CISO Perspectives (public)

N2K Networks
undefined
May 30, 2022 • 24min

New CISO responsibilities: IoT.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Bob Turner, University of Wisconsin at Madison CISO, and Tom Quinn, T. Rowe Price CISO, to discuss IoT as new CISO responsibilities. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
May 23, 2022 • 26min

Security in different verticals: Energy.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Helen Patton, Duo Security at Cisco Advisory CISO, Steve Winterfeld, Akamai Advisory CISO, and Marc Sachs, Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security's Deputy Director for Research, to discuss cybersecurity strategies and tactics in the energy sector. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
May 16, 2022 • 22min

Security in different verticals: Healthcare.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Denise Anderson, Health-ISAC President and CEO, Errol Weiss, Health-ISAC CSO, and Rick Doten, Carolina Complete Health CISO, to discuss cybersecurity strategies and tactics in healthcare. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
May 9, 2022 • 24min

Security in different verticals: Finance.

Rick Howard, the Cyberwire’s CSO and Chief Analyst, is joined by Hash Table members Gary McAlum, USAA’s former CSO, Jerry Archer, Sallie Mae’s CSO, and Steve Winterfeld, Akamai’s Advisory CISO, to discuss cybersecurity strategies in finance and antifraud. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
May 2, 2022 • 24min

Third party cloud platforms around the Hash Table.

Third party cloud platforms as a cybersecurity first principle strategy.As we learned from the deep dive into Azure, AWS, and GCP, none of the primary cloud providers check the box for every security first principle. To do so, Rick looks at third party cloud security providers. In this session, Rick and the Hash Table discuss big security platforms like Fortinet, Cisco, Check Point, and Palo Alto Networks. We discover that comprehensive security orchestration across all data islands is the key, so much so that Rick adds orchestration as one of the five primary first principles.With Rick Howard, the Cyberwire’s CSO and Chief Analyst and three guests: Ram Boreda, a Palo Alto Networks Field CTO, Joakim Lialias, a Product Marketing Director at Cisco, and Ashish Rajan, the host of the Cloud Security Podcast.Cybersecurity professional development and continued education.You will learn about: third party security platforms as first principle tools, cloud security orchestration, virtual firewalls and first principle strategies, converging cloud security tools into a single platformCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more third party cloud platforms and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Apr 25, 2022 • 24min

Third party cloud platforms and cybersecurity first principles.

Third party cloud platforms as a cybersecurity first principle strategy.As we learned from the deep dive into Azure, AWS, and GCP, none of the primary cloud providers check the box for every security first principle. To do so, Rick looks at third party cloud security providers. In this session, Rick discusses big security platforms like Fortinet, Cisco, Check Point, and Palo Alto Networks. We discover that comprehensive security orchestration across all data islands is the key, so much so that Rick adds orchestration as one of the five primary first principles.Cybersecurity professional development and continued education.You will learn about: third party security platforms as first principle tools, cloud security orchestration, virtual firewalls and first principle strategies, converging cloud security tools into a single platformCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more third party cloud platforms and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Apr 18, 2022 • 19min

Google Cloud Platform around the Hash Table.

Google Cloud Platform (GCP) adoption with cybersecurity first principle strategies.In this session looking at cloud platforms through the lens of first principle thinking, Rick and the Hash Table review the Google Cloud Platform (GCP). They identify some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust. The Hash Table gives their detailed technical advice about data management and risk assessments through GCP, strategies using GCP to support cybersecurity, and define our new favorite concepts: cyber shenanigans, conditions of weirdness (COWs), and cyber COW tipping.Bob Turner joins Rick at the Cyberwire’s Hash Table to discuss securing the University of Wisconsin at Madison’s big data lake project using the Google Cloud Platform (GCP) and the GCP zero trust architecture: BeyondCorp.Cybersecurity professional development and continued education.You will learn about: GCP networking, GCP security strategy and data management, cyber shenanigans, conditions of weirdness (COWs), and cyber COW-tippingCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Apr 11, 2022 • 16min

Google Cloud Platform and cybersecurity first principles.

