Cover image of InSecurity
(11)
Business
Technology

InSecurity

Updated 3 days ago

Business
Technology
Read more

Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Read more

Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

iTunes Ratings

11 Ratings
Average Ratings
9
0
1
1
0

Used to be good

By angry koala1 - Sep 24 2019
Read more
This used to be one of my favorites, but now it is a constant Blackberry Cylance commercial. That combined with the continually poor audio quality makes this one to miss.

iTunes Ratings

11 Ratings
Average Ratings
9
0
1
1
0

Used to be good

By angry koala1 - Sep 24 2019
Read more
This used to be one of my favorites, but now it is a constant Blackberry Cylance commercial. That combined with the continually poor audio quality makes this one to miss.

The Best Episodes of:

Cover image of InSecurity

InSecurity

Updated 3 days ago

Read more

Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Rank #1: The Thin Red Line: An Examination of Penetration Testing

Podcast cover
Read more

The Thin Red Line: An Examination of Penetration Testing

Bank employee: So… people hire you to break into their places… to make sure no one can break into their places?

Colin Bishop: It’s a living

Bank Employee: Not a very good one 

 -- Sneakers, 1992, Phil Alden Robinson

This episode of the InSecurity Podcast introduces the latest report from the BlackBerry Cylance Threat Intelligence team. The report is meant to start a conversation and lift the veil on a range of pentesting practices, byproducts, and after effects about which clients and the general public may be unaware.

As the pentesting industry has evolved and expanded, the line distinguishing red teaming exercises (a military term that, for many, has come to be associated with services that include pentesting) from actual threat actor behavior has thinned and, in some cases, blurred entirely. In the pages that follow, the BlackBerry Cylance Threat Intelligence Team examines the pentesting side of that thin red line.

The study sheds light on a discipline where a lack of universally accepted standards allows a range of common practices that may be inadvertently introducing a host of hidden risks that could adversely impact the values, including client privacy and security, pentesting was intended to protect. These practices consequently raise critical questions about one of the fundamental paradigm

This week on InSecurity Matt Stephenson speaks with Red Teamer Matt Maley and Threat Researchers Kevin Livelli and Jon Gross about what is happening in the world of Penentration Testing. We dive into the curious case of The Poseidon Saga and bicker about the blurred line between pen-testing and straight criminal behaviour. Can the laws keep up with Cybersecurity’s most clever talent? Tune in and find out!

About Matt Maley

Matt Maley (@mjmaley) is a self-described technology nerd who has spent his career building teams and offering an attacker's viewpoint to commercial and public organizations of all shapes and sizes. Matt has spent time engineering security solutions, slogging through networks, picking apart applications, and currently leads the Red Team practice within the Professional Services team at BlackBerry Cylance. As Red Team Practice Director, Matt manages the technical development and delivery of offensive security services, with a focus on applying an adversarial perspective to new and emerging technologies. Matt was previously a lead at ATD, Director at Gotham Digital Science, and Blackhat trainer who holds a B.S. degree from Penn State University and OSCP certification. 

This is not his high school yearbook photo.

About Kevin Livelli

Kevin Livelli (@KevinLivelli) is Director of Threat Intelligence at BlackBerry Cylance, where he conducts long-term, complex investigations with the Research and Intelligence team. His work there follows ten years at 60 Minutes, where his investigative reporting and analysis were recognized with Peabody and Emmy awards. Before that, Livelli supervised investigations at the nation’s largest independent police oversight agency. A graduate of Dartmouth, he earned master's degrees from Trinity College Dublin and Columbia University. 

About Jon Gross

Jon Gross was a Director of Threat Intelligence at Cylance.

He is currently in stealth mode and difficult to find.

Other than that… he doesn’t tell us much.

This is the only known photo of Jon Gross

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Aug 21 2019

1hr 4mins

Play

Rank #2: Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem

Podcast cover
Read more

Kip Boyle: Cybersecurity Is a Business Problem, Not a Technical Problem

Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company’s future.

In this week’s episode of InSecurity, Matt Stephenson chats with Kip Boyle, Founder and CEO at  Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They discuss the tools and processes a business will need to  mitigate cyber risk and online threats. Kip has developed a 5-Principle approach that will help safeguard your business from cyber attacks. 

Fire Doesn’t Innovate

The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks

About Kip Boyle

Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI).

Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI.

Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

 Make sure you Subscribe, Rate and Review!

