Cyber Security America
Joshua R Nicholson
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America with your host Joshua Nicholson. You'll learn what it's like running cyber security operations teams inside some of the world's largest companies. It's a cyber backstage pass and real world advice for cyber defenders, CISOs, and security professionals.
Episodes
Mentioned books

May 16, 2023 • 56min
Zero-Trust Paradigm: Secure Browsing Technology - Conceal.io
Welcome to the Cyber Security America show, a platform for exploring the dynamic and ever-evolving world of cybersecurity and information technology. In episode 17, we delve deep into the topic of zero trust, a security model that assumes all users, devices, and applications are potentially hostile, and requires strict access controls and verification measures to prevent data breaches. We also discuss the national security situation surrounding Jack Teixeira and its impact on security controls in the future. #cybersecurity #zerotrust #nationalsecurity Our guest for today's episode is Gordon Lawson, CEO of Conceal.io, who brings years of experience and ability in implementing zero trust strategies for some of the largest organizations in the world. Together, we explore the concept of zero trust, its advantages and challenges, and how it differs from traditional security models. We also discuss the future of zero trust and how it's shaping the cybersecurity landscape, including the innovative ConcealBrowse technology that detects, defends, and isolates malicious internet traffic. #zerotrustimplementation Gordon Lawson has over 20 years of experience in the physical and cyber security space, with a focus on SaaS optimization and global enterprise business development. Prior to joining Conceal, he was President at RangeForce, a cyber training platform company, and SVP of Global Sales at Cofense through their $400MM acquisition by BlackRock in 2018. With his background as a U.S. Naval Officer and a graduate of the Air Force Command and Staff College and the Army Airborne School, Gordon offers unique insights into the implementation of zero trust strategies and the future of cybersecurity. #cybersecurityleader #militaryexperience Threat Intel Report: US Intelligence Agencies and international partners from the 5 Eyes alliance have released a report detailing Russia's Snake Malware, a peer-to-peer network that infected multiple devices, including diplomatic missions and NATO areas. The malware was a significant part of the Turla framework used by Russian cyber threat actors and attributed to the Federal Security Service Center 16 and military unit 71330, also known as Berserk bear. The report supplies recommendations for mitigations and scanner technology. Additionally, a cybersecurity firm reported a threat actor trying to extort executives by compromising new hire credentials, showing the need for ongoing monitoring and protection of human elements in cybersecurity. The growing impact of cyberattacks on physical outcomes is also noted. #cybersecuritythreats #malware #5eyesalliance

May 9, 2023 • 59min
Cyber Security Jobs: Demystifying the Various Roles
Welcome to the Cyber Security America Show, where we dive into the sea of complex technologies and provide real-world context to the world of Cyber Security and Information Technology. In episode 16, we explore the various jobs and roles within the industry, including penetration testers, vulnerability managers, detection analysts, threat hunters, Cloud Security Architects/Engineers, Cyber Security mentorship resources, and Incident Response (IR). Our Threat Intelligence briefing covers the Apple Rapid Response situation, where lack of proper and honest communication caused unnecessary mistrust. We also discuss the latest Ransomware attack against the City of Dallas, U.S. Cyber Teams, and the upcoming International Cyber Competition in San Diego later this year. Our guest for this episode is Steve Cobb, CISO for Security Scorecard, who brings over 30 years of leadership and consulting experience involving IT infrastructure, cybersecurity, incident response, and cyber threat intelligence. Steve is passionate about sharing his knowledge and experience with others through mentorship and training and is a coach for the US Cyber Team. Don't miss out on the US Cyber Games, North Carolina Cyber Academy, Black Hills Training, and Chris Saunders Training. Register now and take the next step in your Cyber Security journey. US Cyber Games - https://www.uscybergames.com/ North Carolina Cyber Academy - https://www.myncca.com/ Black Hills Training - https://www.antisyphontraining.com/ Chris Saunders Training - https://www.networkdefense.co/courses/ - Investigation Theory Join us on this informative episode and stay up to date with the latest Cyber Security news and trends. Follow us on social media and use the hashtags #CyberSecurityAmericaShow #CyberSecurity #InformationTechnology #ThreatIntelligence #USCyberGames #NorthCarolinaCyberAcademy #BlackHillsTraining #ciso #ChrisSaundersTraining to stay connected.

