Cover image of Cyber Security Dispatch
(6)
Podcasting
Tech News

Cyber Security Dispatch

Podcasting
Tech News
Read more

Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.

Read more

Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.

iTunes Ratings

6 Ratings
Average Ratings
6
0
0
0
0

iTunes Ratings

6 Ratings
Average Ratings
6
0
0
0
0
Cover image of Cyber Security Dispatch

Cyber Security Dispatch

Read more

Cyber Security Dispatch brings you to the front lines of cyber security. In our podcast we interview leading experts and practitioners who are fighting attacks, securing systems, and exploring the cutting edge of cyber security and cyber warfare.

Top Episodes

Most Popular Episodes of Cyber Security Dispatch

Rank #1: From One CISO to Another, Get Back to the Basics - An Interview with Jaya Baloo CISO of KPN

May 30 2018
Podcast cover
Read more

Today on the show, we welcome Jaya Baloo, the Chief Information Security Officer of KPN in the Netherlands. Jaya has held this position since 2012 and has been in the information security arena for the past 18 years prior. Today Jaya works with an amazing information security team of highly driven specialists at KPN. She is also a frequent speaker at security conferences around the globe on subjects around lawful interception, mass surveillance and cryptography and in 2015 she won the Cyber Security Executive of the Year Award. In this episode, Jaya shares her experience, knowledge, insights and good humor around the topic of cyber security. Jaya shares what she means by the term “Riding the Security Rollercoaster” and why security companies need to work to end this cycle in order to sustainably manage vulnerabilities and incidents. KPN’s mission is to keep KPN reliable, secure and trusted for customers, partners and society and in this episode, we hear with refreshing honesty, how they are doing just that. 

Play Now

Rank #2: Focusing on What Matters an Interview with Justin Berman CISO of Zenefits

Mar 05 2018
Podcast cover
Read more

Today on the show we have Justin Berman of Zenefits as our guest. Justin is currently the Chief Information Security Officer at the company and we chat to him about what this role looks like in the contemporary climate. For Justin, cyber security is a communal undertaking and this community extends beyond your own company. The better the communication within departments, companies, industries and even globally, the higher the wall of safety can be built. We chat to Justin about how he got into the field, his approach to risk, his advice for the practice at large and get some insight into his hopes for the future. Justin also breaks down his take on the different roles of CISOs and how they fit into a staff as well as the centrality of this position. All this and more, so tune in!

Play Now

Rank #3: Keeping the Lights On - An Interview with Arthur House, Chief Risk Officer for The State of Connecticut.

May 07 2018
Podcast cover
Read more

On today’s show we welcome Arthur House Chief Risk Officer for The State of Connecticut. With the growing risk of cyber crime, it is not just businesses and privately owned enterprises that are in danger. National security and state infrastructure also runs the risk of attack in this world of cloak and daggers. Arthur House who heads up the state led defense against cyber crime is here to tell us all about the groundbreaking working he and his team have conducted in the past couple of years. The Connecticut model, as it has become known after its success, really took national cyber defenses a step forward and Arthur is here to give us his insight into this process as well as to look forward to what some may see as an uncertain future. During our conversation, Arthur stresses the importance of collaboration and communication between all parties involved in the battle against cyber attacks, and a key takeaway from the episode is the idea of resilience to instances of danger rather than some false idea of prevention. All this and more, so tune in!

Play Now

Rank #4: CISO’s are Goal Keepers, All Guts No Glory - An Interview with Giovanni Vigna of Lastline

Jun 29 2018
Podcast cover
Read more

Today on the show, we speak with Giovanni Vigna – CTO and co-founder of Lastline, a cyber security startup, and Director of UC’s Santa Barbara Center for Cyber Security, where he also serves as a computer science professor. In this episode Giovanni shares his unique perspective as both a security technologist and an academic on educating and diversifying the next generation of software programmers and data scientists. Giovanni also shares his insight on technical superiority, buzz word trends, and how triage is the most overlooked and probably the most impactful aspect of security operations today. If done right, triage could be a powerful ally. If done poorly it can suck up time, investment, and leave you exposed. Lastly, we head to the soccer field and find out why CISO’s are just like goal keepers – all guts no glory. Can we really get credit for the attacks that didn’t happen? Find out in this episode.

Play Now

Rank #5: Who is Watching the Watchers - An Interview with Marton Illes of Balabit.