Jan 21 2019

55mins

Play

Rank #3: Incident Response

Podcast cover
Read more

Both the government and private sector have been under scrutiny for their handling of security incidents like sensitive data loss and exposure, and we seeing large organizations with ample resources struggle to provide an adequate response to security incidents.

In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest and former White House CIO Theresa Payton to discuss how government incident response different from the private sector, who should be in charge of incident response, and what organizations can do to make up for the lack of internal resources.

Feb 25 2018

22mins

Play

Rank #4: Clint Watts on Social Media Manipulation

Podcast cover
Read more

Clint Watts: Social Media Manipulation

What if I told you that the most effective way to hack an election isn’t injecting code into a voting machine or surreptitiously changing the vote count, but rather by means of clever and extensive use of popular social media platforms like Facebook and Twitter?

The major platforms are designed to be able to target specifics groups of people who fit specific profiles demographically. Nefarious organizations can use those platform features to influence public opinion and dialogue.

Bots can create what appear to be armies of people who publish what seems on the surface to be “news” that finds a home with like-minded people. And that, friends, is how someone half a world away can sway an election from an iPhone.

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Clint Watts, national security contributor at MSNBC and author of the recently released best-selling book Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News.

About Clint Watts

Clint Watts (@selectedwisdom) is a Robert A. Fox Fellow in the Foreign Policy Research Institute’s Program on the Middle Eastas well as a Senior Fellow at the Center For Cyber and Homeland Security at The George Washington University. Watts is a consultant and researcher modeling and forecasting threat actor behavior and developing countermeasures for disrupting and defeating state and non-state actors.

His research predominately focuses on terrorism forecasting and trends seeking to anticipate emerging extremist hotspots and anticipate appropriate counterterrorism responses. More recently, Watts used modeling to outline Russian influence operations via social media and the Kremlin’s return to Active Measures.

Before becoming a consultant, Clint served as a U.S. Army Infantry Officer after graduating from West Point, an FBI Special Agent on a Joint Terrorism Task Force (JTTF), as the Executive Officer of the Combating Terrorism Center at West Point (CTC) and as a consultant to the FBI’s Counter Terrorism Division (CTD) and National Security Branch (NSB). 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

 Make sure you Subscribe, Rate and Review!

Jun 18 2018

45mins

Play

Rank #5: Jeff Tang: Demystifying Fileless Malware

Podcast cover
Read more

Jeff Tang: Demystifying “Fileless” Malware 

The only difference between a hacker and a remote systems administrator is who is employing them

 -- Unknown

Want to hear some numbers that might scare you? Or… they might confirm what you already know. Or… they might just be numbers.

63% of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon's 2018 State of Endpoint Security Risk report

52% of respondents say all attacks cannot be realistically stopped. Their antivirus solutions are blocking only 43% of attacks

62% of respondents said that their organizations had experienced one or more endpoint attacks that resulted in a data breach

 -- 6 Ways Malware Can Bypass Endpoint Protection; Maria Korolov, contributing writer CSO

By now, everyone is familiar with the concept of file-based malware. Malware typically is delivered in the form of executable files. When it comes to “fileless” malware however, there’s a lot of confusion and misunderstanding due to the evolving nature of the term.

Fileless malware originally took shape in the form of exploit payloads that reside only in-memory and never touched disk. Later on, the endpoint security industry adopted it to encompass file formats that were not traditionally recognized as executable but instead served as a host container to run arbitrary code. As attackers have revamped their techniques, the term has gone on to include misusing built-in operating system utilities to conduct their operations.

In this episode of InSecurity, Matt Stephenson spent some time with Jeff Tang to find out what the hell all this means and why it matters. Think you know? Might want to tune in just to make sure

About Jeff Tang

Jeff Tang(@mrjefftang) is a Senior Security Researcher at Cylance focused on operating systems and vulnerability research. He started his career as a Global Network Exploitation & Vulnerability Analyst at the National Security Agency, where he conducted computer network exploitation operations in support of national security requirements. Prior to Cylance, Jeff served as the Chief Scientist at VAHNA to develop a security platform for identifying targeted network intrusions, and also worked as a CNO Developer at ManTech where he researched tools, techniques and countermeasures in computer network vulnerabilities.