May 2, 2023 • 51min
Cyber Supply Risk Management: Defense Strategy Best Practices
In today's hyper-connected world, no organization can tackle computer threats alone using just their own people, processes, and technology. A successful Chief Information Security Officer (CISO) or Director of Security Operations needs to engage and leverage technology vendors, strategic integrators, and consulting partners to accomplish their mission. That's why we're thrilled to have Mike Johnson, Vice President of Partners & Alliances at DeepSeas, as our expert guest in this episode titled Cyber Supply Risk Management: Defense Strategies for maximized outcomes. Mike brings a unique mix of technical and advisory skills, honed through his experience building successful partner networks at SIEM vendors LogRhythm and Securonix, SaaS GRC provider Pathlock, and now DeepSeas. But first, let's take a look at the latest cyber threats. This week's Cyber Threat Intelligence (CTI) report tracks the active exploitation of PaperCut, a remote code execution (RCE) vulnerability impacting all PaperCut MF or NG versions 8.0 or later (CVE-2023-27350). Additionally, an information disclosure flaw has been found in PaperCut MF or NG versions 15.0 or later (CVE-2023-27351). Reports indicate that the primary exploitation is being done by the ransomware operators of Lockbit and Clop. And if that's not enough, there's a new exploit kit on the block - MacOS Stealer or Atomic Mac OS Dealer (Amos) malware - being sold on Telegram for $1,000 per month. This kit can obtain iCloud Keychain passwords, files from the desktop or documents folder, and can also get the Mac OS password. Don't be caught unprepared - stay up to date with the latest cyber threats and defense strategies. And remember, the material and information presented here is for general information purposes only. Stay Secure and don't forget to Like, Subscribe, Comment, and turn on notifications

Apr 25, 2023 • 58min
Ransomware Attacks: Best Practices for Defense & Response
In the 14th episode of Cyber Security America, we explore one of the most devastating threats that small and large business face today. Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. In recent years, ransomware incidents have become increasingly prevalent among the Nation's state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations. Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver mission-critical services. Malicious actors have adjusted their ransomware tactics over time to include pressuring victims for payment by threatening to release stolen data if they refuse to pay and publicly naming and shaming victims as secondary forms of extortion. The monetary value of ransom demands has also increased, with some demands exceeding US $1 million. Ransomware incidents have become more destructive and impactful in nature and scope. Malicious actors engage in lateral movement to target critical data and propagate ransomware across entire networks. These actors also increasingly use tactics, such as deleting system backups, that make restoration and recovery more difficult or infeasible for impacted organizations. The economic and reputational impacts of ransomware incidents, throughout the initial disruption and, at times, extended recovery, have also proven challenging for organizations large and small. From https://www.cisa.gov/stopransomware/ransomware-guide This Ransomware Guide includes two resources: Part 1: Ransomware Prevention Best Practices Part 2: Ransomware Response Checklist • Policy-oriented or technical assessments help organizations understand how they can improve their defenses to avoid ransomware infection: https://www.cisa.gov/cyber-resource-hub Contacts: • SLTT organizations: CyberLiaison_SLTT@cisa.dhs.gov • Private sector organizations: CyberLiaison_Industry@cisa.dhs.gov Ransomware Quick References • Security Primer – Ransomware (MS-ISAC): Outlines opportunistic and strategic ransomware campaigns, common infection vectors, and best practice recommendations: https://www.cisecurity.org/white-papers/security-primer-ransomware/ • Ransomware: Facts, Threats, and Countermeasures (MSISAC): Facts about ransomware, infection vectors, ransomware capabilities, and how to mitigate the risk of ransomware infection: https://www.cisecurity.org/blog/ransomwarefacts- What are the lessons learned on how best to work together to break down the barriers of communications and prioritization. Don't miss this informative episode to learn more about the and its importance in securing your enterprise. Remember to like, subscribe, and turn on notifications for future episodes. Cyber Security America Podcast https://www.voiceamerica.com/show/4125