Jun 27 2018
Podcast cover
Read more

On today’s episode of the Cyber Security we welcome Marton Illes who is the Director of Privileged Access Management at Balabit. Martin is here to talk to us about his work and role in the company and also to shed some light on this area of cyber security. Most of us are familiar with the ideas of privileges in varying forms but Martin is here to explain exactly how they can work to certain organizations’ benefit and the serviced that Balabit provide. Our guest gives us his background in security and then proceeds to lay out the ways in which privileges can work in company systems as well as some of the pitfalls to avoid. We go on to discuss the idea of monitoring and how to monitor those in higher positions or so-called super-users. Martin details certain pain points within this area and openly describes some of the shortcomings of the technology. From there we go onto discuss current security affairs such as GDPR and the impact of the cloud on his work.

Play Now

Rank #6: Air Gaps Are Like Unicorns - An Interview With Galina Antova

Mar 26 2018
Podcast cover
Read more

In this episode, Air Gaps Are Like Unicorns, we talk with Galina Antova. One of the co-founders of Claroty, a fast growing security startup in the world of industrial control systems. She shares her experience working to protect these critical systems and the journey that led her to found Claroty.

Play Now

Rank #7: The Current State Of Protecting Industrial Systems and Safeguarding Civilization Today-An Interview with Joe Slowik, Adversary Hunter at Dragos

Feb 07 2018
Podcast cover
Read more

In this episode, we welcome Joe Slowik. Joe is the threat and adversary hunter at Dragos and has extensive network security and computer network operations experience spanning the military, intelligence, and nuclear communities. In this episode, Joe takes us beyond the often sensational headlines and misconceptions to walk us through the real challenges and current state of protecting industrial systems and critical infrastructure in our world today. We learn more about what we should aspire to when it comes to industrial control systems and why we need to develop a more analytical approach to threat behavior. Joe shares with us why the Dragos company motto is "safeguarding civilization," as well as their methodology to detect threats and provide the context, tools, and knowledge to respond to attacks with speed and confidence. Could we be safer than we think? Take a listen to find out more.

Play Now

Rank #8: Hacking The Pentagon - An Interview with Lisa Wiswell of Grimm & HackerOne

May 15 2018
Podcast cover
Read more

Today on the show we welcome, Lisa Wiswell. Lisa is an leader in the security space with nearly a decade of programmatic and cyberwarfare experience. Lisa helped start the Hack the Pentagon program during her time working at the Department of Defence. Hack the Pentagon was initially a three-week long bug bounty where the department allowed 1,187 people, completely unaffiliated with the U.S. government, to hack them. Now an ongoing program, Hack the Pentagon, continues to create great cultural shifts in cyber security practices. In this episode, we discuss the challenges of overcoming institutional resistance to having outsiders hack your systems and the surprising success and praise the program received. We also touch on current issues about vulnerability and disclosure and how to create a system where vulnerabilities can be disclosed in a responsible way. Today, Lisa works as a Principal at Grimm and and an advisor at HackerOne, and in this episode, she reminds us why you cannot tell the world you are secure if you aren’t!

Play Now

Rank #9: CISOs On the Tight Rope Balancing Act- An Interview with Simon Gibson, CISO at Gigamon

May 07 2018
Podcast cover
Read more

On today’s episode we are joined by Simon Gibson, CISO of Gigamon. We chat to Simon at the RSA conference about his background in cyber security and his experiences in the different realms of the security world. As a former employee of Bloomberg and AOL, Simon has built skills in varying positions in contrasting companies, something he believes is vital to the flexibility of a good CISO. Our discussion covers his accumulated knowledge through these years of work, the rising importance of data in the security sector, cost considerations and the ethical concerns and responsibilities of companies in regards to their clients. We also chat about company hygiene and best practices for the prevention of risk accumulation. The conversation ends off on the position of cloud services and how this may alter the job of a CISO, before Simon looks back at some highlights and lowlights from the RSA Conferences of the past. 

Play Now

Rank #10: What The Future Of The Internet Looks Like and How We Can Secure It Humanely - An Interview with Andrea Little Limbago, Chief Social Scientist at Endgame

Feb 12 2018
Podcast cover
Read more

Today on the show we welcome Andrea Little Limbago. Andrea is the Chief Social Scientist at Endgame, directing and contributing to the company’s technical content. She has a background in quantitative social science and direct operational support and writes extensively on the geopolitics of the cyber domain, policy, and data science – making her the perfect guest for today’s topic. It’s often easy to forget that behind every computer is a human being and that cyber security is as much a human problem as it is a technical problem. In this episode, we talk with Andrea about the challenge of securing the internet humanely and what the future of the internet looks like as it splinters from an open, borderless system to one that increasingly gets controlled by state and sovereign nations. We touch on the challenges faced by the cyber security workforce today, US elections, China’s new social credit system, crypto-currency, the new developments in GDPR and how they all have the potential to impact democracies and the control over your own data.

