CyberSecStudy is the most efficient and effective way to prepare for the CISSP exam. Add audio to your study process and gain a new perspective.
CyberSecStudy is the most efficient and effective way to prepare for the CISSP exam. Add audio to your study process and gain a new perspective.
CyberSecStudy is the most efficient and effective way to prepare for the CISSP exam. Add audio to your study process and gain a new perspective.
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
Rank #1: 2019-009- Log-MD story, Noid, communicating with Devs and security people-part1.
Log-MD story (quick one) (you’ll like this one, Mr. Boettcher) SeaSec East meetup "Gabe" https://www.sammamish.us/government/departments/information-technology/ransomware-attack-information-hub/ New Slack Moderator (@cherokeeJB) Shoutout to “Jerry G” Mike P on Slack: https://www.eventbrite.com/e/adversary-tactics-red-team-operations-training-course-dc-april-2019-tickets-54735183407 www.Workshopcon.com/events and that we're looking for BlueTeam trainers please Any chance you can tag @workshopcon. SpecterOps and lanmaster53 when you post on Twitter and we'll retweet Noid - @_noid_ firstname.lastname@example.org Bsides Talk (MP3) - https://github.com/noid23/Presentations/blob/master/BSides_2019/Noid_Seattle_Bsides.mp3 Slides (PDF) https://github.com/noid23/Presentations/blob/master/BSides_2019/Its%20Not%20a%20Bug%20Its%20a%20Feature%20-%20Seattle%20BSides%202019.pdf Security view was a bit myopic? “What do we win by playing?” Cultivating relationships (buy lunch, donuts, etc) Writing reports Communicating findings that resonate with developers and management Often pentest reports are seen by various facets of folks Many levels of competency (incompetent -> super dev/sec) Communicating risk? Making bugs make sense to everyone… The three types of power: https://www.manager-tools.com/2018/03/three-types-power-and-one-rule-them-part-1 Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email email@example.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: firstname.lastname@example.org Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Rank #2: Episode 3 - Alerts, Events, and a bit of incident response.
In this issue, we talked about upcoming podcasts with Michael Gough from MI2 Security discussing malware, and this week we get into everything about alerts, why they are important, types of alerts, levels that can occur, and even a bit of incident response in handling alerts. Intro "Private Eye" and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
Rank #1: How to crack passwords.
In this crackerjack edition of the Exploring Information Security podcast, Sean Peterson of Parameter Security joins me to discuss password cracking.Sean (@SeanThePeterson), is one of the most passionate infosec people you don't know. He recently did a talk at ShowMeCon on how to crack passwords. It was his first ever talk and pretty damn good. Sean joined me to give me his insights into password cracking.In this episode we discuss:What type of hardware is needed for password crackingWhat type of attacks are used for password crackingHow to crack passwordsWhat's ahead for password cracking [RSS Feed] [iTunes] Subscribe Sign up with your email address to receive news and updates. Email AddressSign UpWe respect your privacy. Thank you!
Rank #2: How to become a penetration tester - Part 1.
In this reddish edition of the Exploring Information Security podcast, Andrew Morris of Endgame joins me to discuss how to become a penetration tester. Andrew (@Andrew___Morris) is a security researcher at Endgame. Before he got that role he was a penetration tester. I had an opportunity to get to know Andrew at some events in the Columbia, SC. He's very knowledgeable and excited about what he does in the information security space. In this two-part series we discuss some of the nuances of being a pen tester and how to find yourself in that particular role. In this episode we discuss: What is a penetration tester?Why become a penetration tester?What writing a report is likeWhat is the day-to-day life of a pen tester More resources: /r/netsecRoom362 - Rob FullerCarnal0wnage - Chris GatesMetasploitExploit Mondayg0tmi1kCobalt Strikeharmj0yActive Directory SecurityPassing the HashEnigma0X3IrongeekSkullSecurity [RSS Feed] [iTunes]
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Rank #1: 7MS #381: DIY $500 Pentesting Lab Deployment Tips.
For Windows VMs Take a snapshot right after the OS is installed, as (I believe) the countdown timer for Windows evaluation mode starts upon first "real" boot. Want to quickly run Windows updates on a fresh Win VM? Try this (here's the source): powershell Install-PackageProvider -Name NuGet -Forcepowershell Install-Module PSWindowsUpdate -forcepowershell Set-ExecutionPolicy bypasspowershell Import-Module PSWindowsUpdatepowershell Get-WindowsUpdatepowershell Install-WindowsUpdates -AcceptAll -AutoReboot To turn on remote desktop: Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server'-name "fDenyTSConnections" -Value 0 To set the firewall to allow RDP: Enable-NetFirewallRule -DisplayGroup "Remote Desktop" To stop the freakin' Windows hosts from going to sleep: powercfg.exe -change -standby-timeout-ac 0 To automate the install of VMWare tools, grab the package from VMWare's site, decompress it, then: setup64.exe /s /v "/qn reboot=r" To set the time zone via command line, run tzutil /l and then you can set your desired zone with something like tzutil /s "Central Standard Time" For Linux VMs Get SSH keys regenerated and install/run openssh server: apt install openssh-server -ymkdir /etc/ssh/default_keysmv /etc/ssh/ssh_host_* /etc/ssh/default_keys/dpkg-reconfigure openssh-serversystemctl enable ssh.servicesystemctl start ssh.service Then grab some essential pentesting tools using Kali essentials, and keep 'em updated git update Next user group meeting September 30!
Rank #2: 7MS #51: CEH vs. OSCP (audio).
A few people have written in asking whether to pursue the CEH or OSCP (or both). This episode discusses my experience with each cert and hopefully points you in the right direction on which one might be right for you. Here’s the article on CEH I mention during the episode – it has much more…
The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners. Prepare to be enlightened, engaged, perhaps challenged, and definitely informed. Hear first hand what the real security issues are, learn what is behind the issues and get to know the people who are responsible for online security and privacy.Hosted by IT security professionals for everyone.
Rank #1: SC 109: IBM Global CISO Cloud & SaaS and ADP Vice President & Global Security Architect Discuss the Business and Technology Benefits of User Behavior Analytics (UBA) Tools.
The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack. In this podcast sponsored by Exabeam, IBM’s David Cass talks with ADP’s V.Jay LaRosa about how UBA provides always on threat hunting to detect and thwart cyber attacks. LaRosa discusses ADP’s selection and implementation of the UBA solution and how his team uses it to quickly and effectively identify potential anomalous behavior. He also talks ROI, staffing and why he wishes he had started sooner.
Rank #2: SC 122: CISO David Cass Talks Cloud Adoption and Security .
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns. In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a cloud access security broker. The two experts discuss how cloud is taking off and that despite security being a key concern of CISOs, with the right protections and solutions in place, cloud can be highly secure. In this Bitglass sponsored podcast, the two touch on critical control areas and what CISOs should take into account when adopting and maintaining a cloud strategy.
The DevSecOps Days is a recorded series of discussions with thought leaders and practitioners who are working on integrating automated security into every phase of the software development pipeline.
Rank #1: Steps to Responsible Disclosure with Bas van Schaik,Man Yue Mo and Brian Fox.
On March 1, 2018, the team at Semmle announced a critical vulnerability in the Pivotal Spring framework. The vulnerability was found by security researcher Man Yue Mo at Semmle — the team behind lgtm.com. In this episode of OWASP 24/7, I speak with research team at Semmle on how they discovered the vulnerability. Also, Brian Fox joins the discussion on the process for responsible disclosure, different ways to approach it and what other companies and projects are doing when a vulnerability is found in their project.About Man Yue Mo — Security Researcher at Semmle for lgtm.comDuring his PhD in mathematics at Oxford, Mo became interested in scientific algorithm development with a focus on data science and machine learning. At Semmle, Mo developed an interest in Semmle's core technology for writing queries over source code. This QL query technology is freely available on lgtm.com for the open source community to use for analyzing their code. Mo has since used QL to identify numerous security vulnerabilities, including CVE-2017-8046 in Pivotal's Spring Data REST, and the infamous CVE-2017-9805 in Apache Struts. He continues to works closely with the open source community to ensure these vulnerabilities are patched and responsibly disclosed. The blog on https://lgtm.com/blog contains various articles by Mo on how to use QL for security research.About Bas van Schaik — Head of Product at SemmleAs the Head of Product at Semmle, Bas is responsible for the entire product portfolio — from the core QL query technology, to lgtm.com where this technology is made freely available to the open source community. Following his PhD in Computer Science at Oxford, Bas joined Semmle to work on machine learning and data science techniques for extracting insights from software engineering data. After setting up a strong team of machine learning experts, he now works closely with engineers and leaders to ensure that Semmle's products are effective in all parts of the software development process — to secure and improve code, reduce risk, and deliver actionable insights. He works closely with pioneers in the open source community, as well as with developers and leaders at organizations such as Google, Microsoft, NASA, Credit Suisse, NASDAQ, and Dell.About Brian Fox, CTO, SonatypeCo-founder and CTO, Brian Fox is a member of the Apache Software Foundation and former Chair of the Apache Maven project. As a direct contributor to the Maven ecosystem, including the maven-dependency-plugin and maven-enforcer-plugin, he has over 20 years of experience driving the vision behind, as well as developing and leading the development of software for organizations ranging from startups to large enterprises. Brian is a frequent speaker at national and regional events including Java User Groups and other development related conferences.
Rank #2: OWASP Application Security Verification Standard Project w/ Andrew van der Stock.
The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls. The primary aim of the OWASP ASVS Project is to normalize the range in the coverage and level of rigor available in the market when it comes to performing Web application security verification using a commercially-workable open standard.Project on OWASPhttps://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification_Standard_Project
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.
Rank #1: #002 – David Cowen: Standing On the Shoulders of Giants.
David Cowen has more than sixteen years of experience in the areas of security integration, architecture, assessment, programming, forensic analysis and investigations. He started out as a penetration tester then moved to digital forensics. Currently, he is a partner at G-C Partners, LLC, a full service digital forensics investigation company, and has experience working in a…
Rank #2: #003 – Lenny Zeltser: You Can Never Know Everything.
Lenny Zeltser is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization’s security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by…
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Rank #1: ISC StormCast for Thursday, October 24th 2019.
FTC Issues SIM Swapping Guidance https://www.consumer.ftc.gov/blog/2019/10/sim-swap-scams-how-protect-yourselfDiscord Used as Info Stealer Backdoor https://www.bleepingcomputer.com/news/security/discord-turned-into-an-info-stealing-backdoor-by-new-malware/Cisco Exploit Code https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypassTails 4.0 Released https://tails.boum.org/news/version_4.0/index.en.html
Rank #2: ISC StormCast for Friday, January 25th 2019.
Ghostscript Remote Code Execution Vulnerability https://www.openwall.com/lists/oss-security/2019/01/23/5Abusing Exchange to Obtain Domain Admin https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin/IPC Voucher UaF Remote Jailbreak http://blogs.360.cn/post/IPC%20Voucher%20UaF%20Remote%20Jailbreak%20Stage%202%20(EN).htmlCisco Security Updates https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-sdwan-bo
Follow the Wh1t3 Rabbit ... attention technology and business leaders!The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and technology that you need to help make decisions in your daily life and in your organization.
Rank #1: DtSR Episode 288 - Experienced Opinions.
This week, while James was out on family duty, I sat down on a Saturday morning with my good friend Will Gragido to talk security. Will is an industry old-timer (sorry buddy, we're old) and has some seriously valid opinions on many things. We discuss some interesting topics, and apologize for nothing. Highlights from this week's show include... It's conference season again... and time for more buzzword bingo Marketing people are the worst...except we're all complicit Threat Intelligence. Again. Still. Yep. Let's go hunting for threats - who should have a threat hunt team, and why Mergers, acquisitions, and the future of our industry Guest Will Gragido ( @WGragido ) - Will Gragido is a seasoned security professional with over 20 years’ experience in networking and information security. Will’s extensive background is the result of his service as a United States Marine, a consultant with the world renowned International Network Services, Internet Security Systems (now IBM ISS), McAfee, Damballa, Cassandra Security, RSA Netwitness, Carbon Black, Digital Shadows and now Digital Guardian where he leads the organization’s Advanced Threat Protection Product Line as its Director.
Rank #2: DtR Episode 104 - JW Goerlich - Security Leaders Series.
In this episode Who is J.W. Goerlich (redux from episode - How did he get to where he is now? How does the security executive deal with the "moving finish line"? JW discusses how 'security' people can break down barriers between "us" and "them" We discuss why we still fail at the basics, and what all this means... JWG tries to talk about his favorite controls framework We discuss what difference it makes where the CISO reports in the enterprise What will the CISO be, or need to do, in ~3-5 years? We discuss hiring into InfoSec - from outside, or within ... and why? JW gives us the one thing you need to remember Guest J.W. Goerlich ( @jwgoerlich ) - Results-driven IT management executive with a track record of building high performance teams and providing flawless execution. Leverages background in systems engineering, software development, and information security expertise to consistently lower operating costs and raise service levels. Designs solutions that support long-term strategic planning and create immediate impact throughout product lifecycle in process and efficiency gains.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Rank #1: Long Live Penetration Testing - Paul's Security Weekly #556.
This week, we interview Adrian Sanabria, Co-Founder and Research Director of Savage Security! In the Topic Segment, Penetration Testing Is Dead; Long Live Penetration Testing! In the news, we have updates from Drupal, Facebook, NSA, Microsoft, and more on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode556 Visit https://www.securityweekly.com/psw for all the latest episodes!
Rank #2: Cash Cows - Enterprise Security Weekly #143.
This week, Matt and John join Paul to discuss the Enterprise Security News, in which CyberArk opens integration ecosystem to community contributions, ExtraHop Announces Reveal(x) Cloud, McAfee announced updates to McAfee MVISION Cloud for Amazon Web Services, and Elastic expands cybersecurity push in new version of software suite! In our second segment, we welcome Sai Chavali, Security Strategist at ObserveIT to talk about Email Data Exfiltration, and why Prevention is ideal, but Detection and Response is a must! In our final segment, we welcome Britta Glade, Director of Content and Curation of RSA Conference, and Linda Gray, Director and Chief of Operations for RSAC APJ, to discuss what's coming new this year for the RSA Conference APJ! To learn more about ObserveIT, visit: https://securityweekly.com/observeit To learn more about RSAC APJ, visit: https://www.rsaconference.com/events/ap19 Full Show Notes: https://wiki.securityweekly.com/ES_Episode143 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
Rank #1: Developing an Effective AppSec Security Program - Brendon Macaraeg - BSW #151.
Brendon Macaraeg is the Sr. Director of Product Marketing of Signal Sciences. Focus on the people, processes and tools a dev team needs to put an effective security program in place. Discuss how to improve listener's current program and tooling to develop, release secure code and proactively protect their apps in prod. Four potential key tactics or areas to cover. To learn more about Signal Sciences, visit: https://securityweekly.com/signalsciences Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode151
Rank #2: Threat Hunting & AI Hunter, ACM - Paul's Security Weekly #599.
In the Technical Segment, we welcome back our friend Chris Brenton, Chief Operating Officer at Active Countermeasures, to discuss why threat hunting is the missing link between our protection tools and our response tools, and will take a deep dive into the AI Hunter! To learn more about Active Countermeasures and to get the slides for the Technical Segment today, visit: https://securityweekly.com/acm Full Show Notes: https://wiki.securityweekly.com/Episode599 Follow us on Twitter: https://www.twitter.com/securityweekly
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
Rank #1: Addressing the Challenges Facing IT Auditors.
Organizations that want to have a competitive edge must leverage the power of emerging technology, but this technology adds complexity to IT auditing. What can auditors do to address this complexity, and what is the role of business leaders when it comes to IT audit? This podcast, in partnership with Protiviti, discusses the results of the 2019 Global IT Audit Benchmarking Study and provides insights on the top challenges IT audit professionals face, how to address these challenges and the skills IT auditors must have.
Rank #2: COBIT 5 Principles: Where Did They Come From?.
COBIT 5, a framework for the governance and management of enterprise IT, is a valuable resource that leverages proven practices, global thought leadership and groundbreaking tools. In this podcast, we discuss the COBIT 5 principles, where they came from and how enterprises can leverage the framework.
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Rank #1: Defensive Security Podcast Episode 161.
Vote for us! https://www.surveymonkey.com/r/secbloggerwards2016 http://www.csoonline.com/article/3071337/cyber-attacks-espionage/cybercriminals-are-increasingly-embracing-a-sophisticated-business-model-approach.html#tk.rss_all https://www.yahoo.com/news/special-report-cyber-thieves-exploit-banks-faith-swift-052100312–finance.html?ref=gs http://www.securityweek.com/google-soon-kill-sslv3-rc4-support-gmail https://threatpost.com/microsoft-warns-of-sneaky-new-macro-trick/118227/ http://www.networkworld.com/article/3073495/security/kansas-heart-hospital-hit-with-ransomware-paid-but-attackers-demanded-2nd-ransom.html
Rank #2: Defensive Security Podcast Episode 118.
http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/ http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/ http://www.forbes.com/sites/thomasbrewster/2015/05/20/guns-bombs-hacking-cars-and-planes-dangerous-tweets-for-a-security-researcher/
Rank #1: Episode 58: Episode 168 - Passwords Passwords Passwords.
Tonight, Steve and Joseph talked password managers and consumer reports for cybersecurity. LogMeIn now owns LastPass Troy Hunt's article on switching from LastPass Websites, Please Stop Blocking Password Managers. It's 2015 Mudge's Consumer Cyber Reports Find us on Twitter: @SFSPodcast @jsokoly @steveD3
Rank #2: Episode 74: Episode 183 - Third Party Risk.
Martin, Andy, and Steve talk about third party risk programs in light of breaches at Target, Banner Health, and other unfortunate souls.
Catch-up on the latest information security news with our Weekly Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, PCI DSS and more.
Rank #1: Weekly podcast: Asda, malvertising and CSI: Cyber.
In this week’s podcast, we look at Paul Moore’s discovery of a vulnerability in Asda’s website, malvertising, and the RSA conference’s odd interesting choice of keynote speakers.
Rank #2: 31 January Weekly Podcast: Facebook VPN, FaceTime bug, and Internet Explorer 10.
31 January Weekly Podcast: Facebook VPN, FaceTime bug, and Internet Explorer 10 by IT Governance
This is a periodic audio podcast discussing current events and trends in Information and Cyber Security. Hallway con with a topic!
Rank #1: Critical Security Controls: Part 1 (with Brian Ventura).
Critical Security Controls: Part 1 (with Brian Ventura) (WITH BRIAN VENTURA) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 23 GUEST: BRIAN VENTURA October 24, 2016 If you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube. NOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers NOTE: This series was originally intended to be a single episode. Because we recorded in excess of three hours of content, we decided (after the fact) to split this into 2 episodes. Critical Security Controls: Part 1 SHOW NOTES PART 1 We talk about National Cyber Security Awareness Month (NCSAM) and some of the initiatives that we have observed to work and not work as well as what some organizations are doing to help. We touch on what the SANS and Center for Internet Security (CIS) Critical Security Controls (Formerly SANS Top 20) are. We then compare and contrast them briefly to other lists, like the Australian Signals Directorate 35 Strategies to Mitigate Cyber Intrusions, Cloud Security Alliance (CSA) Treacherous 12, Open Web Application Security Project (OWASP) Top 10, and OWASP Application Security Validation Standard (ASVS). PART 2 Controls: Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software We discuss the beginning of the Critical Security Controls. Starting with control number 1, we discuss the importance of knowing what devices and assets are on the network as well as maintaining an inventory management tool. We discuss using inventory management as a means of accountability in management. We transition into control 2 which deals with authorized and unauthorized software. PART 3 Controls: 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Controlled Use of Administrative Accounts We discuss developing secure environments, benchmarking, and baselining. We