Jeff completed his Bachelor of Science (BSc) in Electrical Engineering and Computer Science at the University of California, Berkeley and a Master of Science (MSc) in Offensive Computer Security at Eastern Michigan University.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcastsand GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radioand wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Jul 01 2019

48mins

Play

Rank #6: BlueKeep: It’s Not Just About The Worm

Podcast cover
Read more

BlueKeep: It’s Not Just About The Worm

In the last week, you have likely heard and read stories about the security vulnerability BlueKeep. It has been said to be capable of being exploited for the initiation of self-replicating worm as destructive as WannaCry.

As of June 1, over 1M computers may be at risk.

But is the danger really about The Worm?

Or is it more about millions of endpoints providing direct ingress into networks worldwide?

“The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. 

Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the internet.

We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact and are seeking to motivate increased protections against this flaw. The NSA urges everyone to invest the time and resources to know your network and run supported operating systems with the latest patches.

This is critical not just for NSA’s protection of National Security Systems but for all networks.”

 -- NSA Cybersecurity Advisory - Patch Remote Desktop Services on Legacy Versions of Windows

In this Very Special Episode of InSecurity, Matt Stephenson rounded up a cast of experts to discuss BlueKeep… What is it? Where did it come from? Can it be stopped? Maybe a better question is… can it be prevented? After WannaCry and Petya/NotPetya… why is this happening again?

We are joined by best-selling Cybersecurity author and Kip Boyle, Automox’s Richard Melick and BlackBerry|Cylance’s Scott Scheferman to take good hard look at BlueKeep.

There’s a Bad Moon on the Rise… make sure you are ready for it.

About Kip Boyle

Kip Boyle (@KipBoyle) is a 20-year information security expert and is the founder and CEO of Cyber Risk Opportunities. He is a former Chief Information Security Officer for both technology and financial services companies and was a cyber-security consultant at Stanford Research Institute (SRI).

Boyle led the global IT risk management program for a $9 billion logistics company and was the Wide Area Network Security Director for the F-22 Raptor program. He has participated in several cybersecurity war game exercises and has worked closely with various government agencies including the FBI.

Boyle is a US Air Force officer and serves on the board of directors of the Domestic Abuse Women’s Network (DAWN). He’s been quoted in Entrepreneur magazine, Chief Executive magazine, and is the co-author of Chapter 68, Outsourcing Security Functions, in The Computer Security Handbook.

Fire Doesn’t Innovate

Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.  Cybersecurity is not just a technology problem, it's a management opportunity. Learn how to manage cyber risks and ensure your company is cyber resilient now, and remain in the game no matter what the future holds. 

About Richard Melick

Richard Melick (@RCMelick) is a Sr. Technical Product Marketing Manager at Automox. He has over a decade of experience in Cybersecurity and Antivirus Software, working in various career functions in the industry that have taken him all over the world. 

About Automox

Automox (@AutomoxApp) was founded to pursue a disruptive new vision: the complete automation of endpoint configuration, patching, management and inventory. They are the only cloud endpoint management solution capable of remediating Windows, OS X, and Linux endpoints from a single platform. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint

and software, regardless of location, meets regulatory and operational security requirements.

About Scott Scheferman

Scott Scheferman (@transhackerism) wears many hats at BlackBerry|Cylance, working between the white spaces on the org chart to ensure timely delivery of Consulting Services, effective messaging around the value of predictive AI in the context of cybersecurity operations and risk, research around how the Temporal Predictive Advantaged (TPA) ofBlackBerry|Cylance’s AI affects the broader malware economy, and public speaking at conferences and seminars around the country. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Jun 13 2019

1hr 10mins

Play

Rank #7: Threat Intelligence and Information Sharing

Podcast cover
Read more

Threat intelligence and information sharing initiatives help the public and private sectors better prepare for attacks, and new platforms and standards have been developed to help organizations achieve real-time threat intelligence.

But information sharing and threat intelligence only truly provide value if you have the ability to afford the systems to process the raw data effectively, and have the analysts on hand to consume it in an actionable manner.

Unfortunately, many companies do not and never will have the resources needed to implement an extensive cybersecurity infrastructure of this nature.

In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Vince Crisler, CEO of Dark Cubed and Partner at Fortalice Solutions, who discusses the challenge the broader cybersecurity community faces in automating and integrating advanced capabilities that will work for both large and small organizations.

Nov 26 2017

16mins

Play

Rank #8: Sentinel Technologies has earned the trust for businesses to put their most precious assets in their care

Podcast cover
Read more

Sentinel Technologies has earned the trust for businesses to put their most precious assets in their care.

