Episodes

  • A CISO’s Perspective, Defending Against AI & Ransomware Evolution - Kris Lahiri, Jim Broome, Mike Lyborg - ESW Vault
    May 31 2024

    In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs.

    This segment is sponsored by Swimlane. Visit https://securityweekly.com/swimlanersac to learn more about them!

    The past two years have witnessed an unprecedented surge in the adoption of generative artificial intelligence (AI) across various industries. And while this presents new efficiencies, with these benefits come significant security concerns. The widespread integration of AI applications increases the risk of data breaches and intellectual property theft, while also expanding organizations' vulnerability to malicious data injection and other AI-driven cyberattacks. During this interview Jim will explore why it’s imperative to implement robust security measures to mitigate these evolving risks effectively, and how working alongside an MSSP can benefit your overall security posture.

    Segment Resources: https://go.directdefense.com/2023-Security-Operations-Threat-Report

    This segment is sponsored by DirectDefense. Visit https://securityweekly.com/directdefensersac to learn more about them!

    In recent years, ransomware attacks have undergone a transformative evolution, shifting from indiscriminate, mass-distributed assaults to highly targeted, sophisticated campaigns. Kris Lahiri is able to discuss the dynamic landscape of ransomware and dive into the techniques he has seen cybercriminals employ, the motivations behind these attacks, and the escalating impact on individuals, businesses, and critical infrastructure.

    Segment Resources: https://www.egnyte.com/solutions/ransomware-detection https://www.egnyte.com/guides/governance/ransomware

    This segment is sponsored by Egnyte. Visit https://securityweekly.com/egnytersac to learn more about them!

    Show Notes: https://securityweekly.com/vault-esw-11

    Show more Show less
    47 mins
  • Achieving Cyber Resilience, External Cybersecurity & Risk Reduction - Margarita Barrero, Andy Grolnick, Alexandre Sieira - ESW Vault
    May 31 2024

    Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins.

    This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them!

    Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more.

    This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them!

    Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home

    Vendors, sales channels, partners and other kinds of third parties are essential to most businesses. Ensuring that the information security risks of those other companies don't impact your own is the remit of Third Party Cyber Risk Management (TPCRM) teams. It is increasingly evident, however, that the existing practices and tools are not up to the challenge. They make the process even more adversarial than it needs to be, are focused on risk transfer and/or acceptance rather than reduction; are based on limited and low quality signals; and are often excruciatingly manual. We can do better as an industry, and in this conversation we are going to explore a new paradigm for TPCRM and its advantages for third and first parties.

    Segment Resources: Alice in Supply Chains is a monthly marketing-free newsletter with curated news and commentary on TPCRM: https://www.linkedin.com/newsletters/alice-in-supply-chains-6976104448523677696/

    This segment is sponsored by Tenchi Security. Visit https://securityweekly.com/tenchirsac to learn more about them!

    Show Notes: https://securityweekly.com/vault-esw-10

    Show more Show less
    48 mins
  • Exploring the latest FortiGuard Labs Threat Report - Derek Manky - ESW Vault
    May 30 2024

    As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questions about the current state of threats and attacks, like:

    • What is the latest big shift in strategy and focus for ransomware groups?
    • I keep hearing that attackers are getting faster and faster - how much time to defenders actually have these days (to patch a critical vuln, for example)?
    • What are the latest attack techniques being used? Which are used less, or never used?

    There's not a dull moment in this conversation - I hope you enjoy listening to or watching it as much as I did making it!

    Segment Resources:

    • Fortiguard Labs
    • 2H 2023 FortiGuard Labs Threat Report

    Show Notes: https://securityweekly.com/vault-esw-9

    Show more Show less
    41 mins
  • This Week: short on funding, long on research and analysis & RSAC Interviews - ESW #363
    May 24 2024

    Only one funding announcement this week, so we dive deep into Thoma Bravo's past and present portfolio. They recently announced a sale of Venafi to Cyberark and no one is quite sure how much of a hand they had in the LogRhythm/Exabeam merger, and whether or not they sold their stake in the process.

