<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/cybersecurityinterviews/" rel="self" type="application/rss+xml"/><title><![CDATA[Cyber Security Interviews]]></title><podcast:guid>93eefc0a-f43b-53b6-af95-7ecbd7f5b891</podcast:guid><lastBuildDate>Mon, 25 Sep 2023 19:30:19 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[All Rights Reserved]]></copyright><managingEditor>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</managingEditor><itunes:summary><![CDATA[There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.]]></itunes:summary><image><url>https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg</url><title>Cyber Security Interviews</title><link><![CDATA[https://cybersecurityinterviews.com]]></link></image><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><itunes:owner><itunes:name>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:name></itunes:owner><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author><description>There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from their respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going.</description><link>https://cybersecurityinterviews.com</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Cyber Security Interviews is the weekly podcast dedicated to digging into the minds of the influencers, thought leaders, and individuals who shape the cyber security industry.]]></itunes:subtitle><itunes:explicit>no</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="Technology"></itunes:category><itunes:new-feed-url>https://feeds.captivate.fm/cybersecurityinterviews/</itunes:new-feed-url><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>#127 – Douglas Brush (Part 5): Analysis Paralysis</title><itunes:title>#127 – Douglas Brush (Part 5): Analysis Paralysis</itunes:title><description><![CDATA[<p>This is the 5th part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this fifth part, we will discuss the start-up resources we provided in our <a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank">Hang Out A Shingle</a> presentation, what I am doing with Accel Consulting, selling to CISOs, tips to avoid when presenting cyber services, the selling to CISOs Master Class we are developing, and so much more!</p>]]></description><content:encoded><![CDATA[<p>This is the 5th part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this fifth part, we will discuss the start-up resources we provided in our <a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank">Hang Out A Shingle</a> presentation, what I am doing with Accel Consulting, selling to CISOs, tips to avoid when presenting cyber services, the selling to CISOs Master Class we are developing, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/127-douglas-brush-part-5-analysis-paralysis]]></link><guid isPermaLink="false">7c0daeb9-cf8b-440a-8427-578766d19d90</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 Sep 2023 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/10af1d57-d930-4779-b106-fa824be96bb5/127-Douglas-Brush-Part4-Cyber-Security-Interviews-converted.mp3" length="16769166" type="audio/mpeg"/><itunes:duration>17:28</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is the 5th part of the podcast&apos;s return after a brief hiatus. 

Daniel Ayala continues his interview of me. In this fifth part, we will discuss the start-up resources we provided in our Hang Out A Shingle presentation, what I am doing with Accel Consulting, selling to CISOs, tips to avoid when presenting cyber services, the selling to CISOs Master Class we are developing, and so much more!</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#126 – Douglas Brush (Part 4): Dollars and Cents, Not Bytes</title><itunes:title>#126 – Douglas Brush (Part 4): Dollars and Cents, Not Bytes</itunes:title><description><![CDATA[<p>This is the 4th part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this fourth part, we will discuss my first forensic litigation case, the importance of data governance, the myth of cyber, why I am tired of cybersecurity conferences, and so much more!</p>]]></description><content:encoded><![CDATA[<p>This is the 4th part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this fourth part, we will discuss my first forensic litigation case, the importance of data governance, the myth of cyber, why I am tired of cybersecurity conferences, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/126-douglas-brush-part-4-dollars-and-cents-not-bytes]]></link><guid isPermaLink="false">d47f2281-6ca3-4846-8f10-f280cdb722ac</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 17 Apr 2023 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/51f153be-264a-4f7a-aba6-38965df8fc28/126-Douglas-Brush-Part4-Cyber-Security-Interviews-converted.mp3" length="21102128" type="audio/mpeg"/><itunes:duration>25:07</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#125 – Douglas Brush (Part 3): What is a Special Master?</title><itunes:title>#125 – Douglas Brush (Part 3): What is a Special Master?</itunes:title><description><![CDATA[<p>This is the 3rd part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this third part, we will discuss what I am doing as a Special Master and Court Appointed Neutral, the reasons I think there will be a continued convergence of legal, cybersecurity, and data privacy, why I decided to start another consulting firm, data valuation, and so much more!</p>]]></description><content:encoded><![CDATA[<p>This is the 3rd part of the podcast's return after a brief hiatus.&nbsp;</p><p>Daniel Ayala continues his interview of me. In this third part, we will discuss what I am doing as a Special Master and Court Appointed Neutral, the reasons I think there will be a continued convergence of legal, cybersecurity, and data privacy, why I decided to start another consulting firm, data valuation, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/125-douglas-brush-part-3-what-is-a-special-master]]></link><guid isPermaLink="false">bff00a4f-34aa-4cda-92a6-85122a4203bb</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 03 Apr 2023 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/aecc74e2-5c76-4a92-8fd5-316fadac47fb/125-Douglas-Brush-Part3-Cyber-Security-Interviews-converted.mp3" length="21500240" type="audio/mpeg"/><itunes:duration>25:36</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#124 – Douglas Brush (Part 2): Words of Advice</title><itunes:title>#124 – Douglas Brush (Part 2): Words of Advice</itunes:title><description><![CDATA[<p>This is the 2nd part of the return of the podcast after a brief hiatus.</p><p><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> continues his interview of <a href="https://www.linkedin.com/in/douglasabrush/" target="_blank">me</a>. In this second part, we will discuss how I got started in the industry, defining moments of my career, my first computer, early entrepreneurship, characteristics I look for in professionals, the toxic cybersecurity gatekeeping, and so much more!</p>]]></description><content:encoded><![CDATA[<p>This is the 2nd part of the return of the podcast after a brief hiatus.</p><p><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> continues his interview of <a href="https://www.linkedin.com/in/douglasabrush/" target="_blank">me</a>. In this second part, we will discuss how I got started in the industry, defining moments of my career, my first computer, early entrepreneurship, characteristics I look for in professionals, the toxic cybersecurity gatekeeping, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/124-douglas-brush-part-2-words-of-advice]]></link><guid isPermaLink="false">7af79fef-bd07-4dea-b5dd-8aa4cbfec60f</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Mar 2023 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/aeb91d82-6187-439c-abbf-d120b3911e44/124-Douglas-Brush-Part1-Cyber-Security-Interviews-converted.mp3" length="23087060" type="audio/mpeg"/><itunes:duration>27:29</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#123 – Douglas Brush (Part 1): Guess Who’s Back, Dougie’s Back</title><itunes:title>#123 – Douglas Brush (Part 1): Guess Who’s Back, Dougie’s Back</itunes:title><description><![CDATA[<p>After a hiatus, the Cyber Security Interviews podcast is back!</p><p>A lot has happened in my life over the past 18 months. I have endured death, despair, divorce, and car theft, to name a few traumatic events that made me take a break from several endeavors.</p><p>However, it has allowed me to reprioritize many things to understand where I am now and where I want to go.</p><p>This is the first of several episodes where <a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> interviews me. In this first part, we will cover mental resiliency, the importance of taking time off, how to be your best, and so much more!</p>]]></description><content:encoded><![CDATA[<p>After a hiatus, the Cyber Security Interviews podcast is back!</p><p>A lot has happened in my life over the past 18 months. I have endured death, despair, divorce, and car theft, to name a few traumatic events that made me take a break from several endeavors.</p><p>However, it has allowed me to reprioritize many things to understand where I am now and where I want to go.</p><p>This is the first of several episodes where <a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> interviews me. In this first part, we will cover mental resiliency, the importance of taking time off, how to be your best, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/123-doug-brush-guess-whos-back]]></link><guid isPermaLink="false">5e5ee512-24dd-4b8f-ab53-75692fff3e72</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Mar 2023 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f929383f-a01b-4d37-83f5-568c7a25085f/123-Douglas-Brush-Part1-Cyber-Security-Interviews-converted.mp3" length="26517148" type="audio/mpeg"/><itunes:duration>27:37</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#122 – Leeann Nicolo: Go For It</title><itunes:title>#122 – Leeann Nicolo: Go For It</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/leeann-nicolo/" target="_blank">Leeann Nicolo</a> is the Incident Response lead at <a href="https://www.coalitioninc.com/" target="_blank">The Coalition</a> and specializes in digital forensics and cyber investigations. She has conducted investigations into ransomware, phishing, hacking, data breaches, trade secret theft, and employee malfeasance. Leeann has investigated thousands of digital devices and has extensive subject matter expertise in Windows enterprise forensics, mobile device forensics, business email compromise, cloud security, and ransomware.</p><p>Prior to joining Coalition, Leeann worked at <a href="https://kivuconsulting.com/" target="_blank">Kivu Consulting</a> in Denver and <a href="https://www.kraftkennedy.com/" target="_blank">Kraft Kennedy</a> in New York City overseeing complex cyber investigations and discovery matters for law firms and large multinational corporate clients. She conducted her undergraduate studies at the University of Albany in Information Systems, then achieved my <a href="https://www.pace.edu/program/cybersecurity-ms" target="_blank">Masters of Science in Cybersecurity at Pace University</a>. She is also a <a href="https://www.sans.org/digital-forensics-incident-response/coin-holders/" target="_blank">SANS Lethal Forensicator Coin Holder</a> and on the GIAC Advisory Board.</p><p>In this episode, we discuss her start in information technology, how she made the move to cybersecurity, the discrimination she has faced in the industry, becoming a manager, strong women role models,&nbsp;mentoring others, and so much more.</p><p>Where you can find Leeann:</p><ul><li><a href="https://www.linkedin.com/in/leeann-nicolo/" target="_blank">LinkedIn</a></li><li><a href="https://www.coalitioninc.com/" target="_blank">The Coalition</a></li><li><a href="https://www.wsj.com/articles/how-to-haggle-with-your-hacker-11566811806" target="_blank">Wall Street Journal</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/leeann-nicolo/" target="_blank">Leeann Nicolo</a> is the Incident Response lead at <a href="https://www.coalitioninc.com/" target="_blank">The Coalition</a> and specializes in digital forensics and cyber investigations. She has conducted investigations into ransomware, phishing, hacking, data breaches, trade secret theft, and employee malfeasance. Leeann has investigated thousands of digital devices and has extensive subject matter expertise in Windows enterprise forensics, mobile device forensics, business email compromise, cloud security, and ransomware.</p><p>Prior to joining Coalition, Leeann worked at <a href="https://kivuconsulting.com/" target="_blank">Kivu Consulting</a> in Denver and <a href="https://www.kraftkennedy.com/" target="_blank">Kraft Kennedy</a> in New York City overseeing complex cyber investigations and discovery matters for law firms and large multinational corporate clients. She conducted her undergraduate studies at the University of Albany in Information Systems, then achieved my <a href="https://www.pace.edu/program/cybersecurity-ms" target="_blank">Masters of Science in Cybersecurity at Pace University</a>. She is also a <a href="https://www.sans.org/digital-forensics-incident-response/coin-holders/" target="_blank">SANS Lethal Forensicator Coin Holder</a> and on the GIAC Advisory Board.</p><p>In this episode, we discuss her start in information technology, how she made the move to cybersecurity, the discrimination she has faced in the industry, becoming a manager, strong women role models,&nbsp;mentoring others, and so much more.</p><p>Where you can find Leeann:</p><ul><li><a href="https://www.linkedin.com/in/leeann-nicolo/" target="_blank">LinkedIn</a></li><li><a href="https://www.coalitioninc.com/" target="_blank">The Coalition</a></li><li><a href="https://www.wsj.com/articles/how-to-haggle-with-your-hacker-11566811806" target="_blank">Wall Street Journal</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/122-leeann-nicolo-go-for-it]]></link><guid isPermaLink="false">4145279c-ff6c-4030-a6ae-9f5306dbbaf5</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 19 Jul 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f1774e47-b2d8-4c98-89a7-8c4218505a8e/122-leeann-nicolo-cyber-security-interviews.mp3" length="16309892" type="audio/mpeg"/><itunes:duration>23:55</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#121 – Shannon Brazil: Teach Business to Tech People</title><itunes:title>#121 – Shannon Brazil: Teach Business to Tech People</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/shannonbrazil/" target="_blank">Shannon Brazil </a>is a Senior Cyber Security Specialist working within a CIRT of a Canadian Fortune 500. She has been in IT for over 12 years, with the last three years in Cybercrime investigations with law enforcement and recently moving into the private sector to focus on Digital Forensic analysis and investigations and Incident Response.</p><p>As a hobby, Shannon dives into OSINT CTFs, helps promote young women to enter the STEM industry through Technovation - an innovative program for young entrepreneurs, and offers mentorship to those looking to venture into Cyber Security. She is also a course designer and developer with her local college that aims to arm the new generations with tactics, techniques, and knowledge in becoming experts in Digital Forensics and Investigations.</p><p>In this episode, we discuss starting as a chef, skills learned from culinary arts, moving from IT to investigations, burnout and self-care, mentors she follows, why she mentors others, diversity and inclusion, and so much more.</p><p>Where you can find Shannon:</p><ul><li><a href="https://www.linkedin.com/in/shannonbrazil/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/4n6lady" target="_blank">Twitter</a></li><li><a href="www.4n6lady.com" target="_blank">Website</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/shannonbrazil/" target="_blank">Shannon Brazil </a>is a Senior Cyber Security Specialist working within a CIRT of a Canadian Fortune 500. She has been in IT for over 12 years, with the last three years in Cybercrime investigations with law enforcement and recently moving into the private sector to focus on Digital Forensic analysis and investigations and Incident Response.</p><p>As a hobby, Shannon dives into OSINT CTFs, helps promote young women to enter the STEM industry through Technovation - an innovative program for young entrepreneurs, and offers mentorship to those looking to venture into Cyber Security. She is also a course designer and developer with her local college that aims to arm the new generations with tactics, techniques, and knowledge in becoming experts in Digital Forensics and Investigations.</p><p>In this episode, we discuss starting as a chef, skills learned from culinary arts, moving from IT to investigations, burnout and self-care, mentors she follows, why she mentors others, diversity and inclusion, and so much more.</p><p>Where you can find Shannon:</p><ul><li><a href="https://www.linkedin.com/in/shannonbrazil/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/4n6lady" target="_blank">Twitter</a></li><li><a href="www.4n6lady.com" target="_blank">Website</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/121-shannon-brazil-teach-business-to-tech-people]]></link><guid isPermaLink="false">327f406d-bedd-49d1-b869-ab7aaaf08f89</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 28 Jun 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/766c69d0-6544-4cbf-b3ca-8c0fb09cba1b/120-shannon-brazil-cyber-security-interviews.mp3" length="25903356" type="audio/mpeg"/><itunes:duration>37:06</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#120 – Cimone Wright-Hamor: Cybersecurity Is An Applied Field</title><itunes:title>#120 – Cimone Wright-Hamor: Cybersecurity Is An Applied Field</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/wright-hamor/" target="_blank">Cimone Wright-Hamor</a> works at <a href="https://www.pnnl.gov/cybersecurity" target="_blank">Pacific Northwest National Laboratory</a> (PNNL) as a cybersecurity researcher while pursuing a Ph.D. in Computer Engineering at Iowa State University. She has spent the last decade of her life interning at a variety of organizations. She has had ten internships at more than six different organizations, including public and private industries ranging from Fortune 500 companies like <a href="https://www.microsoft.com/" target="_blank">Microsoft</a> to successful startups such as <a href="https://www.smartagllc.com/" target="_blank">Smart-Ag</a>, state government, and national laboratories.</p><p>Cimone has spent the last five years of her career working in the cybersecurity field. While completing research, she has helped protect the infrastructure for the State of Iowa and ensured that startup companies are developing software with security in mind.</p><p>In this episode, we discuss getting started in information security due to responding to an incident, an early upbringing which prepared her for cybersecurity, bridging theory to engineering, teaming with dev and security teams, the importance of project updates, increasing diversity in the industry, and so much more.</p><p>Where you can find Cimone:</p><ul><li><a href="https://www.linkedin.com/in/wright-hamor/" target="_blank">LinkedIn</a></li><li><a href="https://blackcomputeher.org/" target="_blank">blackcomputeHER</a></li><li><a href="https://www.pnnl.gov/science/staff/staff_info.asp?staff_num=10129" target="_blank">PNNL</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/wright-hamor/" target="_blank">Cimone Wright-Hamor</a> works at <a href="https://www.pnnl.gov/cybersecurity" target="_blank">Pacific Northwest National Laboratory</a> (PNNL) as a cybersecurity researcher while pursuing a Ph.D. in Computer Engineering at Iowa State University. She has spent the last decade of her life interning at a variety of organizations. She has had ten internships at more than six different organizations, including public and private industries ranging from Fortune 500 companies like <a href="https://www.microsoft.com/" target="_blank">Microsoft</a> to successful startups such as <a href="https://www.smartagllc.com/" target="_blank">Smart-Ag</a>, state government, and national laboratories.</p><p>Cimone has spent the last five years of her career working in the cybersecurity field. While completing research, she has helped protect the infrastructure for the State of Iowa and ensured that startup companies are developing software with security in mind.</p><p>In this episode, we discuss getting started in information security due to responding to an incident, an early upbringing which prepared her for cybersecurity, bridging theory to engineering, teaming with dev and security teams, the importance of project updates, increasing diversity in the industry, and so much more.</p><p>Where you can find Cimone:</p><ul><li><a href="https://www.linkedin.com/in/wright-hamor/" target="_blank">LinkedIn</a></li><li><a href="https://blackcomputeher.org/" target="_blank">blackcomputeHER</a></li><li><a href="https://www.pnnl.gov/science/staff/staff_info.asp?staff_num=10129" target="_blank">PNNL</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/120-cimone-wright-hamor-cybersecurity-is-an-applied-field]]></link><guid isPermaLink="false">72e82149-12bd-406d-8c75-e4357e1b59b3</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 21 Jun 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2784bedd-027c-45f0-afe4-7d9f61a0760f/120-cimone-wright-hamor-cyber-security-interviews.mp3" length="50975933" type="audio/mpeg"/><itunes:duration>35:22</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#119 – Jenna Waters: This Is My Team</title><itunes:title>#119 – Jenna Waters: This Is My Team</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/je-waters/" target="_blank">Jenna Waters </a>is a Cybersecurity Consultant at <a href="https://truedigitalsecurity.com/blog" target="_blank">True Digital Security</a> where she specializes in information security program development, industry compliance assessments, threat intelligence, and cloud security controls. She is an experienced professional who consults with companies across multiple industries in achieving security-related best practices and/or regulatory compliance objectives related to risk management and compliance frameworks, and various privacy laws throughout the United States.</p><p>Jenna began her career in the United States Navy working under the <a href="https://www.fcc.navy.mil/" target="_blank">U.S. Fleet Cyber Command at the Naval Intelligence Operations Center (NIOC)</a> and with the National Security Agency (NSA). Afterward, she graduated from the <a href="https://business.utulsa.edu/accounting-cis/computer-information-systems/" target="_blank">University of Tulsa </a>with a degree in Computer Information Systems. Jenna is passionate about sharing her knowledge of cybersecurity with business owners, public policy leaders, and healthcare, financial, and tech industry members. When she isn’t busy helping her clients protect their customers’ data, Jenna is a voracious reader, aspiring hobbyist, and dog mom of two.</p><p>In this episode, we discuss starting cybersecurity with the U.S. Navy, tying spoken languages to coding languages, leading and managing people, building an information security program, getting leadership buy-in, using frameworks for resiliency, diversity and inclusion, and so much more.</p><p>Where you can find Jenna:</p><ul><li><a href="https://www.linkedin.com/in/je-waters/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/truedigitalsec" target="_blank">Twitter</a></li><li><a href="https://truedigitalsecurity.com/blog" target="_blank">Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/je-waters/" target="_blank">Jenna Waters </a>is a Cybersecurity Consultant at <a href="https://truedigitalsecurity.com/blog" target="_blank">True Digital Security</a> where she specializes in information security program development, industry compliance assessments, threat intelligence, and cloud security controls. She is an experienced professional who consults with companies across multiple industries in achieving security-related best practices and/or regulatory compliance objectives related to risk management and compliance frameworks, and various privacy laws throughout the United States.</p><p>Jenna began her career in the United States Navy working under the <a href="https://www.fcc.navy.mil/" target="_blank">U.S. Fleet Cyber Command at the Naval Intelligence Operations Center (NIOC)</a> and with the National Security Agency (NSA). Afterward, she graduated from the <a href="https://business.utulsa.edu/accounting-cis/computer-information-systems/" target="_blank">University of Tulsa </a>with a degree in Computer Information Systems. Jenna is passionate about sharing her knowledge of cybersecurity with business owners, public policy leaders, and healthcare, financial, and tech industry members. When she isn’t busy helping her clients protect their customers’ data, Jenna is a voracious reader, aspiring hobbyist, and dog mom of two.</p><p>In this episode, we discuss starting cybersecurity with the U.S. Navy, tying spoken languages to coding languages, leading and managing people, building an information security program, getting leadership buy-in, using frameworks for resiliency, diversity and inclusion, and so much more.</p><p>Where you can find Jenna:</p><ul><li><a href="https://www.linkedin.com/in/je-waters/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/truedigitalsec" target="_blank">Twitter</a></li><li><a href="https://truedigitalsecurity.com/blog" target="_blank">Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/119-jenna-waters-this-is-my-team]]></link><guid isPermaLink="false">57e89636-4ce0-4a2a-84b8-def3202ed8bc</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 14 Jun 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d9267fa5-f581-42a9-814f-d28af0cc2976/119-jenna-walters-cyber-security-interviews.mp3" length="68583485" type="audio/mpeg"/><itunes:duration>47:36</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#118 – Nato Riley: Reinvent Reality and Reinvent the World</title><itunes:title>#118 – Nato Riley: Reinvent Reality and Reinvent the World</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/nato-riley/" target="_blank">Nato Riley</a> is an Integrations Engineer at <a href="https://www.blumira.com/" target="_blank">Blumira</a> and the Co-founder of <a href="https://cloudunderground.dev/" target="_blank">Cloud Underground</a>. Nato provides infrastructure, code, and security across all his efforts and is focused on helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses.</p><p>He is the host of the “Nato as Code” and the "<a href="https://www.youtube.com/channel/UCnKbJ2vW3QYcLot2D1xeJmA" target="_blank">Cloud Underground</a>" productions on YouTube, the creator and maintainer of the Olympiad platform, and the founder of <a href="https://notiapoint.com/" target="_blank">notiaPoint</a> (now known as <a href="https://cloudunderground.dev/" target="_blank">Cloud Underground</a>).</p><p>In this episode, we discuss starting in technology repairing computers, going to school for public speaking, finding passion in information security, trying too hard to pass certification tests, going out on his own, mentorships, burnout, diversity, and so much more.</p><p>Where you can find Nato:</p><ul><li><a href="https://www.linkedin.com/in/nato-riley/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/NateRiles" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/c/natoascode" target="_blank">Nato as Code - YouTube</a></li><li><a href="https://www.youtube.com/channel/UCnKbJ2vW3QYcLot2D1xeJmA" target="_blank">Cloud Undeground - YouTube</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/nato-riley/" target="_blank">Nato Riley</a> is an Integrations Engineer at <a href="https://www.blumira.com/" target="_blank">Blumira</a> and the Co-founder of <a href="https://cloudunderground.dev/" target="_blank">Cloud Underground</a>. Nato provides infrastructure, code, and security across all his efforts and is focused on helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses.</p><p>He is the host of the “Nato as Code” and the "<a href="https://www.youtube.com/channel/UCnKbJ2vW3QYcLot2D1xeJmA" target="_blank">Cloud Underground</a>" productions on YouTube, the creator and maintainer of the Olympiad platform, and the founder of <a href="https://notiapoint.com/" target="_blank">notiaPoint</a> (now known as <a href="https://cloudunderground.dev/" target="_blank">Cloud Underground</a>).</p><p>In this episode, we discuss starting in technology repairing computers, going to school for public speaking, finding passion in information security, trying too hard to pass certification tests, going out on his own, mentorships, burnout, diversity, and so much more.</p><p>Where you can find Nato:</p><ul><li><a href="https://www.linkedin.com/in/nato-riley/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/NateRiles" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/c/natoascode" target="_blank">Nato as Code - YouTube</a></li><li><a href="https://www.youtube.com/channel/UCnKbJ2vW3QYcLot2D1xeJmA" target="_blank">Cloud Undeground - YouTube</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/118-nato-riley-reinvent-reality-and-reinvent-the-world]]></link><guid isPermaLink="false">8f627600-f7cb-4031-8c60-4328355b2f45</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 07 Jun 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9ed8922-b03d-4f5f-b4ea-d20063ab0a75/118-nato-riley-cyber-security-interviews.mp3" length="79298047" type="audio/mpeg"/><itunes:duration>55:02</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#117 – Sara Avery: Go After What You Want</title><itunes:title>#117 – Sara Avery: Go After What You Want</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/sara-avery-6aa1587/" target="_blank">Sara Avery</a> is a Regional Sales Manager at <a href="https://www.zscaler.com/" target="_blank">Zscaler</a>. She has held various positions over the past 20 years in the Information Technology field and discovered her passion for information security 15 years ago. Her career has largely been spent in sales and account management with a laser focus on my customer's success. Sara's tenured experience in cybersecurity has given her a strong understanding of the complex technology and intelligence required to keep enterprises secure.</p><p>From a young age, she was raised to be a strong female and leader. Her mother, along with other trailblazing women, campaigned to start the Equal Rights Amendment in Colorado in the early 1970s. With a passion for helping others, Sara wanted to start a group that would help, mentor, learn and guide women and founded <a href="https://www.denverissa.org/women-in-security" target="_blank">Women in Cyber Security, ISSA Denver</a>. Her vision was to find a way to inspire and support women in all areas of information security, as well as develop and mentor the younger female generation for the future of the dynamic and ever-changing world of information security.</p><p>In this episode, we discuss her early start with Y2K, why she helped start Women In Security with the Denver ISSA chapter, the evolution of communications with workstyles, getting young girls into STEM, how she is championing equality at work, dealing with gaslighting, mansplaining, and microaggressions, removing the stigma of "the hacker," and so much more!</p><p>Where you can find Sara:</p><ul><li><a href="https://www.linkedin.com/in/sara-avery-6aa1587/" target="_blank">LinkedIn</a></li><li><a href="https://www.denverissa.org/women-in-security" target="_blank">Women In Security - ISSA Denver</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/sara-avery-6aa1587/" target="_blank">Sara Avery</a> is a Regional Sales Manager at <a href="https://www.zscaler.com/" target="_blank">Zscaler</a>. She has held various positions over the past 20 years in the Information Technology field and discovered her passion for information security 15 years ago. Her career has largely been spent in sales and account management with a laser focus on my customer's success. Sara's tenured experience in cybersecurity has given her a strong understanding of the complex technology and intelligence required to keep enterprises secure.</p><p>From a young age, she was raised to be a strong female and leader. Her mother, along with other trailblazing women, campaigned to start the Equal Rights Amendment in Colorado in the early 1970s. With a passion for helping others, Sara wanted to start a group that would help, mentor, learn and guide women and founded <a href="https://www.denverissa.org/women-in-security" target="_blank">Women in Cyber Security, ISSA Denver</a>. Her vision was to find a way to inspire and support women in all areas of information security, as well as develop and mentor the younger female generation for the future of the dynamic and ever-changing world of information security.</p><p>In this episode, we discuss her early start with Y2K, why she helped start Women In Security with the Denver ISSA chapter, the evolution of communications with workstyles, getting young girls into STEM, how she is championing equality at work, dealing with gaslighting, mansplaining, and microaggressions, removing the stigma of "the hacker," and so much more!</p><p>Where you can find Sara:</p><ul><li><a href="https://www.linkedin.com/in/sara-avery-6aa1587/" target="_blank">LinkedIn</a></li><li><a href="https://www.denverissa.org/women-in-security" target="_blank">Women In Security - ISSA Denver</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/117-sara-avery-go-after-what-you-want]]></link><guid isPermaLink="false">9a3cc32c-a942-4a4b-be7b-61ddda4d4311</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 15 Mar 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2eb03e51-d717-4b0f-9a45-7dbf7b2e19bd/117-sara-avery-cyber-security-interviews.mp3" length="77489571" type="audio/mpeg"/><itunes:duration>53:47</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#116 – Jennifer Brown: This Is A Wakeup Call</title><itunes:title>#116 - Jennifer Brown: This Is A Wakeup Call</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jenniferbrownconsulting/" target="_blank">Jennifer Brown</a> is an award-winning entrepreneur, <a href="https://jenniferbrownspeaks.com/" target="_blank">speaker</a>, diversity and inclusion consultant, and author. As the successful founder, president, and <a href="https://jenniferbrownconsulting.com/inclusion-the-book/" target="_blank">CEO of Jennifer Brown Consulting</a>, headquartered in New York City, Jennifer is responsible for designing workplace strategies that have been implemented by some of the biggest companies and nonprofits in the world. She has harnessed more than 14 years of experience as a world-renowned diversity and inclusion expert through consulting work, keynoting, and thought leadership.</p><p>Jennifer has spoken at many top conferences and events such as the International Diversity Forum, the Global D&amp;I Summit, the Forum for Workplace Inclusion, the NGLCC International Business &amp; Leadership Conference, the Out &amp; Equal Workplace Summit, Emerging Women, as well as at organizations such as the Bill and Melinda Gates Foundation, the NBA, Google, IBM, and more.</p><p>She is the bestselling author of; <a href="https://www.amazon.com/Inclusion-Diversity-Workplace-Will-Change/dp/1946384100" target="_blank">Inclusion: Diversity, The New Workplace and The Will to Change</a> and a new book; <a href="https://www.amazon.com/How-Be-Inclusive-Leader-Belonging/dp/1523085177/" target="_blank">How To Be An Inclusive Leader: Your Role in Creating Cultures of Belonging Where Everyone Can Thrive</a>.</p><p>Jennifer is the host of the popular weekly podcast, <a href="https://podcasts.apple.com/us/podcast/will-to-change-uncovering-true-stories-diversity-inclusion/id1208603357" target="_blank">The Will to Change</a>, which uncovers true stories of diversity and inclusion.</p><p>In this episode, we discuss being an ally to underrepresented groups, biases in the workplace, how the COVID crisis has shed a light on diversity, how leadership needs to change the culture, removing harmful processes, finding diverse mentors, the risks to business by not embracing diversity, and so much more.</p><p>Where to find Jennifer:</p><ul><li><a href="https://www.linkedin.com/in/jenniferbrownconsulting/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jenniferbrown" target="_blank">Twitter</a></li><li><a href="https://www.amazon.com/Inclusion-Diversity-Workplace-Will-Change/dp/1946384100" target="_blank">Amazon</a></li><li><a href="https://jenniferbrownconsulting.lpages.co/community-calls/" target="_blank">Blog and Website</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jenniferbrownconsulting/" target="_blank">Jennifer Brown</a> is an award-winning entrepreneur, <a href="https://jenniferbrownspeaks.com/" target="_blank">speaker</a>, diversity and inclusion consultant, and author. As the successful founder, president, and <a href="https://jenniferbrownconsulting.com/inclusion-the-book/" target="_blank">CEO of Jennifer Brown Consulting</a>, headquartered in New York City, Jennifer is responsible for designing workplace strategies that have been implemented by some of the biggest companies and nonprofits in the world. She has harnessed more than 14 years of experience as a world-renowned diversity and inclusion expert through consulting work, keynoting, and thought leadership.</p><p>Jennifer has spoken at many top conferences and events such as the International Diversity Forum, the Global D&amp;I Summit, the Forum for Workplace Inclusion, the NGLCC International Business &amp; Leadership Conference, the Out &amp; Equal Workplace Summit, Emerging Women, as well as at organizations such as the Bill and Melinda Gates Foundation, the NBA, Google, IBM, and more.</p><p>She is the bestselling author of; <a href="https://www.amazon.com/Inclusion-Diversity-Workplace-Will-Change/dp/1946384100" target="_blank">Inclusion: Diversity, The New Workplace and The Will to Change</a> and a new book; <a href="https://www.amazon.com/How-Be-Inclusive-Leader-Belonging/dp/1523085177/" target="_blank">How To Be An Inclusive Leader: Your Role in Creating Cultures of Belonging Where Everyone Can Thrive</a>.</p><p>Jennifer is the host of the popular weekly podcast, <a href="https://podcasts.apple.com/us/podcast/will-to-change-uncovering-true-stories-diversity-inclusion/id1208603357" target="_blank">The Will to Change</a>, which uncovers true stories of diversity and inclusion.</p><p>In this episode, we discuss being an ally to underrepresented groups, biases in the workplace, how the COVID crisis has shed a light on diversity, how leadership needs to change the culture, removing harmful processes, finding diverse mentors, the risks to business by not embracing diversity, and so much more.</p><p>Where to find Jennifer:</p><ul><li><a href="https://www.linkedin.com/in/jenniferbrownconsulting/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jenniferbrown" target="_blank">Twitter</a></li><li><a href="https://www.amazon.com/Inclusion-Diversity-Workplace-Will-Change/dp/1946384100" target="_blank">Amazon</a></li><li><a href="https://jenniferbrownconsulting.lpages.co/community-calls/" target="_blank">Blog and Website</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/116-jennifer-brown-this-is-a-wakeup-call]]></link><guid isPermaLink="false">f2201947-59c2-4cad-9595-8874f2c55fca</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 01 Mar 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b05883fe-9d10-4877-b83a-dbc0378b0d21/116-jennifer-brown-cyber-security-interviews.mp3" length="83230834" type="audio/mpeg"/><itunes:duration>57:46</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#115 – Alyssa Miller: We Are Lacking Empathy</title><itunes:title>#115 - Alyssa Miller: We Are Lacking Empathy</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/alyssam-infosec/" target="_blank">Alyssa Miller</a> leads the security strategy for <a href="https://www.spglobal.com/ratings/en/" target="_blank">S&amp;P Global Ratings</a> as Business Information Security Officer (BISO), connecting corporate security objectives to business initiatives. She blends a unique mix of technical expertise and executive presence to bridge the gap that can often form between security practitioners and business leaders. Her goal is to change how we look at the security of our interconnected way of life and focus attention on defending privacy and cultivating trust.</p><p>A native of Milwaukee, Alyssa began her IT career as a programmer for a Wisconsin-based financial software provider. Her security passion quickly shaped her career as she moved into a leadership role within the ethical hacking team, conducting penetration testing and application assessments along with her team.</p><p>As a hacker, Alyssa has a passion for security that she evangelizes to business leaders and industry audiences through her work as a cybersecurity professional and through her various public speaking engagements. When not engaged in security research and advocacy, she is also an accomplished soccer referee, guitarist, and photographer.</p><p>In this episode, we discuss&nbsp;why she misses conferences, starting with computers at an early age, diversity, equity, and inclusion, the discrimination she has faced, the lack of understanding of privilege, discriminatory hiring practices, how to be an ally, and so much more!</p><p>Where you can find Alyssa:</p><ul><li><a href="https://www.linkedin.com/in/alyssam-infosec/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/AlyssaM_InfoSec" target="_blank">Twitter</a></li><li><a href="https://alyssasec.com/" target="_blank">Alyssa In-Security</a></li><li><a href="https://www.thinkers360.com/tl/AlyssaMiller" target="_blank">Thinkers360</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/alyssam-infosec/" target="_blank">Alyssa Miller</a> leads the security strategy for <a href="https://www.spglobal.com/ratings/en/" target="_blank">S&amp;P Global Ratings</a> as Business Information Security Officer (BISO), connecting corporate security objectives to business initiatives. She blends a unique mix of technical expertise and executive presence to bridge the gap that can often form between security practitioners and business leaders. Her goal is to change how we look at the security of our interconnected way of life and focus attention on defending privacy and cultivating trust.</p><p>A native of Milwaukee, Alyssa began her IT career as a programmer for a Wisconsin-based financial software provider. Her security passion quickly shaped her career as she moved into a leadership role within the ethical hacking team, conducting penetration testing and application assessments along with her team.</p><p>As a hacker, Alyssa has a passion for security that she evangelizes to business leaders and industry audiences through her work as a cybersecurity professional and through her various public speaking engagements. When not engaged in security research and advocacy, she is also an accomplished soccer referee, guitarist, and photographer.</p><p>In this episode, we discuss&nbsp;why she misses conferences, starting with computers at an early age, diversity, equity, and inclusion, the discrimination she has faced, the lack of understanding of privilege, discriminatory hiring practices, how to be an ally, and so much more!</p><p>Where you can find Alyssa:</p><ul><li><a href="https://www.linkedin.com/in/alyssam-infosec/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/AlyssaM_InfoSec" target="_blank">Twitter</a></li><li><a href="https://alyssasec.com/" target="_blank">Alyssa In-Security</a></li><li><a href="https://www.thinkers360.com/tl/AlyssaMiller" target="_blank">Thinkers360</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/115-alyssa-miller-we-are-lacking-empathy]]></link><guid isPermaLink="false">386abc66-7c87-4d58-9dce-0671398685c5</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 22 Feb 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/0242ae51-93b3-4d52-bb06-5893246d306a/115-alyssa-miller-cyber-security-interviews.mp3" length="73386129" type="audio/mpeg"/><itunes:duration>50:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#114 – Chloé Messdaghi: How Can We Do Better</title><itunes:title>#114 – Chloé Messdaghi: How Can We Do Better</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/chloemessdaghi/" target="_blank">Chloé Messdaghi</a> is the Chief Strategist at <a href="https://ittakesahuman.com/" target="_blank">Point3 Security</a>. In addition to her passion for keeping people safe and empowered both on and offline, she is also interested in increasing the numbers of marginalized genders in information security. She is the Co-Founder of <a href="https://www.womenofsecurity.com/" target="_blank">Women of Security (WoSEC)</a> and <a href="https://www.hackingisnotacrime.org/" target="_blank">Hacking is NOT a Crime</a> and the Founder of <a href="https://www.wearehackerz.org/" target="_blank">WeAreHackerz (WomenHackerz)</a>.</p><p>Chloé is a keynote speaker at major information security conferences and events and serves as a trusted source for national and sector reporters and editors. She holds a master of science (MS) from the University of Edinburgh, and a BA in international relations from the University of California, Davis, as well as a certificate in entrepreneurship from Wharton and other professional certificates.</p><p>In this episode, we discuss the adjustment to conferences from home, feeling unwelcome in cybersecurity as a woman, pivotal moments that kept her in security, making real changes in diversity, equity, and inclusion, how biases develop, removing the bro-culture in management, changing the perceptions of hackers, and so much more!</p><p>Where you can find Chloé:</p><ul><li><a href="https://www.linkedin.com/in/chloemessdaghi/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ChloeMessdaghi" target="_blank">Twitter</a></li><li><a href="https://www.chloemessdaghi.com/" target="_blank">Personal Page</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/chloemessdaghi/" target="_blank">Chloé Messdaghi</a> is the Chief Strategist at <a href="https://ittakesahuman.com/" target="_blank">Point3 Security</a>. In addition to her passion for keeping people safe and empowered both on and offline, she is also interested in increasing the numbers of marginalized genders in information security. She is the Co-Founder of <a href="https://www.womenofsecurity.com/" target="_blank">Women of Security (WoSEC)</a> and <a href="https://www.hackingisnotacrime.org/" target="_blank">Hacking is NOT a Crime</a> and the Founder of <a href="https://www.wearehackerz.org/" target="_blank">WeAreHackerz (WomenHackerz)</a>.</p><p>Chloé is a keynote speaker at major information security conferences and events and serves as a trusted source for national and sector reporters and editors. She holds a master of science (MS) from the University of Edinburgh, and a BA in international relations from the University of California, Davis, as well as a certificate in entrepreneurship from Wharton and other professional certificates.</p><p>In this episode, we discuss the adjustment to conferences from home, feeling unwelcome in cybersecurity as a woman, pivotal moments that kept her in security, making real changes in diversity, equity, and inclusion, how biases develop, removing the bro-culture in management, changing the perceptions of hackers, and so much more!</p><p>Where you can find Chloé:</p><ul><li><a href="https://www.linkedin.com/in/chloemessdaghi/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ChloeMessdaghi" target="_blank">Twitter</a></li><li><a href="https://www.chloemessdaghi.com/" target="_blank">Personal Page</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/114-chloe-messdaghi-how-can-we-do-better]]></link><guid isPermaLink="false">9829dc08-5fb4-472e-8ae4-ff17c3d4d6d5</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 15 Feb 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/968b66b4-dd03-446a-b642-58e6f7bba725/114-chloe-messdaghi-cyber-security-interviews.mp3" length="74607432" type="audio/mpeg"/><itunes:duration>51:47</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#113 – Julian Waits: Diversity of Thought</title><itunes:title>#113 – Julian Waits: Diversity of Thought</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/julianwaits/" target="_blank">Julian Waits</a> is the general manager of cybersecurity at <a href="https://www.devo.com/" target="_blank">Devo Technology</a>. He has over 30 years of experience in senior leadership roles at technology companies, specializing in security, risk, and threat detection.</p><p>He serves on several industry boards, including the <a href="http://www.icmcponline.com/" target="_blank">International Consortium of Minority Cybersecurity Professionals (ICMCP)</a> and <a href="https://www.nist.gov/itl/applied-cybersecurity/nice" target="_blank">National Cybersecurity STEM Education (NICE)</a>, promoting the development of the next generation of cybersecurity professionals.</p><p>In this episode, we discuss missing travel, working more in COVID-19, recruiting from non-traditional places, diversity, equity, and inclusion, his start in music before technology, changing people's understanding of differences, removing unconscious biases, his mentors, why language matters, and so much more!</p><p>Where you can find Julian:</p><ul><li><a href="https://www.linkedin.com/in/julianwaits/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/julianwaits" target="_blank">Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/julianwaits/" target="_blank">Julian Waits</a> is the general manager of cybersecurity at <a href="https://www.devo.com/" target="_blank">Devo Technology</a>. He has over 30 years of experience in senior leadership roles at technology companies, specializing in security, risk, and threat detection.</p><p>He serves on several industry boards, including the <a href="http://www.icmcponline.com/" target="_blank">International Consortium of Minority Cybersecurity Professionals (ICMCP)</a> and <a href="https://www.nist.gov/itl/applied-cybersecurity/nice" target="_blank">National Cybersecurity STEM Education (NICE)</a>, promoting the development of the next generation of cybersecurity professionals.</p><p>In this episode, we discuss missing travel, working more in COVID-19, recruiting from non-traditional places, diversity, equity, and inclusion, his start in music before technology, changing people's understanding of differences, removing unconscious biases, his mentors, why language matters, and so much more!</p><p>Where you can find Julian:</p><ul><li><a href="https://www.linkedin.com/in/julianwaits/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/julianwaits" target="_blank">Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/113-julian-waits-diversity-of-thought]]></link><guid isPermaLink="false">39642d22-22ca-40fd-8283-f06ebeb7dcbc</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 08 Feb 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/41f8ef74-072c-495b-bd6b-3ef9a1a3572d/113-julian-waits-cyber-security-interviews.mp3" length="80438652" type="audio/mpeg"/><itunes:duration>55:50</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#112: Douglas Brush – Pain Is Inevitable, Suffering Is Optional</title><itunes:title>#112: Douglas Brush - Pain Is Inevitable, Suffering Is Optional</itunes:title><description><![CDATA[<p><span>This is the last episode in the five-part series on mental health, self-care, and neurodiversity. This will not be the last time I speak about these issues on the podcast. I encourage everyone to take these issues seriously and help remove stigmas and champion differences in the way our brains work.</span></p><p><span>Cybersecurity professionals spend most of their day focused on the health and wellbeing of the environments in their care. However, the cost of reducing risk and keeping our networks safe often comes at the price of our professionals' mental health. Many InfoSec professionals burn out, suffer from anxiety and depression, and turn to unhealthy coping mechanisms, which further exacerbate underlying psychological and physical health issues.</span></p><p><span>This is an abridged version of one of my public presentations on mental health. My goal is to alleviate the stigma around mental health and stress the importance of open and frank dialogs about this serious issue impacting our community. I will share my journey, reverse engineer the stigma of mental health in business, and look at ways we can hack mental health in productive and meaningful ways.</span></p><p><strong><em><u>Episode Disclaimer:</u></em></strong></p><p><em>This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em>We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong><em>THIS IS NOT MEDICAL ADVICE</em></strong><em>. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></description><content:encoded><![CDATA[<p><span>This is the last episode in the five-part series on mental health, self-care, and neurodiversity. This will not be the last time I speak about these issues on the podcast. I encourage everyone to take these issues seriously and help remove stigmas and champion differences in the way our brains work.</span></p><p><span>Cybersecurity professionals spend most of their day focused on the health and wellbeing of the environments in their care. However, the cost of reducing risk and keeping our networks safe often comes at the price of our professionals' mental health. Many InfoSec professionals burn out, suffer from anxiety and depression, and turn to unhealthy coping mechanisms, which further exacerbate underlying psychological and physical health issues.</span></p><p><span>This is an abridged version of one of my public presentations on mental health. My goal is to alleviate the stigma around mental health and stress the importance of open and frank dialogs about this serious issue impacting our community. I will share my journey, reverse engineer the stigma of mental health in business, and look at ways we can hack mental health in productive and meaningful ways.</span></p><p><strong><em><u>Episode Disclaimer:</u></em></strong></p><p><em>This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em>We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong><em>THIS IS NOT MEDICAL ADVICE</em></strong><em>. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/112-douglas-brush-pain-is-inevitable-suffering-is-optional]]></link><guid isPermaLink="false">dae0f242-f4eb-4a5f-9cb8-4db0b9409faa</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 01 Feb 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/929e50cb-4c17-462a-a75b-db77803cdd55/112-douglas-brush-cyber-security-interviews.mp3" length="30397727" type="audio/mpeg"/><itunes:duration>39:58</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#111 – Danny Akacki: Work Worth Doing</title><itunes:title>#111 – Danny Akacki: Work Worth Doing</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/dakacki/" target="_blank">Danny Akacki</a> is just a storyteller perpetually looking for a stage. He loves nothing more than attending conferences, giving talks, writing blogs, and finding new ways to reach as many people as he can to educate about cybersecurity. For him, there is no greater satisfaction than community building.</p><p>Danny has been fortunate enough to spend his career in Defense, learning from some of the best in the business, including teams at Mandiant, GE capital &amp;&nbsp;most recently as a Technology Advocate with Splunk. He loves what he does and the people he gets to do it with.</p><p>In this episode, we discuss his mental health journey, adjusting to a new role during COVID-19, finding outlets for stress release, if mental health issues are worse in cybersecurity, neurodiversity, PTSD, and so much more.</p><p>Where you can find Danny:</p><ul><li><a href="linkedin.com/in/dakacki" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/DAkacki" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/SecondOrderChaos" target="_blank">YouTube</a></li><li><a href="https://www.twitch.tv/2OCStream" target="_blank">Twitch</a></li></ul><br/><p><strong><em><u>Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/dakacki/" target="_blank">Danny Akacki</a> is just a storyteller perpetually looking for a stage. He loves nothing more than attending conferences, giving talks, writing blogs, and finding new ways to reach as many people as he can to educate about cybersecurity. For him, there is no greater satisfaction than community building.