The diverse threats we face are increasingly cyber-based. Much of America's most sensitive data is stored on computers. We are losing data, money, and ideas through cyber intrusions. This threatens innovation and, as citizens, we are also increasingly vulnerable to losing our personal information.

 - James Comey

Sentinel Technologies. They may be one of the most important companies you’ve never heard of. They have been In business for over 35 years. With over 500 employees and over 50 Company Certifications and over 2400 individual certifications with industry pillars including EMC, VMware and NetApp, they have been around a lot of different blocks and solved a lot of different problems for their clients.

With a customer base striped across Education, Finance, Healthcare, Manufacturing and Government… It’s fair to say that Sentinel Technologies has a lot of fingers in a lot of pies

About Sentinel Technologies

Sentinel has stayed at the forefront of IT developments and maintained a singular focus on providing practical and innovative solutions. With single-source accountability, Sentinel processes and teams address a range of IT needs – from communications, to data center, to cloud and managed services.

About Bob Keblusek

Bob Keblusek (@rkeblusek) is the Chief Technology Officer at Sentinel Technologies.

About Rick Spatafore

Rick Spatafore (@RickSpatafore) is the Strategic Advisor for Security & Healthcare at Sentinel Technologies 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

About Edward Preston

Edward Preston (@eptrader)has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. 

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Sticher, SoundCloud, I Heart Radio as well as

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Aug 27 2018

46mins

Play

Rank #9: InSecurity Podcast: Mike Daugherty and Malcolm Harkins... Who Can You Trust?

Podcast cover
Read more

What if I told you that there are companies out there who deliberately spoof data breaches in order to blackmail their “customers” into paying for their “breach remediation services”?

What if I told you that, after failing to be a good little victim to such a scam, LabMD began hearing from the Federal Trade Commission about its security and technology practices?

Would you believe me if I said that, in a battle that is now in its 17thyear, our guest has attempted the impossible and stood up to the crooks and the FTC? Rather than settle a case that he knew was wrong, our guest refused to live in the world he was given. He has battled to change that world and keep his company’s name and his own name from being steamrolled by the bureaucracy of a government agency that may not really know what they are doing when it comes to data privacy and security.

Joining Matt Stephenson on the InSecurity podcast are Mike Daugherty and Malcolm Harkins.

Mike is the CEO of LabMD who refused to be the victim of a shady “Breach Mediation” company, which led to a decade long battle with the Federal Trade Commission.

Malcolm is the Chief Security & Trust Officer at Cylance. He is not one to sit idly by and let the cybersecurity industry focus on profits over people.

Imagine what might happen when you get these two in a room together…

About Mike Daugherty

Mike Daugherty is embroiled in the biggest regulatory cybersecurity legal battle in the country today. The CEO of LabMD, a cancer testing laboratory, author, speaker, consultant and policy advocate, he has spent most of the last decade defending his company against charges that it had deficient cybersecurity practices. The early years of his entering and fighting Washington, DC, are recorded in his book, The Devil Inside the Beltway. In so doing, he has become the only litigant to challenge the basic authority that underlies more than 200 enforcement actions relating to cybersecurity and online privacy that the FTC has brought over the past 15 years. Every one of the 200+ litigants before him – including some of the largest companies in the world – have settled with the FTC, creating an unquestioned and untested belief that the FTC has broad authority to regulate in these areas. Following oral arguments in June, 2017, before a panel of the 11th Circuit Court of Appeals, on June 6, 2018, he actually prevailed. In so doing, he toppled key pillars of the FTC’s cybersecurity and online privacy edifice, successfully exposing and challenging The Administrative State. The cybersecurity regulatory framework for all of industry has been flipped on its head.

About Malcolm Harkins

As the Chief Security and Trust Officer at CylanceMalcolm Harkins (@ProtectToEnable) is responsible for all aspects of information risk and security, security and privacy policy, and for peer outreach activities to drive improvement across the world in the understanding of cyber risks and best practices to manage and mitigate those risks. Previously, he was Vice President and Chief Security and Privacy Officer at Intel Corp. In that role, Malcolm was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Jul 25 2018

50mins

Play

Rank #10: Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

Podcast cover
Read more

Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense

Is a Terminator T-800 an endpoint? Is Voltron an endpoint? Could we have prevented a lot of damage to the Earth if Tony Stark had just installed a BlackBerry Cylance endpoint protection solution on the Iron Legion?