    We also have a crazy stat Ross Haleliuk spotted in Bessemer's analysis: "13 out of 14 cybersecurity companies acquired in the past year for over $100M were from Israel". Is this an anomaly? Does it just mean that Israel wasn't shy about selling when the market was down? We discuss.

    A number of new product announcements continue to trickle out post-RSA.

    We'll also discuss Sam Altman and OpenAI's decision to use Scarlett Johansson's voice against her will and what it could mean for deepfakes, advanced social engineering techniques, and general big tech sliminess.

    Do you know what a "product glorifier" is? How about a glowstacker? You will if you check out the second-to-last story in the show notes!

    See the show notes for individual descriptions on each RSAC interview. This week, we feature speakers from Sailpoint, Okta, Ping Identity, LimaCharlie, QwietAI, and Picus!

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-363

    Show more Show less
    2 hrs and 39 mins
  • Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362
    May 16 2024

    Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down!

    Meanwhile, LogRhythm and Exabeam merge, likely with the hopes of weathering the coming storm. The situation seems clear - there's no such thing as "best of breed" SIEM anymore. It's a commodity to be attached to the existing dominant security platforms. Are the days numbered for the older pure-play SIEM/SOAR vendors out there? Crowdstrike and Palo Alto alone could displace a lot of incumbents, even with a less than stellar product.

    Visit the show notes for full descriptions on each RSAC executive interview!

    Show Notes: https://securityweekly.com/esw-362

    Show more Show less
    2 hrs and 28 mins
  • Executive Interviews from RSAC! - ESW #361
    May 9 2024

    Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical Start, Anomali, Cyware, and Pentera!

    Find individual descriptions for each interview on the show notes.

    Show Notes: https://securityweekly.com/esw-361

    Show more Show less
    2 hrs and 9 mins
  • Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
    May 2 2024

    It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs.

    Resources

    • 5 Best Practices for Building a Cyber Incident Response Plan

    This segment is sponsored by Graylog. Visit https://securityweekly.com/graylog to learn more about them!

    It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features...

    To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's M-Trends!

    Finally, we've got some great essays that are worth putting on your reading list, including a particularly fun take on the Verizon DBIR by Kelly Shortridge.

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-360

    Show more Show less
    1 hr and 57 mins
  • Autonomous - I don't think that word means what you think it means - Adam Shostack, Ely Kahn - ESW #359
    Apr 25 2024

    A clear pattern with startups getting funding this week are "autonomous" products and features.

    • Automated detection engineering
    • Autonomously map and predict malicious infrastructure
    • ..."helps your workforce resolve their own security issues autonomously"
    • automated remediation
    • automated compliance management & reporting

    I'll believe it when I see it. Don't get me wrong, I think we're in desperate need of more automation when it comes to patching and security decision-making. I just don't think the majority of the market has the level of confidence necessary to trust security products to automate things without a human in the loop.

    The way LimaCharlie is going about it, with their new bi-directional functionality they're talking up right now, might work, as detections can be VERY specific and fine-grained.

    We've already seen a round of fully automated guardrail approaches (particularly in the Cloud) fail, however. My prediction? Either what we're seeing isn't truly automated, or it will become a part of the product that no one uses - like Metasploit Pro licenses.

    We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if you're looking for some ideas!

    This segment is sponsored by SentinelOne. Visit https://securityweekly.com/sentinelone to learn more about them!

    This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats.

    Resources:

    • Here's the Inherent Threats Whitepaper
    • Adam's book, Threat Modeling: Designing for Security
    • Adam's latest book, Threats: What Every Engineer Should Learn from Star Wars
    • We mention the Okta Breach - here's my writeup on it
    • We mention the CSRB report on the Microsoft/Storm breach, here's Adam's blog post on it
    • And finally, Adam mentions the British Library incident report, which is here, and Adam's blog post is here

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://securityweekly.com/esw-359

    Show more Show less
    1 hr and 58 mins