Host John Bambenek discusses complex cybersecurity issues
…
continue reading
Netenrich threat researcher and security expert John Bambenek interviews leading security experts and threat researchers on the latest cyber threats and attacks, and what organizations need to do. Threat researchers, analysts, and SOC teams will gain insights on the latest techniques and approaches to advanced detection, investigation, and response. Learn how enterprises are modernizing outdated systems by adopting data analytics to gain increased visibility, intelligence and efficiencies to ...
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading
1
Fear, Loathing, and Responsible Disclosure
40:57
40:57
Play later
Play later
Lists
Like
Liked
40:57
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and ho…
…
continue reading
1
Script Kiddies or APT: Inside the World of DDoS
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.…
…
continue reading
One of the great things about cybersecurity is that there are always new problems to research and try to solve. Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application.By Netenrich
…
continue reading
1
Cyber Security and Meat Space: Insights From Malware Targeting the Power Grid
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he …
…
continue reading
1
Threat Actors and Making DNS Fail Harder and at Greater Scale than Ever Before
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCart…
…
continue reading
1
25 years of SIEM: The Rocky Journey to Autonomic Security Operations
52:06
52:06
Play later
Play later
Lists
Like
Liked
52:06
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?…
…
continue reading
1
Toil Reduction as a Service - Improving Automation in Threat Detection and Analytics
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35
We are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations.By Netenrich
…
continue reading
1
Data Dumpster Fires, How to Make Your SIEM Not Suck
49:46
49:46
Play later
Play later
Lists
Like
Liked
49:46
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize securit…
…
continue reading
Muddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.By Netenrich
…
continue reading
In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work.By Netenrich
…
continue reading
1
Threat Hunting: Finding Malicious Phishing Domains
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20
John Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks.By Netenrich
…
continue reading
1
How business email compromises attack our emotions and bottom line
33:35
33:35
Play later
Play later
Lists
Like
Liked
33:35
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can…
…
continue reading
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations …
…
continue reading
1
Dan DeCloss, Founder, President and CEO at PlexTrac; Perpetual Asker of Questions
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01
Daniel DeCloss is Founder and CEO of PlexTrac and has over 15 years of experience in Cybersecurity. Dan started his career in the Department of Defense then moved to private sector consulting where he worked at companies like Veracode as a Principal Consultant in Penetration Testing. He also served as a Principal Security Engineer for the Mayo Clin…
…
continue reading
1
Michael Manrod, CISO at Grand Canyon Education
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03
Michael Manrod, CISO at Grand Canyon Education Mike Manrod, MSISE, CCSBA, CSSBB, CISSP, Chief Information Security Officer--Mike presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff and information asset…
…
continue reading
1
Anu Kukar - Cybersecurity Career Transitioner; Founded Global Campaign Switch2Cyber™
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49
Anu Kukar is an industry award winner, international keynote speaker and diverse executive with 20 years of experience in both consulting and industry. She has spoken 60+ events, published articles and been a guest on podcasts globally across 9 countries. She shares insights and provides practical tips through her unique storytelling whilst taking …
…
continue reading
1
Alex Rhodes, CISSP - Cybersecurity Research Engineer and Space Cyber Affluent; Youth and Community Engagement Director
44:52
44:52
Play later
Play later
Lists
Like
Liked
44:52
Alex Rhodes is a Cybersecurity Research Engineer and Space Cyber affluent. He also serves on the board of advisors and as Youth and Community Director for Whole Cyber Human Initiative. He's retired from the U.S. Army in 2018 as the Assistant Special Agent in Charge of the Digital Forensics Research Branch for the Army Criminal Investigative Divisio…
…
continue reading
1
Val Mukherjee, CISSP, Chairman & Founder, Cyber Future Foundation & Servant Leader
51:01
51:01
Play later
Play later
Lists
Like