In this week’s episode of InSecurity, Matt Stephenson chats with BlackBerry CTO Charles Eagan and BlackBerry Cylance CPO Eric Cornelius... two people charged with leading the charge to combine BlackBerry and Cylance into a security solution that will protect every Thing under the sun.

Take a walk with them as Matt finds out what the future holds now that BlackBerry and Cylance have come together.

If you are in San Francisco for RSA, make sure to come say hello to Charles, Eric, Matt and a lot of other interesting security folks Tuesday night at the Digital Shadows Security Leaders Party, Tuesday, March 5that 6.00 pm. 

Cylance will be at Booth #6145 in the North Hall. Swing by to see demos of Cylance’s Artificial Intelligence (AI) Platform which provides advanced endpoint protection and endpoint detection and response capabilities.

Join us to see for yourself how the Cylance AI Platform delivers business value and outcomes you had been told were impossible. You can also snag some of our giveaways while you’re there, so come on by. 

About Charles Eagan

Charles Eagan is the Chief Technology Officer for BlackBerry. In this role, Charles oversees the standardization and integration of all company products and is responsible for the advancement of new technologies and partnerships, with an emphasis on defining BlackBerry’s Enterprise of Things platform as well as driving innovation within emerging markets.

Charles was previously the Global Head of Electronics at Dyson Ltd (U.K.), focused on IoT device deployment. Prior to that he served as BlackBerry’s Global Head of Device Software, and spearheaded development of the BlackBerry 10 operating system and the transition to secure Android.

Charles was formerly Vice President of Engineering for QNX Software, where he concentrated on the automotive and embedded markets. He also worked at Cisco and directed development of the seminal CRS-1 carrier routing system.

Charles is a noted speaker, thought leader and IoT expert who has been at the forefront of new frontiers in digital connectivity for over three decades. He graduated with honors from the University of Waterloo (Canada) with a bachelor’s degree in applied mathematics and electrical engineering minor.

About Eric Cornelius

Eric Cornelius is the Chief Product Officer at Blackberry Cylance. In this role, Eric drives product and innovation. Previously Eric served as VP of Innovation, Director of Critical Infrastructure/ICS and Technical Director of Incident Response/Critical Infrastructure at Cylance. Eric brings this wealth of knowledge and long history as a security practitioner, consultant, trusted advisor and product builder to his work in elevating our product development initiatives, and to leading our product management and corporate development teams.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review! 

Mar 04 2019

43mins

Play

Rank #11: Clint Watts: The World of Advanced Persistent Manipulators

Podcast cover
Read more

Clint Watts: The World of Advanced Persistent Manipulators

This $#!%’s chess! It ain’t checkers

 -- Detective Alonzo Harris; 2001, Training Day

Want to have some fun with some numbers? As of May 2019, the total worldwide population identifying as human is 7.7 billion. Among those people, 4.4 billion of them use the internet. Not quite everyone is sharing their lives, but there are 3.499 billion active social media users.

Are they all real people? That’s a valid question… There are an estimated 270 million fake Facebook profiles. Oh… and… in 2018 Twitter deleted 70 Million accounts they determined were fake. So there’s that.

Clint Watts studies terrorists, terrorism, social media, external forces meddling with elections and a lot of other Orwellian things. Since publishing Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News last summer, he has looked deeper into other types of election hacking including Deepfakes. You may have seen his June testimony in front of the U.S. House of Representatives Permanent Select Committee on Intelligence on C-Span… if you’re a C-Span type of person.

In this week’s episode of InSecurity, Matt Stephenson welcomes Clint Watts back to InSecurity. This week, we dig into Advanced Persistent Manipulators. Like their technology cousin Advanced Persistent Threats, APMs are hard to quantify, harder to understand and ever more difficult to stop. With governments all over the world in a state of perpetual campaign mode and candidates running their own Troll farms, do we even know what to prepare for? Tune in and find out!

About Clint Watts

Clint Watts (@selectedwisdom) is a Distinguished Research Fellow at the Foreign Policy Research Institute, Non-Resident Fellow at the Alliance for Securing Democracy. His book best-selling Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News shined a light on what has, is and could happen with regard to social media manipulation and the ways foreign interests can hack the electoral process. It was recently released in paperback.