Apr 18, 2023 • 51min
Breaking Down CISO Communication Barriers Between CIO and Board
Don't forget to like, subscribe, and turn on notifications for future episodes. Welcome to the 13th episode of Cyber Security America, where we delve into the challenges and issues related to managing up and cultivating the complex relationship between the Chief Information Officer (CIO), Chief Information Security Officer (CISO), and the Board of Directors. Effective identification and mitigation of systemic corporate risk toward technology crown jewels and assets are crucial for the success or failure of a company's Cyber Security program. In this episode, we explore the lessons learned on how to work together to break down the barriers of communication and prioritization. Join us for this informative episode to learn more about this critical issue and its importance in securing your enterprise. Our guest speaker for this episode is George Tsantes, a renowned Cybersecurity expert with over 40 years of experience in delivering innovative solutions and securing enterprises across industries. He is the co-founder and CEO of CYBERPHOS, a Software as a Service (SAAS) focused on improving cybersecurity risk governance. He also operates GT3 Consulting, a boutique consultancy that helps clients across a wide spectrum of industries understand and manage their cybersecurity risk. During his career, Mr. Tsantes was a Principle at EY where he led the firm's cybersecurity practice for the Financial Services Office (FSO) and advised many of EY's key clients across a wide range of cyber topics and projects. He was also Executive Vice President and Chief Technology Officer of Intersections, Inc., and a Partner at Accenture, a global management consulting and technology services company. He is the co-author of Cybertax, Managing the Risks and Results and a frequent speaker at corporate and industry events. As part of this episode, we will also be discussing the latest Cybersecurity threats, including CVE-2023-21554 rated as a 9.8 CVSS score, a RCE vulnerability involving Microsoft Message Querying Services, and CVE-2023-28528252, an out of bound write vulnerability in Microsoft Windows that is being exploited by the Ransomware group known as Noco Ywa. Additionally, research shows that over 360,000 IP addresses are exposing Microsoft MSMQ services over the Internet via TCP port 1801, and the Lockbit 3.0 attack strikes again. Join us for an insightful discussion on Executive Development and how to avoid the CISO, CIO, and Board Communications chasm. Follow us on Cyber Security America Podcast https://www.youtube.com/@cybersecurityamerica_show/featured #cybersecurity #CISO #infosec #Iinformationsecurity #riskreduction #threatintelligence #computersecurity

Apr 11, 2023 • 1h 1min
Security Operations: Hybrid SOC Delivery & Maturity
Tune in to episode 12 of Cyber Security America, airing live on Tuesdays at Noon ET on VoiceAmerica. In this week's discussion, we will continue the conversation from the previous episode and delve deeper into the topic of Security Operations Center (SOC) delivery models. Join Josh and special guest, Mr. Paul Dwyer, as they explore the best practices and lessons learned for optimizing SOC performance and maturity. As a former Global IBM Security Partner with vast experience in SOC implementation and optimization, Mr. Dwyer brings invaluable insights to the table. Don't miss this opportunity to learn about SOC strategy design, implementation, and optimization techniques, as well as the latest developments in Risk Analytic Centers (Fusion Centers). Follow the links below to listen to the episode on Spotify and access more resources on the topics of SOC, threat detection, and cyber defense. #SOC #securityoperations #threatdetection #threatresponse #MDR #cybersecurity #cyberthreats #cyberdefense #cyberthreatintelligence #manageddetectionandresponse #threatintel #threatintelligence #deepseas https://www.linkedin.com/in/joshuanicholson/

Apr 4, 2023 • 57min
Diversity & Inclusion: Women in Cyber - New Path Forward
The Untold History of Women in Cyber Security. In this new episode, we hear from women who are leading cyber defense teams, developing cutting-edge technology, and driving innovation in the cyber security field. They will share their stories, the challenges they have faced, and how they met them head on. We also discuss how the cyber security industry benefits from diversity. Join us as we contribute to the documentation of women's impact in the cyber security industry and learn from the experiences of women who are paving the way for the next generation of leaders. This is The Untold History of Women in Cyber Security." https://www.youtube.com/channel/UCp94j2q_-F4SwvxgQYI_8Cg

