Artwork

Content provided by Jacob Garrison. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Garrison or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Common Weaknesses Used By Cyber Attackers w/ David Ethington, Information Security Architect at Paramount

48:16
 
Share
 

Manage episode 360452492 series 3466455
Content provided by Jacob Garrison. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Garrison or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episodes

Artwork
iconShare
 
Manage episode 360452492 series 3466455
Content provided by Jacob Garrison. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Garrison or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide