- CISO Series Newsletter
- Posts
- Join us tomorrow for “Hacking Extreme Vulnerabilities”
Join us tomorrow for “Hacking Extreme Vulnerabilities”
Join us tomorrow for “Hacking Extreme Vulnerabilities”
Welcome to this week's newsletter!
On this week's Super Cyber Friday what happens when a computer vulnerability can have real world consequences.
This week on Defense in Depth: Building a Data First Security Program
Cyber Security Headlines you need to know: China-linked backdoor, Samsung leak, record breaking DDoS
Super Cyber Fridays!
Join us TOMORROW, Friday [03-11-22], for "Hacking Extreme Vulnerabilities"
Tomorrow's discussion for
Super Cyber Friday
will be
"Hacking Extreme Vulnerabilities: An hour of critical thinking about the confluence of concerns across threat actors’ intentions, industry targets, ransomware, and a company’s unique weaknesses."
It all begins at 1 PM ET/10 AM PT on Friday, March 11, 2022 with guests Doug DeMio, Leader Ransomware Task Force, American Family Insurance, Ed Bellis, CTO and co-founder, Kenna Security (now part of Cisco). We'll have fun conversation and games, plus at the end of the hour (2 PM ET/11 AM PT) we'll do our meetup.
Thanks to our Super Cyber Friday sponsor, Kenna Security
Defense in Depth
Building a Data First Security Program
On this week's Defense in Depth, Steve Zalewski and I welcome sponsored guest is Brian Vecci, field CTO, Varonis. Here are a few of the highlights from our discussion:
Do I know where my sensitive data lives? How can I tell?
Why do all the tools that try to classify data fail miserably?
How much should we teach the data owners about risks in collecting and storing the information?
.
Thanks to our podcast sponsor, Varonis
Cyber Security Headlines - Week in Review
We're live tomorrow and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. Here are a few of the stories we'll be discussing on the show:
Most advanced China-linked backdoor ever raises alarms for cyber-espionage investigators
Hackers allegedly leak Samsung data, source code
DDoS attacks use new record-breaking amplification vector
“You can participate live in the conversation by registering on
.”
or subscribe to the daily newsletter.
Thanks to this week's headlines sponsor, Torq
Highlights from Super Cyber Friday
"Hacking Automated Response"
Here are five of the best moments from "Hacking Automated Response" with Wesley Mullins, CTO, Deepwatch, and Steve Zalewski, co-host, Defense in Depth
you can watch the video, read the best bad ideas, and best quotes from the chat room.
Thanks to our video chat sponsor, deepwatch
Jump in on these conversations
Twitter user Mick Douglas(@bettersafetynet) asks for a "cold-take" of more threads and how-to's for those new to infosec. (More here)
Brian Krebs is stoking conversation on his post about Internet backbone giant Lumen Technologies "shunning" Russia. (More here)
Alex Awad (@WisdomOfRage) asked, "What made you choose cyber security?" For him it was the show Mr. Robot. (More here)
Super Cyber Friday...
Coming up in the weeks ahead we have:
[3-11-22] Hacking Extreme Vulnerabilities
[3-18-22] Hacking Security Validation
[3-25-22] Hacking Prioritization
[4-1-22] Hacking Proactive Security
[4-29-22] Hacking the SOC
[5-6-22] Hacking SaaS Data Security
[5-13-22] Hacking Complexity
[9-16-22] Hacking Like a Cybercrook
and register for them all now!