

Adopting Zero Trust
Adopting Zero Trust
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first). Hosted on Acast. See acast.com/privacy for more information.
Episodes
Mentioned books

Apr 30, 2024 • 59min
Ransomware: To Pay or Not to Pay?
Season 3, Episode 6: Two seasoned cybersecurity professionals, Bryan Willett and Kris Lovejoy, shed light on the dilemma organizations face when hit by ransomware: Should they pay the ransom or not?Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.Ransomware: To Pay or Not to Pay? It’s an easy question, and we all have the same ideal answer, but how often does life throw us simplicity? Rarely.This week on Adopting Zero Trust, we continue our conversation that looked at the role cyber insurance plays in organizations and drill into one of the most challenging topics associated with it: Ransomware. And, because this is a heavy subject, we brought in two heavy hitters from past episodes to share their perspectives, Kris Lovejoy and Brian WillettTL;DRPaying ransomware ransoms is a complex decision that depends on various factors, such as the potential impact on the organization's services or employees.Having robust and tested backups is crucial in a ransomware situation, but organizations must be prepared for scenarios where ransomware affects backups.Cyber insurance can help mitigate the financial impact of ransomware attacks, but organizations should be cautious and consider all the potential outcomes.Avoiding ransomware attacks requires a proactive approach, which includes implementing hardening standards, good practices around vulnerability management, enforcing compliance on systems, and having good identity protection.AI holds promise in the cybersecurity sector, but its role in ransomware attacks is still in its infancy. Hosted on Acast. See acast.com/privacy for more information.

Apr 11, 2024 • 1min
Cyber Insurance: Sexy? No. Important? Critically yes.
Season 3, Episode 5: Cyber Insurance may not be the sexiest topic, but it’s an important piece of any mature cyber program. We chatted with a lawyer and a VC who share their perspective.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.There are many aspects of cybersecurity that are not classified as cool or sexy, but every component plays a role in securing people, data, and businesses. One particular aspect that is often seen as a necessary evil, even more so than policies and documentation, is cyber insurance. On one hand, you have a system that forces backstops to protect the organization in the event of an incident; on the other, requirements to not only remain insured but reduce premiums encourage businesses to invest more in securing the business.This week, we chatted with Karl Sharman of Forgepoint Capital and Andy Moss of Reed Smith to better understand the role cyber insurance plays today. Hosted on Acast. See acast.com/privacy for more information.

Mar 28, 2024 • 54min
The Current and Future State of Zero Trust With Forrester’s David Holmes
Forrester's Principal Research Analyst on Zero Trust, David Holmes, discusses the core principles of Zero Trust, the acceleration of its adoption due to the COVID-19 pandemic, and the challenges and successes in implementing Zero Trust technologies. The conversation also touches on the evolution of programming languages, the role of AI in cybersecurity, and the integration of AI-driven conversations in sales processes.

Mar 7, 2024 • 46min
Canva's Kane Narraway on Building a Zero Trust MVP
Canva's Kane Narraway shares insights on building a Zero Trust strategy in under a year, emphasizing prioritizing data security, resource allocation, and transitioning to Zero Trust measures. The podcast also includes a light-hearted discussion on Gandalf's horse trivia and encountering a Sauron's Mace replica.

Feb 8, 2024 • 47min
AZT: Quit Bugging the CISO + CIO
In this episode, the CIO of Energy Solutions discusses the formation of cybersecurity and technology budgets, the dynamics between CIOs and security vendors, navigating complex security challenges, strategic team collaboration, IT challenges, and enhancing security practices with external partnerships.

Jan 18, 2024 • 50min
Hacker Valley Dishes on Breaking Into Cybersecurity
To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays. A new year, a new season, and plenty of new threats to impact the world of cybersecurity. This week we break from our typical conversations about modern cybersecurity strategies and concepts to focus on one of the most important aspects of our space: people.People are the why behind what we do. We protect, support, and educate them about the dangers that lurk online. However, cybersecurity is also driven by people, and for new entries into our field, it can feel nearly impossible to break in. This week we turn to two experts who lived the lives of practitioners and shifted their energy toward telling amazing stories that drive our industry forward. This duo has built a masterclass on what it means to be in cybersecurity and has guided countless people through every nook and cranny.And with that, we’re excited to introduce Hacker Valley Media’s Ron Eddings and Chris Cochran who discuss breaking down the barriers to cybersecurity and why practitioners need to invest in soft skills.Read more at adoptingzerotrust.com Hosted on Acast. See acast.com/privacy for more information.

