The SecureWorld Sessions-logo

The SecureWorld Sessions

Technology Podcasts

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

Location:

United States

Description:

Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.

Twitter:

@SecureWorld

Language:

English


Episodes

Project 2030: Cybersecurity, AI, and Technology Predictions

12/22/2020
Long-term predictions are risky, but Rik Ferguson likes to predict things a decade into the future. Rik is Vice President of Security Research at Trend Micro. Building off his Project 2020, Rik is now working on Project 2030. In our interview, we get a glimpse of the future of AI, the future of malware, the future of wearables, the future of ransomware, and more. Also, we discuss implications of the 2020 SolarWinds data breach. If predictions are your thing, do not miss this...

Duration:00:37:14

Future of Cyber Law and Big Data Management

12/15/2020
What does the 2021 cyber law and privacy law landscape look like? Our first guest is attorney Jordan Fischer of Beckage Law. And how can you ensure total data discovery and then manage that big data with security and compliance in mind? Our second guest is Arun Gandhi, Vice President at 1touch.io, which specializes in this area. Also, we have new research from Trend Micro about 2021 cyber threat trends. Resource Links: • Jordan Fischer on LinkedIn:...

Duration:00:43:18

The Resilient and Secure Organization

12/1/2020
What does a resilient and secure organization look like? What are key strategies and technologies these organizations should have? How does a resilient organization empower its employees? In this episode, we glean insights from Adam Leisring, Chief Information Security Officer at Paycor. Also, we have new research from Trend Micro. The latest report is called "Inside the Bulletproof Hosting Business: Cybercriminal Methods and OpSec," and it's a fascinating read. See the link below to...

Duration:00:39:46

Modern Cybersecurity Leadership

11/17/2020
In this episode, we are learning about modern cybersecurity leadership. We hear from Yaron Levi, CISO of Blue Cross and Blue Shield of Kansas City. Levi shares about what security professionals need to do now to lead. And he helps us consider the following questions: Why is information security mainly reactive instead of proactive? Why do most organizations view security as a technology problem instead of a business risk problem? How come so many organizations lack a clear security...

Duration:00:33:40

The Future of Cloud Security

11/10/2020
In this episode, we talk to Mark Nunnikhoven, Vice President of Cloud Research at Trend Micro. 2020 was the cloud's biggest year, and we're talking about securing the cloud into the future. How do we make cloud security usable? How do we make cloud security stable? What does building in this environment look like right now, and what is the state of DevSecOps? What can we do about misconfigurations in the cloud? What are cloud security opportunities and challenges? And are cloud platform...

Duration:00:31:23

Oil and Natural Gas Cyber Threats

10/27/2020
In this episode, we talk to cybersecurity leaders in the oil and natural gas industry. Experts from the ONG-ISAC (Oil and Natural Gas Information Sharing and Analysis Center) answer the following questions: • What does the cyber threat landscape look like for the petroleum industry, and what are the potential impacts? • What are barriers to sharing threat intelligence and benefits of doing so? • How do you see cyber threats evolving in 2021 and beyond for the energy sector? Also, details...

Duration:00:29:02

The CMMC Explained

10/20/2020
In this episode, we talk to James Goepel about the Cybersecurity Maturity Model Certification (CMMC). He discusses this important new certification for supply chain security within the U.S. Department of Defense (DoD) system, addressing the following: • Why was the CMMC created? • Who needs the CMMC? • How will the CMMC work? • Will the CMMC spread beyond the DoD? James is a former member of the Board of Directors for the CMMC Accreditation Body, and is now CEO of Fathom Cyber. Also,...

Duration:00:42:55

New National Cyber Power Index

10/13/2020
In this episode, we talk to Julia Voo, one of the authors of the newly published National Cyber Power Index 2020. Which country is the most powerful in cyberspace? The NCPI takes a "whole of country" approach to measuring cyber power, ranking 30 countries in the context of seven national objectives. Voo is a Cyber Fellow at the Belfer Center for Science and International Affairs at the Harvard Kennedy School. She was the closing keynote at the SecureWorld Detroit-Toronto-Cincinnati virtual...

Duration:00:39:21

Culture in Information Security

10/6/2020
In this episode, we hear from Don McKeown, Information Security Manager at Wolters Kluwer Health. He talks about the various levels of culture within an organization, and the culture of security. Plus, approaches to security: blocking and tackling programs, compliance-based information security programs, and risk-based InfoSec programs. McKeown spoke at the 2020 SecureWorld Boston virtual conference, and this is a part of his presentation. Resource Links: • Don McKeown on LinkedIn:...

Duration:00:25:41

Ransomware and Digital Extortion: Should You Pay?

9/22/2020
In this episode, we hear from Dan Pepper, Partner on BakerHostetler's Privacy and Data Protection team. He frequently handles security incidents, interacting with federal and state agencies and forensic service providers, and has overseen investigations including many cases of ransomware. How are attackers launching their ransomware attacks? Should you pay the ransom or not? Is it legal to pay a hacker's ransom demand? He answers these questions and more. Pepper spoke at the virtual...