Play Now

Rank #1: From One CISO to Another, Get Back to the Basics - An Interview with Jaya Baloo CISO of KPN

Podcast cover
Read more

Today on the show, we welcome Jaya Baloo, the Chief Information Security Officer of KPN in the Netherlands. Jaya has held this position since 2012 and has been in the information security arena for the past 18 years prior. Today Jaya works with an amazing information security team of highly driven specialists at KPN. She is also a frequent speaker at security conferences around the globe on subjects around lawful interception, mass surveillance and cryptography and in 2015 she won the Cyber Security Executive of the Year Award. In this episode, Jaya shares her experience, knowledge, insights and good humor around the topic of cyber security. Jaya shares what she means by the term “Riding the Security Rollercoaster” and why security companies need to work to end this cycle in order to sustainably manage vulnerabilities and incidents. KPN’s mission is to keep KPN reliable, secure and trusted for customers, partners and society and in this episode, we hear with refreshing honesty, how they are doing just that. 

May 30 2018
19 mins
Play Now

Rank #2: Focusing on What Matters an Interview with Justin Berman CISO of Zenefits

Podcast cover
Read more

Today on the show we have Justin Berman of Zenefits as our guest. Justin is currently the Chief Information Security Officer at the company and we chat to him about what this role looks like in the contemporary climate. For Justin, cyber security is a communal undertaking and this community extends beyond your own company. The better the communication within departments, companies, industries and even globally, the higher the wall of safety can be built. We chat to Justin about how he got into the field, his approach to risk, his advice for the practice at large and get some insight into his hopes for the future. Justin also breaks down his take on the different roles of CISOs and how they fit into a staff as well as the centrality of this position. All this and more, so tune in!

Mar 05 2018
34 mins
Play Now

Rank #3: Keeping the Lights On - An Interview with Arthur House, Chief Risk Officer for The State of Connecticut.

Podcast cover
Read more

On today’s show we welcome Arthur House Chief Risk Officer for The State of Connecticut. With the growing risk of cyber crime, it is not just businesses and privately owned enterprises that are in danger. National security and state infrastructure also runs the risk of attack in this world of cloak and daggers. Arthur House who heads up the state led defense against cyber crime is here to tell us all about the groundbreaking working he and his team have conducted in the past couple of years. The Connecticut model, as it has become known after its success, really took national cyber defenses a step forward and Arthur is here to give us his insight into this process as well as to look forward to what some may see as an uncertain future. During our conversation, Arthur stresses the importance of collaboration and communication between all parties involved in the battle against cyber attacks, and a key takeaway from the episode is the idea of resilience to instances of danger rather than some false idea of prevention. All this and more, so tune in!

May 07 2018
38 mins
Play Now

Rank #4: CISO’s are Goal Keepers, All Guts No Glory - An Interview with Giovanni Vigna of Lastline

Podcast cover
Read more

Today on the show, we speak with Giovanni Vigna – CTO and co-founder of Lastline, a cyber security startup, and Director of UC’s Santa Barbara Center for Cyber Security, where he also serves as a computer science professor. In this episode Giovanni shares his unique perspective as both a security technologist and an academic on educating and diversifying the next generation of software programmers and data scientists. Giovanni also shares his insight on technical superiority, buzz word trends, and how triage is the most overlooked and probably the most impactful aspect of security operations today. If done right, triage could be a powerful ally. If done poorly it can suck up time, investment, and leave you exposed. Lastly, we head to the soccer field and find out why CISO’s are just like goal keepers – all guts no glory. Can we really get credit for the attacks that didn’t happen? Find out in this episode.

Jun 29 2018
23 mins
Play Now

Rank #5: Who is Watching the Watchers - An Interview with Marton Illes of Balabit.

Podcast cover
Read more

On today’s episode of the Cyber Security we welcome Marton Illes who is the Director of Privileged Access Management at Balabit. Martin is here to talk to us about his work and role in the company and also to shed some light on this area of cyber security. Most of us are familiar with the ideas of privileges in varying forms but Martin is here to explain exactly how they can work to certain organizations’ benefit and the serviced that Balabit provide. Our guest gives us his background in security and then proceeds to lay out the ways in which privileges can work in company systems as well as some of the pitfalls to avoid. We go on to discuss the idea of monitoring and how to monitor those in higher positions or so-called super-users. Martin details certain pain points within this area and openly describes some of the shortcomings of the technology. From there we go onto discuss current security affairs such as GDPR and the impact of the cloud on his work.