</p><p>Danny has been fortunate enough to spend his career in Defense, learning from some of the best in the business, including teams at Mandiant, GE capital &amp;&nbsp;most recently as a Technology Advocate with Splunk. He loves what he does and the people he gets to do it with.</p><p>In this episode, we discuss his mental health journey, adjusting to a new role during COVID-19, finding outlets for stress release, if mental health issues are worse in cybersecurity, neurodiversity, PTSD, and so much more.</p><p>Where you can find Danny:</p><ul><li><a href="linkedin.com/in/dakacki" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/DAkacki" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/SecondOrderChaos" target="_blank">YouTube</a></li><li><a href="https://www.twitch.tv/2OCStream" target="_blank">Twitch</a></li></ul><br/><p><strong><em><u>Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/111-danny-akacki-work-worth-doing]]></link><guid isPermaLink="false">7af86534-21df-4eaf-8203-a1d0eeb0b44b</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 Jan 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/466546ef-d476-433b-a519-2d42a37bc308/111-danny-akacki-cyber-security-interviews.mp3" length="92097832" type="audio/mpeg"/><itunes:duration>01:03:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#110 – Ryan Louie: Security Starts In the Mind</title><itunes:title>#110 - Ryan Louie: Security Starts In the Mind</itunes:title><description><![CDATA[<p><a href="https://twitter.com/ryanlouie" target="_blank">Ryan K. Louie</a>, MD, Ph.D. is a board-certified psychiatrist focusing on the mental health impact of cybersecurity, and the psychiatry of entrepreneurship. Ryan received his MD and Ph.D. degrees from the Stanford University School of Medicine and completed residency training in psychiatry at the University of Hawaii Department of Psychiatry.</p><p>Ryan completed an internship with the Office of International Health and Biodefense at the US Department of State and was the recipient of a Fulbright Fellowship to Japan. Ryan has published academic articles in psychiatry and cell biology and is the inventor of the patented microtubule lumen-cast nanowire technology.</p><p>In this episode, we discuss the stigmas of mental health, coping skills, the economic costs for not addressing mental health, neurodiversity, handling COVID-19 stress, removing job pressures in information security, and so much more!</p><p>Where you can find Ryan:</p><ul><li><a href="https://twitter.com/ryanlouie https://twitter.com/ryanlouie" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ryanlouie" target="_blank">Twitter</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></description><content:encoded><![CDATA[<p><a href="https://twitter.com/ryanlouie" target="_blank">Ryan K. Louie</a>, MD, Ph.D. is a board-certified psychiatrist focusing on the mental health impact of cybersecurity, and the psychiatry of entrepreneurship. Ryan received his MD and Ph.D. degrees from the Stanford University School of Medicine and completed residency training in psychiatry at the University of Hawaii Department of Psychiatry.</p><p>Ryan completed an internship with the Office of International Health and Biodefense at the US Department of State and was the recipient of a Fulbright Fellowship to Japan. Ryan has published academic articles in psychiatry and cell biology and is the inventor of the patented microtubule lumen-cast nanowire technology.</p><p>In this episode, we discuss the stigmas of mental health, coping skills, the economic costs for not addressing mental health, neurodiversity, handling COVID-19 stress, removing job pressures in information security, and so much more!</p><p>Where you can find Ryan:</p><ul><li><a href="https://twitter.com/ryanlouie https://twitter.com/ryanlouie" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ryanlouie" target="_blank">Twitter</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/110-ryan-louie-security-starts-in-the-mind]]></link><guid isPermaLink="false">e08e9bad-4a11-4dfe-ae98-71b6d96b0774</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 18 Jan 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/67df739e-d2f2-4972-ab28-907f36a1f802/110-ryan-louie-cyber-security-interviews.mp3" length="68431777" type="audio/mpeg"/><itunes:duration>47:30</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#109 – Amanda Berlin: Happier People Stay Longer</title><itunes:title>#109 – Amanda Berlin: Happier People Stay Longer</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/amandaberlin/" target="_blank">Amanda Berlin</a> is the Lead Incident Detection Engineer for <a href="https://www.blumira.com/" target="_blank">Blumira</a> and the CEO and owner of the nonprofit corporation <a href="https://www.mentalhealthhackers.org/" target="_blank">Mental Health Hackers</a>. She is the author of a Blue Team best practices book called "<a href="https://www.amazon.com/Defensive-Security-Handbook-Practices-Infrastructure/dp/1491960388" target="_blank">Defensive Security Handbook: Best Practices for Securing Infrastructure</a>” with Lee Brotherston through O'Reilly Media. She is a co-host on the <a href="https://www.brakeingsecurity.com" target="_blank">Brakeing Down Security podcast</a> and writes for several blogs.</p><p>Amanda is an avid volunteer and mental health advocate. She has presented at a large number of conventions, meetings, and industry events such as DerbyCon, O’Reilly Security, GrrCon, and DEFCON.</p><p>In this episode, we discuss her start in help desk, speaking amount mental health, depression and anxiety, men's reluctance to report health issues, neurodiversity, how organizations can encourage self-care, using medication, the Mental Health Hackers organization, and so much more.</p><p>Where you can find Amanda:</p><ul><li><a href="https://www.linkedin.com/in/amandaberlin/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/InfoSystir" target="_blank">Twitter - InfoSystir</a></li><li><a href="https://twitter.com/hackershealth" target="_blank">Twitter - Mental Health Hackers</a></li><li><a href="https://www.mentalhealthhackers.org/" target="_blank">Mental Health Hackers</a></li><li><a href="https://www.brakeingsecurity.com/" target="_blank">Brakeing Down Security Podcast</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/amandaberlin/" target="_blank">Amanda Berlin</a> is the Lead Incident Detection Engineer for <a href="https://www.blumira.com/" target="_blank">Blumira</a> and the CEO and owner of the nonprofit corporation <a href="https://www.mentalhealthhackers.org/" target="_blank">Mental Health Hackers</a>. She is the author of a Blue Team best practices book called "<a href="https://www.amazon.com/Defensive-Security-Handbook-Practices-Infrastructure/dp/1491960388" target="_blank">Defensive Security Handbook: Best Practices for Securing Infrastructure</a>” with Lee Brotherston through O'Reilly Media. She is a co-host on the <a href="https://www.brakeingsecurity.com" target="_blank">Brakeing Down Security podcast</a> and writes for several blogs.</p><p>Amanda is an avid volunteer and mental health advocate. She has presented at a large number of conventions, meetings, and industry events such as DerbyCon, O’Reilly Security, GrrCon, and DEFCON.</p><p>In this episode, we discuss her start in help desk, speaking amount mental health, depression and anxiety, men's reluctance to report health issues, neurodiversity, how organizations can encourage self-care, using medication, the Mental Health Hackers organization, and so much more.</p><p>Where you can find Amanda:</p><ul><li><a href="https://www.linkedin.com/in/amandaberlin/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/InfoSystir" target="_blank">Twitter - InfoSystir</a></li><li><a href="https://twitter.com/hackershealth" target="_blank">Twitter - Mental Health Hackers</a></li><li><a href="https://www.mentalhealthhackers.org/" target="_blank">Mental Health Hackers</a></li><li><a href="https://www.brakeingsecurity.com/" target="_blank">Brakeing Down Security Podcast</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied as a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/109-amanda-berlin-happier-people-stay-longer]]></link><guid isPermaLink="false">11a20146-d0b5-4886-b51a-b5e2df1047fd</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 11 Jan 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ead53fc5-0b34-4f8f-bf6d-feca83be110a/109-amanda-berlin-cyber-security-interviews.mp3" length="70923412" type="audio/mpeg"/><itunes:duration>49:13</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#108 – Bill Hudenko: The Mind Body Connection</title><itunes:title>#108 – Bill Hudenko: The Mind Body Connection</itunes:title><description><![CDATA[<p><a href="linkedin.com/in/bill-hudenko-3b737511/" target="_blank">Bill Hudenko</a>, Ph.D. has significant experience in the fields of both mental health and technology. Dr. Hudenko is a licensed psychologist, a researcher, and a professor who holds a joint appointment as a faculty member at <a href="https://pbs.dartmouth.edu/people/william-j-hudenko" target="_blank">Dartmouth's Department of Psychological and Brain Sciences</a> and <a href="https://geiselmed.dartmouth.edu/faculty/facultydb/view.php/?uid=4648" target="_blank">Dartmouth’s Geisel School of Medicine</a>.&nbsp;</p><p>His research focuses on the use of technology to improve mental health delivery and patient outcomes.&nbsp;Dr. Hudenko is also an experienced software engineer and former database administrator for the National Center for Post-Traumatic Stress Disorder.&nbsp;Dr. Hudenko is currently the CEO of <a href="https://trusst.app/" target="_blank">Trusst Health Inc.</a>, a company devoted to providing high quality, affordable remote psychotherapy via messaging.</p><p>In this episode, we discuss his background in brain and computer sciences, the intersection of technology and mental health, our brains' development, neurodiversity, mental health stigma, decision making, and so much more!</p><p>Where you can find Bill:</p><ul><li><a href="linkedin.com/in/bill-hudenko-3b737511/" target="_blank">LinkedIn</a></li><li><a href="https://pbs.dartmouth.edu/people/william-j-hudenko" target="_blank">Dartmouth's Department of Psychological and Brain Sciences</a></li><li><a href="https://geiselmed.dartmouth.edu/faculty/facultydb/view.php/?uid=4648" target="_blank">Dartmouth’s Geisel School of Medicine</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied to be a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></description><content:encoded><![CDATA[<p><a href="linkedin.com/in/bill-hudenko-3b737511/" target="_blank">Bill Hudenko</a>, Ph.D. has significant experience in the fields of both mental health and technology. Dr. Hudenko is a licensed psychologist, a researcher, and a professor who holds a joint appointment as a faculty member at <a href="https://pbs.dartmouth.edu/people/william-j-hudenko" target="_blank">Dartmouth's Department of Psychological and Brain Sciences</a> and <a href="https://geiselmed.dartmouth.edu/faculty/facultydb/view.php/?uid=4648" target="_blank">Dartmouth’s Geisel School of Medicine</a>.&nbsp;</p><p>His research focuses on the use of technology to improve mental health delivery and patient outcomes.&nbsp;Dr. Hudenko is also an experienced software engineer and former database administrator for the National Center for Post-Traumatic Stress Disorder.&nbsp;Dr. Hudenko is currently the CEO of <a href="https://trusst.app/" target="_blank">Trusst Health Inc.</a>, a company devoted to providing high quality, affordable remote psychotherapy via messaging.</p><p>In this episode, we discuss his background in brain and computer sciences, the intersection of technology and mental health, our brains' development, neurodiversity, mental health stigma, decision making, and so much more!</p><p>Where you can find Bill:</p><ul><li><a href="linkedin.com/in/bill-hudenko-3b737511/" target="_blank">LinkedIn</a></li><li><a href="https://pbs.dartmouth.edu/people/william-j-hudenko" target="_blank">Dartmouth's Department of Psychological and Brain Sciences</a></li><li><a href="https://geiselmed.dartmouth.edu/faculty/facultydb/view.php/?uid=4648" target="_blank">Dartmouth’s Geisel School of Medicine</a></li></ul><br/><p><strong><em><u>﻿Episode Disclaimer:</u></em></strong></p><p><em style="color: black">This podcast's information is not intended or implied to be a substitute for professional medical advice, diagnosis, or treatment. </em></p><p><em style="color: black">We make no representation and assume no responsibility for the accuracy of the information contained in or available through this presentation. </em><strong style="color: black"><em>THIS IS NOT MEDICAL ADVICE</em></strong><em style="color: black">. Please speak to your physician before embarking on any treatment plan.</em></p><p><strong style="color: black"><em>NEVER DISREGARD PROFESSIONAL MEDICAL ADVICE OR DELAY SEEKING MEDICAL TREATMENT BECAUSE OF SOMETHING YOU HEARD ON THIS PODCAST.</em></strong></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/108-bill-hudenko-the-mind-body-connection]]></link><guid isPermaLink="false">56c71426-342b-4b12-98e2-2a23f746360e</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 04 Jan 2021 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ba709bcc-3d9c-4ec2-913f-024e67b6ac72/108-bill-hudenko-cyber-security-interviews.mp3" length="73148174" type="audio/mpeg"/><itunes:duration>50:46</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#107 – Daniel Wood: We Don’t Have Enough Skilled People</title><itunes:title>#107 – Daniel Wood: We Don’t Have Enough Skilled People</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/danielewood/" target="_blank">Daniel Wood </a>is the Associate Vice President of Consulting at <a href="https://www.bishopfox.com/" target="_blank">Bishop Fox</a>, where he leads all service lines, develops strategic initiatives, and has established the Applied Research and Development program. Daniel has over 15 years of experience in cybersecurity and is a subject matter expert in red teaming, insider threat, and counterintelligence. Daniel was previously the manager of security engineering and technology at Bridgewater Associates, where he shaped the strategic direction of technology for the firm and oversaw technical security assessments of Bridgewater’s international office expansions.</p><p>Daniel has also served in roles supporting the U.S. government in security architecture, engineering, and offensive operations as a Security Engineer and Red Team Leader. He supported the U.S. Special Operations Command (USSOCOM) on red teaming and digital warfare operations, and the U.S. Army on the Wargaming Cyber Effects on Soldiers’ Decision-Making project.</p><p>In this episode, we discuss adapting to COVID-19, focusing on red teaming, cloud security architecture, responsible vulnerability disclosure, ICS security, compliance versus security, his work with the US military and cybersecurity, diversity in information security, and so much more!</p><p>Where you can find Daniel:</p><ul><li><a href="https://www.linkedin.com/in/danielewood/" target="_blank">LinkedIn</a></li><li><a href="https://labs.bishopfox.com/industry-blog" target="_blank">Bishop Fox Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/danielewood/" target="_blank">Daniel Wood </a>is the Associate Vice President of Consulting at <a href="https://www.bishopfox.com/" target="_blank">Bishop Fox</a>, where he leads all service lines, develops strategic initiatives, and has established the Applied Research and Development program. Daniel has over 15 years of experience in cybersecurity and is a subject matter expert in red teaming, insider threat, and counterintelligence. Daniel was previously the manager of security engineering and technology at Bridgewater Associates, where he shaped the strategic direction of technology for the firm and oversaw technical security assessments of Bridgewater’s international office expansions.</p><p>Daniel has also served in roles supporting the U.S. government in security architecture, engineering, and offensive operations as a Security Engineer and Red Team Leader. He supported the U.S. Special Operations Command (USSOCOM) on red teaming and digital warfare operations, and the U.S. Army on the Wargaming Cyber Effects on Soldiers’ Decision-Making project.</p><p>In this episode, we discuss adapting to COVID-19, focusing on red teaming, cloud security architecture, responsible vulnerability disclosure, ICS security, compliance versus security, his work with the US military and cybersecurity, diversity in information security, and so much more!</p><p>Where you can find Daniel:</p><ul><li><a href="https://www.linkedin.com/in/danielewood/" target="_blank">LinkedIn</a></li><li><a href="https://labs.bishopfox.com/industry-blog" target="_blank">Bishop Fox Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/107-daniel-wood-we-dont-have-enough-skilled-people]]></link><guid isPermaLink="false">964a74fc-902e-456d-824d-64f037dd0851</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 28 Dec 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/69fe00cf-aa64-4253-bad6-050d02c9660f/107-daniel-wood-cyber-security-interviews.mp3" length="54775146" type="audio/mpeg"/><itunes:duration>38:00</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#106 – Jasson Casey: Hire Missionaries, Not Mercanaries</title><itunes:title>#106 - Jasson Casey: Hire Missionaries, Not Mercanaries</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jassoncasey/" target="_blank">Jasson Casey</a> is the CTO of <a href="beyondidentity.com" target="_blank">Beyond Identity</a>, a passwordless identity management provider. He also serves as a Fellow in CyberSecurity with the <a href="https://www.csis.org/" target="_blank">Center for Strategic and International Studies</a> (CSIS) and the <a href="https://nationalsecurity.gmu.edu/" target="_blank">National Security Institute </a>(NSI). Previously, Jasson was CTO of <a href="https://securityscorecard.com/" target="_blank">SecurityScorecard</a>, VP of Engineering at <a href="https://www.ironnet.com/" target="_blank">IronNet Cybersecurity</a>, Founder and Executive Director of <a href="http://flowgrammable.org/" target="_blank">Flowgrammable</a> and Compiled Networks, and served in other technical and executive roles.</p><p>Jasson received a bachelor’s degree in computer engineering from The University of Texas at Austin and a Ph.D. in computer engineering from Texas A&amp;M University.</p><p>In this episode, we discuss adjusting to COVID-19, his start in VoIP, third party security management, security without passwords, why you are a target, the role of a CTO, using the right language in security, start-up hiring, and so much more!</p><p>Where you can find Jasson:</p><ul><li><a href="https://www.linkedin.com/in/jassoncasey/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jassoncasey" target="_blank">Twitter</a></li><li><a href="https://www.beyondidentity.com/blog" target="_blank">Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jassoncasey/" target="_blank">Jasson Casey</a> is the CTO of <a href="beyondidentity.com" target="_blank">Beyond Identity</a>, a passwordless identity management provider. He also serves as a Fellow in CyberSecurity with the <a href="https://www.csis.org/" target="_blank">Center for Strategic and International Studies</a> (CSIS) and the <a href="https://nationalsecurity.gmu.edu/" target="_blank">National Security Institute </a>(NSI). Previously, Jasson was CTO of <a href="https://securityscorecard.com/" target="_blank">SecurityScorecard</a>, VP of Engineering at <a href="https://www.ironnet.com/" target="_blank">IronNet Cybersecurity</a>, Founder and Executive Director of <a href="http://flowgrammable.org/" target="_blank">Flowgrammable</a> and Compiled Networks, and served in other technical and executive roles.</p><p>Jasson received a bachelor’s degree in computer engineering from The University of Texas at Austin and a Ph.D. in computer engineering from Texas A&amp;M University.</p><p>In this episode, we discuss adjusting to COVID-19, his start in VoIP, third party security management, security without passwords, why you are a target, the role of a CTO, using the right language in security, start-up hiring, and so much more!</p><p>Where you can find Jasson:</p><ul><li><a href="https://www.linkedin.com/in/jassoncasey/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jassoncasey" target="_blank">Twitter</a></li><li><a href="https://www.beyondidentity.com/blog" target="_blank">Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/106-jasson-casey-hire-missionaries-not-mercanaries]]></link><guid isPermaLink="false">a7b796a9-37fa-485a-928a-359923637598</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 21 Dec 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bfbc7497-b5ed-44f9-adfb-ef892ec0f0d7/106-jasson-casey-cyber-security-interviews.mp3" length="69297631" type="audio/mpeg"/><itunes:duration>48:06</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#105 – John Hammond: Raise The Cyber Security Poverty Line</title><itunes:title>#105 – John Hammond: Raise The Cyber Security Poverty Line</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/johnhammond010/" target="_blank">John Hammond</a> is a Security Researcher at <a href="https://huntresslabs.com/" target="_blank">Huntress</a> as well as a cybersecurity instructor, developer, red teamer, and CTF enthusiast. John is a former <a href="https://www.dcita.edu/" target="_blank">Department of Defense Cyber Training Academy</a> curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF and the "Capture the Packet" competition at <a href="https://www.defcon.org" target="_blank">DEFCON</a> US.</p><p>John speaks at security conferences such as <a href="http://www.bsidesnova.org/" target="_blank">BsidesNoVA</a>, to students at colleges such as the University of North Carolina Greensboro, and other events like the <a href="https://holidayhackchallenge.com/" target="_blank">SANS Holiday Hack Challenge/</a>KringleCon. He is an online <a href="https://www.youtube.com/johnhammond010" target="_blank">YouTube personality</a> showcasing programming tutorials, cybersecurity guides, and CTF video walkthroughs.</p><p>In this episode, we discuss how he started in pen-testing, contributing to the community, pen-testing vs purple teaming, setting the rules for engagement, solving the same problems, diversity and inclusion, and so much more.</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/johnhammond010/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/_johnhammond" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/johnhammond010" target="_blank">YouTube</a></li><li><a href="https://github.com/JohnHammond" target="_blank">GitHub</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/johnhammond010/" target="_blank">John Hammond</a> is a Security Researcher at <a href="https://huntresslabs.com/" target="_blank">Huntress</a> as well as a cybersecurity instructor, developer, red teamer, and CTF enthusiast. John is a former <a href="https://www.dcita.edu/" target="_blank">Department of Defense Cyber Training Academy</a> curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF and the "Capture the Packet" competition at <a href="https://www.defcon.org" target="_blank">DEFCON</a> US.</p><p>John speaks at security conferences such as <a href="http://www.bsidesnova.org/" target="_blank">BsidesNoVA</a>, to students at colleges such as the University of North Carolina Greensboro, and other events like the <a href="https://holidayhackchallenge.com/" target="_blank">SANS Holiday Hack Challenge/</a>KringleCon. He is an online <a href="https://www.youtube.com/johnhammond010" target="_blank">YouTube personality</a> showcasing programming tutorials, cybersecurity guides, and CTF video walkthroughs.</p><p>In this episode, we discuss how he started in pen-testing, contributing to the community, pen-testing vs purple teaming, setting the rules for engagement, solving the same problems, diversity and inclusion, and so much more.</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/johnhammond010/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/_johnhammond" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/johnhammond010" target="_blank">YouTube</a></li><li><a href="https://github.com/JohnHammond" target="_blank">GitHub</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/105-john-hammond-raise-the-cyber-security-poverty-line]]></link><guid isPermaLink="false">828978fa-4af7-47cf-9326-b2a8abfa9645</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 14 Dec 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/18c09301-17dc-4283-b5dc-f3e171775525/105-john-hammond-cyber-security-interviews.mp3" length="55344636" type="audio/mpeg"/><itunes:duration>38:24</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#104 – David Wong: Many Layers of Complexity</title><itunes:title>#104 - David Wong:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/david-wong-53170a4/" target="_blank">David Wong</a> is a security engineer working on the <a href="https://libra.org/en-US/" target="_blank">libra Blockchain</a> at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community.</p><p>David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and <a href="https://def.camp/speaker/david-wong/" target="_blank">DEF CON</a> and has delivered cryptography training sessions in the industry. He is the author of the soon-to-be-published <a href="https://www.manning.com/books/real-world-cryptography" target="_blank">Real-World Cryptography book</a>.</p><p>In this episode, we discuss why he focused on cryptography, the evolution of blockchain, his contributions to TLS, the Noise Protocol Framework, quantum computing, why he wrote a book on crypto, presenting and teaching cryptography, sanitizing data, and so much more!</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/david-wong-53170a4/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cryptodavidw" target="_blank">Twitter</a></li><li><a href="https://www.manning.com/books/real-world-cryptography" target="_blank">Real-Word Cryptography</a></li><li><a href="https://www.cryptologie.net/" target="_blank">Cryptologie.net</a></li><li><a href="https://noiseprotocol.org/" target="_blank">Noiseprotocol.org</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/david-wong-53170a4/" target="_blank">David Wong</a> is a security engineer working on the <a href="https://libra.org/en-US/" target="_blank">libra Blockchain</a> at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community.</p><p>David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and <a href="https://def.camp/speaker/david-wong/" target="_blank">DEF CON</a> and has delivered cryptography training sessions in the industry. He is the author of the soon-to-be-published <a href="https://www.manning.com/books/real-world-cryptography" target="_blank">Real-World Cryptography book</a>.</p><p>In this episode, we discuss why he focused on cryptography, the evolution of blockchain, his contributions to TLS, the Noise Protocol Framework, quantum computing, why he wrote a book on crypto, presenting and teaching cryptography, sanitizing data, and so much more!</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/david-wong-53170a4/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cryptodavidw" target="_blank">Twitter</a></li><li><a href="https://www.manning.com/books/real-world-cryptography" target="_blank">Real-Word Cryptography</a></li><li><a href="https://www.cryptologie.net/" target="_blank">Cryptologie.net</a></li><li><a href="https://noiseprotocol.org/" target="_blank">Noiseprotocol.org</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/104-david-wong-many-layers-of-complexity]]></link><guid isPermaLink="false">51f72b10-2564-4e77-8436-18f68814931f</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 07 Dec 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c57cd657-dd99-4ba2-8f46-395f6d284ec5/104-david-wong-cyber-security-interviews.mp3" length="62533448" type="audio/mpeg"/><itunes:duration>43:24</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#103 – Jeff Hussey: Try Not To Make More Than One Mistake In a Row</title><itunes:title>#103 - Jeff Hussey: Try Not To Make More Than One Mistake In a Row</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" target="_blank">Jeff Hussey</a> is the President and CEO of <a href="https://tempered.io/" target="_blank">Tempered</a>. Jeff, the founder of <a href="https://www.f5.com/" target="_blank">F5 Networks</a>, is an accomplished entrepreneur with a proven track record in the networking and security markets. He maintains several board positions across a variety of technology, nonprofit and philanthropic organizations and currently is the chairman of the board for Carena and chairman and co-owner of <a href="https://www.ecofiltro.com/" target="_blank">Ecofiltro</a> and <a href="https://www.puravidacreategood.com/" target="_blank">PuraVidaCreateGood</a>.</p><p>Jeff also serves on the board for Webaroo and the Seattle Symphony. He was the chairman of the board for Lockdown Networks, which was sold to McAfee in 2008. Hussey received a BA in Finance from SPU and an MBA from the University of Washington.</p><p>In this episode, we discuss adjusting to a remote workforce with a start-up, founding F5 Networks, developing a userbase community, tips for information security product success, IoT and OT cybersecurity, the <a href="https://www.security7.net/news/what-is-host-identity-protocol-hip" target="_blank">Host Identity Protocol</a>, healthcare security, prioritizing efforts as a founder, what gets him out of the bed in the morning, and so much more!</p><p>Where you can find Jeff:</p><ul><li><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" target="_blank">LinkedIn</a></li><li><a href="https://tempered.io/company/#press-room" target="_blank">Tempered</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" target="_blank">Jeff Hussey</a> is the President and CEO of <a href="https://tempered.io/" target="_blank">Tempered</a>. Jeff, the founder of <a href="https://www.f5.com/" target="_blank">F5 Networks</a>, is an accomplished entrepreneur with a proven track record in the networking and security markets. He maintains several board positions across a variety of technology, nonprofit and philanthropic organizations and currently is the chairman of the board for Carena and chairman and co-owner of <a href="https://www.ecofiltro.com/" target="_blank">Ecofiltro</a> and <a href="https://www.puravidacreategood.com/" target="_blank">PuraVidaCreateGood</a>.</p><p>Jeff also serves on the board for Webaroo and the Seattle Symphony. He was the chairman of the board for Lockdown Networks, which was sold to McAfee in 2008. Hussey received a BA in Finance from SPU and an MBA from the University of Washington.</p><p>In this episode, we discuss adjusting to a remote workforce with a start-up, founding F5 Networks, developing a userbase community, tips for information security product success, IoT and OT cybersecurity, the <a href="https://www.security7.net/news/what-is-host-identity-protocol-hip" target="_blank">Host Identity Protocol</a>, healthcare security, prioritizing efforts as a founder, what gets him out of the bed in the morning, and so much more!</p><p>Where you can find Jeff:</p><ul><li><a href="https://www.linkedin.com/in/jeff-hussey-a6628a7/" target="_blank">LinkedIn</a></li><li><a href="https://tempered.io/company/#press-room" target="_blank">Tempered</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/103-jeff-hussey-try-not-to-make-more-than-one-mistake-in-a-row]]></link><guid isPermaLink="false">38ac618f-b19f-430d-972b-674d7ac2be44</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 30 Nov 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/35160182-186e-4443-a4f3-f5e4ca7ffc81/103-jeff-hussey-cyber-security-interviews.mp3" length="68142515" type="audio/mpeg"/><itunes:duration>47:18</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#102 – John Ford: Keeping The Organization Informed</title><itunes:title>#102 – John Ford:</itunes:title><description><![CDATA[<p><a href="linkedin.com/in/john-ford-ciso" target="_blank">John Ford</a> is the Cybersecurity Strategist at <a href="https://www.ironnet.com/" target="_blank">IronNet</a> and is an information security veteran with over twenty years in a wide variety of roles. Prior to IronNet, John was CISO for ConnectWise, the global leader in providing software solutions for Managed Services Providers. In this role, he was accountable for customer-facing security activities, product security, and served as an advisor to the CEO and leadership team.</p><p>Before joining IronNet, John founded Sienna Group, a firm dedicated to providing data protection solutions to enterprise organizations, and has held executive roles in the healthcare industry.</p><p>In this episode, we discuss healthcare security, compliance versus security, HIPAA regulation and privacy, intellectual property protection, real-time information sharing, ransomware in hospitals, recommendations for new CISOs, and so much more!</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/john-ford-ciso/" target="_blank">LinkedIn</a></li><li><a href="https://www.ironnet.com/blog" target="_blank">IronNet Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="linkedin.com/in/john-ford-ciso" target="_blank">John Ford</a> is the Cybersecurity Strategist at <a href="https://www.ironnet.com/" target="_blank">IronNet</a> and is an information security veteran with over twenty years in a wide variety of roles. Prior to IronNet, John was CISO for ConnectWise, the global leader in providing software solutions for Managed Services Providers. In this role, he was accountable for customer-facing security activities, product security, and served as an advisor to the CEO and leadership team.</p><p>Before joining IronNet, John founded Sienna Group, a firm dedicated to providing data protection solutions to enterprise organizations, and has held executive roles in the healthcare industry.</p><p>In this episode, we discuss healthcare security, compliance versus security, HIPAA regulation and privacy, intellectual property protection, real-time information sharing, ransomware in hospitals, recommendations for new CISOs, and so much more!</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/john-ford-ciso/" target="_blank">LinkedIn</a></li><li><a href="https://www.ironnet.com/blog" target="_blank">IronNet Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/102-john-ford-keeping-the-organization-informed]]></link><guid isPermaLink="false">cb14e98d-ac6b-47d7-a9cb-11f43dc2397c</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 23 Nov 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2859d57d-09bd-4a5e-9764-423ce528f6ce/102-john-ford-cyber-security-interviews.mp3" length="56970082" type="audio/mpeg"/><itunes:duration>39:32</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#101 – Brandon Hoffman: Align Security To Business Outcomes</title><itunes:title>#101 - Brandon Hoffman: Align Security To Business Outcomes</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/bshoffman/" target="_blank">Brandon Hoffman</a> is the CISO &amp; Head of Security Strategy at <a href="https://netenrich.com/blog/" target="_blank">Netenrich</a>. Brandon is an admired security executive responsible for Netenrich’s technical sales and security strategy for both the company and its customers. Most recently, he oversaw solution architecture for <a href="https://public.intel471.com/" target="_blank">Intel 471</a>’s dark web threat intelligence business.</p><p>As former CTO at <a href="https://www.firemon.com/products/lumeta/" target="_blank">Lumeta Corporation</a> and <a href="https://www.redseal.net/" target="_blank">RedSeal Networks</a>, Brandon led technical and field development in network security, vulnerability, and risk. He’s also held key practitioner roles focused in security architecture, penetration testing, networking, and data center operations. Brandon holds an MS degree from Northwestern University and a BS degree from the University of Illinois at Chicago.</p><p>In this episode, we discuss adapting to COVID, accidentally getting into security, designing the intelligent SOC, a risk-based approach to information security, measuring cybersecurity outcomes, cyber insurance, risk management frameworks, and so much more!</p><p>Where you can find Brandon:</p><ul><li><a href="https://www.linkedin.com/in/bshoffman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brandonshoffman" target="_blank">Twitter</a></li><li><a href="https://netenrich.com/blog/" target="_blank">Netenrich Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/bshoffman/" target="_blank">Brandon Hoffman</a> is the CISO &amp; Head of Security Strategy at <a href="https://netenrich.com/blog/" target="_blank">Netenrich</a>. Brandon is an admired security executive responsible for Netenrich’s technical sales and security strategy for both the company and its customers. Most recently, he oversaw solution architecture for <a href="https://public.intel471.com/" target="_blank">Intel 471</a>’s dark web threat intelligence business.</p><p>As former CTO at <a href="https://www.firemon.com/products/lumeta/" target="_blank">Lumeta Corporation</a> and <a href="https://www.redseal.net/" target="_blank">RedSeal Networks</a>, Brandon led technical and field development in network security, vulnerability, and risk. He’s also held key practitioner roles focused in security architecture, penetration testing, networking, and data center operations. Brandon holds an MS degree from Northwestern University and a BS degree from the University of Illinois at Chicago.</p><p>In this episode, we discuss adapting to COVID, accidentally getting into security, designing the intelligent SOC, a risk-based approach to information security, measuring cybersecurity outcomes, cyber insurance, risk management frameworks, and so much more!</p><p>Where you can find Brandon:</p><ul><li><a href="https://www.linkedin.com/in/bshoffman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brandonshoffman" target="_blank">Twitter</a></li><li><a href="https://netenrich.com/blog/" target="_blank">Netenrich Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/101-brandon-hoffman-align-security-to-business-outcomes]]></link><guid isPermaLink="false">ba6754fa-4bed-47de-9bac-7f9234050c7a</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 16 Nov 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a17b0847-842d-453c-ab40-db648923ffce/101-brandon-hoffman-cyber-security-interviews.mp3" length="55962657" type="audio/mpeg"/><itunes:duration>38:50</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#100 – Douglas Brush: Cybersecurity Is Psychological</title><itunes:title>#100 - Douglas Brush: Cybersecurity Is Phycological</itunes:title><description><![CDATA[<p>This is a special episode where we celebrate the 100th episode of the Cyber Security Interviews podcast! In this episode, I have the mic turned back on me by a past guest, great friend, and an amazing asset to the community, <a href="https://cybersecurityinterviews.com/episodes/078-nadean-tanner-boil-it-down/" target="_blank">Nadean Tanner</a>. She crowdsourced some questions, but head plenty of her own as well as we did this Ask Me Anything special episode.</p><p>Douglas Brush is an information security executive with over 26 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, Douglas has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues. He also serves as a federally court-appointed Special Master and neutral expert in high profile litigation matters involving privacy, security, and eDiscovery.</p><p>Currently, he is at Splunk where he works with Fortune 500 organizations to improve their security operations and reduce business risk from cyber-attacks.</p><p>He is also the founder and host of <a href="https://cybersecurityinterviews.com/" target="_blank">Cyber Security Interviews</a>, a popular information security podcast.</p><p>In this episode, we discuss why I started the podcast, impostor syndrome, guests I would like to have on the show, my focus on mental health and diversity, important soft skills, talents versus skills, what's in my fridge, and so much more!</p>]]></description><content:encoded><![CDATA[<p>This is a special episode where we celebrate the 100th episode of the Cyber Security Interviews podcast! In this episode, I have the mic turned back on me by a past guest, great friend, and an amazing asset to the community, <a href="https://cybersecurityinterviews.com/episodes/078-nadean-tanner-boil-it-down/" target="_blank">Nadean Tanner</a>. She crowdsourced some questions, but head plenty of her own as well as we did this Ask Me Anything special episode.</p><p>Douglas Brush is an information security executive with over 26 years of entrepreneurship and professional technology experience. He is a globally recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to serving as a CISO and leading enterprise security assessments, Douglas has conducted hundreds of investigations involving hacking, data breaches, trade secret theft, employee malfeasance, and various other legal and compliance issues. He also serves as a federally court-appointed Special Master and neutral expert in high profile litigation matters involving privacy, security, and eDiscovery.</p><p>Currently, he is at Splunk where he works with Fortune 500 organizations to improve their security operations and reduce business risk from cyber-attacks.</p><p>He is also the founder and host of <a href="https://cybersecurityinterviews.com/" target="_blank">Cyber Security Interviews</a>, a popular information security podcast.</p><p>In this episode, we discuss why I started the podcast, impostor syndrome, guests I would like to have on the show, my focus on mental health and diversity, important soft skills, talents versus skills, what's in my fridge, and so much more!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/100-douglas-brush-cybersecurity-is-phycological]]></link><guid isPermaLink="false">da07a1dd-55b8-4043-b60c-1aa2626f7412</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 09 Nov 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/66094c98-0011-4569-a65c-c54a592d657f/100-douglas-brush-cyber-security-interviews.mp3" length="39134192" type="audio/mpeg"/><itunes:duration>42:13</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#099 – Fredrick Lee (Flee): Security Should Be Lovable</title><itunes:title>#099 - Fredrick Lee (Flee): Security Should Be Lovable</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/fredrickdlee/" target="_blank">Fredrick "Flee" Lee</a> is the Chief Security Officer at <a href="https://gusto.com/" target="_blank">Gusto</a>, where he leads information and physical security strategies including consumer protection, compliance, governance, and risk. </p><p>Before Gusto, Lee spent more than 15 years leading global information security and privacy efforts at large financial services companies and technology startups, most recently as Square's Head of Information Security. He previously held senior security and privacy roles at Bank of America, NetSuite, and Twilio. Lee was born and raised in Mississippi and holds a bachelor's degree in computer engineering from the University of Oklahoma.</p><p>In this episode, we discuss COVID response, three-dimensional communications, security as an enabler, integrating security and engineering teams, the information security skills shortage, diversity and inclusion in cybersecurity, his early mentors, and so much more.</p><p>Where you can find Flee:</p><ul><li><a href="https://www.linkedin.com/in/fredrickdlee/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/fredrickl" target="_blank">Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/fredrickdlee/" target="_blank">Fredrick "Flee" Lee</a> is the Chief Security Officer at <a href="https://gusto.com/" target="_blank">Gusto</a>, where he leads information and physical security strategies including consumer protection, compliance, governance, and risk. </p><p>Before Gusto, Lee spent more than 15 years leading global information security and privacy efforts at large financial services companies and technology startups, most recently as Square's Head of Information Security. He previously held senior security and privacy roles at Bank of America, NetSuite, and Twilio. Lee was born and raised in Mississippi and holds a bachelor's degree in computer engineering from the University of Oklahoma.</p><p>In this episode, we discuss COVID response, three-dimensional communications, security as an enabler, integrating security and engineering teams, the information security skills shortage, diversity and inclusion in cybersecurity, his early mentors, and so much more.</p><p>Where you can find Flee:</p><ul><li><a href="https://www.linkedin.com/in/fredrickdlee/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/fredrickl" target="_blank">Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/099-fredrick-lee-flee-security-should-be-lovable]]></link><guid isPermaLink="false">b57aa935-a96d-443d-9b7d-d0d9f7c60fcd</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 24 Aug 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d1e4584b-95be-4434-ad3d-202e649370f0/099-fredrick-lee-cyber-security-interviews.mp3" length="92718758" type="audio/mpeg"/><itunes:duration>01:04:22</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#098 – Andrea Roberson: Reach Out to Others</title><itunes:title>#098 - Andrea Roberson:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/andrearoberson/" target="_blank">Andrea Roberson</a> is a product manager at Centrify Corporation, where she directs the product roadmap for Centrify Privileged Access Service. She was previously a technical support engineer at the company for almost two years and has held several engineering and support roles during her career including at Google and Apple.</p><p>She has a Bachelor of Science degree in Computer Science from Spelman College, where she was a member of the <a href="https://nsbe.org/home.aspx" target="_blank">National Society of Black Engineers</a>, the <a href="https://www.acm.org/" target="_blank">Association for Computing Machinery</a>, and <a href="https://exhibits.stanford.edu/news-service/catalog/ky830df0026" target="_blank">SpelBots</a>.</p><p>In this episode, we discuss working with product teams remotely, moving from IT to information security, securing remote access, diversity and inclusion in cybersecurity, mentoring others, self-care and mental health, new threats due to COVID, and so much more.</p><p>Where you can find Andrea:</p><ul><li><a href="https://www.linkedin.com/in/andrearoberson/" target="_blank">LinkedIn</a></li><li><a href="https://www.centrify.com/blog/author/andrea-roberson/" target="_blank">Centrify Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/andrearoberson/" target="_blank">Andrea Roberson</a> is a product manager at Centrify Corporation, where she directs the product roadmap for Centrify Privileged Access Service. She was previously a technical support engineer at the company for almost two years and has held several engineering and support roles during her career including at Google and Apple.</p><p>She has a Bachelor of Science degree in Computer Science from Spelman College, where she was a member of the <a href="https://nsbe.org/home.aspx" target="_blank">National Society of Black Engineers</a>, the <a href="https://www.acm.org/" target="_blank">Association for Computing Machinery</a>, and <a href="https://exhibits.stanford.edu/news-service/catalog/ky830df0026" target="_blank">SpelBots</a>.</p><p>In this episode, we discuss working with product teams remotely, moving from IT to information security, securing remote access, diversity and inclusion in cybersecurity, mentoring others, self-care and mental health, new threats due to COVID, and so much more.</p><p>Where you can find Andrea:</p><ul><li><a href="https://www.linkedin.com/in/andrearoberson/" target="_blank">LinkedIn</a></li><li><a href="https://www.centrify.com/blog/author/andrea-roberson/" target="_blank">Centrify Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/098-andrea-roberson-reach-out-to-others]]></link><guid isPermaLink="false">9801cc6e-97b3-439d-8ffc-7e298c90790b</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Aug 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/29e9450f-38fe-4750-b703-e727da8e22f2/098-andrea-roberson-cyber-security-interviews.mp3" length="50902312" type="audio/mpeg"/><itunes:duration>35:19</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#097 – HD Moore: The New Normal</title><itunes:title>#097 - HD Moore:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/hdmoore/" target="_blank">HD Moore</a> is the founder and CEO of <a href="https://www.rumble.run/" target="_blank">Rumble Network Discovery</a>; a platform designed to make asset inventory quick and easy by combining active scanning with innovative research.</p><p>Prior to starting Rumble, HD was best known as the founder of the <a href="https://www.metasploit.com/" target="_blank">Metasploit Project</a>, the foremost open-source exploit development framework, and continues to be a prolific researcher and occasional speaker at security events.</p><p>In this episode, we discuss starting with BBSs back in the day, starting the Metasploit project, <a href="https://www.rapid7.com/research/project-sonar/" target="_blank">project Sonar</a>, his development of Rumble Networks, securing home networks, fingerprinting networks, jump boxes in IoT networks, and so much more.</p><p>Where you can find HD:</p><ul><li><a href="https://www.linkedin.com/in/hdmoore/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/hdmoore" target="_blank">Twitter</a></li><li><a href="https://hdm.io/" target="_blank">Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/hdmoore/" target="_blank">HD Moore</a> is the founder and CEO of <a href="https://www.rumble.run/" target="_blank">Rumble Network Discovery</a>; a platform designed to make asset inventory quick and easy by combining active scanning with innovative research.</p><p>Prior to starting Rumble, HD was best known as the founder of the <a href="https://www.metasploit.com/" target="_blank">Metasploit Project</a>, the foremost open-source exploit development framework, and continues to be a prolific researcher and occasional speaker at security events.</p><p>In this episode, we discuss starting with BBSs back in the day, starting the Metasploit project, <a href="https://www.rapid7.com/research/project-sonar/" target="_blank">project Sonar</a>, his development of Rumble Networks, securing home networks, fingerprinting networks, jump boxes in IoT networks, and so much more.</p><p>Where you can find HD:</p><ul><li><a href="https://www.linkedin.com/in/hdmoore/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/hdmoore" target="_blank">Twitter</a></li><li><a href="https://hdm.io/" target="_blank">Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/097-hd-moore-the-new-normal]]></link><guid isPermaLink="false">df6256a3-5485-46a9-818d-b5324f464fb9</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 03 Aug 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/05573a61-cd4e-4eda-a227-0a3fa96e9b43/097-hd-moore-cyber-security-interviews.mp3" length="51472942" type="audio/mpeg"/><itunes:duration>35:43</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#096 – Gabe Gumbs: Data Is An Asset</title><itunes:title>#096 - Gabe Gumbs: Data Is An Asset</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/gabriel-gumbs-68323939/" target="_blank">Gabe Gumbs</a> has a deep-rooted passion for technology, information security, and problem-solving. As Chief Innovation Officer of <a href="https://www.spirion.com/" target="_blank">Spirion</a>—a leader in rapid identification and protection of sensitive data—he’s channeling that passion to make the digital world a safer place. Wielding a unique mix of technical vision, marketing, and business acumen, Gabe is shaping the future of data security and protecting the sensitive personal data of customers, colleagues, and communities around the world.</p><p>Despite having held a range of leadership positions in security technology— including VP of Product Strategy at STEALTHbits and Director of Research &amp; Products at WhiteHat Security—Gabe considers his most valuable experience to be the time he spent on the ground as a security practitioner. Thanks to his intimate understanding of the real issues security professionals face on the front lines, he’s able to identify the core of the problem and create innovative solutions that push data security technology forward.</p><p>In this episode, we discuss his early starts with the <a href="https://www.2600.com/meetings" target="_blank">2600 meet-ups</a>, privacy versus security, speaking to executives in their language, cloud security, information security skills shortages, training legal teams for cyber, how to get started in cybersecurity, and so much more.</p><p>Where you can find Gabe:</p><ul><li><a href="https://www.linkedin.com/in/gabriel-gumbs-68323939/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/gabrielgumbs" target="_blank">Twitter</a></li><li><a href="https://www.spirion.com/blog/" target="_blank">Spirion Blog &amp; Podcast</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/gabriel-gumbs-68323939/" target="_blank">Gabe Gumbs</a> has a deep-rooted passion for technology, information security, and problem-solving. As Chief Innovation Officer of <a href="https://www.spirion.com/" target="_blank">Spirion</a>—a leader in rapid identification and protection of sensitive data—he’s channeling that passion to make the digital world a safer place. Wielding a unique mix of technical vision, marketing, and business acumen, Gabe is shaping the future of data security and protecting the sensitive personal data of customers, colleagues, and communities around the world.</p><p>Despite having held a range of leadership positions in security technology— including VP of Product Strategy at STEALTHbits and Director of Research &amp; Products at WhiteHat Security—Gabe considers his most valuable experience to be the time he spent on the ground as a security practitioner. Thanks to his intimate understanding of the real issues security professionals face on the front lines, he’s able to identify the core of the problem and create innovative solutions that push data security technology forward.</p><p>In this episode, we discuss his early starts with the <a href="https://www.2600.com/meetings" target="_blank">2600 meet-ups</a>, privacy versus security, speaking to executives in their language, cloud security, information security skills shortages, training legal teams for cyber, how to get started in cybersecurity, and so much more.</p><p>Where you can find Gabe:</p><ul><li><a href="https://www.linkedin.com/in/gabriel-gumbs-68323939/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/gabrielgumbs" target="_blank">Twitter</a></li><li><a href="https://www.spirion.com/blog/" target="_blank">Spirion Blog &amp; Podcast</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/096-gabe-gumbs-data-is-an-asset]]></link><guid isPermaLink="false">5ea6c871-97bd-41fc-8b40-0a8e8e8e1abd</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Jul 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e82836f4-ea70-49b0-b1f1-7399caf79f5d/096-gabe-gumbs-cyber-security-interviews.mp3" length="55050500" type="audio/mpeg"/><itunes:duration>38:12</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#095 – Shahrokh Shahidzadeh: Education Is a Big Part of IT</title><itunes:title>#095 - Shahrokh Shahidzadeh: Education Is a Big Part of IT</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/shahrokh-shahidzadeh-1187062/" target="_blank">Shahrokh Shahidzadeh</a> is the CEO of <a href="https://www.acceptto.com/try-acceptto-request/" target="_blank">Acceptto</a>. Shahrokh is a seasoned technologist and leader with 29 years of contribution to modern computer architecture, device identity, platform trust elevation, large IoT initiatives, and ambient intelligence research with more than 25 issued and pending patents.</p><p>Before Acceptto, Shahrokh was a senior principal technologist contributing to Intel Corporation for 25 years in a variety of leadership positions where he architected and led multiple billion-dollar product initiatives.</p><p>In this episode, we discuss evolving authentication, SSO and MFA challenges, anomalous behavior detection, enforcing least privilege, his time with Intel, AI and ML, multi-cloud security, securing home users, and so much more.</p><p>Where you can find Shahrokh:</p><ul><li><a href="https://www.linkedin.com/in/shahrokh-shahidzadeh-1187062/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/accepttocorp" target="_blank">Twitter</a></li><li><a href="https://blog.acceptto.com/" target="_blank">Acceptto</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/shahrokh-shahidzadeh-1187062/" target="_blank">Shahrokh Shahidzadeh</a> is the CEO of <a href="https://www.acceptto.com/try-acceptto-request/" target="_blank">Acceptto</a>. Shahrokh is a seasoned technologist and leader with 29 years of contribution to modern computer architecture, device identity, platform trust elevation, large IoT initiatives, and ambient intelligence research with more than 25 issued and pending patents.</p><p>Before Acceptto, Shahrokh was a senior principal technologist contributing to Intel Corporation for 25 years in a variety of leadership positions where he architected and led multiple billion-dollar product initiatives.</p><p>In this episode, we discuss evolving authentication, SSO and MFA challenges, anomalous behavior detection, enforcing least privilege, his time with Intel, AI and ML, multi-cloud security, securing home users, and so much more.</p><p>Where you can find Shahrokh:</p><ul><li><a href="https://www.linkedin.com/in/shahrokh-shahidzadeh-1187062/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/accepttocorp" target="_blank">Twitter</a></li><li><a href="https://blog.acceptto.com/" target="_blank">Acceptto</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/095-shahrokh-shahidzadeh-education-is-a-big-part-of-it]]></link><guid isPermaLink="false">0bb7c0f2-c54a-45e1-a73c-f54b38d4db6d</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 13 Jul 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bb463bd4-e803-4fdc-8288-4db378bc98a2/095-shahrokh-shahidzadeh-cyber-security-interviews.mp3" length="54955971" type="audio/mpeg"/><itunes:duration>38:08</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#094 – Deborah Golden: How Can I Support You Today</title><itunes:title>#094 - Deborah Golden: How Can I Support You Today</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/deborah-golden-7872561a8/" target="_blank">Deborah Golden</a> is the US Cyber &amp; Strategic Risk leader for <a href="https://www2.deloitte.com/us/en/profiles/debgolden.html" target="_blank">Deloitte Risk &amp; Financial Advisory</a>. In the prior six years, Deborah served as the Government &amp; Public Services (GPS) Cyber Risk Services leader, as well as the GPS Advisory Market Offering leader, GPS Empowered Well-Being leader and the lead principal for a major federal government health care provider.</p><p>Deb has more than 25 years of information technology experience spanning numerous industries, with an in-depth focus on government and public services, life sciences and health care, and financial services.</p><p>Deb received a bachelor’s degree in Finance at Virginia Tech and a master’s degree in Information Technology at George Washington University. She serves on Virginia Tech’s Business Information Technology and Masters in Information Technology Advisory Boards is a self-proclaimed fitness junky and avid traveler and trains service dogs with the <a href="https://www.guidedog.org/" target="_blank">Guide Dog Foundation</a> in her spare time.</p><p>In this episode, we discuss mental health awareness, her 1-3-5-15 routine, working with clients remotely, COVID-19 cybersecurity spend, securing home networks, diversity in the cyber workplace, The Guide Dog Foundation, and so much more.</p><p>Where you can find Deb:</p><ul><li><a href="https://www.linkedin.com/in/deborah-golden-7872561a8/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/go1denhokie" target="_blank">Twitter</a></li><li><a href="https://www2.deloitte.com/us/en/profiles/debgolden.html" target="_blank">Deloitte Bio</a></li><li><a href="https://www.guidedog.org/" target="_blank">Guide Dog Foundation</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/deborah-golden-7872561a8/" target="_blank">Deborah Golden</a> is the US Cyber &amp; Strategic Risk leader for <a href="https://www2.deloitte.com/us/en/profiles/debgolden.html" target="_blank">Deloitte Risk &amp; Financial Advisory</a>. In the prior six years, Deborah served as the Government &amp; Public Services (GPS) Cyber Risk Services leader, as well as the GPS Advisory Market Offering leader, GPS Empowered Well-Being leader and the lead principal for a major federal government health care provider.</p><p>Deb has more than 25 years of information technology experience spanning numerous industries, with an in-depth focus on government and public services, life sciences and health care, and financial services.</p><p>Deb received a bachelor’s degree in Finance at Virginia Tech and a master’s degree in Information Technology at George Washington University. She serves on Virginia Tech’s Business Information Technology and Masters in Information Technology Advisory Boards is a self-proclaimed fitness junky and avid traveler and trains service dogs with the <a href="https://www.guidedog.org/" target="_blank">Guide Dog Foundation</a> in her spare time.</p><p>In this episode, we discuss mental health awareness, her 1-3-5-15 routine, working with clients remotely, COVID-19 cybersecurity spend, securing home networks, diversity in the cyber workplace, The Guide Dog Foundation, and so much more.</p><p>Where you can find Deb:</p><ul><li><a href="https://www.linkedin.com/in/deborah-golden-7872561a8/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/go1denhokie" target="_blank">Twitter</a></li><li><a href="https://www2.deloitte.com/us/en/profiles/debgolden.html" target="_blank">Deloitte Bio</a></li><li><a href="https://www.guidedog.org/" target="_blank">Guide Dog Foundation</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/094-deborah-golden-how-can-i-support-you-today]]></link><guid isPermaLink="false">e05aba6e-b1eb-41d7-8f84-84529af60271</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Jul 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/58792f61-78f8-455f-a6a2-6ed759865f88/094-deb-golden-cyber-security-interviews.mp3" length="66578637" type="audio/mpeg"/><itunes:duration>46:12</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#093 – Kyle Hanslovan &amp; Chris Bisnett: Crimeware Is a Business</title><itunes:title>#093 - Kyle Hanslovan &amp; Chris Bisnett:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/kylehanslovan/" target="_blank">Kyle Hanslovan</a> comes to <a href="https://huntresslabs.com/index.html" target="_blank">Huntress Labs</a> from the U.S. Intelligence Community, where he supported defensive and offensive cyber operations for the past decade. He previously co-founded the defense consulting firm StrategicIO and actively participates in the ethical hacking community as a Black Hat conference trainer, STEM mentor, and Def Con CTF champion. Additionally, he serves in the Maryland Air National Guard as a Cyber Warfare Operator.</p><p><a href="https://www.linkedin.com/in/chris-bisnett-1792041b/" target="_blank">Chris Bisnett</a> is a veteran information security researcher with more than a decade of experience in offensive and defensive cyber operations. While serving with the NSA RedTeam, he attacked government networks and systems to identify and remedy vulnerabilities. Chris is also a recognized Black Hat conference trainer and has taught his “<a href="https://www.blackhat.com/us-18/training/fuzzing-for-vulnerabilities.html" target="_blank">Fuzzing For Vulnerabilities</a>” course at several events around the world. Before founding Huntress Labs, Chris co-founded LegalConfirm, LLC, where he led product design and development until the company was acquired in 2014.</p><p>In this episode, we discuss incident response planning, their early starts in offensive theaters, red teaming, Ransomware-as-a-Service, small business and enterprise threats, breaking bad news to clients, holding leadership accountable, hacking back, tips and resources for start-ups, warnings for founders, and so much more.</p><p>(Note: If you are interested in start-ups and being a founder, <a href="https://cybersecurityinterviews.com/episodes/091-daniel-ayala-does-this-help-us/" target="_blank">Daniel Ayala</a> and I created a regularly updated blog for founders and start-ups: <a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank"><strong><em>Hang Out A Shingle – Starting Your Cybersecurity Company</em></strong></a>.</p><p>Where you can find Kyle and Chris:</p><ul><li><a href="https://www.linkedin.com/in/kylehanslovan/" target="_blank">LinkedIn - Kyle</a></li><li><a href="https://www.linkedin.com/in/chris-bisnett-1792041b/" target="_blank">LinkedIn - Chris</a></li><li><a href="https://twitter.com/KyleHanslovan" target="_blank">Twitter - Kyle</a></li><li><a href="https://twitter.com/ChrisBisnett" target="_blank">Twitter - Chris</a></li><li><a href="https://blog.huntresslabs.com/" target="_blank">Huntress Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/kylehanslovan/" target="_blank">Kyle Hanslovan</a> comes to <a href="https://huntresslabs.com/index.html" target="_blank">Huntress Labs</a> from the U.S. Intelligence Community, where he supported defensive and offensive cyber operations for the past decade. He previously co-founded the defense consulting firm StrategicIO and actively participates in the ethical hacking community as a Black Hat conference trainer, STEM mentor, and Def Con CTF champion. Additionally, he serves in the Maryland Air National Guard as a Cyber Warfare Operator.</p><p><a href="https://www.linkedin.com/in/chris-bisnett-1792041b/" target="_blank">Chris Bisnett</a> is a veteran information security researcher with more than a decade of experience in offensive and defensive cyber operations. While serving with the NSA RedTeam, he attacked government networks and systems to identify and remedy vulnerabilities. Chris is also a recognized Black Hat conference trainer and has taught his “<a href="https://www.blackhat.com/us-18/training/fuzzing-for-vulnerabilities.html" target="_blank">Fuzzing For Vulnerabilities</a>” course at several events around the world. Before founding Huntress Labs, Chris co-founded LegalConfirm, LLC, where he led product design and development until the company was acquired in 2014.</p><p>In this episode, we discuss incident response planning, their early starts in offensive theaters, red teaming, Ransomware-as-a-Service, small business and enterprise threats, breaking bad news to clients, holding leadership accountable, hacking back, tips and resources for start-ups, warnings for founders, and so much more.</p><p>(Note: If you are interested in start-ups and being a founder, <a href="https://cybersecurityinterviews.com/episodes/091-daniel-ayala-does-this-help-us/" target="_blank">Daniel Ayala</a> and I created a regularly updated blog for founders and start-ups: <a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank"><strong><em>Hang Out A Shingle – Starting Your Cybersecurity Company</em></strong></a>.</p><p>Where you can find Kyle and Chris:</p><ul><li><a href="https://www.linkedin.com/in/kylehanslovan/" target="_blank">LinkedIn - Kyle</a></li><li><a href="https://www.linkedin.com/in/chris-bisnett-1792041b/" target="_blank">LinkedIn - Chris</a></li><li><a href="https://twitter.com/KyleHanslovan" target="_blank">Twitter - Kyle</a></li><li><a href="https://twitter.com/ChrisBisnett" target="_blank">Twitter - Chris</a></li><li><a href="https://blog.huntresslabs.com/" target="_blank">Huntress Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/093-kyle-hanslovan-chris-bisnett-crimeware-is-a-business]]></link><guid isPermaLink="false">35c4afef-6363-4bde-9487-5924a4b81bad</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 29 Jun 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b900bf6-0cc9-401a-ae55-34b024f814c0/093-hanslovan-bisnett-cyber-security-interviews.mp3" length="75651990" type="audio/mpeg"/><itunes:duration>52:30</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#092 – Jack Kudale: You Gotta Have More Cowbell</title><itunes:title>#092 - Jack Kudale:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jackkudale/" target="_blank">Jack Kudale</a> is Founder and CEO at <a href="https://cowbell.insure/blog/" target="_blank">Cowbell Cyber</a> with over two decades of business executive experience. Previous senior roles include COO at Cavirin, CEO at Lacework, both cloud security startups; SnapLogic, a leader in hybrid cloud integration; and CA Technologies, where Jack led DevOps sales for the Fortune 500 leader.</p><p>With deep operational experience in the DevOps, Cybersecurity, IT Ops, &amp; Big Data&nbsp;spaces, Jack leads&nbsp;Cowbell to execute on its vision of bridging the cyber insurability gap. Jack also serves as a governing board member of <a href="https://www.brighterchildren.org/" target="_blank">Brighter Children</a>, a non-profit organization.</p><p>In this episode, we discuss the importance of cyber insurance, risk management, the difference between cyber insurance vs other insurance products, the risks COVID-19 pose to small businesses, right-sizing cyber insurance policies, industries that are targets for attackers, and so much more.</p><p>Where you can find Jack:</p><ul><li><a href="https://www.linkedin.com/in/jackkudale/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cowbellcyber" target="_blank">Twitter</a></li><li><a href="https://cowbell.insure/blog/" target="_blank">Cowbell Cyber Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jackkudale/" target="_blank">Jack Kudale</a> is Founder and CEO at <a href="https://cowbell.insure/blog/" target="_blank">Cowbell Cyber</a> with over two decades of business executive experience. Previous senior roles include COO at Cavirin, CEO at Lacework, both cloud security startups; SnapLogic, a leader in hybrid cloud integration; and CA Technologies, where Jack led DevOps sales for the Fortune 500 leader.</p><p>With deep operational experience in the DevOps, Cybersecurity, IT Ops, &amp; Big Data&nbsp;spaces, Jack leads&nbsp;Cowbell to execute on its vision of bridging the cyber insurability gap. Jack also serves as a governing board member of <a href="https://www.brighterchildren.org/" target="_blank">Brighter Children</a>, a non-profit organization.</p><p>In this episode, we discuss the importance of cyber insurance, risk management, the difference between cyber insurance vs other insurance products, the risks COVID-19 pose to small businesses, right-sizing cyber insurance policies, industries that are targets for attackers, and so much more.</p><p>Where you can find Jack:</p><ul><li><a href="https://www.linkedin.com/in/jackkudale/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cowbellcyber" target="_blank">Twitter</a></li><li><a href="https://cowbell.insure/blog/" target="_blank">Cowbell Cyber Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/092-jack-kudale-you-gotta-have-more-cowbell]]></link><guid isPermaLink="false">3268746e-45ec-45ea-b776-3589721821ff</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 22 Jun 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4b666f7b-d236-4593-887c-80bfc780e2de/092-jack-kudale-cyber-security-interviews.mp3" length="73937425" type="audio/mpeg"/><itunes:duration>51:19</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#091 – Daniel Ayala: Does This Help Us</title><itunes:title>#091 - Daniel Ayala: Does This Help Us</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> is the Founder, and Managing Partner for <a href="https://secratic.com/" target="_blank">Secratic</a>, a strategic information security, and privacy consultancy focused on helping companies protect data and information, and be prepared before incidents happen.&nbsp;Daniel is also currently serving as the Interim Chief Information Security Officer for Michigan State University.</p><p>Throughout his 24 year career, he has led security organizations large and small in banking and financial services, pharmaceutical, information, library, and technology companies around the world, taught university-level courses, and both writes and regularly speaks on the topics of security, privacy, data ethics, and compliance.</p><p>In this episode, we discuss remote working, being a virtual CISO, compliance vs. security vs. privacy, application development security, creating a culture of security, communication skills, giving back to the community, mentoring others, mental health, and so much more!</p><p>Where you can find Daniel:</p><ul><li><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/buddhake" target="_blank">Twitter</a></li><li><a href="https://mentorcore.biz/" target="_blank">MentorCore</a></li><li><a href="https://secratic.com/" target="_blank">Secratic</a></li><li><a href="https://danielayala.com/" target="_blank">Blog</a></li><li><a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank">Hang Out A Shingle: Starting Your Own Cybersecurity Company</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">Daniel Ayala</a> is the Founder, and Managing Partner for <a href="https://secratic.com/" target="_blank">Secratic</a>, a strategic information security, and privacy consultancy focused on helping companies protect data and information, and be prepared before incidents happen.&nbsp;Daniel is also currently serving as the Interim Chief Information Security Officer for Michigan State University.</p><p>Throughout his 24 year career, he has led security organizations large and small in banking and financial services, pharmaceutical, information, library, and technology companies around the world, taught university-level courses, and both writes and regularly speaks on the topics of security, privacy, data ethics, and compliance.</p><p>In this episode, we discuss remote working, being a virtual CISO, compliance vs. security vs. privacy, application development security, creating a culture of security, communication skills, giving back to the community, mentoring others, mental health, and so much more!</p><p>Where you can find Daniel:</p><ul><li><a href="https://www.linkedin.com/in/danielaayala/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/buddhake" target="_blank">Twitter</a></li><li><a href="https://mentorcore.biz/" target="_blank">MentorCore</a></li><li><a href="https://secratic.com/" target="_blank">Secratic</a></li><li><a href="https://danielayala.com/" target="_blank">Blog</a></li><li><a href="https://smartlyremote.net/2020/05/17/show-notes-hang-out-a-shingle/" target="_blank">Hang Out A Shingle: Starting Your Own Cybersecurity Company</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/091-daniel-ayala-does-this-help-us]]></link><guid isPermaLink="false">0ef92753-8c87-47a0-8b1e-56d80f0b6f48</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 15 Jun 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9082cd3d-bfba-4ae2-ad47-b378c1cdb14c/091-daniel-ayala-cyber-security-interviews.mp3" length="83020770" type="audio/mpeg"/><itunes:duration>57:38</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#090 – Anthony Bettini: Building What No One Else Has</title><itunes:title>#090 - Anthony Bettini:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/anthonybettini/" target="_blank">Anthony Bettini</a> is the CTO for <a href="https://www.whitehatsec.com/author/anthony/" target="_blank">WhiteHat Security</a>, the leader in Application Security, enabling businesses to protect critical data, ensure compliance, and manage risk. Previously, Anthony ran Tenable Research where Anthony joined via Tenable’s acquisition of FlawCheck – a leading Container Security startup where Anthony was the CEO &amp; Founder.</p><p>Before its acquisition by Symantec, Anthony was CEO &amp; Founder of Appthority, a leading Mobile Security startup, and winner of the “Most Innovative Company of the Year” award at the RSA Conference.</p><p>In this episode, we discuss managing a remote team, web application security, DevSec, responsible vulnerability disclosure, Artificial Intelligence (AI), how to focus your career, being a founder, and so much more!</p><p>Where you can find Anthony:</p><ul><li><a href="https://www.linkedin.com/in/anthonybettini/" target="_blank">LinkedIn</a></li><li><a href="https://www.whitehatsec.com/author/anthony/" target="_blank">WhiteHat Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/anthonybettini/" target="_blank">Anthony Bettini</a> is the CTO for <a href="https://www.whitehatsec.com/author/anthony/" target="_blank">WhiteHat Security</a>, the leader in Application Security, enabling businesses to protect critical data, ensure compliance, and manage risk. Previously, Anthony ran Tenable Research where Anthony joined via Tenable’s acquisition of FlawCheck – a leading Container Security startup where Anthony was the CEO &amp; Founder.</p><p>Before its acquisition by Symantec, Anthony was CEO &amp; Founder of Appthority, a leading Mobile Security startup, and winner of the “Most Innovative Company of the Year” award at the RSA Conference.</p><p>In this episode, we discuss managing a remote team, web application security, DevSec, responsible vulnerability disclosure, Artificial Intelligence (AI), how to focus your career, being a founder, and so much more!</p><p>Where you can find Anthony:</p><ul><li><a href="https://www.linkedin.com/in/anthonybettini/" target="_blank">LinkedIn</a></li><li><a href="https://www.whitehatsec.com/author/anthony/" target="_blank">WhiteHat Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/090-anthony-bettini-building-what-no-one-else-has]]></link><guid isPermaLink="false">7b6c06ed-83f4-46fe-85b6-946c13b4b1e6</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 08 Jun 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/30827e32-9b07-42d9-945e-acc7de20c0fa/090-anthony-bettini-cyber-security-interviewsp.mp3" length="56024070" type="audio/mpeg"/><itunes:duration>38:53</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#089 – Ed Bellis: Complexity is the Enemy</title><itunes:title>#089 – Ed Bellis: Complexity is the Enemy</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/bellis/" target="_blank">Ed Bellis</a> is a security industry veteran and expert and was once named “Information Security Executive of the Year”. He currently serves as the Chief Technology Officer and Co-founder of <a href="https://www.kennasecurity.com/" target="_blank">Kenna Security</a>. He founded Kenna Security to deliver a data-driven risk-based approach to remediation and help IT teams prioritize and thwart would-be security threats.</p><p>Ed is the former CISO of Orbitz and former Vice President, Corporate Information Security at Bank of America. He is an advisor to Dascena and former advisor to SecurityScoreboard.com, Dharma, and Society of Payment Security Professionals. Ed is a contributing author to the book, <a href="https://www.amazon.com/Beautiful-Security-Leading-Experts-Explain/dp/0596527489" target="_blank">Beautiful Security</a>. He is also a frequent speaker at industry conferences such as RSA, BlackHat, and many others.</p><p>In this episode, we discuss vulnerability management maturity, how to focus on remediation, inventory management, securing cloud services, IoT devices in the enterprise, entrepreneurship, hiring the right people, and so much more.</p><p>Where you can find Ed:</p><ul><li><a href="https://www.linkedin.com/in/bellis/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ebellis" target="_blank">Twitter</a></li><li><a href="https://www.kennasecurity.com/blog/" target="_blank">Kenna Security Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/bellis/" target="_blank">Ed Bellis</a> is a security industry veteran and expert and was once named “Information Security Executive of the Year”. He currently serves as the Chief Technology Officer and Co-founder of <a href="https://www.kennasecurity.com/" target="_blank">Kenna Security</a>. He founded Kenna Security to deliver a data-driven risk-based approach to remediation and help IT teams prioritize and thwart would-be security threats.</p><p>Ed is the former CISO of Orbitz and former Vice President, Corporate Information Security at Bank of America. He is an advisor to Dascena and former advisor to SecurityScoreboard.com, Dharma, and Society of Payment Security Professionals. Ed is a contributing author to the book, <a href="https://www.amazon.com/Beautiful-Security-Leading-Experts-Explain/dp/0596527489" target="_blank">Beautiful Security</a>. He is also a frequent speaker at industry conferences such as RSA, BlackHat, and many others.</p><p>In this episode, we discuss vulnerability management maturity, how to focus on remediation, inventory management, securing cloud services, IoT devices in the enterprise, entrepreneurship, hiring the right people, and so much more.</p><p>Where you can find Ed:</p><ul><li><a href="https://www.linkedin.com/in/bellis/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ebellis" target="_blank">Twitter</a></li><li><a href="https://www.kennasecurity.com/blog/" target="_blank">Kenna Security Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/089-ed-bellis-complexity-is-the-enemy]]></link><guid isPermaLink="false">60c43ce1-c86a-436a-aa54-afc9f430a41c</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 01 Jun 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/92ded5d1-7599-480c-9b87-02188579e3f4/089-ed-bellis-cyber-security-interviews.mp3" length="59948733" type="audio/mpeg"/><itunes:duration>41:36</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#088 – Mikko Hyppönen: You Might Have an Enemy In the Future</title><itunes:title>#088 - Mikko Hyppönen: You Might Have an Enemy In the Future</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/hypponen/" target="_blank">Mikko Hypponen</a> is a global security expert and has worked at F-Secure since 1991. Currently, he serves as <a href="https://blog.f-secure.com/" target="_blank">F-Secure's</a> Chief Research Officer.</p><p>Mikko has written on his research for the <a href="https://mikko.hypponen.com/articles.html" target="_blank">New York Times, Wired, and Scientific American</a>, and he frequently appears on international TV. He has lectured at the universities of Stanford, Oxford, and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list.</p><p>Mikko sits on the advisory boards of t2 and Social Safeguard and in the advisory panel for the Monetary Authority of Singapore.</p><p>In this episode, we discuss his early starts in information security, the rebirth of TELNET, security by design, the difference between privacy and security, mobile device security, IoT security, election security, and so much more.</p><p>Where you find Mikko:</p><ul><li><a href="https://www.linkedin.com/in/hypponen/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/mikko" target="_blank">Twitter</a></li><li><a href="https://blog.f-secure.com/" target="_blank">F-Secure Blog</a></li><li><a href="https://www.hbo.com/documentaries/kill-chain-the-cyber-war-on-americas-elections" target="_blank">HBO - Kill Chain: <em>The Cyber War on America’s Elections</em></a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/hypponen/" target="_blank">Mikko Hypponen</a> is a global security expert and has worked at F-Secure since 1991. Currently, he serves as <a href="https://blog.f-secure.com/" target="_blank">F-Secure's</a> Chief Research Officer.</p><p>Mikko has written on his research for the <a href="https://mikko.hypponen.com/articles.html" target="_blank">New York Times, Wired, and Scientific American</a>, and he frequently appears on international TV. He has lectured at the universities of Stanford, Oxford, and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list.</p><p>Mikko sits on the advisory boards of t2 and Social Safeguard and in the advisory panel for the Monetary Authority of Singapore.</p><p>In this episode, we discuss his early starts in information security, the rebirth of TELNET, security by design, the difference between privacy and security, mobile device security, IoT security, election security, and so much more.