discuss the cross correlation of the US DOD’s (DISA) STIGs (Security Technical Implementation Guides) and CIS Benchmarks and assessing it using Secure Content Assessment Protocol (SCAP). A discussion about golden images ensues and we discuss methods for patching golden images. We discuss vulnerability scanning versus assessment, mobile vulnerabilities, and scanning strategies. Finally, we discuss the importance of limiting who has administrative privileges and when they should be used. ABOUT BRIAN Brian Ventura Brian has 20+ years in Information Technology, ranging from systems administration to project management and information security. He is an Information Security Architect in Portland, Oregon and volunteers as the Director of Education for the Portland ISSA Chapter. Brian holds his CISSP and GCCC, as well as other industry certifications. As the Director of Education, Brian coordinates relevant local and online training opportunities. CONTACTING BRIAN: Twitter: @brianwifaneye Brian’s SANS Instructor Profile Brian’s SANS Courses: SEC440: Critical Security Controls: Planning, Implementing and Auditing (2 day course in Pittsburgh, PA: February 1 and 2, 2017) SEC566: Implementing and Auditing the Critical Security Controls – In-Depth (5 day course in Seattle, WA: February 6 through 10, 2017) Links to Resources mentioned: Australian Signals Directorate 35 Strategies to Mitigate Cyber Intrusions CSA Treacherous 12 (PDF) OWASP Top 10 OWASP ASVS 3.0 (PDF) National Cyber Security Awareness Month (Stay Safe Online) CIS Critical Security Controls Gary McGraw Books Software Security: Building Security In Building Secure Software: How to Avoid Security Problems the Right Way Exploiting Online Games: Cheating Massively Distributed Systems Software Security Library Boxed Set, First Edition PASSWORD BLOG LINKS: AlienVault Hosted Locally on Advanced Persistent Security WI-FI BLOG LINK: AlienVault Hosted Locally on Advanced Persistent Security POWERSHELL LINK: AlienVault Thanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page. Enter your email address:Delivered by FeedBurner SUBSCRIBE TO OUR MAILING LIST * indicates required Email Address * First Name Last Name
Rank #2: SANS Top 20 Critical Security Controls 1-4.
SANS Top 20 Critical Security Controls 1-4 The SANS SANS Top 20 Critical Security Controls are an industry and (for the most part) vendor neutral set of controls that organizations are encouraged to implement to ensure they are cognizant of security issues and can respond accordingly. This episode deals exclusively with the first 4 controls in-depth, so to not overwhelm listeners with what is shaping up to be a nearly 3 hour podcast. If you want to discuss how Advanced Persistent Security can help you implement the SANS Top 20 Critical Security Controls, please contact Advanced Persistent Security Sales. Content This week, we begin to discuss the SANS Top 20 Critical Security Controls, this week we cover the following 4 Controls: SANS Top 20 Critical Security Controls, #1: Inventory of Authorized and Unauthorized Devices SANS Top 20 Critical Security Controls, #2: Inventory of Authorized and Unauthorized Software SANS Top 20 Critical Security Controls, #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers SANS Top 20 Critical Security Controls, #4: Continuous Vulnerability Assessment and Remediation The Center for Internet Security Benchmarks Program The NIST National Checklist Program DISCLAIMER: Aside from receiving training from SANS and holding a certification from their partner organization, GIAC, neither Advanced Persistent Security nor myself, Joe Gray are affiliated with SANS. This podcast is authorized via SANS open use clause and is not officially authorized by SANS. There is no compensation to Advanced Persistent Security nor myself, Joe Gray for doing this podcast. The purpose is to increase awareness using open frameworks. If you have any questions or concerns about the podcast or something you want featured on the podcast, please email us at email@example.com Thanks for stopping by and listening to our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens to this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page. Be sure to subscribe to this podcast and to our Blog. References NIST SP 800-53 Revision 4 SANS Top 20 Critical Security Controls Enter your email address:Delivered by FeedBurner Subscribe to our mailing list * indicates required Email Address * First Name Last Name // //