Nov 30, 2023 • 56min
From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details on our site.You know what they say, you save the best for last. As we wrap season two of Adopting Zero Trust, we take a shift from our standard conversations about modern cybersecurity strategies and look back at some of the history that got us to where we are today.This week we chat with Hector Monsegur, Co-Founder of LulzSec, and current Director of Research for Alacrinet, who discusses his journey from hacktivism to white hat pen testing.In May of 2011, a series of cyber attacks swept the globe. Starting with Fox News, after a broadcaster called rapper Common ‘vile’, then an attack on X Factor (yes, the show Joe Rogan used to host) leaking contestant data, and through to taking down the Sony Playstation network. A, at the time, black hat hacking group was founded and picked off targets for laughs (lulz) rather than financial gain. Among the group was co-founder Hector Monsegur, better known by his alias Sabu, who shaped the movement into cause-based cyber attacks or hacktivism.But the story starts well before the formation of Lulzsec, and before the FBI knocked on Hector’s door. It stretches back to a time when there weren’t resources for people to learn how to hack, pen test, and become cybersecurity practitioners didn’t exist, unlike the endless amount of certs and higher education programs that exist today.Key TakeawaysThe evolution of one's ethical stance: Hector's journey highlights the importance of questioning and reassessing one's actions and beliefs.Collaboration and collective impact: Working together can amplify efforts and create positive change, even in the realm of cybersecurity.Balancing curiosity and responsibility: Exploring technology and hacking skills should be accompanied by a sense of responsibility and ethical considerations.Editor’s NoteThe season finale of AZT is here, and we couldn’t have found a more interesting way to wrap things up. Hector has such a unique and storied past, and we can’t recommend his own series enough. The very agent who knocked on his door joins him as the cohost on Hacker and the Fed.We also can’t thank you, our listeners, enough for another year of the show. Neal and I do this as a passion project first and foremost, but as we seek to attract harder-to-reach guests, we are also building in some ad opportunities. We are ensuring that doesn't impact how we highlight the practitioner's perspective on modern cybersecurity strategies, too.Speaking of growing, that other podcast I mentioned last episode? Mastering the Art of Failing can now be found at failingpod.com or on your favorite podcast app. The pilot series will highlight people who have found success in their lives, but not without some challenges along the way. Our first guest, Glen Hellman, was part of several successful exits… and quite a few not-so-successful flops. As the series progresses we’ll expand beyond just career-oriented stories and dig into physical, mental, and other states of pushing boundaries and levels of success. Hosted on Acast. See acast.com/privacy for more information.

Nov 16, 2023 • 46min
The Market For Enterprise (Secure) Browsers
Evgeniy Kharam, a founder, CISO, architect, and podcast producer, explores the rise of Enterprise (Secure) browsers. Topics include remote browser isolation, customized browser profiles, and the impact of managed devices on compliance requirements.

Nov 2, 2023 • 57min
Beyond the Buzzword: Applicable use of AI in Cybersecurity
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI. “My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination [As opposed to a generative AI model]. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are. Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a stark difference between what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?Key TakeawaysAI plays a significant role in both offensive and defensive cybersecurity strategies.Threat actors use AI to enhance their attacks, making them more believable and harder to detect.Defensive uses of AI include improving workflow and making SOCs more productive.Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches. Hosted on Acast. See acast.com/privacy for more information.

Oct 19, 2023 • 55min
AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices
Zack Butcher, founding engineer at Tetrate, discusses building upon NIST’s Zero Trust policies and standards. They explore the challenges of implementing Zero Trust, the importance of identity-based segmentation and API security, and the role of service mesh in enhancing security and control in a distributed system. They also discuss the implementation and evolution of the Google BeyondCorp system.