</p><p>Where you find Mikko:</p><ul><li><a href="https://www.linkedin.com/in/hypponen/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/mikko" target="_blank">Twitter</a></li><li><a href="https://blog.f-secure.com/" target="_blank">F-Secure Blog</a></li><li><a href="https://www.hbo.com/documentaries/kill-chain-the-cyber-war-on-americas-elections" target="_blank">HBO - Kill Chain: <em>The Cyber War on America’s Elections</em></a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/088-mikko-hypponen-you-might-have-an-enemy-in-the-future]]></link><guid isPermaLink="false">a404973a-e916-4058-89b8-bcdc723eefdf</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 May 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f11977e4-adb0-4547-b897-b1e7c278f3fc/088-mikko-hypponen-cyber-security-interviews.mp3" length="72546517" type="audio/mpeg"/><itunes:duration>50:21</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#087 – Steve Moore: It’s a Balancing Act</title><itunes:title>#087 - Stephen Moore: It&apos;s a Balancing Act</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/stephenrmoore/" target="_blank">Stephen&nbsp;Moore</a> is a Vice President and the Chief Security Strategist at <a href="https://www.exabeam.com/" target="_blank">Exabeam</a> and is also the host of <a href="https://www.exabeam.com/podcast/" target="_blank">The New CISO podcast</a>. Stephen has more than 15 years of experience in information&nbsp;security, intrusion analysis, threat intelligence, security architecture, and web infrastructure design. Before joining Exabeam, Stephen spent more than seven years at Anthem in a variety of cybersecurity practitioner and leadership roles. He played a leading role in the response and remediation of the data breach announced in 2015.</p><p>Stephen has deep experience working with legal,&nbsp;privacy, and audit staff to improve cybersecurity and demonstrate greater organizational relevance. He has been a Member of the Advisory Board at SecureAuth Corporation since July 2017.</p><p>In this episode, we discuss adopting SOCs for remote operations, shifting focus to credentials, SOAR, attacker attribution, threat intelligence, post-Covid-19 IT changes, and so much more.</p><p>Where you can find Stephen:</p><ul><li><a href="https://www.linkedin.com/in/stephenrmoore/" target="_blank">LinkedIn</a></li><li><a href="https://www.exabeam.com/podcast/" target="_blank">The New CISO Podcast</a></li><li><a href="https://www.exabeam.com/information-security-blog/" target="_blank">Exabeam Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/stephenrmoore/" target="_blank">Stephen&nbsp;Moore</a> is a Vice President and the Chief Security Strategist at <a href="https://www.exabeam.com/" target="_blank">Exabeam</a> and is also the host of <a href="https://www.exabeam.com/podcast/" target="_blank">The New CISO podcast</a>. Stephen has more than 15 years of experience in information&nbsp;security, intrusion analysis, threat intelligence, security architecture, and web infrastructure design. Before joining Exabeam, Stephen spent more than seven years at Anthem in a variety of cybersecurity practitioner and leadership roles. He played a leading role in the response and remediation of the data breach announced in 2015.</p><p>Stephen has deep experience working with legal,&nbsp;privacy, and audit staff to improve cybersecurity and demonstrate greater organizational relevance. He has been a Member of the Advisory Board at SecureAuth Corporation since July 2017.</p><p>In this episode, we discuss adopting SOCs for remote operations, shifting focus to credentials, SOAR, attacker attribution, threat intelligence, post-Covid-19 IT changes, and so much more.</p><p>Where you can find Stephen:</p><ul><li><a href="https://www.linkedin.com/in/stephenrmoore/" target="_blank">LinkedIn</a></li><li><a href="https://www.exabeam.com/podcast/" target="_blank">The New CISO Podcast</a></li><li><a href="https://www.exabeam.com/information-security-blog/" target="_blank">Exabeam Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/087-steve-moore-its-a-balancing-act]]></link><guid isPermaLink="false">8b885a76-e462-4b4a-afd9-88e6a22df9c7</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 18 May 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8c8fd62e-41b3-4c4f-b7fe-d6c750eb038a/087-steve-moore-cyber-security-interviews.mp3" length="73956259" type="audio/mpeg"/><itunes:duration>51:20</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#086 – Dave Kennedy: The Basics Are Still Challenging</title><itunes:title>#086 - Dave Kennedy: The Basics Are Still Challenging</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/davidkennedy4/" target="_blank">David Kennedy</a> is the founder of <a href="https://www.binarydefense.com/" target="_blank">Binary Defense</a> and <a href="https://www.trustedsec.com/" target="_blank">TrustedSec</a>.&nbsp;Both organizations focus on the betterment of the security industry.&nbsp;David also served as a board of director for the ISC2 organization. David was the former CSO for a Diebold Incorporated, where he ran the entire INFOSEC program.&nbsp;David is a co-author of the book "Metasploit:&nbsp;The Penetration Testers Guide," the creator of the <a href="https://github.com/trustedsec/social-engineer-toolkit" target="_blank">Social-Engineer Toolkit </a>(SET), Artillery, Unicorn, PenTesters Framework, and several popular open-source tools.&nbsp;</p><p>David was the co-founder of <a href="https://en.wikipedia.org/wiki/DerbyCon" target="_blank">DerbyCon</a>; a large-scale conference started in Louisville, Kentucky.&nbsp;Before the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence-related missions.</p><p>David is frequently interviewed by news organizations, including CNN, Fox News, MSNBC, CNBC, and BBC World News.&nbsp;He has testified in front of Congress on two occasions on the security around government websites.</p><p>In this episode, we discuss the shift to virtual conferences, Zoom vulnerabilities, responsible vulnerability disclosure, the importance of communication skills, giving back to the community, mental health, working from home, and so much more.</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/davidkennedy4/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/HackingDave" target="_blank">Twitter</a></li><li><a href="https://www.trustedsec.com/blog/" target="_blank">TrustedSec Blog</a></li><li><a href="https://t.co/6yHoSwGKVH" target="_blank">TrustedSec Public Slack</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/davidkennedy4/" target="_blank">David Kennedy</a> is the founder of <a href="https://www.binarydefense.com/" target="_blank">Binary Defense</a> and <a href="https://www.trustedsec.com/" target="_blank">TrustedSec</a>.&nbsp;Both organizations focus on the betterment of the security industry.&nbsp;David also served as a board of director for the ISC2 organization. David was the former CSO for a Diebold Incorporated, where he ran the entire INFOSEC program.&nbsp;David is a co-author of the book "Metasploit:&nbsp;The Penetration Testers Guide," the creator of the <a href="https://github.com/trustedsec/social-engineer-toolkit" target="_blank">Social-Engineer Toolkit </a>(SET), Artillery, Unicorn, PenTesters Framework, and several popular open-source tools.&nbsp;</p><p>David was the co-founder of <a href="https://en.wikipedia.org/wiki/DerbyCon" target="_blank">DerbyCon</a>; a large-scale conference started in Louisville, Kentucky.&nbsp;Before the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence-related missions.</p><p>David is frequently interviewed by news organizations, including CNN, Fox News, MSNBC, CNBC, and BBC World News.&nbsp;He has testified in front of Congress on two occasions on the security around government websites.</p><p>In this episode, we discuss the shift to virtual conferences, Zoom vulnerabilities, responsible vulnerability disclosure, the importance of communication skills, giving back to the community, mental health, working from home, and so much more.</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/davidkennedy4/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/HackingDave" target="_blank">Twitter</a></li><li><a href="https://www.trustedsec.com/blog/" target="_blank">TrustedSec Blog</a></li><li><a href="https://t.co/6yHoSwGKVH" target="_blank">TrustedSec Public Slack</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/086-dave-kennedy-the-basics-are-still-challenging]]></link><guid isPermaLink="false">e3d90e02-2846-4cdc-8b30-156bf6404843</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 11 May 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/773ee3b5-bb90-4b62-b41e-25cddfc48fe1/086-dave-kennedy-cyber-security-interviews.mp3" length="66610162" type="audio/mpeg"/><itunes:duration>46:14</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#085 – John Strand: Making the Industry Better</title><itunes:title>#085 - John Strand: Making the Industry Better</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/john-strand-a1b4b62/" target="_blank">John Strand</a> is the owner of <a href="https://www.blackhillsinfosec.com/blog/" target="_blank">Black Hills Information Security</a>, a firm specializing in penetration testing, Active Defense, and Hunt Teaming services.&nbsp;He is also the CTO of <a href="https://www.activecountermeasures.com/" target="_blank">Active Countermeasures</a>, a firm dedicated to tracking advanced attackers inside and outside your network.</p><p>John has consulted and taught hundreds of organizations in the areas of cybersecurity, regulatory compliance, and penetration testing. John is a contributor to the industry shaping <a href="http://www.pentest-standard.org/index.php/Main_Page" target="_blank">Penetration Testing Execution Standard</a> and 20 Critical Controls frameworks. He is also an experienced speaker, having done presentations to the FBI, NASA, the NSA, and at various industry conferences.&nbsp;</p><p>John also co-hosts <a href="https://securityweekly.com/" target="_blank">Security Weekly</a>, the world's largest information security podcast; co-authored <a href="https://www.amazon.com/Offensive-Countermeasures-Art-Active-Defense-ebook/dp/B00DQSQ7QY" target="_blank">Offensive Countermeasures: The Art of Active Defense;</a> and writes loud rock music and makes various futile attempts at fly-fishing.</p><p>In this episode, we discuss remote workers in the Covid-19 pandemic, validating VPN targets in pen tests, cloud security, developing SANS course material, how to choose what to give away, planning conferences, threat hunting, keeping up with new vulnerabilities, mental health, and so much more.</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/john-strand-a1b4b62/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/strandjs" target="_blank">Twitter</a></li><li><a href="https://www.blackhillsinfosec.com/blog/" target="_blank">BHIS Blog</a></li><li><a href="https://securityweekly.com/" target="_blank">Security Weekly Podcast</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/john-strand-a1b4b62/" target="_blank">John Strand</a> is the owner of <a href="https://www.blackhillsinfosec.com/blog/" target="_blank">Black Hills Information Security</a>, a firm specializing in penetration testing, Active Defense, and Hunt Teaming services.&nbsp;He is also the CTO of <a href="https://www.activecountermeasures.com/" target="_blank">Active Countermeasures</a>, a firm dedicated to tracking advanced attackers inside and outside your network.</p><p>John has consulted and taught hundreds of organizations in the areas of cybersecurity, regulatory compliance, and penetration testing. John is a contributor to the industry shaping <a href="http://www.pentest-standard.org/index.php/Main_Page" target="_blank">Penetration Testing Execution Standard</a> and 20 Critical Controls frameworks. He is also an experienced speaker, having done presentations to the FBI, NASA, the NSA, and at various industry conferences.&nbsp;</p><p>John also co-hosts <a href="https://securityweekly.com/" target="_blank">Security Weekly</a>, the world's largest information security podcast; co-authored <a href="https://www.amazon.com/Offensive-Countermeasures-Art-Active-Defense-ebook/dp/B00DQSQ7QY" target="_blank">Offensive Countermeasures: The Art of Active Defense;</a> and writes loud rock music and makes various futile attempts at fly-fishing.</p><p>In this episode, we discuss remote workers in the Covid-19 pandemic, validating VPN targets in pen tests, cloud security, developing SANS course material, how to choose what to give away, planning conferences, threat hunting, keeping up with new vulnerabilities, mental health, and so much more.</p><p>Where you can find John:</p><ul><li><a href="https://www.linkedin.com/in/john-strand-a1b4b62/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/strandjs" target="_blank">Twitter</a></li><li><a href="https://www.blackhillsinfosec.com/blog/" target="_blank">BHIS Blog</a></li><li><a href="https://securityweekly.com/" target="_blank">Security Weekly Podcast</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/085-john-strand-making-the-industry-better]]></link><guid isPermaLink="false">d959b813-06ff-467b-b2cc-34b23908bbd0</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 04 May 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8825694d-29ff-4031-970f-fbe2f8c273c1/085-john-strand-cyber-security-interviews.mp3" length="66751850" type="audio/mpeg"/><itunes:duration>46:20</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#084 – Adam Hunt: A Game We Play</title><itunes:title>#084 - Adam Hunt:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/adamphunt/" target="_blank">Adam Hunt</a> is the CTO and Chief Data Scientist at <a href="https://www.riskiq.com/" target="_blank">RiskIQ</a>. As Chief Data Scientist, Adam leads the data science, data engineering, and research teams at RiskIQ. Adam pioneers research automating the detection of adversarial attacks across disparate digital channels, including email, web, mobile, social media. Adam also has received patents for identifying new external threats using machine learning.</p><p>Adam received his Ph.D. in experimental particle physics from Princeton University. As an award-winning member of the CMS collaboration at the <a href="https://home.cern/science/accelerators/large-hadron-collider" target="_blank">Large Hadron Collider</a>, he was an integral part of developing the online and offline analysis systems that lead to the discovery of the Higgs Boson.</p><p>In this episode, we discuss starting in particle physics, data science, communication skills, process automation, managing attack surface areas, and so much more.</p><p>Where you can find Adam:</p><ul><li><a href="https://www.linkedin.com/in/adamphunt/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/RiskIQ" target="_blank">Twitter</a></li><li><a href="https://www.riskiq.com/blog/" target="_blank">RiskIQ</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/adamphunt/" target="_blank">Adam Hunt</a> is the CTO and Chief Data Scientist at <a href="https://www.riskiq.com/" target="_blank">RiskIQ</a>. As Chief Data Scientist, Adam leads the data science, data engineering, and research teams at RiskIQ. Adam pioneers research automating the detection of adversarial attacks across disparate digital channels, including email, web, mobile, social media. Adam also has received patents for identifying new external threats using machine learning.</p><p>Adam received his Ph.D. in experimental particle physics from Princeton University. As an award-winning member of the CMS collaboration at the <a href="https://home.cern/science/accelerators/large-hadron-collider" target="_blank">Large Hadron Collider</a>, he was an integral part of developing the online and offline analysis systems that lead to the discovery of the Higgs Boson.</p><p>In this episode, we discuss starting in particle physics, data science, communication skills, process automation, managing attack surface areas, and so much more.</p><p>Where you can find Adam:</p><ul><li><a href="https://www.linkedin.com/in/adamphunt/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/RiskIQ" target="_blank">Twitter</a></li><li><a href="https://www.riskiq.com/blog/" target="_blank">RiskIQ</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/084-adam-hunt-a-game-we-play]]></link><guid isPermaLink="false">a343d996-5be1-42ef-bbcd-3e286d27ef54</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 23 Mar 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9eceb9e0-0c02-4c01-bafd-11951c72949b/084-adam-hunt-cyber-security-interviews.mp3" length="44293879" type="audio/mpeg"/><itunes:duration>30:44</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#083 – Nate Fick: Give Teams Autonomy</title><itunes:title>#083 - Nate Fick: Give Teams Autonomy</itunes:title><description><![CDATA[<p>Nate Fick is the General Manager of <a href="https://www.elastic.co/security" target="_blank">Elastic Security </a>and former CEO of Endgame. He is also an Operating Partner at Bessemer Venture Partners. Before joining Endgame, Nate was CEO of the Center for a New American Security. He led Marine Corps infantry and reconnaissance units in combat in Afghanistan and Iraq. His book about that experience, <a href="https://www.amazon.com/One-Bullet-Away-Making-Officer/dp/0618773436/" target="_blank"><em>One Bullet Away</em></a>, was a New York Times bestseller, a Washington Post "Best Book of the Year," and one of the Military Times' "Best Military Books of the Decade.”</p><p>Nate is a graduate of Dartmouth College, the Harvard Kennedy School, and the Harvard Business School. Nate serves as a Trustee of Dartmouth, and on the Military &amp; Veterans Advisory Council of JPMorgan Chase &amp; Co. He is a member of the Young Presidents’ Organization and a life member of the Council on Foreign Relations and Trout Unlimited.</p><p>In this episode, we discuss leadership, lessons learned in the Marines, cyberwar, information sharing, government policies, finding the signals in the noise, resource management, and so much more!</p><p>Where you can find Nate:</p><ul><li><a href="https://www.linkedin.com/in/natefick/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ncfick" target="_blank">Twitter</a></li><li><a href="https://www.elastic.co/blog/" target="_blank">Elastic Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p>Nate Fick is the General Manager of <a href="https://www.elastic.co/security" target="_blank">Elastic Security </a>and former CEO of Endgame. He is also an Operating Partner at Bessemer Venture Partners. Before joining Endgame, Nate was CEO of the Center for a New American Security. He led Marine Corps infantry and reconnaissance units in combat in Afghanistan and Iraq. His book about that experience, <a href="https://www.amazon.com/One-Bullet-Away-Making-Officer/dp/0618773436/" target="_blank"><em>One Bullet Away</em></a>, was a New York Times bestseller, a Washington Post "Best Book of the Year," and one of the Military Times' "Best Military Books of the Decade.”</p><p>Nate is a graduate of Dartmouth College, the Harvard Kennedy School, and the Harvard Business School. Nate serves as a Trustee of Dartmouth, and on the Military &amp; Veterans Advisory Council of JPMorgan Chase &amp; Co. He is a member of the Young Presidents’ Organization and a life member of the Council on Foreign Relations and Trout Unlimited.</p><p>In this episode, we discuss leadership, lessons learned in the Marines, cyberwar, information sharing, government policies, finding the signals in the noise, resource management, and so much more!</p><p>Where you can find Nate:</p><ul><li><a href="https://www.linkedin.com/in/natefick/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ncfick" target="_blank">Twitter</a></li><li><a href="https://www.elastic.co/blog/" target="_blank">Elastic Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/083-nate-fick-give-teams-autonomy]]></link><guid isPermaLink="false">5dcb9d09-a7a4-46a9-b07b-97ae8f704e5c</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 17 Feb 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/75bed2b5-4ffb-47f9-b7b8-1e082e9d4783/083-nate-fick-cyber-security-interviews.mp3" length="53718600" type="audio/mpeg"/><itunes:duration>37:17</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#082 – Jamil Jaffer: Not All Nation-state Activity Is the Same</title><itunes:title>#082 - Jamil Jaffer:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jamil-jaffer-199115/" target="_blank">Jamil Jaffer</a> is Senior Vice President for Strategy, Partnerships &amp; Corporate Development at <a href="https://ironnet.com/about/news/" target="_blank">IronNet</a>, a startup technology firm founded by former National Security Agency (NSA) Director Gen. Keith Alexander (ret.).</p><p>Prior to joining IronNet, Jamil served as the Chief Counsel and Senior Advisor for the Senate Foreign Relations Committee and Senior Counsel to the House Intelligence Committee where he led the committee’s oversight of NSA surveillance and wrote the original version of the Cybersecurity Information Sharing Act (CISA) signed into law in 2015. He also worked in the White House during the Bush Administration as an Associate Counsel to the President and in the Justice Department where he led the National Security Division's work on the President's Comprehensive National Cybersecurity Initiative.</p><p>Jamil is also an Assistant Professor of Law and Director of the National Security Law &amp; Policy Program at the Antonin Scalia Law School at George Mason University and a Visiting Fellow at Stanford University’s Hoover Institution.</p><p>In this episode, we discuss starting as in legal, government's role in cybersecurity, information sharing with real-time collaboration, automation, trend spotting, impacts to small businesses, cyberwar, and so much more.</p><p>Where you can find Jamil:</p><ul><li><a href="https://www.linkedin.com/in/jamil-jaffer-199115/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jamil_n_jaffer" target="_blank">Twitter</a></li><li><a href="https://ironnet.com/about/news/" target="_blank">IronNet</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jamil-jaffer-199115/" target="_blank">Jamil Jaffer</a> is Senior Vice President for Strategy, Partnerships &amp; Corporate Development at <a href="https://ironnet.com/about/news/" target="_blank">IronNet</a>, a startup technology firm founded by former National Security Agency (NSA) Director Gen. Keith Alexander (ret.).</p><p>Prior to joining IronNet, Jamil served as the Chief Counsel and Senior Advisor for the Senate Foreign Relations Committee and Senior Counsel to the House Intelligence Committee where he led the committee’s oversight of NSA surveillance and wrote the original version of the Cybersecurity Information Sharing Act (CISA) signed into law in 2015. He also worked in the White House during the Bush Administration as an Associate Counsel to the President and in the Justice Department where he led the National Security Division's work on the President's Comprehensive National Cybersecurity Initiative.</p><p>Jamil is also an Assistant Professor of Law and Director of the National Security Law &amp; Policy Program at the Antonin Scalia Law School at George Mason University and a Visiting Fellow at Stanford University’s Hoover Institution.</p><p>In this episode, we discuss starting as in legal, government's role in cybersecurity, information sharing with real-time collaboration, automation, trend spotting, impacts to small businesses, cyberwar, and so much more.</p><p>Where you can find Jamil:</p><ul><li><a href="https://www.linkedin.com/in/jamil-jaffer-199115/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jamil_n_jaffer" target="_blank">Twitter</a></li><li><a href="https://ironnet.com/about/news/" target="_blank">IronNet</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/082-jamil-jaffer-not-all-nation-state-activity-is-the-same]]></link><guid isPermaLink="false">dc4c39dc-d48e-47a4-b3c2-78759caa1271</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Feb 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1a342a03-a259-4c72-8548-4badd9971d9e/082-jamil-jaffer-cyber-security-interviews.mp3" length="53864295" type="audio/mpeg"/><itunes:duration>37:21</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#081 – James Patchett: Make Small Businesses Safe</title><itunes:title>#081 – James Patchett:</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/james-patchett-b99b14161/" target="_blank">James Patchett</a> is the President and CEO of the <a href="https://edc.nyc/program/cyber-nyc" target="_blank">New York City Economic Development Corporation</a>. James has spent his career building stronger cities through investments in affordable housing, innovation, and 21st-century infrastructure.</p><p>During his tenure, he has overseen some of the city’s most ambitious projects, including launching a citywide ferry system, developing Mayor de Blasio’s 100,000 jobs plan, and optimizing NYCEDC’s 60 million square feet of real estate.</p><p>Prior to his appointment as NYCEDC President in 2016, James served as chief of staff to Deputy Mayor for Housing and Economic Development Alicia Glen, where he helped oversee more than 25 city agencies and played a pivotal role in preserving thousands of affordable homes. James holds a BA in Economics from Amherst College and an MBA from Stanford University.</p><p>In this episode, we discuss NYC building a cyber army, economic development through cyber, business accelerators, matching inventors with business coaches, NYC's talent pool, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/james-patchett-b99b14161/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jbpatchett" target="_blank">Twitter</a></li><li><a href="https://edc.nyc/program/cyber-nyc" target="_blank">NYCEDC</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/james-patchett-b99b14161/" target="_blank">James Patchett</a> is the President and CEO of the <a href="https://edc.nyc/program/cyber-nyc" target="_blank">New York City Economic Development Corporation</a>. James has spent his career building stronger cities through investments in affordable housing, innovation, and 21st-century infrastructure.</p><p>During his tenure, he has overseen some of the city’s most ambitious projects, including launching a citywide ferry system, developing Mayor de Blasio’s 100,000 jobs plan, and optimizing NYCEDC’s 60 million square feet of real estate.</p><p>Prior to his appointment as NYCEDC President in 2016, James served as chief of staff to Deputy Mayor for Housing and Economic Development Alicia Glen, where he helped oversee more than 25 city agencies and played a pivotal role in preserving thousands of affordable homes. James holds a BA in Economics from Amherst College and an MBA from Stanford University.</p><p>In this episode, we discuss NYC building a cyber army, economic development through cyber, business accelerators, matching inventors with business coaches, NYC's talent pool, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/james-patchett-b99b14161/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jbpatchett" target="_blank">Twitter</a></li><li><a href="https://edc.nyc/program/cyber-nyc" target="_blank">NYCEDC</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/081-james-patchett-make-small-businesses-safe]]></link><guid isPermaLink="false">9e6b7f48-890e-433f-a352-f5232d9933bd</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Jan 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3a2141ad-8915-4bc6-a426-9527a40d58f3/081-james-patchett-cyber-security-interviews.mp3" length="50386292" type="audio/mpeg"/><itunes:duration>34:58</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>James Patchett is the President and CEO of the New York City Economic Development Corporation. James has spent his career building stronger cities through investments in affordable housing, innovation, and 21st-century infrastructure.

During his tenure, he has overseen some of the city’s most ambitious projects, including launching a citywide ferry system, developing Mayor de Blasio’s 100,000 jobs plan, and optimizing NYCEDC’s 60 million square feet of real estate.

Prior to his appointment as NYCEDC President in 2016, James served as chief of staff to Deputy Mayor for Housing and Economic Development Alicia Glen, where he helped oversee more than 25 city agencies and played a pivotal role in preserving thousands of affordable homes. James holds a BA in Economics from Amherst College and an MBA from Stanford University.