Liked
51:01
About Valmiki Mukherjee: Valmiki (Val) is Chairman and Founder of Cyber Future Foundation and a globally recognized expert in the cyber and cloud security industry with a focus on innovation and collaboration to address the Information Security needs of the future. He previously served as an Executive Director in the Cyber Advisory Services at EY. …
…
continue reading
1
Michael Gregg, CISSP, Chief Information Security Officer, North Dakota Information Technology - Be Legendary
48:31
48:31
Play later
Play later
Lists
Like
Liked
48:31
About Michael Gregg: Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues. With Michael’s cyber experience span being over a period of two decade…
…
continue reading
1
Christophe Foulon, CISSP, Workforce Development and Research Director, Whole Cyber Human Initiative
39:36
39:36
Play later
Play later
Lists
Like
Liked
39:36
About Christophe Foulon: Christophe Foulon, senior manager and cybersecurity consultant at F10 FinTech, brings over 15 years of experience as a CISO, vCISO, information security manager, adjunct professor, author, and cybersecurity strategist with a passion for customer service, process improvement, and information security. He also has spent more …
…
continue reading
1
Shefali Mookencherry, CISO, Edward-Elmhurst Health; Adjunct Professor; Principal Advisor at Impact Advisors
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34
About Shefali Mookencherry Shefali Mookencherry is CISO at Edward-Elmhurst Health, has extensive experience in healthcare cybersecurity, HIPAA, PCI, Promoting Interoperability and revenue cycle areas, including 30+ years in the healthcare industry, with fifteen spent in senior management positions. She is currently a CISO, who is responsible for de…
…
continue reading
1
John Bambenek - Principal Threat Hunter at Netenrich
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19
John Bambenek - Principal Threat Hunter at Netenrich; Chief Architect of the Cyber Panopticon; Incident Handler for Internet Storm Center About John Bambenek: John Bambenek is an information security practitioner from Champaign, Illinois. As a graduate from the University of Illinois with a B.A. in Theoretical Astrophysics (emphasis in extragalacti…
…
continue reading
1
Chris Russell - CISO, tZERO, Cybersecurity Mentor, Snyk Ambassador, Advisory Council Member at NightDragon
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55
CHRISTOPHER RUSSELL, CISO, tZERO Group About Christopher Russell: Christopher Russell is the Chief Information Security Officer for tZERO. Apart from holding a master’s degree in cybersecurity, he also has several certifications in cloud security, endpoint detection and response, SIEM, NGFWs, and blockchain. He has a background as a human intellige…
…
continue reading
1
Valarie Findlay - President / Chief Scientist, TIGIR Secure; Cybersecurity Powerful Force
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23
VALARIE FINDLAY, President / Chief Scientist, TIGIR Secure About Valarie Findlay: Professionally, Valarie has over twenty years in national security, intelligence and threat analysis for US and Canadian governments. From this experience, she developed the methodology and functionality for TIGIR to meet a growing risk assessment and compliance need …
…
continue reading
1
Dr. Chase Cunningham - Zero Trust Warrior; CSO at Ericom Software; US Navy Veteran; Author
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25
Dr. Chase Cunningham is the Chief Security Strategy Officer (CSO) at Ericom Software. Previously he was Principal Analyst at Forrester serving Security and Risk professionals. Prior to Forrester Research, Chase was the director of cyber threat intelligence with Armor, where he designed and managed the cloud security and intelligence engine for thei…
…
continue reading
1
Paul Cummings - U.S. Navy Veteran Turned Cybersecurity Warrior and Servant Leader; President and Founder of Whole Cyber Human Initiative
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06
About Paul Cummings: Visionary Paul Cummings is a retired 20-year US Navy Information Systems Technology Chief, currently working as an Information Systems Security Engineer and Cyber Security Research Engineer for Stephenson Technologies Corporation. He brings a comprehensive background in executive-level planning, managing IT and Cyber Security t…
…
continue reading
1
Josh Mason - CEO & Founder of Cyber Supply Drop; Red Team Instructor at INE; Retired Air Force Pilot
42:03
42:03
Play later
Play later
Lists
Like
Liked
42:03
Josh Mason is the CEO and Founder of Cyber Supply Drop. He runs giveaways that provide participants with free vouchers for training and certification exams. He’s also a Red Team instructor at INE, a huge advocate and mentor to veterans breaking into cyber, and a very active contributor in the community. He’s also an instructor for WithYouWithMe, an…