Jun 27 2018
21 mins
Play Now

Rank #6: Air Gaps Are Like Unicorns - An Interview With Galina Antova

Podcast cover
Read more

In this episode, Air Gaps Are Like Unicorns, we talk with Galina Antova. One of the co-founders of Claroty, a fast growing security startup in the world of industrial control systems. She shares her experience working to protect these critical systems and the journey that led her to found Claroty.

Mar 26 2018
21 mins
Play Now

Rank #7: The Current State Of Protecting Industrial Systems and Safeguarding Civilization Today-An Interview with Joe Slowik, Adversary Hunter at Dragos

Podcast cover
Read more

In this episode, we welcome Joe Slowik. Joe is the threat and adversary hunter at Dragos and has extensive network security and computer network operations experience spanning the military, intelligence, and nuclear communities. In this episode, Joe takes us beyond the often sensational headlines and misconceptions to walk us through the real challenges and current state of protecting industrial systems and critical infrastructure in our world today. We learn more about what we should aspire to when it comes to industrial control systems and why we need to develop a more analytical approach to threat behavior. Joe shares with us why the Dragos company motto is "safeguarding civilization," as well as their methodology to detect threats and provide the context, tools, and knowledge to respond to attacks with speed and confidence. Could we be safer than we think? Take a listen to find out more.

Feb 07 2018
27 mins
Play Now

Rank #8: Hacking The Pentagon - An Interview with Lisa Wiswell of Grimm & HackerOne

Podcast cover
Read more

Today on the show we welcome, Lisa Wiswell. Lisa is an leader in the security space with nearly a decade of programmatic and cyberwarfare experience. Lisa helped start the Hack the Pentagon program during her time working at the Department of Defence. Hack the Pentagon was initially a three-week long bug bounty where the department allowed 1,187 people, completely unaffiliated with the U.S. government, to hack them. Now an ongoing program, Hack the Pentagon, continues to create great cultural shifts in cyber security practices. In this episode, we discuss the challenges of overcoming institutional resistance to having outsiders hack your systems and the surprising success and praise the program received. We also touch on current issues about vulnerability and disclosure and how to create a system where vulnerabilities can be disclosed in a responsible way. Today, Lisa works as a Principal at Grimm and and an advisor at HackerOne, and in this episode, she reminds us why you cannot tell the world you are secure if you aren’t!

May 15 2018
37 mins
Play Now

Rank #9: CISOs On the Tight Rope Balancing Act- An Interview with Simon Gibson, CISO at Gigamon

Podcast cover
Read more

On today’s episode we are joined by Simon Gibson, CISO of Gigamon. We chat to Simon at the RSA conference about his background in cyber security and his experiences in the different realms of the security world. As a former employee of Bloomberg and AOL, Simon has built skills in varying positions in contrasting companies, something he believes is vital to the flexibility of a good CISO. Our discussion covers his accumulated knowledge through these years of work, the rising importance of data in the security sector, cost considerations and the ethical concerns and responsibilities of companies in regards to their clients. We also chat about company hygiene and best practices for the prevention of risk accumulation. The conversation ends off on the position of cloud services and how this may alter the job of a CISO, before Simon looks back at some highlights and lowlights from the RSA Conferences of the past. 

May 07 2018
25 mins
Play Now

Rank #10: What The Future Of The Internet Looks Like and How We Can Secure It Humanely - An Interview with Andrea Little Limbago, Chief Social Scientist at Endgame

Podcast cover
Read more

Today on the show we welcome Andrea Little Limbago. Andrea is the Chief Social Scientist at Endgame, directing and contributing to the company’s technical content. She has a background in quantitative social science and direct operational support and writes extensively on the geopolitics of the cyber domain, policy, and data science – making her the perfect guest for today’s topic. It’s often easy to forget that behind every computer is a human being and that cyber security is as much a human problem as it is a technical problem. In this episode, we talk with Andrea about the challenge of securing the internet humanely and what the future of the internet looks like as it splinters from an open, borderless system to one that increasingly gets controlled by state and sovereign nations. We touch on the challenges faced by the cyber security workforce today, US elections, China’s new social credit system, crypto-currency, the new developments in GDPR and how they all have the potential to impact democracies and the control over your own data.

Feb 12 2018
26 mins
Play Now