In this episode, we discuss NYC building a cyber army, economic development through cyber, business accelerators, matching inventors with business coaches, NYC&apos;s talent pool, and so much more.</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#080 – Heather Mahalik: Earn The Tool</title><itunes:title>#080 – Heather Mahalik: Earn The Tool</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/heather-mahalik-3615535/" target="_blank">Heather Mahalik</a> is the Senior Director of Digital Intelligence at Cellebrite and a Senior Instructor, author and course lead for <a href="blank" target="_blank">FOR585: Smartphone Forensic Analysis In-Depth</a>. To say that digital forensics is central to Heather's life is quite an understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to media associated with terrorism. She has helped law enforcement, eDiscovery firms, military, and the federal government extract and manually decode artifacts used in solving investigations around the world.</p><p>Heather began working in digital forensics in 2002, and has been focused on mobile forensics since 2010 - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used. She also maintains <a href="www.smarterforensics.com" target="_blank">www.smarterforensics.com</a>. Heather is the co-author of Practical Mobile Forensics (1st -4th editions), currently a best seller from Pack't Publishing.</p><p>In this episode, we discuss coming back to law enforcement, cloud forensics, what drives her research, early mentors, the start of cellphone forensics, mobile device threats, developing presentations, and so much more!</p><p>Where you can find Heather:</p><ul><li><a href="https://twitter.com/HeatherMahalik" target="_blank">Twitter</a></li><li><a href="https://www.linkedin.com/in/heather-mahalik-3615535/" target="_blank">LinkedIn</a></li><li><a href="https://www.sans.org/instructors/heather-mahalik" target="_blank">SANS</a></li><li><a href="https://smarterforensics.com/blog/" target="_blank">Blog</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/heather-mahalik-3615535/" target="_blank">Heather Mahalik</a> is the Senior Director of Digital Intelligence at Cellebrite and a Senior Instructor, author and course lead for <a href="blank" target="_blank">FOR585: Smartphone Forensic Analysis In-Depth</a>. To say that digital forensics is central to Heather's life is quite an understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to media associated with terrorism. She has helped law enforcement, eDiscovery firms, military, and the federal government extract and manually decode artifacts used in solving investigations around the world.</p><p>Heather began working in digital forensics in 2002, and has been focused on mobile forensics since 2010 - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used. She also maintains <a href="www.smarterforensics.com" target="_blank">www.smarterforensics.com</a>. Heather is the co-author of Practical Mobile Forensics (1st -4th editions), currently a best seller from Pack't Publishing.</p><p>In this episode, we discuss coming back to law enforcement, cloud forensics, what drives her research, early mentors, the start of cellphone forensics, mobile device threats, developing presentations, and so much more!</p><p>Where you can find Heather:</p><ul><li><a href="https://twitter.com/HeatherMahalik" target="_blank">Twitter</a></li><li><a href="https://www.linkedin.com/in/heather-mahalik-3615535/" target="_blank">LinkedIn</a></li><li><a href="https://www.sans.org/instructors/heather-mahalik" target="_blank">SANS</a></li><li><a href="https://smarterforensics.com/blog/" target="_blank">Blog</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/080-heather-mahalik-earn-the-tool]]></link><guid isPermaLink="false">e4bb3452-30ff-4b97-811e-7eb2282fe0b5</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 13 Jan 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4459408f-5bd8-4c7d-995d-d2f2dcc0d450/080-heather-mahalik-cyber-security-interviews.mp3" length="54486420" type="audio/mpeg"/><itunes:duration>37:49</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#079 – Mari DeGrazia: Not Just One Technology</title><itunes:title>#079 – Mari DeGrazia: Not Just One Technology</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/mari-degrazia/" target="_blank">Mari DeGrazia</a> is a Senior Vice President in the Cyber Risk practice of Kroll, a division of Duff &amp; Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital forensics community. Mari joined Kroll from Verizon Enterprises where she served as Case Lead on various network intrusion and data breach investigations.</p><p>Mari is a strong believer in giving back to the forensic community and has written and released numerous programs/scripts, two of which are used in SANS training. In addition, she has presented her research at several industry conferences, published articles in eForensics Magazine, and was the technical editor for Windows Registry Forensics S.E.</p><p>In this episode, we discuss starting in IT, balancing work and family, self-training, the importance of the DFIR community, cross-training, using AI for detection, cloud security, giving back to the industry, and so much more.</p><p>Where you can find Mari:</p><ul><li><a href="https://www.linkedin.com/in/mari-degrazia/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/maridegrazia" target="_blank">Twitter</a></li><li><a href="https://az4n6.blogspot.com/" target="_blank">Blog</a></li><li><a href="https://github.com/mdegrazia" target="_blank">GitHub</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/mari-degrazia/" target="_blank">Mari DeGrazia</a> is a Senior Vice President in the Cyber Risk practice of Kroll, a division of Duff &amp; Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital forensics community. Mari joined Kroll from Verizon Enterprises where she served as Case Lead on various network intrusion and data breach investigations.</p><p>Mari is a strong believer in giving back to the forensic community and has written and released numerous programs/scripts, two of which are used in SANS training. In addition, she has presented her research at several industry conferences, published articles in eForensics Magazine, and was the technical editor for Windows Registry Forensics S.E.</p><p>In this episode, we discuss starting in IT, balancing work and family, self-training, the importance of the DFIR community, cross-training, using AI for detection, cloud security, giving back to the industry, and so much more.</p><p>Where you can find Mari:</p><ul><li><a href="https://www.linkedin.com/in/mari-degrazia/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/maridegrazia" target="_blank">Twitter</a></li><li><a href="https://az4n6.blogspot.com/" target="_blank">Blog</a></li><li><a href="https://github.com/mdegrazia" target="_blank">GitHub</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/079-mari-degrazia-not-just-one-technology]]></link><guid isPermaLink="false">83a8ff5d-5ed6-4405-a8fd-d9df81020326</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Jan 2020 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2a25b49e-d496-4299-a8c6-23d3c288c353/079-mari-degrazia-cyber-security-interviews.mp3" length="64341129" type="audio/mpeg"/><itunes:duration>44:39</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mari DeGrazia is a senior director in the Cyber Risk practice of Kroll, a division of Duff &amp;amp; Phelps. Over the course of a 12-year career in the computer industry, Mari has become a leader within the digital forensics community. Mari joined Kroll from Verizon Enterprises where she served as Case Lead on various network intrusion and data breach investigations.

Mari is a strong believer in giving back to the forensic community and has written and released numerous programs/scripts, two of which are used in SANS training. In addition, she has presented her research at several industry conferences, published articles in eForensics Magazine, and was the technical editor for Windows Registry Forensics S.E.

In this episode, we discuss starting in IT, balancing work and family, self-training, the importance of the DFIR community, cross-training, using AI for detection, cloud security, giving back to the industry, and so much more.</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#078 – Nadean Tanner: Boil It Down</title><itunes:title>#078 - Nadean Tanner: Boil It Down</itunes:title><description><![CDATA[<p><em>When my 7-year-old introduced me to his second-grade class, he put it best: "My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber."</em></p><p><em>- Nadean Tanner</em></p><p><a href="https://www.linkedin.com/in/nadeanhtanner/" target="_blank">Nadean Tanner</a> is the Senior Manager of Technical Education Programs at <a href="https://puppet.com/" target="_blank">Puppet</a>.&nbsp;She is responsible for all things product training from working with internal knowledge sources and the instructional design team to produce modern, engaging knowledge assets to delivering online and onsite classroom sessions.&nbsp;</p><p>Nadean is an experienced instructor and speaker with nearly 20 years' experience in information technology and security training delivery and development.&nbsp;At Rapid7, she taught vulnerability management and network and application assault as well as SQL, Ruby, and API.&nbsp;Before Rapid 7, Nadean taught Security Analytics and Advanced Security Operations Center Management for RSA. She taught cybersecurity and information assurance 8570 classes for the Department of Defense including CISSP at Fort Gordon, Fort Carson, and the Pentagon, and she developed and taught graduate-level computer science courses at Louisiana State University for six years.</p><p>In this episode, we discuss teaching and traveling, communicating technical terms, talking about the basics, writing a book, teaching with humility, knowing when you are an expert, and so much more.</p><p>Where you can find Nadean:</p><ul><li><a href="https://www.linkedin.com/in/nadeanhtanner/" target="_blank">LinkedIn</a></li><li><a href="https://www.nadeantanner.org/" target="_blank">Website</a></li><li><a href="https://www.amazon.com/Cybersecurity-Blue-Toolkit-Nadean-Tanner/dp/1119552931/" target="_blank">Amazon</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><em>When my 7-year-old introduced me to his second-grade class, he put it best: "My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber."</em></p><p><em>- Nadean Tanner</em></p><p><a href="https://www.linkedin.com/in/nadeanhtanner/" target="_blank">Nadean Tanner</a> is the Senior Manager of Technical Education Programs at <a href="https://puppet.com/" target="_blank">Puppet</a>.&nbsp;She is responsible for all things product training from working with internal knowledge sources and the instructional design team to produce modern, engaging knowledge assets to delivering online and onsite classroom sessions.&nbsp;</p><p>Nadean is an experienced instructor and speaker with nearly 20 years' experience in information technology and security training delivery and development.&nbsp;At Rapid7, she taught vulnerability management and network and application assault as well as SQL, Ruby, and API.&nbsp;Before Rapid 7, Nadean taught Security Analytics and Advanced Security Operations Center Management for RSA. She taught cybersecurity and information assurance 8570 classes for the Department of Defense including CISSP at Fort Gordon, Fort Carson, and the Pentagon, and she developed and taught graduate-level computer science courses at Louisiana State University for six years.</p><p>In this episode, we discuss teaching and traveling, communicating technical terms, talking about the basics, writing a book, teaching with humility, knowing when you are an expert, and so much more.</p><p>Where you can find Nadean:</p><ul><li><a href="https://www.linkedin.com/in/nadeanhtanner/" target="_blank">LinkedIn</a></li><li><a href="https://www.nadeantanner.org/" target="_blank">Website</a></li><li><a href="https://www.amazon.com/Cybersecurity-Blue-Toolkit-Nadean-Tanner/dp/1119552931/" target="_blank">Amazon</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/078-nadean-tanner-boil-it-down]]></link><guid isPermaLink="false">a447e44e-e54f-4b97-ac6d-4db96cc4a0ef</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 16 Dec 2019 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ac08cd9d-9274-479e-9d16-6d8ba7aaf476/078-nadean-tanner-cyber-security-interviews.mp3" length="64325469" type="audio/mpeg"/><itunes:duration>44:39</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>When my 7-year-old introduced me to his second-grade class, he put it best: &quot;My Mom teaches the good guys how to keep the bad guys out of their computers. She has a blue lightsaber.&quot;

- Nadean Tanner

Nadean Tanner is the Senior Manager of Technical Education Programs at Puppet. She is responsible for all things product training from working with internal knowledge sources and the instructional design team to produce modern, engaging knowledge assets to delivering online and onsite classroom sessions. 

Nadean is an experienced instructor and speaker with nearly 20 years&apos; experience in information technology and security training delivery and development. At Rapid7, she taught vulnerability management and network and application assault as well as SQL, Ruby, and API. Before Rapid 7, Nadean taught Security Analytics and Advanced Security Operations Center Management for RSA. She taught cybersecurity and information assurance 8570 classes for the Department of Defense including CISSP at Fort Gordon, Fort Carson, and the Pentagon, and she developed and taught graduate-level computer science courses at Louisiana State University for six years.

In this episode, we discuss teaching and traveling, communicating technical terms, talking about the basics, writing a book, teaching with humility, knowing when you are an expert, and so much more.</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#077 – Frank Downs: Know When To Leave</title><itunes:title>#077 - Frank Downs: Know When To Leave</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/frankdownsnopublic/" target="_blank">Frank Downs</a> is the director of cybersecurity practices at <a href="https://cybersecurity.isaca.org/" target="_blank">ISACA</a>. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, he proceeded to obtain a master’s degree in cybersecurity from UMBC, after a pit stop at Johns Hopkins to obtain a master’s degree in Government.</p><p>Eventually, Frank decided to ease the learning process for individuals transitioning from non-technical backgrounds into cybersecurity by becoming a full-time Intelligence and Operations Consultant for multiple federal law enforcement and intelligence agencies.</p><p>In this episode, we discuss starting in another industry before the DoD, packet capture analysis, doing the work no one else wants to do, knowing when to move into new roles, non-traditional backgrounds, training and certifications, COBIT, and so much more.</p><ul><li><a href="https://www.linkedin.com/in/frankdownsnopublic/" target="_blank">LinkedIn</a></li><li><a href="https://www.frankdowns.com/" target="_blank">FrankDowns.com</a></li><li><a href="https://cybersecurity.isaca.org/" target="_blank">ISACA</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/frankdownsnopublic/" target="_blank">Frank Downs</a> is the director of cybersecurity practices at <a href="https://cybersecurity.isaca.org/" target="_blank">ISACA</a>. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, he proceeded to obtain a master’s degree in cybersecurity from UMBC, after a pit stop at Johns Hopkins to obtain a master’s degree in Government.</p><p>Eventually, Frank decided to ease the learning process for individuals transitioning from non-technical backgrounds into cybersecurity by becoming a full-time Intelligence and Operations Consultant for multiple federal law enforcement and intelligence agencies.</p><p>In this episode, we discuss starting in another industry before the DoD, packet capture analysis, doing the work no one else wants to do, knowing when to move into new roles, non-traditional backgrounds, training and certifications, COBIT, and so much more.</p><ul><li><a href="https://www.linkedin.com/in/frankdownsnopublic/" target="_blank">LinkedIn</a></li><li><a href="https://www.frankdowns.com/" target="_blank">FrankDowns.com</a></li><li><a href="https://cybersecurity.isaca.org/" target="_blank">ISACA</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/077-frank-downs-know-when-to-leave]]></link><guid isPermaLink="false">14f2ffad-fe33-4cf0-9cb8-f061882073ae</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Tue, 10 Dec 2019 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9dfd3d91-0041-4c80-b8b2-05db90e8a62e/077-frank-downs-cyber-security-interviews.mp3" length="58586979" type="audio/mpeg"/><itunes:duration>48:12</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Frank Downs is the director of cybersecurity practices at ISACA. Frank, a 14-year cybersecurity specialist, graduated with a bachelor’s degree in English from the University of Maryland, after which he promptly joined the US Department of Defense as a subject matter expert, working with computer networks on a daily basis. Realizing that English and cybersecurity were two very different concepts, he proceeded to obtain a master’s degree in cybersecurity from UMBC, after a pit stop at Johns Hopkins to obtain a master’s degree in Government.

Eventually, Frank decided to ease the learning process for individuals transitioning from non-technical backgrounds into cybersecurity by becoming a full-time Intelligence and Operations Consultant for multiple federal law enforcement and intelligence agencies.

In this episode, we discuss starting in another industry before the DoD, packet capture analysis, doing the work no one else wants to do, knowing when to move into new roles, non-traditional backgrounds, training and certifications, COBIT, and so much more.</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#076 – Lesley Carhart: You’ve Got to Play the Game</title><itunes:title>#076 – Lesley Carhart: You’ve Got to Play the Game</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/lcarhart/" target="_blank">Lesley Carhart</a> is a Principal Threat Analyst at the Threat Operations Center at <a href="https://dragos.com/team/lesley-carhart/" target="_blank">Dragos</a>. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Prior to Dragos, she was the incident response team lead at Motorola Solutions, performing digital forensics and incident handling services for both enterprise and public safety customers.</p><p>In 2017, Lesley was named a <a href="https://www.cyberscoop.com/2017-top-women-in-cybersecurity/" target="_blank">“Top Woman in Cybersecurity”</a> by Cyberscoop news and received the Guidance Enfuse conference “Women in Technology” award. She holds a Bachelor’s Degree in Network Technologies from DePaul University, A.A.S. in Avionics Systems and Electronics Systems, GIAC GCIH, GREM, GCFA, and GCFE certifications, and currently serves as a Cyber Systems NCO in the US Air Force Reserves.</p><p>In her free time, Lesley co-organizes resume and interview clinics at several cybersecurity conferences, blogs, and tweets prolifically about infosec, and is a youth martial arts instructor.</p><p>In this episode, we discuss her early mentors, mentoring, writing resumes, starting as a coder, organizational missions, ICS security, electronic voting, submitting CFPs, and so much more.</p><p>Where you can find Lesley:</p><ul><li><a href="https://www.linkedin.com/in/lcarhart/" target="_blank">LinkedIn</a></li><li><a href="https://tisiphone.net/" target="_blank">Blog</a></li><li><a href="https://www.youtube.com/user/hacks4pancakes" target="_blank">YouTube</a></li><li><a href="https://twitter.com/hacks4pancakes" target="_blank">Twitter</a></li></ul><br/>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/lcarhart/" target="_blank">Lesley Carhart</a> is a Principal Threat Analyst at the Threat Operations Center at <a href="https://dragos.com/team/lesley-carhart/" target="_blank">Dragos</a>. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy focus on response to nation-state adversary attacks. Prior to Dragos, she was the incident response team lead at Motorola Solutions, performing digital forensics and incident handling services for both enterprise and public safety customers.</p><p>In 2017, Lesley was named a <a href="https://www.cyberscoop.com/2017-top-women-in-cybersecurity/" target="_blank">“Top Woman in Cybersecurity”</a> by Cyberscoop news and received the Guidance Enfuse conference “Women in Technology” award. She holds a Bachelor’s Degree in Network Technologies from DePaul University, A.A.S. in Avionics Systems and Electronics Systems, GIAC GCIH, GREM, GCFA, and GCFE certifications, and currently serves as a Cyber Systems NCO in the US Air Force Reserves.</p><p>In her free time, Lesley co-organizes resume and interview clinics at several cybersecurity conferences, blogs, and tweets prolifically about infosec, and is a youth martial arts instructor.</p><p>In this episode, we discuss her early mentors, mentoring, writing resumes, starting as a coder, organizational missions, ICS security, electronic voting, submitting CFPs, and so much more.</p><p>Where you can find Lesley:</p><ul><li><a href="https://www.linkedin.com/in/lcarhart/" target="_blank">LinkedIn</a></li><li><a href="https://tisiphone.net/" target="_blank">Blog</a></li><li><a href="https://www.youtube.com/user/hacks4pancakes" target="_blank">YouTube</a></li><li><a href="https://twitter.com/hacks4pancakes" target="_blank">Twitter</a></li></ul><br/>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/076-lesley-carhart-youve-got-play-game]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2514</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 30 Sep 2019 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5a5df9bb-50b7-4596-9f46-bfb0677b19a5/076lesleycarhartcybersecurityinterviews.mp3" length="38956761" type="audio/mpeg"/><itunes:duration>45:12</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lesley Carhart is a Principal Threat Analyst at the Threat Operations Center at Dragos. She is recognized as a subject matter expert in cybersecurity, incident response, and digital forensics, regularly speaking at conferences and universities. She has spent the last 11 years of her 20+ year IT career specializing in information security, with a heavy…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#075 – Brian Martin (Jericho): The Hacker Mindset</title><itunes:title>#075 – Brian Martin (Jericho): The Hacker Mindset</itunes:title><description><![CDATA[<p>Brian Martin (a.k.a. Jericho) has been poking about the hacker and security scene for over 22 years, building valuable skills such as skepticism and anger management. As a hacker-turned-security whore, Jericho has a great perspective to offer an unsolicited opinion on just about any security topic. A long-time advocate of advancing the field, sometimes by any means necessary, he thinks the idea of &#8216;forward-thinking&#8217; is quaint; we&#8217;re supposed to be thinking that way all the time.</p>
<p>No degree, no certifications, just the willingness to say things many in this dismal industry are thinking, but unwilling to say themselves. He remains a champion of security industry integrity and small misunderstood creatures.</p>
<p>In this episode, we discuss starting as a phreak and phone systems, BBS hacking forums, sharing knowledge, calling people out, cybersecurity skill shortages, understanding the adversaries mindset, PCI compliance, and so much more.</p>
<p>Where you can find Brian:</p>
<ul>
<li><a href="https://linkedin.com/in/attritionorg">LinkedIn</a></li>
<li><a href="http://attrition.org/">attrition.org</a></li>
<li><a href="https://twitter.com/attritionorg">Twitter</a></li>
</ul><br/>
<p>&nbsp;</p>
]]></description><content:encoded><![CDATA[<p>Brian Martin (a.k.a. Jericho) has been poking about the hacker and security scene for over 22 years, building valuable skills such as skepticism and anger management. As a hacker-turned-security whore, Jericho has a great perspective to offer an unsolicited opinion on just about any security topic. A long-time advocate of advancing the field, sometimes by any means necessary, he thinks the idea of &#8216;forward-thinking&#8217; is quaint; we&#8217;re supposed to be thinking that way all the time.</p>
<p>No degree, no certifications, just the willingness to say things many in this dismal industry are thinking, but unwilling to say themselves. He remains a champion of security industry integrity and small misunderstood creatures.</p>
<p>In this episode, we discuss starting as a phreak and phone systems, BBS hacking forums, sharing knowledge, calling people out, cybersecurity skill shortages, understanding the adversaries mindset, PCI compliance, and so much more.</p>
<p>Where you can find Brian:</p>
<ul>
<li><a href="https://linkedin.com/in/attritionorg">LinkedIn</a></li>
<li><a href="http://attrition.org/">attrition.org</a></li>
<li><a href="https://twitter.com/attritionorg">Twitter</a></li>
</ul><br/>
<p>&nbsp;</p>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/075-brian-martin-jericho-the-hacker-mindset]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2509</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 23 Sep 2019 06:00:22 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/df19edde-a875-4137-9dd5-a6864cf9818c/074brianmartincybersecurityinterviews.mp3" length="40921723" type="audio/mpeg"/><itunes:duration>48:22</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Brian Martin (a.k.a. Jericho) has been poking about the hacker and security scene for over 22 years, building valuable skills such as skepticism and anger management. As a hacker-turned-security whore, Jericho has a great perspective to offer an unsolicited opinion on just about any security topic. A long-time advocate of advancing the field, sometimes by&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#074 – Bill Conner: You Cannot Have Privacy Without Security</title><itunes:title>#074 – Bill Conner: You Cannot Have Privacy Without Security</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/billfconner/" target="_blank" rel="noopener">Bill Conner</a> is the President and CEO of <a href="https://www.sonicwall.com/" target="_blank" rel="noopener">SonicWall</a>. Bill has lead key divisions of AT&amp;T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle.</p>
<p>Bill also created and hosted “Hacked” for SiriusXM’s business radio. He has been recognized with several awards including Marketing Computers “Marketer of the Year,” Tech Titans “Corporate CEO of the Year,” Federal Computer’s “Top 100 Award,” and the “National Youth Science Camp Alumnus of the Year.”</p>
<p>In this episode, we discuss starting in encryption, security for the SMB market, advanced malware, threat intel, cloud security, breaking SSL in the enterprise, network basics for IoT, governments backdooring encryption, and so much more.</p>
<p>Where you can find Bill:</p>
<ul>
<li><a href="https://www.linkedin.com/in/billfconner/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/ConnerBill" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://blog.sonicwall.com/en-us/authors/bill-conner/" target="_blank" rel="noopener">SonicWall Blog</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/billfconner/" target="_blank" rel="noopener">Bill Conner</a> is the President and CEO of <a href="https://www.sonicwall.com/" target="_blank" rel="noopener">SonicWall</a>. Bill has lead key divisions of AT&amp;T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle.</p>
<p>Bill also created and hosted “Hacked” for SiriusXM’s business radio. He has been recognized with several awards including Marketing Computers “Marketer of the Year,” Tech Titans “Corporate CEO of the Year,” Federal Computer’s “Top 100 Award,” and the “National Youth Science Camp Alumnus of the Year.”</p>
<p>In this episode, we discuss starting in encryption, security for the SMB market, advanced malware, threat intel, cloud security, breaking SSL in the enterprise, network basics for IoT, governments backdooring encryption, and so much more.</p>
<p>Where you can find Bill:</p>
<ul>
<li><a href="https://www.linkedin.com/in/billfconner/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/ConnerBill" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://blog.sonicwall.com/en-us/authors/bill-conner/" target="_blank" rel="noopener">SonicWall Blog</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/074-bill-conner-you-cannot-have-privacy-without-security]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2500</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 16 Sep 2019 06:00:22 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d22a5db0-8120-494e-b1d1-894721ce64a6/074billconnercybersecurityinterviews.mp3" length="39546456" type="audio/mpeg"/><itunes:duration>42:35</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Bill Conner is the President and CEO of SonicWall. Bill has lead key divisions of AT&amp;amp;T, took Nortel into the $9 billion acquisition of Bay Networks, worked to secure digital identities with Entrust, and brought secure communications and privacy from the consumer to the enterprise through mobile and cloud with Silent Circle. Bill also created&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#073 – Bernard Harguindeguy: Identity Is The Keystone</title><itunes:title>#073 – Bernard Harguindeguy: Identity Is The Keystone</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/bernardharguindeguy/" target="_blank" rel="noopener">Bernard Harguindeguy</a> is the Chief Technology Officer &amp; General Manager Intelligence from <a href="https://www.pingidentity.com/en/company/leadership.html" target="_blank" rel="noopener">Ping Identity</a>. Bernard joined Ping in June 2018 through the acquisition of Elastic Beam, where he was the CEO and founder. His work at Elastic Beam revolutionized the use of AI to protect API infrastructures from cyber attacks and deliver deep insight into API access and usage.</p>
<p>Bernard earned an MS in Engineering Management from Stanford University and a BS in Electrical Engineering from the University of California Irvine where he was inducted into the <a href="http://tech.uci.edu/halloffame/inductees" target="_blank" rel="noopener">Engineering Hall of Fame</a>.</p>
<p>In this episode, we discuss starting in email security, identity as the perimeter, API security, selling to the C suite, how AI will help security, IoT security, and so much more.</p>
<p>Where you can find Bernard:</p>
<ul>
<li><a href="https://www.linkedin.com/in/bernardharguindeguy/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/bernardh_" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.pingidentity.com/en/company/leadership.html" target="_blank" rel="noopener">Ping</a></li>
</ul><br/>