…
continue reading
1
Andrea Bonime-Blanc - CEO & Founder, GEC Risk Advisory LLC; Global Ethicist; NYU Cybersecurity Professor; Book Author
46:01
46:01
Play later
Play later
Lists
Like
Liked
46:01
Dr. Bonime-Blanc spent two decades as a c-suite global corporate executive at Bertelsmann, Verint, and PSEG overseeing legal, governance, risk, ethics, corporate responsibility, crisis management, compliance, audit, InfoSec and environmental health and safety, among other functions. She began her career as an international corporate lawyer at Clear…
…
continue reading
1
Lola Obamehinti - eBay Cybersecurity Force to be Reckoned with; Security Awareness Advocate; Mixing Tech & Fashion
25:07
25:07
Play later
Play later
Lists
Like
Liked
25:07
Lola Obamehinti has a background in journalism and technology. Lola is Business Ethics Officer, Security Awareness & Training Lead at eBay. She graduated with a BA in Journalism from SMU and obtained an MS in Information Science from UNT in 2017. Currently, Lola is the Global Information Security Training & Communications Lead and a Business Ethics…
…
continue reading
1
George Finney - CSO at Southern Methodist University & Author of Well Aware; "I love being able to take apart a problem and find a good solution for it."
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40
George Finney, CSO at Southern Methodist University; Author of Well Aware: Master The Nine Cybersecurity Habits to Protect Your Future George Finney is the Chief Security Officer (CSO) and Director of Digital Interests for Southern Methodist University. George works in a variety of areas at SMU including facilitating IT Security and Compliance, inc…
…
continue reading
1
Steve Zalewski - Former CISO at Levi Strauss & CO; Cybersecurity Advisor; Evolving the Security Vendor Relationship with CISOs
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41
Steve Zalewski was formerly the Chief Information Security Officer at Levi Strauss & Co., a global leader in jeanswear. Prior to Levi Strauss & Co., Steve was the Managing Enterprise Security Architect responsible for cybersecurity critical infrastructure protection at Pacific Gas & Electric Company. Earlier in his career, Steve has held leadership…
…
continue reading
1
Diana Kelley – CTO & Founding Partner, Security Curve; Chief vCISO, Salt Cybersecurity, Board Member and Inclusion Working Group Champion at WiCyS
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37
About Our Diary Entry: Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champ…
…
continue reading
1
Nick Werner - Application Security Engineer at Experian; Influencing & Sharing Advice for Cyber Career Seekers
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43
About Nick Werner: Nick is an application security engineer and penetration tester and he is passionate about mentoring and helping others in the community break into cybersecurity. He has published a hand full of articles that discuss how to get your foot in the door, what skills are necessary for certain security positions, and how to gain those …
…
continue reading
1
Shawn Bowen - CISO, World Fuel Services; Trusted Board Advisor, First CISO Marine Corps Intelligence
50:14
50:14
Play later
Play later
Lists
Like
Liked
50:14
Shawn Bowen is the Vice President and Chief Information Security Officer of World Fuel Services, a Fortune 500 energy, commodities, and services company. He was formerly the Global Head of IT Security and Compliance (Chief Information Security Officer) for Restaurant Brands International (parent company of Burger King, Popeyes Louisiana Kitchen, an…
…
continue reading
1
Naomi Buckwalter, Director of Information Security & IT - Getting Past Gatekeepers & Helping Others Break into Cybersecurity
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14
This week’s guest is persistent and has turned her passion into fuel to fight the good fight and help entry level people break into cybersecurity, while movin’ past the gatekeepers. Naomi Buckwalter, CISSP CISM is the Director of Information Security & IT at Beam Technologies. She has over 20 years' experience in IT and Security and has held roles …
…
continue reading
1
Chris Morales, CISO at Netenrich - Quick Witted Veteran, Fueled by Data Analytics
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45
About Chris Morales: We’re here this week with an AI and threat modeling guru, Chris Morales! He’s Netenrich’s FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company’s security solutions and processes. Chris has 20-something years of information security experience, having …
…
continue reading
1
Dan Lohrmann, Chief Strategist and CSO for Security Mentor – Yorkshire Tea Drinker!
