#5 - Ken Westin on trust in the Information Security field: losing it and how we can get it back

43:46
 
Share
 

This series is archived ("Inactive feed" status)

Please note series archiving is a new, experimental, feature of Player FM with the aim of helping users understand how we fetch series and report on any issues.

When? This feed was archived on June 04, 2017 15:56 (). Last successful fetch was on November 21, 2016 23:07 ()

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 100464090 series 84378
By Discovered by Player FM and our community — copyright is owned by the publisher, not Player FM, and audio streamed directly from their servers.

Episode #5 of the Standard Deviant Security Podcast focuses on the topic of trust with Ken Westin of Tripwire Inc. Ken has done a lot of work and research on this topic and has very insightful commentary on the subject. The Internet, when it was first conceived and designed, was built around a model of implicit trust - people and devices just trusted each other. Fast forward 40 some years and now we deal with all sorts of activity that can harm data, reputation, and people - activities that the original creators of the Internet probably couldn’t even conceive of. We've added on technology that increases trust and mitigates risk of data breaches, DDoS attacks, organized crime rings and other threats but significant risk still exists and seems to be increasing. Where is the security industry succeeding and where is it failing?
Ken is a Senior Security Analyst at Tripwire Inc., with 15 years of experience building and breaking things through the use/misuse of technology. His technology exploits and endeavors have been featured in Forbes, Good Morning America, Dateline, New York Times, The Economist and has won awards from MIT, CTIA, Oregon Technology Awards, SXSW, Entrepreneur and named in Portland Business Journal's 2013 "40 Under 40". He has worked with law enforcement and journalists utilizing various technologies to unveil organized crime rings, recover stolen cars, even a car jacking amongst other crimes.
You can follow Ken on Twitter: @kwestin
Please follow the Standard Deviant Security Podcast on Twitter @standeviant and visit the website at www.thestandarddeviant.com.

17 episodes available. A new episode about every 15 days averaging 53 mins duration .