Google Cloud Platform (GCP) adoption with cybersecurity first principle strategies.In this session looking at cloud platforms through the lens of first principle thinking, Rick Howard reviews the Google Cloud Platform (GCP). He identifies some fundamental architectural differences between GCP and the other cloud providers that make GCP more effective at zero trust.Cybersecurity professional development and continued education.You will learn about: GCP networking, GCP security strategy and data management, BeyondCorpCyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more Google Cloud Platform and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Apr 4, 2022 • 30min

Amazon AWS around the Hash Table.

Amazon AWS adoption with cybersecurity first principle strategies.In this second session reviewing cloud platforms through the lens of first principle thinking, Rick and the Hash Table review Amazon Web Services (AWS). They discuss how AWS supports, or doesn’t support, strategies of resilience, zero trust, intrusion kill chains, and risk assessments. The Hash Table gives their detailed technical experiences and strategies using AWS to support cybersecurity.Jerry Archer, Merritt Baer, and Mark Ryland join Rick around the Hash Table.Cybersecurity professional development and continued education.You will learn about: AWS networking and API techniques, DevSecOps in a cloud environment, AWS services and security tools, AWS strategies that support cybersecurity first principles.CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more Amazon AWS and cybersecurity first principles resources, check the topic essay. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Mar 28, 2022 • 20min

Amazon AWS and cybersecurity first principles.

Amazon AWS adoption with cybersecurity first principle strategies.In this second session reviewing cloud platforms through the lens of first principle thinking, Rick Howard reviews Amazon Web Services (AWS). He discusses how AWS supports, or doesn’t support, strategies of resilience, zero trust, intrusion kill chains, and risk assessments.Cybersecurity professional development and continued education.You will learn about: AWS networking and API techniques, DevSecOps in a cloud environment, AWS services and security tools, AWS strategies that support cybersecurity first principles.CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, InstagramAdditional first principles resources for your cybersecurity program.For more Amazon AWS and cybersecurity first principles resources, check the topic essay.Selected Reading: S1E6: 11 MAY: Cybersecurity First Principles S1E7: 18 MAY: Cybersecurity first principles: zero trust S1E8: 26 MAY: Cybersecurity first principles: intrusion kill chains. S1E9: 01 JUN: Cybersecurity first principles - resilience S1E11: 15 JUN: Cybersecurity first principles - risk S2E7: 31 AUG: Identity Management: a first principle idea. S2E8: 07 SEP: Identity Management: around the Hash Table. S4E3: 25 JAN: Microsoft Azure through a first principle lens S4E4: 01 FEB: Microsoft Azure security (Hashtable Interviews) “5 Best Practices for Resiliency Planning Using AWS | Amazon Web Services,” Amazon Web Services, 7 October 2020. “6 Best Practices for Increasing Security in AWS in a Zero Trust World.” by Louis Columbus, Forbes, 4 January 2019.  “About: History,” Cloud Security Alliance. “A Brief History of AWS,” by Alec Rojasm, Media Temple, 31 August 2017. “Amrandazz/Attack-Guardduty-Navigator.” by amrandazz, GitHub, 2021. “AWS Networking and Security 101,” by Net Joints, YouTube Video, 2020. “AWS Networking Fundamentals,” by Amazon Web Services, YouTube Video, 2019. “AWS Training and Certification,” by Aws.training, 2021. “Exposed Azure Bucket Leaked Passports, IDs of Volleyball Reporters,” by Ax Sharma, BleepingComputer, February 2021. “How to Connect Your On-Premises Active Directory to AWS Using AD Connector | Amazon Web Services,” by Amazon Web Services, 6 July 2015.  “How to Think about Zero Trust Architectures on AWS | Amazon Web Services.” by Amazon Web Services, 20 January 2020.  “Leaky AWS S3 Buckets Are so Common, They’re Being Found by the Thousands Now – with Lots of Buried Secrets,” by Shaun Nichols, Shaun, Theregister.com, 3 August 2020.  “Network Address Translation (NAT) - GeeksforGeeks,” by GeeksforGeeks, 7 May 2018.  “Zero Trust Architectures: An AWS Perspective | Amazon Web Services,” by Amazon Web Services, 3 November 2020.  Learn more about your ad choices. Visit megaphone.fm/adchoices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app