Incident Technique public
[search 0]
More
Download the App!
show episodes
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Welcome to EZ 𝐓𝐡𝐞 𝐄𝐧𝐠𝐥𝐢𝐬𝐡 𝐙𝐨𝐧𝐞. This is your host Ziyad. My goal is to help you practice and improve your English the easy way through fun, motivational, and English skill-based content. I have 10+ years of English teaching experience. Practice with EZ on TikTok here https://www.tiktok.com/@theenglishzone Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Loading …
show series
 
Hosts Tom Wilkie and Matt Toback sit down with guests Liz Rice from Isovalent and Mario Macías from Grafana Labs to explore how eBPF is revolutionizing observability, networking, and security in modern infrastructure. They cover what eBPF is (hint: it's no longer just about packet filtering!), the performance advantages of eBPF-based instrumentatio…
  continue reading
 
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
  continue reading
 
Let's talk about how important having a customer success manager, or equivalent, to assist you with your tool integration can make the difference between resource fatigue and success. On top of having solid relationships with our tool vendors, long time CISO Jake Lorz, shares with us how important tool interoperability is, proper governance reviews…
  continue reading
 
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Show Notes: https://cisostoriespodcast.co…
  continue reading
 
Let's talk to cybersecurity expert, Lalisha Hurt, about her approach to selecting the right tools for your organization by using proven methods such as referencing the Gartner Magic Quadrant, thinking about the entire IT portfolio as part of your selection process, and what a successful 'Vendor Day' can do! Visit https://cisostoriespodcast.com for …
  continue reading
 
People don't understand the power of words, that's why they are powerless. You can change that! Listen and pay attention. --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support
  continue reading
 
In this episode of Grafana's Big Tent, hosts Mat Ryer and Tom Wilkie dive into the world of monitoring Kubernetes with guests Vasil Kaftandzhiev from Grafana Labs and Dio Tsoumas who leads the DevOps team at the consumer research company GWI. They explore why traditional monitoring techniques aren't enough for Kubernetes environments and discuss th…
  continue reading
 
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
  continue reading
 
What if there was more to making those impactful decisions that you haven’t considered? Let’s talk about how being open minded can directly impact the success of tool selection and optimization in your company. Is a SOC report enough or are there other criteria needed to make that risk based decision? Let’s discuss cognitive biases in tool selectio…
  continue reading
 
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Show Notes: https://cisostoriespodcast.com/csp-195
  continue reading
 
Let’s talk to our favorite Tokyo security leader about how she has experienced tool selection across the world. To be risk adverse or not to be risk adverse. What a question! Segment Resources: https://www.youtube.com/watch?v=BdFzJxSemKo Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp…
  continue reading
 
Phrasal Verbs are a big part of English language, especially colloquial English, spoken daily by native speakers. If you don't understand phrasal verbs, you will NOT be able to understand American native speakers. Watch this on Youtube HERE! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
  continue reading
 
Join host Mat Ryer as he explores the world of Adaptive Metrics with Grafana Labs engineers Patrick Oyarzun and Mauro Stettler, alongside guest Oren Lion from TeleTracking. What started as a hackathon project has evolved into a game-changing feature that helps organizations manage their metrics more efficiently and cost-effectively. They discuss th…
  continue reading
 
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
  continue reading
 
Hear from expert TimBall, CISO for NGO-ISAC, on his experiences in the industry and how he advises his members on finding the right tool. Especially when it comes to making sure the tool isn’t a ‘shiny object’ purchase but actually addressing your organizations underlying issues and bringing value! Bonus, let’s talk about election security! Segment…
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
  continue reading
 
Learning English is NOT difficult; rather, it is EASY! It's just difficult for you to practice and stay focused for even 5 minutes! Watch this video to help you build the habits YOU NEED for boosting your English in no time! Watch the YouTube video HERE! --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
  continue reading
 
