Security Weekly Podcast Network (Audio)

Incident Response Readiness - Gerard Johansen - PSW #794

Aug 10, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The Week of Hacker Summer Camp
02:12 • 3min
3
How I Got My Start at the Information Security Industry
05:03 • 2min
4
The Rise of Digital Forensics
06:34 • 2min
5
The Evolution of Forensics
08:25 • 3min
6
How to Communicate With Senior Leadership in a Defunct Group
11:39 • 2min
7
Instant Response: A Guide for Security Analysts
13:56 • 3min
8
How to Get Started in Cyber Security
17:19 • 4min
9
The Importance of Communication in Law Enforcement
20:52 • 5min
10
The Importance of Having a Hub and Speak
26:06 • 2min
11
The Four R's of a Successful Training Program
28:30 • 3min
12
The Importance of Instant Response in a Campus Environment
31:43 • 3min
13
How to Deal With a Coworking Campus or Coworking Environment
34:32 • 2min
14
How to Deploy a Prototypical Ransomware Investigation
36:38 • 4min
15
How to Test a Ransomware Backup
40:58 • 4min
16
How to Restore Your Business From Backups
44:44 • 5min
17
How to Get Motivation for People to Write Cheat Sheets
49:25 • 2min
18
How to Restore From Backup During a Ransomware Incident
51:06 • 3min
19
The Importance of Simple Checklists in Crisis Driven Organizations
53:43 • 4min
20
The Importance of Documentation in Emergency Response
57:24 • 2min
21
The Importance of Understanding the Incident Commander
59:17 • 2min
22
The Pitfall Stumbling Blocks to a Successful Incident Commander Role
01:01:09 • 4min
23
How to Be a Successful Hacker
01:05:01 • 5min
24
The Importance of Protecting Gaming Platforms
01:09:58 • 2min
25
The Power of a Voltage Fault Injection
01:12:21 • 4min
26
The Tesla Attack on the Tesla Model S
01:16:41 • 3min
27
Tesla's Secure End Claims
01:19:22 • 2min
28
Spectre and Meltdown: The Downfall Attacks
01:21:31 • 2min
29
The Trade Between Speed and Security
01:23:47 • 3min
30
The Intel Podcast Chips and Salsa
01:26:54 • 4min
31
How a Simple XOR Can Cause a Micro Architectural Stack Overflow
01:30:54 • 5min
32
The Future of Hardware Attacks
01:35:40 • 5min
33
How to Patch Your Microcode Version
01:41:06 • 4min
34
Microsoft's UEFI Update Mechanism
01:45:12 • 2min
35
How to Scan Your HP Servers for Low Level Problems
01:47:10 • 6min
36
How to Build a Bad USB Storage Device
01:53:10 • 5min
37
How to Build a Rubber Ducky
01:57:41 • 2min
38
The Artificial Intelligence of Typing
01:59:50 • 2min
39
The Importance of Keyboard Training
02:01:57 • 2min
40
The Dangers of AI-driven Keyboards
02:04:05 • 4min
41
The Tweezer Attack on the Nintendo GameCube
02:08:16 • 2min
42
Nintendo Sues a Person for $10 Million in One
02:10:21 • 3min
43
Sony, EMI, and the Napster Platform
02:13:11 • 4min
44
How to Speed Up Your Code and Make It Run on GPU
02:16:58 • 4min
45
The Importance of Language Prediction
02:21:15 • 4min
46
The Future of Artificial Intelligence
02:25:22 • 4min
47
The Importance of Emergence in AI
02:29:46 • 3min
48
Tesla's Safer in Self Driving Mode Than Humans
02:32:33 • 2min
49
Automatic Driving Purgatory
02:34:38 • 4min
50
The Best Security Experts in Cruise Vehicle Security
02:38:32 • 2min
51
The Importance of Apps in Taxis
02:40:46 • 2min
52
The Evolution of Fraud
02:43:12 • 3min
53
The Importance of Paying Attention
02:46:24 • 4min
54
The Flipper Zero Hacking Tool
02:49:58 • 5min
55
The Flipper: A Hacker Tool
02:54:59 • 4min
56
The Importance of Permission in Cybersecurity
02:58:29 • 5min
57
How to Upgrade to Fedora 38
03:03:26 • 6min
58
The Data Protection Law in California
03:09:05 • 3min
59
Microsoft's CEO Blasts Microsoft to Fix Windows Vulnerability
03:12:12 • 4min
60
The Importance of the Security of Medical Devices
03:15:49 • 4min
61
The Importance of Device Hygiene Retirement
03:19:56 • 3min
62
Vim One Liner for Text Manipulation
03:22:29 • 5min