On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
1
The AI Episode: Experts Share Security Insights on LLMs and GenAI
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25
Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry.…
…
continue reading
1
Bill Dunnion on the push for transparency in security breaches
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39
Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based. In this episod…
…
continue reading
1
Jennifer Villarreal on how she upped her hacking game
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON.…
…
continue reading
1
Sara Mosley on best practices for Zero Trust
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47
Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She rec…
…
continue reading
1
Michael Daniel on untangling cybersecurity’s complexity problem
35:13
35:13
Play later
Play later
Lists
Like
Liked
35:13
Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Tas…
…
continue reading
1
Anand Prakash on cloud security startups and next-gen hacking
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
Anand Prakash on cloud security startups and next-gen hacking Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by Se…
…
continue reading
1
Ads Dawson on developing the OWASP Top 10 for Large Language Models
36:09
36:09
Play later
Play later
Lists
Like
Liked
36:09
Ads Dawson, release lead and founding member for the Open Web Application Security Project (OWASP) Top 10 for Large Language Model Applications project, has no shortage of opinions on securing generative artificial intelligence (GenAI) and LLMs. With rapid adoption across the tech industry, GenAI and LLMs are dominating the conversation in the info…
…
continue reading
1
Kevin Tambascio on balancing security with availability of services in healthcare
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09
Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilanc…
…
continue reading
1
Tennisha Martin on bridging the cyber talent gap through diversity
31:01
31:01
Play later
Play later
Lists
Like
Liked
31:01
Cybersecurity organizations tend to have unrealistic hiring expectations, according to Tennisha Martin, founder and executive director of the training-focused nonprofit BlackGirlsHack. That can make it hard for would-be candidates to stand out and contribute to solving urgent cybersecurity challenges. In the latest episode of WE’RE IN!, Tennisha un…
…
continue reading
1
Mara Winn on protecting America’s critical infrastructure from cyberthreats
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58
A first-of-its-kind 2016 cyberattack on Ukraine’s power grid was a wake-up call for countries around the world to shore up protection of vulnerable energy resources. Mara Winn, Deputy Director for Preparedness, Policy, and Risk Analysis at the Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER), is in cha…
…
continue reading
1
Amy Chang on squaring cyber policy with real-world threats
33:39
33:39
Play later
Play later
Lists
Like
Liked
33:39
Amy Chang, a resident senior fellow for Cybersecurity and Emerging Threats at the R Street Institute, has many tough problems to consider, from election security to adversarial AI attacks to the geopolitical implications of cyberwarfare. In a world rife with hot takes, she pursues a balanced approach to answering these weighty issues—nothing is an …
…
continue reading
1
Mark Kuhr on AI pentesting and the Synack Red Team
36:18
36:18
Play later
Play later
Lists
Like
Liked
36:18
Dr. Mark Kuhr, a former National Security Agency employee, faced a host of challenges when he co-founded Synack with CEO Jay Kaplan in 2013. As CTO for the security testing company, Mark has led Synack through dramatic growth while working to shift the mindset of some cybersecurity practitioners. For instance, the Synack platform, featuring access …
…
continue reading
1
Anthony Newman on cyberthreats to higher education
40:06
40:06
Play later
Play later
Lists
Like
Liked
40:06
In this episode of WE’RE IN!, Anthony Newman, executive director at Research and Education Networks Information Sharing and Analysis Center (REN-ISAC), highlights the need for protecting research infrastructure in higher education, dealing with credential dumps and monitoring the dark web for potential threats. He also discusses the challenges face…
…
continue reading
1
Dennis Fisher on the future of cybersecurity journalism
31:32
31:32
Play later
Play later
Lists
Like
Liked
31:32
Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and I…
…
continue reading
1
Jason Loomis on finding the humanity in cybersecurity
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Jason Loomis, Chief Information Security Officer at Freshworks, emphasizes the human side of cybersecurity and the importance of effective leadership. New CISOs should make an effort to understand not just existing security controls, but also the team dynamics at any new organization they’re helping to protect. The human element all too often goes …
