Afleveringen
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Wendy Nather a strategist, research director, former industry analyst and former CISO, and much more. During this podcast we discussed Wendy's idea that technology and security should be easy to use like a spoon, unless you are a toddler. Keep listening as the conversation morphs into how intimacy means lower security. Wrapping up with some great advice on what we owe each other and our civic duty in cyberspace and how it applies to The Human Attack Surface.
Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Dave Kennedy a security pen tester, CEO, author, speaker, and much more. During this podcast we discussed Daves take on the three legged stool of security, people, process and technology, along with an anecdote of how he defeated MFA. Wrapping up with some great advice on how to implement a human-to-human connection when reporting security incidents and how it applies to The Human Attack Surface.
Music was created for this podcast by y3t1.
-
Zijn er afleveringen die ontbreken?
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Ean Meyer a security assurance at Marriott Vacations Worldwide and an educator. During this podcast we discussed Ean's take on motivating end users to help with security incident reporting to our listeners and how it applies to The Human Attack Surface. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Chris Roberts a security researcher, breaker of things, and fixer of things. Currently a CISO at Boom Supersonic. During this podcast we discussed Chris's take disinformation, and provide sage advice "ask more questions and challenge assumptions" to our listeners and how it applies to The Human Attack Surface. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Mz Bat former NASA security analyst and currently a Security Director at Krebs Stamos Group and ethical hacker. Mz Bat wrangled in a surprise guest, Chris Krebs! Chris is the former Director of CISA until fired by Tweet. During this podcast we discussed disinformation, and best practices to protect users with our guests and how it applies to The Human Attack Surface. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Jeff Man former NSA DoD cryptanalyst and currently a PCI QSA and ethical hacker. Jeff introduces the three legged stool of people, processes, and technology and how it applies to The Human Attack Surface. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are discussing the human attack surface (THAS) with Chris Silvers from CG Silvers, a professional social engineer. Chris provides deep insights into protecting users and that training is for dogs, we educate people. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are introducing the human attack surface as an attack vector and how to protect this valuable resource. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are giving up on controlling ransomware, followed by a recap of season one. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are looking at phishing. Specifically, phishing awareness training value or abandoning the practice altogether. Wolf recommends the use of passwordless authentication as a solution and Dave argues we need better trained users. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode we are looking at security frameworks and whether or not they provide a genuine value or is another way for vendors to gain revenue. Listen closely, we may save you some of your valuable time. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. This is the third and final part of a three part series on privacy. Now we discuss consumer privacy from the perspective of the consumer and corporation. Too many metaphors in this episode but all have a tactical theme. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. This is the second part of a three part series on privacy. We discuss corporate privacy where you hear the perspective of the security executive and the security analyst along with a some homework for you. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. This is the first part of a three part series on privacy. We discuss personal privacy, what needs protecting and some advice on tactical methods for protecting your personal privacy. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode Wolf and Dave argue the value of having a solid risk management practice utilizing your risk appetite and risk tolerance. We also introduced a tool to help those needing help to get started. Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode Wolf and Dave ague the differences between Information Security in comparison to Cyber Security. And we made a game out of it! Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. In this episode Wolf and Dave discuss the super short question, but incredibly challenging one to answer, "Am I secure?" Music was created for this podcast by y3t1.
-
Welcome to Tactical Security! Where we argue cybersecurity practices from a technical and managerial standpoint. This is the first episode for the first season. We discuss the fruition of this podcast and the difference between being tactical and strategic from a security perspective, as well as, when to be tactical. Music was created for this podcast by y3t1.