr. Technical Marketing Engineer), illumio  adopting zero trust philosophy Implementing #zeroTrust in organization Challenges and benefits to microsegmentation? Forrester Wave Report: https://www.illumio.com/resource-center/research-report/forrester-wave-zero-trust-2020  https://www.illumio.com/ Twitter: https://twitter.com/illumio

 2020-038-Phil_Beyer-etsy-CISO-leadership-making-an-impact | File Type: audio/mpeg | Duration: 41:45

A little bit of background learning how to 'own' a program wasting 'consultant' time by checking a box "thinking fast and slow" developing skills and expertise

 2020-037-Katie Moussouris, Implementing VCMM, diversity in job descriptions - Part 2 | File Type: audio/mpeg | Duration: 39:18

1st steps to implement in the VCMM What can be done to ensure management buy-in what would a pipeline for intake of vulnerabilities look like?

 2020-036-Katie Moussouris, Vulnerability Coordination Maturity Model, when are you ready for a bug bounty - Part 1 | File Type: audio/mpeg | Duration: 37:08

Part 1 of 2 Introduce Katie Moussouris, CEO and owner of Luta Security What is the VCMM? Who are the stakeholders involved in a Vuln. Disclosure program How mature does the organization need to be to implement a Vuln disclosure program? How is this used to communicate vulnerabilities to other orgs?

 2020-035-ransomware death in Germany, Zerologon woes, drovorub, and corp data on personal devices | File Type: audio/mpeg | Duration: 01:09:09

Plumbing issues Amanda is taking over her company's social media this week (28th of September) Bsides Edmonton report Personal devices have corporate data Someone died and hospital is blaming ransomware drovorub linux malware and more!

Comments

Login or signup comment.