

Incident Response Readiness - Gerard Johansen - PSW #794
Aug 10, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62
Introduction
00:00 • 2min
The Week of Hacker Summer Camp
02:12 • 3min
How I Got My Start at the Information Security Industry
05:03 • 2min
The Rise of Digital Forensics
06:34 • 2min
The Evolution of Forensics
08:25 • 3min
How to Communicate With Senior Leadership in a Defunct Group
11:39 • 2min
Instant Response: A Guide for Security Analysts
13:56 • 3min
How to Get Started in Cyber Security
17:19 • 4min
The Importance of Communication in Law Enforcement
20:52 • 5min
The Importance of Having a Hub and Speak
26:06 • 2min
The Four R's of a Successful Training Program
28:30 • 3min
The Importance of Instant Response in a Campus Environment
31:43 • 3min
How to Deal With a Coworking Campus or Coworking Environment
34:32 • 2min
How to Deploy a Prototypical Ransomware Investigation
36:38 • 4min
How to Test a Ransomware Backup
40:58 • 4min
How to Restore Your Business From Backups
44:44 • 5min
How to Get Motivation for People to Write Cheat Sheets
49:25 • 2min
How to Restore From Backup During a Ransomware Incident
51:06 • 3min
The Importance of Simple Checklists in Crisis Driven Organizations
53:43 • 4min
The Importance of Documentation in Emergency Response
57:24 • 2min
The Importance of Understanding the Incident Commander
59:17 • 2min
The Pitfall Stumbling Blocks to a Successful Incident Commander Role
01:01:09 • 4min
How to Be a Successful Hacker
01:05:01 • 5min
The Importance of Protecting Gaming Platforms
01:09:58 • 2min
The Power of a Voltage Fault Injection
01:12:21 • 4min
The Tesla Attack on the Tesla Model S
01:16:41 • 3min
Tesla's Secure End Claims
01:19:22 • 2min
Spectre and Meltdown: The Downfall Attacks
01:21:31 • 2min
The Trade Between Speed and Security
01:23:47 • 3min
The Intel Podcast Chips and Salsa
01:26:54 • 4min
How a Simple XOR Can Cause a Micro Architectural Stack Overflow
01:30:54 • 5min
The Future of Hardware Attacks
01:35:40 • 5min
How to Patch Your Microcode Version
01:41:06 • 4min
Microsoft's UEFI Update Mechanism
01:45:12 • 2min
How to Scan Your HP Servers for Low Level Problems
01:47:10 • 6min
How to Build a Bad USB Storage Device
01:53:10 • 5min
How to Build a Rubber Ducky
01:57:41 • 2min
The Artificial Intelligence of Typing
01:59:50 • 2min
The Importance of Keyboard Training
02:01:57 • 2min
The Dangers of AI-driven Keyboards
02:04:05 • 4min
The Tweezer Attack on the Nintendo GameCube
02:08:16 • 2min
Nintendo Sues a Person for $10 Million in One
02:10:21 • 3min
Sony, EMI, and the Napster Platform
02:13:11 • 4min
How to Speed Up Your Code and Make It Run on GPU
02:16:58 • 4min
The Importance of Language Prediction
02:21:15 • 4min
The Future of Artificial Intelligence
02:25:22 • 4min
The Importance of Emergence in AI
02:29:46 • 3min
Tesla's Safer in Self Driving Mode Than Humans
02:32:33 • 2min
Automatic Driving Purgatory
02:34:38 • 4min
The Best Security Experts in Cruise Vehicle Security
02:38:32 • 2min
The Importance of Apps in Taxis
02:40:46 • 2min
The Evolution of Fraud
02:43:12 • 3min
The Importance of Paying Attention
02:46:24 • 4min
The Flipper Zero Hacking Tool
02:49:58 • 5min
The Flipper: A Hacker Tool
02:54:59 • 4min
The Importance of Permission in Cybersecurity
02:58:29 • 5min
How to Upgrade to Fedora 38
03:03:26 • 6min
The Data Protection Law in California
03:09:05 • 3min
Microsoft's CEO Blasts Microsoft to Fix Windows Vulnerability
03:12:12 • 4min
The Importance of the Security of Medical Devices
03:15:49 • 4min
The Importance of Device Hygiene Retirement
03:19:56 • 3min
Vim One Liner for Text Manipulation
03:22:29 • 5min