Clint is also a national security contributor for NBC News and MSNBC. His research and writing focuses on terrorism, counterterrorism, social media influence and Russian disinformation. Clint’s tracking of terrorist foreign fighters allowed him to predict the rise of the Islamic State over al Qaeda in 2014. From 2014 – 2016, he worked with Andrew Weisburd and J.M. Berger to track and model the rise of Russian influence operations via social media leading up to the U.S. Presidential election of 2016. This research led Clint to testify before four different Senate committees in 2017and 2018regarding Russia’s information warfare campaign against the U.S. and the West.

Before becoming a consultant, Clint served as a U.S. Army infantry officer, a FBI Special Agent, as the Executive Officer of the Combating Terrorism Center at West Point, as a consultant to the FBI’s Counter Terrorism Division and National Security Branch, and as an analyst supporting the U.S. Intelligence Community and U.S. Special Operations Command.

His supporters think he’s had an interesting career, his enemies think he can’t hold down a job… both would be correct.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

A former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.

Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.

Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.

Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Jul 22 2019

58mins

Play

Rank #12: The Cybersecurity Skill Shortage is a Matter of National Security

Podcast cover
Read more

Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe.

Over two thirds of all network compromises are not discovered for months

The average cost to a business for each record lost to a data breach is $148

Now consider that, according to the Herjavec group, there will be over 3.5 million cybersecurity job vacancies by 2021. These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present?

In today’s special LIVE episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day.

About Huntsource

Huntsource seeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything.

Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe.

About Matt Donato

Matt Donato is the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business.

About Jack Hall

Jack Hall is the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Oct 29 2018

16mins

Play

Rank #13: HuntSource is working hard to fill the Cybersecurity skills gap

Podcast cover
Read more

HuntSource is working hard to fill the Cybersecurity skills gap

Here are some important numbers to consider when thinking about the personnel and technology required to keep your network and your data safe.

These gaps run the gamut from the heart of the datacenter up to the executive suite including CISO and CSO positions. How are businesses supposed to prepare for their future if they are not fully staffed and ready to protect their present?

Have you heard some of this before? We hope you enjoyed last week’s tribute to Orson Welles and our CyberWar of the Worldpodcast.

Now let’s get serious and have an in depth discussion about the Cybersecurity Skills gap….

In today’s episode of InSecurity, Matt Stephenson talks with Huntsource Co-Founders Matt Donato and Jack Hall about the ever-growing Cybersecurity Skills Shortage. In a world where there appears to be a never ending torrent of malware, ransomware and coordinated attacks, the gap between attackers and defenders is growing seemingly every day. 

About Huntsource

Huntsourceseeks to arm businesses with the highest quality talent needed to effectively combat the various security risks that threaten them on a daily basis. They strive to be the preeminent and comprehensive Information and Cyber Security Professional Search and Talent Solutions firm, putting people and customers at the center of everything.

Their focus areas include cyber and information security. Protecting its infrastructure is vital to keeping a company safe.

About Matt Donato

Matt Donatois the Co-Founder and Managing Partner of Huntsource. He has 12+ years of experience in the staffing, executive search, and talent solutions industry. He is a seasoned leader and recruiting industry expert. Over the years his experience has included leading a variety of strategic and tactical operations functions, business development, key account relationship management, recruiting, organizational training, talent mapping, and driving organic new business growth. Donato continues to help elevate companies by identifying key talent and fostering relationships with both clients and candidates. Matt received his BS in Economics from Roanoke College and is currently obtaining his Executive MBA from Wake Forest School of Business.

About Jack Hall

Jack Hallis the Co-Founder and Managing Partner of Huntsource. He has spent the greater part of his 12+ year recruiting career working for large, national IT staffing firms. His experience includes recruiting top talent, client acquisition, strategic account management, training, and development. As a consistent top producer, Jack builds lasting relationships with his customers through a consultative approach and deep understanding of their business domain. He’s serviced clients in multiple industries, including financial services, telecommunications, consumer products, publishing, and healthcare, among others. Jack holds a BA in Psychology from the University of Tennessee, Knoxville, for which he remains an active supporter of the College of Arts and Sciences.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Nov 05 2018

47mins

Play

Rank #14: The State of Local Government Security

Podcast cover
Read more

Security teams in local government, be they state, county or municipal, are working hard to secure critical data and systems with tight budgets and limited personnel. There are 133 operating governments in the State of Virginia alone, yet there are less than a dozen CISOs to manage operations.

Why are there so few CISOs in local government? Is the CISO role in local government different than in the private sector? What are some of the security challenges local governments are facing today?

