Brakeing Down Security Podcast
Summary: A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
- Visit Website
- RSS
- Artist: Bryan Brake, Amanda Berlin, Brian Boettcher
- Copyright: Copyright 2020. All rights reserved
Podcasts:
2020-046-solarwinds-fireeye-breaches-GE-medical-device-issues-and-2021_predictions
What is the difference between having a proactive vs. reactive security strategy? What does micro-segmentation adoption look like as we head into the new year? What is the future of micro-segmentation? Segmentation of database areas? Logs?
What is Porchetta Industries? What is the current problem with supporting opensource projects? How are you working to solve the problem
What is Porchetta Industries? What is the current problem with supporting opensource projects? How are you working to solve the problem
Why we are here today? What kind of hardware or software do you need? Why would a security professional want to know how to use SDR tools and attacks? What other kinds of attacks can be launched? What are the current limitations to testing wireless and RF related systems? What about custom wireless implementations? I’m a wireless manufacturer of some kind of device. What are some things I could do to ensure that the types of attacks we discussed here cannot affect me?
SPONSORED Podcast: Katey Wood from Illumio on deployment and using WIndows Filtering Platform
topics discussed: Why did you write the book? What is a pentester? Skills needed Education of hacker Building a lab Kali linux Pentester Framework Docker OWASP Juice Box Vulnhub Overthewire PicoCTF Developing a plan Gaining experience Gaining employment How companies can hire better qualified candidates
man's search for meaning poor planning means poor performance in an incident SHIELD from MITRE RTO/RPO metrics 7 steps to building
intro discuss updates between the 2018 show and this month How has Ohio standardized IT and Security management? Voting chain of custody best practices
making an impact knowing when to start making changes in the organization best methods to encourage org change management and build out your security program
Neil Patel (Sr. Technical Marketing Engineer), illumio adopting zero trust philosophy Implementing #zeroTrust in organization Challenges and benefits to microsegmentation? Forrester Wave Report: https://www.illumio.com/resource-center/research-report/forrester-wave-zero-trust-2020 https://www.illumio.com/ Twitter: https://twitter.com/illumio
A little bit of background learning how to 'own' a program wasting 'consultant' time by checking a box "thinking fast and slow" developing skills and expertise
1st steps to implement in the VCMM What can be done to ensure management buy-in what would a pipeline for intake of vulnerabilities look like?
Part 1 of 2 Introduce Katie Moussouris, CEO and owner of Luta Security What is the VCMM? Who are the stakeholders involved in a Vuln. Disclosure program How mature does the organization need to be to implement a Vuln disclosure program? How is this used to communicate vulnerabilities to other orgs?
Plumbing issues Amanda is taking over her company's social media this week (28th of September) Bsides Edmonton report Personal devices have corporate data Someone died and hospital is blaming ransomware drovorub linux malware and more!