Cyber Security America

Joshua R Nicholson
undefined
Mar 7, 2023 • 59min

Cyber Control Testing: New Purple Teaming Revolution

The landscape of cyber security threats is evolving, and with it, so are the methods of penetration testing and control validation. Sophisticated organizations now use a continuous purple-teaming methodology that combines offensive testers (Red Teamers) with Cyber Defenders (Blue Teamers) to identify blind spots in their Detection & Response (D&R) controls before a breach occurs. This new approach, called Breach Attack Simulation (BAS), is transforming the way security controls are tested and how analytics are developed. In this episode of our Cyber Security America podcast, we discuss best practices and lessons learned from the purple-teaming revolution. We explore the need for vigilance in monitoring desktop telemetry from EDR solutions, the effectiveness of Network Intrusion Detection Systems (NIDS) sensors and supporting log analytics. The days of simple penetration testing are over, and we explore what to look for in a Breach Attack Simulation managed or in-house capability. Join the conversation and don't miss out on this game-changing episode, packed with expert tips and insights. Listen now on and watch on YouTube at https://www.youtube.com/watch?v=3nDjc6RaZ3Q. #DetectionAndResponse #intelligence #threatintelligence #ThreatHunting #informationsecurity #Podcast #VoiceAmerica #deepseas #charlottebusiness #leader #ciso #cybernews #cyberdefense. Available on #spotifypodcasts,
undefined
Feb 28, 2023 • 55min

Threat Mitigation: Attack Surface Reduction (ASR) paradigm shift

Join us for an engaging and thought-provoking episode of Cyber Security America, as we delve into the crucial topic of The Confusion Between Attack Surface Reduction (ASR) and Vulnerability Management (VM). Our expert guest, Jason Nordquist and Ken Gonzales, share their insights on the current state of cybersecurity and the challenges faced by organizations in this space. Discover the importance of this new paradigm, a critical yet often overlooked aspect of cybersecurity, and how it can help mitigate the risks posed by cyber threats. Don't miss out on this opportunity to gain valuable knowledge and actionable tips from a seasoned cybersecurity professional.
undefined
Feb 21, 2023 • 52min

Security Operations: Adapting SOC Delivery to Threat Actors

At the center of your cyber security universe is the Security Operations Center (SOC). This is supposed to be part of your 24/7 Managed Detection & Response (MDR) capability. But how do you know if your security operations team is running in a mature and highly capable manner. This is where the rubber meets the road when identifying and respond to security threats within your environment. What are the different delivery models, lessons learned, and best practices for driving improvements? We will also explore the increasingly sophisticated tactics used by threat actors, including their use of IoT devices to evade detection inside your network and pivot around undetected. Join us as we take our defense strategy to the next level of maturity, exploring what's working and what needs to change to stay ahead of the evolving threat landscape.
undefined
Feb 14, 2023 • 56min

Cyber Security Governance: Big Shift at SEC & CISA

SEC cybersecurity risk governance rule and its impact on the market. Chris Hetner is the former Cyber Security Advisor to the Chair of the US Securities and Exchange Commission (SEC) and a former Senior Member of the US Department of Treasury Financial Banking Information Infrastructure Committee. He talks about the final process of approving the cybersecurity risk governance guidance, which will bring about a tectonic shift in the way cyber is governed. Don't miss this informative and engaging conversation about the complexities of cybersecurity governance and how the Board will need to adapt.
undefined
Feb 7, 2023 • 58min

Threat Detection & Analytics: Best Practices for Improved Visibility and Response

Protecting what you don't know about is impossible, and detecting unseen threats is equally challenging. In this episode, we delve into Threat Detection & Analytics, discussing the best practices for structuring a program, utilizing effective tools and techniques, and improving an organization's visibility, threat detection, and response capabilities through the use of frameworks and lessons learned.
undefined
Jan 31, 2023 • 58min

What Makes A Good Threat Intelligence Program In 2023?

In the world of Cyber Security, an essential component needed in the fight is a mature Threat Intelligence program tied to a strong Attack Surface Reduction (ASR) function. In this episode. We explore the world of Cyber Intelligence in the enterprise and in small business environments. We will learn from former military, intelligence, and NSA analysts working in the private sector now. What does good look like and what will the new year bring?
undefined
Jan 24, 2023 • 1h 13min

2022 Cyber Threats: Security Vulnerabilities & Major Impacts

This year there has been a tsunami of security vulnerabilities and events that have caused major impact to governments and corporations around the world. We will focus on major security threats and how security programs adapted and responded. Real world accounts from cyber–Incident responders and threat analysts on what worked, what didn't, and lessons for the next incident. How does Machine Learning and AI fit into the modern battle space to protect our supply chains and more? (e.g. ChatGPT, Quantum Computers, Cloud Computing).

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app