Mar 28, 2023 • 45min
Cyber Risk Management: Identity & Access Mgt (IAM)
In the 10th episode of Cyber Security America, we delve into the crucial field of Identity & Access Management (IAM). We discuss how identities, access rights, and permissions all play a crucial role in providing secure access to data and applications across multiple ecosystems. Our guest Rakesh, a cybersecurity leader with over 18 years of experience, highlights the often-overlooked aspect of User Experience and the need for dedicated resources to drive a successful IAM program. He shares insights into how small and mid-sized companies can implement these functions to achieve maximum risk reduction. Don't miss this informative episode to learn more about IAM and its importance in securing your enterprise. Remember to like, subscribe, and turn on notifications for future episodes. Rakesh is a Cybersecurity leader with 18+ years of progressive experience assisting Fortune 500 companies in implementing security and risk management programs. He was previously the Head of IAM for an Insurance company and managed all aspects of IAM incl. governance, strategy & roadmap, engineering, regulatory compliance, and operations. He has worked in a variety of leadership positions running several IAM services. He has been a management consultant at Big-4 organization where he was part of the Cybersecurity consulting group focused on Financial Services. Outside of IAM, Rakesh also has experience across broader areas of Cybersecurity incl. endpoint and data security, network security, vendor risk management and cyber governance. Rakesh has a bachelor's degree in Computer Science Engineering from VTU, India and holds CISSP, CISM and CRISC certifications. He is based out of Charlotte, where he lives with his wife and two kids. In his free time, he enjoys going on treks, training for marathons, playing poker and motorbike rides. #cybersecurity #CISO #infosec #IAM #userexperience #riskreduction

Mar 21, 2023 • 1h 2min
Building a Cybersecurity Career: The Journey to CISO
Join us for the 9th episode of Cyber Security America as we explore the journey of a cybersecurity professional who climbed the ranks from junior Cybersecurity consultant to the coveted position of Chief Information Security Officer (CISO). Our guest, Josh, shares his experience of working as a consultant at EY and ultimately leading the cybersecurity efforts at General Atlantic, managing over 84.4 billion in assets under management. Josh discusses how he established and developed a leading cybersecurity function at Pine River Capital Management and led cyber threat management advisory services for financial sector clients during his 10-year tenure at EY. He also shares his insights on the most critical cybersecurity challenges facing organizations today, including threat intelligence, vulnerability identification and remediation, security monitoring and analytics, incident management, and security engineering. In addition, Josh serves as the Chairman of the FS-ISAC Alternative Investors Council and formerly served as a Cybersecurity Advisory Board Member for Pace University's Seidenberg School of Computer Science and Information Systems. With a bachelor's and master's degree in Computer Science from Dartmouth College, he is also a certified CISSP. Join us to gain valuable insights from Josh's cybersecurity journey and learn from his experience in dealing with the most pressing cybersecurity issues. Don't forget to use the following hashtags for the most popular cybersecurity topics: #cybersecurity #CISO #infosec #threatintelligence #vulnerabilitymanagement #securitymonitoring #incidentmanagement #securityengineering #FSISAC #CISSP #GeneralAtlantic #PineRiverCapital #EY #deepseas #DartmouthCollege #SeidenbergSchool #cybersecurityamerica

Mar 14, 2023 • 55min
Thought Leadership: Bruce Schneier on "A Hacker's Mind"
Welcome to Cyber Security America, the podcast where we delve deep into the world of cybersecurity and provide insights on past trends, current challenges, and areas for improvement. Our goal is to help you stay informed and prepared for the next cyber threat. In this episode, we have a very special guest, Bruce Schneier, an internationally renowned security technologist, known as a security guru by The Economist. With over a dozen books and hundreds of articles and academic papers under his belt, Bruce is a true legend in the information security field. He's also the author of the latest book, A Hacker's Mind, where he takes hacking out of the world of computing and uses it to analyze the systems that underpin our society. During our conversation, Bruce provides us with valuable insights on the current state of cybersecurity. He discusses the impact of coordinated takedowns by federal forces on ransomware actors, and how less payment transactions on the blockchain related to ransomware actors is a promising sign. He also highlights an emerging threat, Black Lotus, and shares his thoughts on how artificial intelligence thinking like a hacker could be catastrophic. This episode is packed with expert tips and lessons learned. So tune in now to Cyber Security America and join the conversation. Don't forget to check out our website, DeepSeas, for more information on cybersecurity. You can also follow Bruce Schneier on Twitter at @schneierblog for more updates and insights on cybersecurity thought leadership. https://www.linkedin.com/in/joshuanicholson/ https://twitter.com/nicholsonj7111