In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest David Jordan, CISO for Arlington County and co-host of Practical Security Radio, to discuss the state of security for state, county, and municipal organizations.

Dec 10 2017

20mins

Play

Rank #15: The State of Cyberwarfare

Podcast cover
Read more

If you have been following the news for the last year, odds are you’ve heard about the tensions alleged cyberwarfare operations are causing amongst world powers, and APTs and zerodays are fueling the FUD.

Governments and corporations continue to prepare to address the threat, with some considering options for ‘offensive defense’ strategies. Reuters reported in late November that NATO allies are drawing up cyberwarfare principles that could include the ability to use offensive capabilities to take down enemy networks.

In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Tiago Rosado, cybersecurity adviser and strategist at Dognædis, to discuss what cyberwarfare related implictions should be a concern for businesses, and how they can proactively prepare for threats from nation-states actors.

Dec 18 2017

23mins

Play

Rank #16: Marcus Carey: Tribe of Hackers

Podcast cover
Read more

Marcus Carey: Tribe of Hackers

There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. With his new book Tribe of Hackers, Marcus Carey wants to change that.

Tribe of Hackers is a collection of industry, career, and personal insights from 70 cybersecurity luminaries.

In this week’s episode of InSecurity, Matt Stephenson sits down with world renowned hacker Marcus Carey, CEO of Threatcare, to talk about talk about his new book, Tribe of Hackers as well as mentors from his past who have influenced him and, by extension, influenced the world of cybersecurity.

About Tribe of Hackers

These are the wisdom and perspectives of real-life hackers and cybersecurity practitioners, including David KennedyWendy NatherLesley Carhart, and Bruce Potter.

Threatcare will be giving away three copies per day (fifteen total) at the RSA Conference. Follow Threatcare on Twitter and Sign Up for the Risk Report to learn more about the details.

All proceeds from the book will go towards Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid’s Club.

About Marcus Carey

Marcus Carey is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy and holds a Master’s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. Currently, working as founder and CEO of cybersecurity company Threatcare, Marcus is passionate about giving back to the community through things like mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time. Tribe of Hackers is his first published book, but will definitely not be his last.

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Make sure you Subscribe, Rate and Review!

Jan 28 2019

51mins

Play

Rank #17: InSecurity Podcast Mixtape: Hacker Summer Camp Edition

Podcast cover
Read more

InSecurity Podcast Mixtape: Hacker Summer Camp Edition

is there any better time of year to go to Las Vegas than early August?!?

We’re totally kidding… It’s hot and this year there was a plague of locusts!

But it is also the time of year when people from all walks of the Cybersecurity world gather to learn, teach and reconnect. Whether it is at BSidesLV, Black Hat, DEFCONor other events too cool to be on the radar, odds are, you are standing in line next to someone who knows how to either protect or break into a network.

We spoke with some of those folks...

Enjoy!

  1. Charles Eagan: BlackBerry Cylance Covers the Entire Security Spectrum
  2. Joe Menn: Cult of the Dead Cow; How the Original Hacking Supergroup Might Just Save the World
  3. John McClurg: There Is a Reason Legislators Listen to John McClurg
  4. Mia Damiano: Bringing the Story of Cybersecurity to the People
  5. Dave Cundiff: Building a Security Program as Secure as Fort Knox
  6. Greg Fitzgerald: Cyberforceis Showing SMBs the Same Love as Large Enterprises
  7. Dave Castignola: Why BlackBerry Cylance Looks to the Moon for Inspiration
  8. Rex Johnson: Rex JohnsonKnows Where the Gaps are in Cyber Insurance
  9. Red Dragon 1949: @RedDragon1949Can Only Tell You SOME of the Cyberscurity Stories He Has Lived
  10. Mark Wilson: BlackBerry and Cylance: The Integration is DONE

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcastsand GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radioand wherever you get your podcasts!

Make sure you Subscribe, Rate and Review!

Sep 09 2019

47mins

Play

Rank #18: Susan Etlinger on The Ever Expanding Role of Artificial Intelligence

Podcast cover
Read more

From Amazon Echo to self-driving cars to Norman, the Psychopathic AI… the Artificial Intelligence diaspora appears to be growing as diverse as humanity itself. Are we good with that?

Susan Etlinger joins Matt Stephenson on the InSecurity podcast to dig into the business ramifications of the ever-increasing presence Artificial Intelligence in the data center. Susan is an industry analyst focusing on industry trends related to the impact of emerging technologies on organizations and individuals. Susan specializes in business strategies related to artificial intelligence, data science, analytics and digital ethics.