Duration:00:28:04

Youth and Cybercrime

9/15/2020
In this episode, we are partnering with the non-profit Cybercrime Support Network (CSN) to raise awareness as part of their Youth and Cybercrime Week. We interview Cam, who was arrested for cyberattacks when he was 14 years old and now works as a cybersecurity professional. How did he get into cybercrime and then into a role defending against it? What advice does he have for young people? Also, we speak with Kristin Judge, CEO of Cybercrime Support Network, about how we can help direct...

Duration:00:45:03

Information Security and Digital Transformation

8/25/2020
In this episode, we share part of a SecureWorld presentation by Sandy Silk, Director of Information Security Education and Consulting at Harvard University. In her presentation, titled "Hey, InfoSec: Be Part of the Digital Transformation or Be Left Behind!," Silk discusses how security teams need to evolve to deliver the same digital transformation (Dx) value and benefits as other technology and data initiatives within their organizations. Resource Links: • Trend Micro's Close the Gap...

Duration:00:32:16

Business Continuity Planning During a Pandemic

8/18/2020
CISO Milinda Rambel Stone and Human Resources VP Susan Hanson, both of Provation Medical, worked together on a pandemic plan completed just as the COVID-19 pandemic hit the U.S. They discuss these questions: How does a pandemic plan fit with a Business Continuity Plan (BCP)? How did the business, including information security, communicate during this time? How was the plan communicated to executive leadership? How has the BCP helped cybersecurity and other parts of the business work...

Duration:00:30:03

What Do AI and Machine Learning Mean for Cybersecurity?

8/11/2020
In this episode, we are speaking with Joshua Cloud, Director of Information Security at NFI, as he answers three important questions for us: 1. What is Artificial Intelligence (AI)? 2. What is Machine Learning (ML)? 3. How can we use AI and ML in cybersecurity and cyber defense? Also, new research, just published by Trend Micro, our premiere podcast partner, on unveiling critical security flaws in programmable industrial machines. Resource Links: • Research: Trend Micro report, "Hidden...

Duration:00:29:07

Emerging Cybersecurity Technologies

8/4/2020
In this episode, we are speaking with cybersecurity and technology influencer Chuck Brooks about emerging technologies that can help you defend your organization in cyberspace. Brooks covers everything from the future of quantum computing and the encryption debate to China in tech, election cybersecurity, 5G concerns, and low-hanging cybersecurity fruit companies should address now. Also, new research on device and supply chain security in healthcare from Trend Micro, our premiere podcast...

Duration:00:43:30

Identity and Access Management: The Journey

7/28/2020
In this episode, we hear from Joe Zurba, Chief Information Security Officer at Harvard Medical School. He details the challenging Identity and Access Management landscape the school faces and how it navigates IAM. Zurba was a keynote speaker at the 2020 SecureWorld Boston virtual conference. Also, updates on ThiefQuest (EvilQuest), the quickly-evolving macOS malware. We’re sharing new research from Trend Micro, our premiere podcast partner. Resource Links: • Research: Trend Micro's...

Duration:00:32:54

Hunting The Dark Overlord

7/21/2020
In this episode, we are speaking with cybersecurity researcher, pentester, and author Vinny Troia. His new book is "Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques." He explains how he tracked down the alleged hackers behind Gnostic Plays, Shiny Hunters, NSFW, and the The Dark Overlord groups. And it turns out, there are some very tight connections between these groups. Troia reveals the identities of two teenage hackers that he says are...

Duration:00:36:04

The Future of Cybersecurity Conferences

7/14/2020
What does cybersecurity collaboration look like in the digital realm? What about the future of physical events and conferences for the cybersecurity industry? In this episode, we are speaking with conference creator Brad Graver, Vice President of SecureWorld. Brad and his team have overseen more than 120 cybersecurity conferences across North America over the past 19 years, and have experienced the shift from in-person to online events in the wake of COVID-19. Also, we look at new cloud...

Duration:00:21:48

Cloud Security Gaps and Misconfigurations

7/7/2020
In this episode, we are speaking with Aaron Ansari, Vice President of Cloud One - Conformity at Trend Micro. What are the remote work security gaps exposed by the COVID-19 shift to the cloud? What are common factors in cloud security misconfigurations? With cybersecurity features built into many cloud platforms, do you need a third-party or external cloud security solution? We explore these questions and more. Says Ansari: "Cloud providers have an enormous, robust, complex set of services...

Duration:00:21:39

No Dummy: An Interview with Author Joseph Steinberg

6/30/2020
In this episode, we are speaking with noted author Joseph Steinberg. His works on cybersecurity have been read by millions of people, including a security certification exam study guide and recently the "Cybersecurity for Dummies" book. We cover a variety of topics: AI in cybersecurity; the rise of the insider threat risk; translating risk to executives or end-users; IoT security; and more. RESOURCE LINKS: • Trend Micro's Incident Response...

Duration:00:40:26