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43
This week we chat with the guy who served as the first CISO for the state of Michigan, Dan Lohrmann in May 2002. Today he serves as Chief Security Officer at Security Mentor, Inc. He has advised senior leaders at the White House, National Governors™ Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security…
…
continue reading
1
Saepio – Greg Hatch, CEO | Dan Ward, CTO at Saepio – Cyber Superheroes!
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48
This episode includes quite the pair – Greg Hatch, CEO, and Dan Ward, CTO, of a new cybersecurity startup focused on Continuous Security Improvement™ (CSI). As serious as cybersecurity is for everyone and businesses, Greg still finds time to keep a sense of humor and have a positive impact on others. Dan is more than the technical brains behind Sae…
…
continue reading
1
Les Correia, Global Head of Application Security at The Estée Lauder Companies – Powerful Intriguing Force!
47:25
47:25
Play later
Play later
Lists
Like
Liked
47:25
Les Correia, Global Head of Application Security at The Estée Lauder Companies – Powerful Intriguing Force! This week we welcome the worldly Les Correia, who is the Global Head of Application Security at The Estée Lauder Companies Inc. In a previous life he held Senior/Advisory roles providing thought leadership at AT&T, Lucent, INS (now BT Profess…
…
continue reading
1
James Azar - CEO at CyberHub; CISO; Espresso Lovin’ Non-Stop, Doesn’t Stop!
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28
This week captures the one and only, James Azar, CISO – CISSP, Host of CISO Talk Podcast and CyberHub Podcast. Hopped up on his daily espressos he brings passion, energy and opinions to share about his journey into cybersecurity and views on leadership. As much as he challenges all of us, not just on cybersecurity, but on geopolitical issues, he is…
…
continue reading
1
I'm Mary N. Chaney, ESQ., Information Security & Privacy Expert - MIC drop!
50:00
50:00
Play later
Play later
Lists
Like
Liked
50:00
This week we have the pleasure of having Mary N. Chaney, someone who's had one heck of a journey through our industry. Mary is a former Federal Bureau of Investigation (FBI) Special Agent where she investigated cybercrime and served as their Information Systems Security Officer. Currently, she practices cyber law for her own firm, specializing in h…
…
continue reading
The CISO Diaries is focused on the human side of CISO leadership. Not one path is alike and that draws the allure of getting to know those that are keeping businesses and people protected. This introduction episode is a kick off to get to know hosts, Leah McLean and Syya Yasotornrat. Guests and audiences will experience authenticity, thoughtful con…
…
continue reading
1
Cybersecurity Today with John Bambenek Episode #38
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Greg Otto of cyberscoop.com.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #37
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Chris Bing of cyberscoop.com.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #36
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today, John talked with Greg Otto from Cyberscoop.com.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #35
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Greg Otto from Cyberscoop.com.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #34
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Zaid Shoorbajee of CyberScoop.com and Christine Schoellhorn of Security Planner.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #33
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Greg Otto of CyberScoop.com and the CEO of Malwarebytes, Marcin Kleczynski.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #32
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Greg Otto of CyberScoop.com and Jerry Thompson of IdentityGuard.By John Bambenek
…
continue reading
1
Cybersecurity Today With John Bambenek Episode #31
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
On this week's episode of Cybersecurity Today with John Bambenek, John talked with Shaun Waterman of CyberScoop.com.By John Bambenek
…
continue reading