In this episode of Insecurity, Susan calms Matt's irrational fears of the potential of AI while illuminating the exciting present and future of Artificial Intelligence and Machine Learning.

We'll take a look at what is happening in "The Enterprise" and why AI experiments like Microsoft's Tay and MIT's Norman can provide value. Given that Susan was recently named among 100 #AI Influencersby US AI, she is among the most qualified among us to lead this conversation. 

About Susan Etlinger

Susan Etlinger(@setlinger), an industry analyst at Altimeter Group, is a globally recognized expert in digital strategy, with a focus on artificial intelligence, big data, AI ethics and big data. Susan conducts independent research and has authored many reports that are available to the public. Susan works with Global 2000 clients to assess the impact of AI and related technologies on business, and identify use cases, opportunities, risks and organizational structure and culture. She also works with technology vendors to refine product road maps and strategies based on her independent research. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Aug 19 2018

37mins

Play

Rank #19: Hiep Dang & Edward Preston introduce Cylance Smart Antivirus

Podcast cover
Read more

InSecurity Podcast: Why is Cylance entering the consumer market?

  • What if I told you that
    • 67% of workers use their own personal devices while at work
    • 37% of US workers telecommute
  • What if you asked me “why should I care?”
    • Cloud-based solutions (Office365, DropBox, Box, Trello, Atlassian, etc) allow employees to access corporate assets from personal devices
    • Employees can connect USB thumb drives to personal devices infected with malware, then plug them into a company device
    • Employees can access corporate email on personal devices
    • Telecommuters can VPN into work from a personal device
    • Cached credentials from employees logging into company assets from a personal device could be stolen by malware
    • Web-cam enabling malware on a personal device could spy on and compromise employees

The virtual borders of a Corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employee’s home networks have become blurred. CISOs and their Security Teams have a difficult time controlling their security risk and exposure from cybersecurity threats originating from employee’s homes.

Think you’ve got the kind of security solution in place you need to protect your network from not just the bad guys, but hard-working employees?

In this episode of the InSecurity Podcast, Hiep Dang and Edward Preston join Matt Stephenson to introduce Cylance’s new baby… Cylance Smart Antivirus. Hiep and Edward will explain how Cylance is bringing their groundbreaking, enterprise security solutions to the home user.

About Hiep Dang

Over 14 years ago, Hiep Dang (@Hiep_Dang) serendipitously turned a casual curiosity in computer forensics and viruses into a full time professional career in the cyber-security industry. His journey has given Hiep a spectrum of experiences from burgeoning startups to Fortune 500 companies while solving deep technical to abstract business problems. Hiep’s sweet spot is product management because it is at the intersection of product strategy and technical execution. During the day, he geeks out on building innovative security products and at night Hiep teaches Kung Fu.

About Edward Preston

Edward Preston (@eptrader) has an eclectic professional background that stretches from the trading floors of Wall Street to data centers worldwide. Edward started his career in the finance industry, spending over 15 years in commodities and foreign exchange. With a natural talent for motivating, coaching, and mentoring loyal, goal-oriented sales teams, Edward has a track record for building effective sales teams who have solid communication lines with executive management. 

About Matt Stephenson

Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV

Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come before.

Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

To hear more, visit:

ThreatVector InSecurity Podcasts:

https://threatvector.cylance.com/en_us/category/podcasts.html

iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2

GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste

Aug 01 2018

36mins

Play

Rank #20: Evolving Role of the Hacker

Podcast cover
Read more

From Acid Burn to Trinity to Lisbeth Salander, the hacker has emerged in popular culture as the hero as often as the villain. As much as we’d like to believe that hackers have great hair and wear cool latex body suits, that isn’t always the case.

Hacking, hackers and hacker culture have had a massive influence on the world, whether it is in popular culture like Wargames or The Matrix, or criminal events that directly effect peoples’ lives like the Equifax or Office of Personnel Management breach.

An important statement from Hacker history declared, “This is our world now... the world of the electron and the switch [...] We exist without skin color, without nationality, without religious bias... and you call us criminals. [...] Yes, I am a criminal. My crime is that of curiosity…”

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Nic Percoco, Chief Security Officer at Uptake and founder of the THOTCON conference who discusses the evolving role of the hacker in work, society, and culture.

Mar 26 2018

36mins

Play