…
continue reading
1
Sarah Armstrong-Smith on understanding the attacker mindset
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37
Season 3 Episode 3 Sarah Armstrong-Smith on understanding the attacker mindset Sarah Armstrong-Smith, Chief Security Advisor at Microsoft and a cyber security author, discusses her role in improving cyber postures and staying ahead of threats. She explains how Microsoft uses machine learning in their threat intelligence and what's next with the ons…
…
continue reading
1
Andreas Wuchner on Cyber Resiliency in Financial Services
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55
The financial services industry is among the most sought-after targets for cyberattacks. When malicious actors steal data, it’s often just a means to a cash-rich (or bitcoin) end. Andreas Wuchner, advisor to many security startups and a formative contributor to Switzerland's National Financial Services Information Sharing and Analysis Center, has a…
…
continue reading
1
Ryan Kazanciyan on Securing the AI future
26:03
26:03
Play later
Play later
Lists
Like
Liked
26:03
Securing a startup valued in the billions of dollars is no small feat. According to Ryan Kazanciyan, CISO at Wiz, it’s all about process. His previous experience with companies like Mandiant and Meta rounded out his security background. Using his experience from large enterprises, Ryan takes a considered approach to securing a startup. The cloud se…
…
continue reading
Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE'RE IN! Hosted by Synack's Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer …
…
continue reading
1
Lauren Zabierek on “Sharing the Mic” to Foster Cyber Innovation
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02
The next generation of cybersecurity leaders have a vision for the future of cybersecurity. Facing advanced nation-state threats, the breakneck speed of tech innovation and a deluge of zero days, Lauren Zabierek is moving the dial on workforce diversity to tackle these challenges. Lauren, senior policy advisor for Cybersecurity and Infrastructure S…
…
continue reading
1
Jeremiah Roe Unpacks the “Puzzle” of Pentesting
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13
Pentesting is in Jeremiah Roe’s DNA. He has worked for a traditional pentesting consultancy, conducted clever physical penetration tests over the years (as documented in his episode on the Darknet Diaries podcast), and he now finds himself at the cutting edge of security testing as field CISO for North America at Synack. Jeremiah is a fan of escape…
…
continue reading
1
Demystifying OT Cybersecurity with Danielle Jablanski
40:45
40:45
Play later
Play later
Lists
Like
Liked
40:45
The operational technology (OT) computer networks that support life as we know it are increasingly coming under threat. But despite the proliferation of malware aimed at critical infrastructure, Danielle Jablanski isn’t running for the hills. As an OT cybersecurity strategist for Nozomi Networks, Danielle helps critical infrastructure organizations…
…
continue reading
1
API Security Decoded with Corey Ball, Senior Manager of Penetration Testing, Moss Adams and Chief Hacking Officer, APIsec University
34:39
34:39
Play later
Play later
Lists
Like
Liked
34:39
Application programming interfaces (APIs) are taking over the internet. APIs now make up 83% of internet traffic because they help applications communicate with each other via API calls. And they’re a critical threat vector for companies. Corey Ball, author of “Hacking APIs,” saw the API takeover happening and realized there was a gap in security t…
…
continue reading
1
Emma Stewart on the Future of the Electric Grid, Cyber Mutual Assistance and “Crying Wolf” on Energy Threats
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48
Power and energy security strategist Emma Stewart is always on the lookout for what’s next in the U.S. electric grid, whether that be an influx of renewable energy or cyberattacks by malicious hackers. Her engineering background helps her understand how things work so she can break them to build them again, but stronger. Emma has announced she’s jo…
…
continue reading
1
Kelly Moan on Zero-Trust Strategies, Safeguarding NYC and the Need for Representation in Cybersecurity
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49
As Chief Information Security Officer for NYC, Kelly Moan is on the front lines protecting New Yorkers from the latest cyberthreats. She juggles everything from implementing zero-trust security models to helping state agencies fend off sophisticated hacking attempts. Don’t miss the latest episode of WE’RE IN! in which Kelly opens up about her profe…
…
continue reading