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
  continue reading
 
Let’s talk about how regardless of your organizations data footprint being in the cloud or on prem, or if you’re a billion dollar organization or smaller, if the adversaries want in, they will find a way. Don’t fall victim because of bad cyber hygiene but instead work your experiences, your leadership, and train your people to limit exposure. Hear …
  continue reading
 
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
  continue reading
 
Send us a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University. Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital…
  continue reading
 
In this episode of Grafana's Big Tent, host Matt Toback explores the world of DDoS protection and observability with guests Alex Forster, Engineering Manager at CloudFlare, and Dee Kitchen, VP of Engineering at Grafana Labs. They discuss the challenges of detecting and mitigating DDoS attacks, the importance of automation in maintaining high availa…
  continue reading
 
We are living at an age where success is only measured by achieving goals and never failing and they say that if you think positive things only, you will attract ONLY good and positive things. That's a wrong approach. Here's a better and more effective alternative to "manifestation". You can also watch the Youtube video lesson here! --- Support thi…
  continue reading
 
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
  continue reading
 
Let’s talk about the vCISO’s approach to Incident Response advisory with clients; particularly small and medium sized businesses (SMB). How can your cyber liability insurance support your organization outside of when an incident occurs? We will discuss strategies SMBs can take to strengthen their IR plans while keeping in mind their business needs …
  continue reading
 
This is part of a 30 day English course for beginner English learners. You can watch this lesson on YouTube as well as the other lessons. Click here. Subscribe on Youtube: https://www.youtube.com/@theenglishzone Follow on Instagram: @TheEnglishZone_ --- Support this podcast: https://podcasters.spotify.com/pod/show/theenglishzone/support…
  continue reading
 
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
  continue reading
 
Listen to the importance of legal relationships and interaction with the CISO and security program. Jess and Joe talk about the need for legal to understand the security team's day to day and also what incident response means to your organization. Bringing your legal reps into the folds when a breach happens is too late! Work as a team early to mak…
  continue reading
 
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
  continue reading
 
In this episode, hosts Tom Wilkie and Mat Ryer are teaming up with Grafana Labs’ Devin Cheevers and Prezi’s Alex Koehler to tackle the world of on-call responsibilities and incident management. Alex digs into Prezi's tech stack and provides a real-world look at observability practices and the lessons learned from managing a complex microservices ar…
  continue reading
 
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
  continue reading
 
Todd Fitzgerald will be moving on from the CISO STORIES podcast after 185+ episodes, which was initiated almost 4 years ago following the publication of the #1 Best-Selling CISO COMPASS book, which has guided 1000’s of emerging, current, experienced, and new CISOs and their teams in their journey to protect our organizations’ and nation’s informati…
  continue reading
 
Cyber Essentials - Part 2:We first tackled cyber essentials in 2021 - since then there have been a number of updates and changes, as well as our understanding changing. We are therefore revisiting CE. In this part we cover 8 more tips to achieve CE, including the elements that are not obvious. This advice stems from us advising and supporting compl…
  continue reading
 
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
  continue reading
 
Vulnerabilities are the ‘front doors’ for attackers to infiltrate our systems and a key process organizations must get right into order to protect our systems and information assets. Join us as we discuss vulnerability management, identification of assets, prioritization, threat intelligence, leveraging tools, desired vulnerability product features…
  continue reading
 
To kick off season two of Grafana's Big Tent podcast, our host Mat Ryer is back and he's bringing along some heavy hitters! Get ready for a deep dive into the world of caching with Memcached maintainer Alan Kasindorf (aka dormando), along with caching aficionados Danny Kopping and Ed Welch. They’ll discuss CPU-level to application-level caching and…
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
Rapid advancement in the sophistication and availability of "deepfake" technology enabled by generative AI - the ability to generate convincing multimedia and interactive representations indistinguishable from the real thing - presents new and growing challenges for CISOs seeking to combat fraud, intrusion, disinformation, and other adverse consequ…
  continue reading
 
Loading …

Quick Reference Guide