<p>&nbsp;</p>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/bernardharguindeguy/" target="_blank" rel="noopener">Bernard Harguindeguy</a> is the Chief Technology Officer &amp; General Manager Intelligence from <a href="https://www.pingidentity.com/en/company/leadership.html" target="_blank" rel="noopener">Ping Identity</a>. Bernard joined Ping in June 2018 through the acquisition of Elastic Beam, where he was the CEO and founder. His work at Elastic Beam revolutionized the use of AI to protect API infrastructures from cyber attacks and deliver deep insight into API access and usage.</p>
<p>Bernard earned an MS in Engineering Management from Stanford University and a BS in Electrical Engineering from the University of California Irvine where he was inducted into the <a href="http://tech.uci.edu/halloffame/inductees" target="_blank" rel="noopener">Engineering Hall of Fame</a>.</p>
<p>In this episode, we discuss starting in email security, identity as the perimeter, API security, selling to the C suite, how AI will help security, IoT security, and so much more.</p>
<p>Where you can find Bernard:</p>
<ul>
<li><a href="https://www.linkedin.com/in/bernardharguindeguy/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/bernardh_" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.pingidentity.com/en/company/leadership.html" target="_blank" rel="noopener">Ping</a></li>
</ul><br/>
<p>&nbsp;</p>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/073-bernard-harguindeguy-identity-is-the-keystone]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2482</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 19 Aug 2019 06:00:32 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d8170fdb-d81c-4a88-88fc-cda15c743368/073bernardharguindeguycybersecurityinterviews.mp3" length="31093343" type="audio/mpeg"/><itunes:duration>40:00</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Bernard Harguindeguy is the Chief Technology Officer &amp;amp; General Manager Intelligence from Ping Identity. Bernard joined Ping in June 2018 through the acquisition of Elastic Beam, where he was the CEO and founder. His work at Elastic Beam revolutionized the use of AI to protect API infrastructures from cyber attacks and deliver deep insight into&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#072 – Vinny Sakore: This Was Crime</title><itunes:title>#072 – Vinny Sakore: This Was Crime</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/vinnysakore/" target="_blank" rel="noopener">Vinny Sakore</a> joined the <a href="https://netdiligence.com/" target="_blank" rel="noopener">NetDiligence</a> team in 2017 as their Chief Technology Officer. Prior to joining NetDiligence Vinny served as Verizon’s HIPAA Security Officer. His previous experience includes stints as Chief Technology Officer for two healthcare technology companies.</p>
<p>Vinny is a featured speaker nationally and internationally on the topics of Cyber Risk, Mobile Technology, and Information Security. He is a regular presenter at organizations and events such as the NetDiligence Cyber Risk forums, Information Security Forum (ISF), International Association of Privacy Professionals (IAPP), Healthcare Information Management Systems and Society (HIMSS), and the Risk Information Management Society (RIMS). Vinny has been quoted in numerous publications, including CSO Online, Wall Street Journal, and Information Security Magazine.</p>
<p>He serves on a number of not-for-profit boards and also teaches cybersecurity courses at Messiah College.</p>
<p>In this episode, we discuss the difference between privacy and security, talking to the board about cybersecurity, preparing for the cyber tsunami, government regulation, threat intel, aggregating insurance data, and so much more.</p>
<p>Where you can find Vinny:</p>
<ul>
<li><a href="https://www.linkedin.com/in/vinnysakore/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/VinnySakore" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="http://juntoblog.net/" target="_blank" rel="noopener">Blog</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/vinnysakore/" target="_blank" rel="noopener">Vinny Sakore</a> joined the <a href="https://netdiligence.com/" target="_blank" rel="noopener">NetDiligence</a> team in 2017 as their Chief Technology Officer. Prior to joining NetDiligence Vinny served as Verizon’s HIPAA Security Officer. His previous experience includes stints as Chief Technology Officer for two healthcare technology companies.</p>
<p>Vinny is a featured speaker nationally and internationally on the topics of Cyber Risk, Mobile Technology, and Information Security. He is a regular presenter at organizations and events such as the NetDiligence Cyber Risk forums, Information Security Forum (ISF), International Association of Privacy Professionals (IAPP), Healthcare Information Management Systems and Society (HIMSS), and the Risk Information Management Society (RIMS). Vinny has been quoted in numerous publications, including CSO Online, Wall Street Journal, and Information Security Magazine.</p>
<p>He serves on a number of not-for-profit boards and also teaches cybersecurity courses at Messiah College.</p>
<p>In this episode, we discuss the difference between privacy and security, talking to the board about cybersecurity, preparing for the cyber tsunami, government regulation, threat intel, aggregating insurance data, and so much more.</p>
<p>Where you can find Vinny:</p>
<ul>
<li><a href="https://www.linkedin.com/in/vinnysakore/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/VinnySakore" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="http://juntoblog.net/" target="_blank" rel="noopener">Blog</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/072-vinny-sakore-this-was-crime]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2489</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 08 Jul 2019 06:00:19 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e9996406-2d85-4b6a-84a6-d728d5121e28/072vinnysakorecybersecurityinterviews.mp3" length="39750942" type="audio/mpeg"/><itunes:duration>39:05</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Vinny Sakore joined the NetDiligence team in 2017 as their Chief Technology Officer. Prior to joining NetDiligence Vinny served as Verizon’s HIPAA Security Officer. His previous experience includes stints as Chief Technology Officer for two healthcare technology companies. Vinny is a featured speaker nationally and internationally on the topics of Cyber Risk, Mobile Technology, and&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#071 – Renaud Deraison: Complexity Breeds Insecurity</title><itunes:title>#071 – Renaud Deraison: Complexity Breeds Insecurity</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/renaud-deraison-26051982/" target="_blank" rel="noopener">Renaud Deraison</a> is known in the global security community as the father of the Nessus vulnerability scanner. His original creation, <a href="https://www.tenable.com/products/nessus" target="_blank" rel="noopener">Nessus</a>, celebrated its 15th anniversary in 2013 and is considered the de facto standard for vulnerability scanning worldwide.</p>
<p>Renaud co-founded <a href="https://www.tenable.com/" target="_blank" rel="noopener">Tenable Network Security</a> in 2002. As Chief Technology Officer, he drives product strategy and development. Before Tenable, Renaud was the primary author of the Nessus vulnerability scanner – releasing the first version of Nessus when he was 17.</p>
<p>Renaud continues to contribute to the global security community; he is the author of three patents related to network scanning and security and has published his work in books and magazines.</p>
<p>In this episode, we discuss building the first version of Nessus when he was a teenager, getting the basics right, challenges with the cloud, IoT and embedded devices security, responsible vulnerability disclosure, and so much more.</p>
<p>Where you can find Renaud:</p>
<ul>
<li><a href="https://www.linkedin.com/in/renaud-deraison-26051982/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://www.tenable.com/profile/renaud-deraison" target="_blank" rel="noopener">Tenable</a></li>
<li><a href="https://www.darkreading.com/attacks-breaches/the-argument-for-risk-based-security/a/d-id/1330687?" target="_blank" rel="noopener">Dark Reading: The Argument for Risk-Based Security</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/renaud-deraison-26051982/" target="_blank" rel="noopener">Renaud Deraison</a> is known in the global security community as the father of the Nessus vulnerability scanner. His original creation, <a href="https://www.tenable.com/products/nessus" target="_blank" rel="noopener">Nessus</a>, celebrated its 15th anniversary in 2013 and is considered the de facto standard for vulnerability scanning worldwide.</p>
<p>Renaud co-founded <a href="https://www.tenable.com/" target="_blank" rel="noopener">Tenable Network Security</a> in 2002. As Chief Technology Officer, he drives product strategy and development. Before Tenable, Renaud was the primary author of the Nessus vulnerability scanner – releasing the first version of Nessus when he was 17.</p>
<p>Renaud continues to contribute to the global security community; he is the author of three patents related to network scanning and security and has published his work in books and magazines.</p>
<p>In this episode, we discuss building the first version of Nessus when he was a teenager, getting the basics right, challenges with the cloud, IoT and embedded devices security, responsible vulnerability disclosure, and so much more.</p>
<p>Where you can find Renaud:</p>
<ul>
<li><a href="https://www.linkedin.com/in/renaud-deraison-26051982/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://www.tenable.com/profile/renaud-deraison" target="_blank" rel="noopener">Tenable</a></li>
<li><a href="https://www.darkreading.com/attacks-breaches/the-argument-for-risk-based-security/a/d-id/1330687?" target="_blank" rel="noopener">Dark Reading: The Argument for Risk-Based Security</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/071-renaud-deraison-complexity-breeds-insecurity]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2479</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 27 May 2019 06:00:26 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/adf73e85-8904-43f5-acbc-7246be3ca124/071renaudderaisoncybersecurityinterviews.mp3" length="21763979" type="audio/mpeg"/><itunes:duration>26:47</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Renaud Deraison is known in the global security community as the father of the Nessus vulnerability scanner. His original creation, Nessus, celebrated its 15th anniversary in 2013 and is considered the de facto standard for vulnerability scanning worldwide. Renaud co-founded Tenable Network Security in 2002. As Chief Technology Officer, he drives product strategy and development.&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#070 – Lorrie Cranor: Help Open The Doors</title><itunes:title>#070 – Lorrie Cranor: Help Open The Doors</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/lorriecranor/" target="_blank" rel="noopener">Lorrie Faith Cranor</a>, <a href="https://www.computer.org/" target="_blank" rel="noopener">IEEE Fellow</a>, is the Director and Bosch Distinguished Professor in <a href="https://www.cmu.edu/epp/people/faculty/lorrie-faith-cranor.html" target="_blank" rel="noopener">Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University</a>. She also directs the <a href="https://cups.cs.cmu.edu/" target="_blank" rel="noopener">CyLab Usable Privacy and Security Laboratory (CUPS) </a>and co-directs the MSIT-Privacy Engineering masters program. In 2016 she served as Chief Technologist at the US Federal Trade Commission, working in the office of Chairwoman Ramirez. She is also a co-founder of <a href="https://www.wombatsecurity.com/" target="_blank" rel="noopener">Wombat Security Technologies, Inc</a>, a security awareness training company.</p>
<p>She has authored over 150 research papers on online privacy, usable security, and other topics. She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability and founded the Symposium On Usable Privacy and Security (SOUPS).</p>
<p>In this episode, we discuss the difference between privacy and security, lawmakers and technologists working together, founding Wombat security, the famous &#8220;password dress,&#8221; what makes a good password policy, IoT nutrition labels, and so much more.</p>
<p>Where you can find Lorrie:</p>
<ul>
<li><a href="https://www.linkedin.com/in/lorriecranor/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/lorrietweet" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.cmu.edu/epp/people/faculty/lorrie-faith-cranor.html" target="_blank" rel="noopener">Carnegie Mellon University</a></li>
<li><a href="https://www.computer.org/" target="_blank" rel="noopener">IEEE</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/lorriecranor/" target="_blank" rel="noopener">Lorrie Faith Cranor</a>, <a href="https://www.computer.org/" target="_blank" rel="noopener">IEEE Fellow</a>, is the Director and Bosch Distinguished Professor in <a href="https://www.cmu.edu/epp/people/faculty/lorrie-faith-cranor.html" target="_blank" rel="noopener">Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University</a>. She also directs the <a href="https://cups.cs.cmu.edu/" target="_blank" rel="noopener">CyLab Usable Privacy and Security Laboratory (CUPS) </a>and co-directs the MSIT-Privacy Engineering masters program. In 2016 she served as Chief Technologist at the US Federal Trade Commission, working in the office of Chairwoman Ramirez. She is also a co-founder of <a href="https://www.wombatsecurity.com/" target="_blank" rel="noopener">Wombat Security Technologies, Inc</a>, a security awareness training company.</p>
<p>She has authored over 150 research papers on online privacy, usable security, and other topics. She has played a key role in building the usable privacy and security research community, having co-edited the seminal book Security and Usability and founded the Symposium On Usable Privacy and Security (SOUPS).</p>
<p>In this episode, we discuss the difference between privacy and security, lawmakers and technologists working together, founding Wombat security, the famous &#8220;password dress,&#8221; what makes a good password policy, IoT nutrition labels, and so much more.</p>
<p>Where you can find Lorrie:</p>
<ul>
<li><a href="https://www.linkedin.com/in/lorriecranor/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/lorrietweet" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.cmu.edu/epp/people/faculty/lorrie-faith-cranor.html" target="_blank" rel="noopener">Carnegie Mellon University</a></li>
<li><a href="https://www.computer.org/" target="_blank" rel="noopener">IEEE</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/070-lorrie-cranor-help-open-the-doors]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2465</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 May 2019 06:00:29 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6f7ee1e0-8b3d-4d9e-9007-1d125554718d/070lorriecaranorcybersecurityinterviews.mp3" length="22901858" type="audio/mpeg"/><itunes:duration>29:14</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lorrie Faith Cranor, IEEE Fellow, is the Director and Bosch Distinguished Professor in Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. She also directs the CyLab Usable Privacy and Security Laboratory (CUPS) and co-directs the MSIT-Privacy Engineering masters program.&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#069 – Ben Johnson: Break Down The Problems</title><itunes:title>#069 – Ben Johnson: Break Down The Problems</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/benjaminjohnson80/" target="_blank" rel="noopener">Ben Johnson</a> is CTO and co-founder of <a href="https://www.obsidiansecurity.com/" target="_blank" rel="noopener">Obsidian Security</a>. Prior to founding Obsidian, he co-founded <a href="https://www.carbonblack.com/" target="_blank" rel="noopener">Carbon Black</a> and most recently served as the company&#8217;s Chief Security Strategist. As the company&#8217;s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space. Prior to Carbon Black, Ben was an NSA computer scientist and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.</p>
<p>Ben is active in the cybersecurity community, where he is a <a href="https://www.fisc.uscourts.gov/" target="_blank" rel="noopener">technical advisor to the US FISA Court </a>and sits on boards of multiple security startups. Johnson earned a bachelor&#8217;s degree in computer science from the University of Chicago and a master&#8217;s degree in computer science from Johns Hopkins University.</p>
<p>In this episode we discuss starting with the NSA, starting Carbon Black, focusing on the endpoint, identity security, government compliance, why everyone is in sales, picking your founder team, and so much more.</p>
<p>Where you can find Ben:</p>
<ul>
<li><a href="https://www.linkedin.com/in/benjaminjohnson80/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/chicagoben" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.obsidiansecurity.com/blog/" target="_blank" rel="noopener">Obsidian Blog</a></li>
</ul><br/>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/benjaminjohnson80/" target="_blank" rel="noopener">Ben Johnson</a> is CTO and co-founder of <a href="https://www.obsidiansecurity.com/" target="_blank" rel="noopener">Obsidian Security</a>. Prior to founding Obsidian, he co-founded <a href="https://www.carbonblack.com/" target="_blank" rel="noopener">Carbon Black</a> and most recently served as the company&#8217;s Chief Security Strategist. As the company&#8217;s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space. Prior to Carbon Black, Ben was an NSA computer scientist and later worked as a cyber engineer in an advanced intrusion operations division for the intelligence community.</p>
<p>Ben is active in the cybersecurity community, where he is a <a href="https://www.fisc.uscourts.gov/" target="_blank" rel="noopener">technical advisor to the US FISA Court </a>and sits on boards of multiple security startups. Johnson earned a bachelor&#8217;s degree in computer science from the University of Chicago and a master&#8217;s degree in computer science from Johns Hopkins University.</p>
<p>In this episode we discuss starting with the NSA, starting Carbon Black, focusing on the endpoint, identity security, government compliance, why everyone is in sales, picking your founder team, and so much more.</p>
<p>Where you can find Ben:</p>
<ul>
<li><a href="https://www.linkedin.com/in/benjaminjohnson80/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/chicagoben" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.obsidiansecurity.com/blog/" target="_blank" rel="noopener">Obsidian Blog</a></li>
</ul><br/>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/069-ben-johnson-break-down-the-problems]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2459</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 May 2019 06:00:37 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4f2a420e-385a-494b-aca3-d82a6a082fbe/069benjohnsoncybersecurityinterviews.mp3" length="45997002" type="audio/mpeg"/><itunes:duration>51:20</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ben Johnson is CTO and co-founder of Obsidian Security. Prior to founding Obsidian, he co-founded Carbon Black and most recently served as the company&amp;#8217;s Chief Security Strategist. As the company&amp;#8217;s original CTO, he led efforts to create the powerful capabilities that helped define the next-generation endpoint security space. Prior to Carbon Black, Ben was an&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#068 – Deborah Blyth: Security Is Everybody’s Job</title><itunes:title>#068 – Deborah Blyth: Security Is Everybody’s Job</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/deborah-blyth/" target="_blank" rel="noopener">Deborah Blyth</a> is the Chief Information Security Officer (CISO) <a href="http://www.oit.state.co.us/about/leadership/chief-information-security-officer" target="_blank" rel="noopener">State of Colorado, Governor&#8217;s Office of Information Technology</a>. In August 2014, Deborah Blyth became the state’s new CISO, bringing a diverse 25-year technology background including 14 years of information security experience. As the CISO, she serves as the point of contact for all information security initiatives in Colorado, informing the Secretary of Technology &amp; Chief Information Officer and executive agency leadership on security risks and impacts of policy and management decisions on IT-related initiatives.</p>
<p>Before joining the state of Colorado, Deborah led the Information Technology Security and Compliance programs at TeleTech and Travelport. Deborah is a Colorado native and graduated Summa cum Laude with a Bachelor of Science degree from Regis University.</p>
<p>In this episode, we discuss her start in IT and her passion for technology, changes from the board and C-suite, the <a href="https://www.thedenverchannel.com/news/crime/two-iranian-men-indicted-in-cdot-ransomware-attack-that-disrupted-computers-for-weeks" target="_blank" rel="noopener">CDOT attack</a>, the importance of having an IR plan in place, leveraging change management for security, managing priorities, cloud security, and so much more.</p>
<p>Where you can find Deborah:</p>
<ul>
<li><a href="https://www.linkedin.com/in/deborah-blyth/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="http://www.oit.state.co.us/about/leadership/chief-information-security-officer" target="_blank" rel="noopener">Governor&#8217;s Office of Information Technology</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/deborah-blyth/" target="_blank" rel="noopener">Deborah Blyth</a> is the Chief Information Security Officer (CISO) <a href="http://www.oit.state.co.us/about/leadership/chief-information-security-officer" target="_blank" rel="noopener">State of Colorado, Governor&#8217;s Office of Information Technology</a>. In August 2014, Deborah Blyth became the state’s new CISO, bringing a diverse 25-year technology background including 14 years of information security experience. As the CISO, she serves as the point of contact for all information security initiatives in Colorado, informing the Secretary of Technology &amp; Chief Information Officer and executive agency leadership on security risks and impacts of policy and management decisions on IT-related initiatives.</p>
<p>Before joining the state of Colorado, Deborah led the Information Technology Security and Compliance programs at TeleTech and Travelport. Deborah is a Colorado native and graduated Summa cum Laude with a Bachelor of Science degree from Regis University.</p>
<p>In this episode, we discuss her start in IT and her passion for technology, changes from the board and C-suite, the <a href="https://www.thedenverchannel.com/news/crime/two-iranian-men-indicted-in-cdot-ransomware-attack-that-disrupted-computers-for-weeks" target="_blank" rel="noopener">CDOT attack</a>, the importance of having an IR plan in place, leveraging change management for security, managing priorities, cloud security, and so much more.</p>
<p>Where you can find Deborah:</p>
<ul>
<li><a href="https://www.linkedin.com/in/deborah-blyth/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="http://www.oit.state.co.us/about/leadership/chief-information-security-officer" target="_blank" rel="noopener">Governor&#8217;s Office of Information Technology</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/068-deborah-blyth-security-is-everybodys-job]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2390</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 29 Apr 2019 06:00:41 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5ef1bf55-d62b-4ebf-98b4-329b279e3144/068debbiblythcybersecurityinterviews.mp3" length="42820295" type="audio/mpeg"/><itunes:duration>44:51</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Deborah Blyth is the Chief Information Security Officer (CISO) State of Colorado, Governor&amp;#8217;s Office of Information Technology. In August 2014, Deborah Blyth became the state’s new CISO, bringing a diverse 25-year technology background including 14 years of information security experience. As the CISO, she serves as the point of contact for all information security initiatives&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#067 – Fred Kneip: Compliance Doesn’t Equal Security</title><itunes:title>#067 – Fred Kneip: Compliance Doesn’t Equal Security</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/fred-kneip-411a8322/" target="_blank" rel="noopener">Fred Kneip</a> is the CEO and Founder of <a href="https://www.cybergrx.com" target="_blank" rel="noopener">CyberGRX</a>. Since founding the company in 2015, Fred has led the creation of the world&#8217;s first global third-party cyber risk management (TPCRM) exchange. During his tenure at CyberGRX, Fred has been responsible for the overall direction of the company and as the company’s chief strategist, for securing global partnerships, leading investments and overseeing management and corporate execution.</p>
<p>Prior to CyberGRX, Fred led the Security and Compliance Departments at Bridgewater Associates, an investment management firm overseeing about $160 billion for 350 of the largest and most sophisticated global institutional clients. Fred holds a BSE in Civil Engineering from Princeton University and an MBA from Columbia Business School.</p>
<p>In this episode we discuss the growing Denver cybersecurity scene, starting in compliance, managing supply chain and vendor risk, current and upcoming regulations, compliance versus security, benchmarking, and so much more.</p>
<p>Where you can find Fred:</p>
<ul>
<li><a href="https://www.linkedin.com/in/fred-kneip-411a8322/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/fred_kneip" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.cybergrx.com/resources/category/blog/" target="_blank" rel="noopener">Blog</a></li>
</ul><br/>
]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/fred-kneip-411a8322/" target="_blank" rel="noopener">Fred Kneip</a> is the CEO and Founder of <a href="https://www.cybergrx.com" target="_blank" rel="noopener">CyberGRX</a>. Since founding the company in 2015, Fred has led the creation of the world&#8217;s first global third-party cyber risk management (TPCRM) exchange. During his tenure at CyberGRX, Fred has been responsible for the overall direction of the company and as the company’s chief strategist, for securing global partnerships, leading investments and overseeing management and corporate execution.</p>
<p>Prior to CyberGRX, Fred led the Security and Compliance Departments at Bridgewater Associates, an investment management firm overseeing about $160 billion for 350 of the largest and most sophisticated global institutional clients. Fred holds a BSE in Civil Engineering from Princeton University and an MBA from Columbia Business School.</p>
<p>In this episode we discuss the growing Denver cybersecurity scene, starting in compliance, managing supply chain and vendor risk, current and upcoming regulations, compliance versus security, benchmarking, and so much more.</p>
<p>Where you can find Fred:</p>
<ul>
<li><a href="https://www.linkedin.com/in/fred-kneip-411a8322/" target="_blank" rel="noopener">LinkedIn</a></li>
<li><a href="https://twitter.com/fred_kneip" target="_blank" rel="noopener">Twitter</a></li>
<li><a href="https://www.cybergrx.com/resources/category/blog/" target="_blank" rel="noopener">Blog</a></li>
</ul><br/>
]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/067-fred-kneip-compliance-doesnt-equal-security]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2385</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 22 Apr 2019 06:00:54 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/4d741384-43bf-4542-ab1e-0d652b15e964/067fredkneipcybersecurityinterviews.mp3" length="50016604" type="audio/mpeg"/><itunes:duration>48:12</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Fred Kneip is the CEO and Founder of CyberGRX. Since founding the company in 2015, Fred has led the creation of the world&amp;#8217;s first global third-party cyber risk management (TPCRM) exchange. During his tenure at CyberGRX, Fred has been responsible for the overall direction of the company and as the company’s chief strategist, for securing&amp;hellip;</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#066 – Alissa Torres: A Well Balanced Approach</title><itunes:title>#066 – Alissa Torres: A Well Balanced Approach</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/alissatorres" target="_blank">Alissa Torres</a> is a SANS analyst and <a href="https://www.sans.org/instructors/alissa-torres" target="_blank">Principal SANS instructor</a> specializing in advanced digital forensics and incident response (DFIR). Alissa was recognized by <a href="https://www.scmagazine.com/home/security-news/features/women-to-watch/" target="_blank">SC Magazine as one of its "2016 Women to Watch."</a> and a recipient of the Enfuse 2018 Difference Makers Award for her efforts in educational outreach.</p><p>She has more than 15 years of experience in computer and network security that spans government, academic, and corporate environments. Her current role as Founder and Senior Consultant at <a href="https://sibertor.com/" target="_blank">Sibertor Forensics</a>, a security operations and incident response consulting company, provides daily challenges “in the trenches” and demands constant technical growth. Alissa is a frequent presenter at industry conferences (RSA, BSides, Shmoocon, Enfuse) and has taught hundreds of security professionals over the last 5 years in more than 12 countries. As the lead author of the <a href="https://www.sans.org/course/memory-forensics-in-depth" target="_blank">SANS FOR526 Advanced Memory Forensics and Threat Detection</a> course, she is passionate about memory management and forensic artifact hunting.</p><p>In this episode we discuss, being confused with <a href="https://www.linkedin.com/in/heather-mahalik-gasf-gcfe-cfce-ence-mfce-3615535/" target="_blank">Heather Mahalik</a>, running a helpdesk, file system forensics, memory forensics, balancing blue teams and red teams, when to add threat hunting to your program, the value of certifications, balancing work and life, keeping skills current, and so much more.</p><p>Where you can find Alissa:</p><ul><li><a href="https://www.linkedin.com/in/alissatorres" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/sibertor" target="_blank">Twitter</a></li><li><a href="https://www.sans.org/instructors/alissa-torres" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/alissatorres" target="_blank">Alissa Torres</a> is a SANS analyst and <a href="https://www.sans.org/instructors/alissa-torres" target="_blank">Principal SANS instructor</a> specializing in advanced digital forensics and incident response (DFIR). Alissa was recognized by <a href="https://www.scmagazine.com/home/security-news/features/women-to-watch/" target="_blank">SC Magazine as one of its "2016 Women to Watch."</a> and a recipient of the Enfuse 2018 Difference Makers Award for her efforts in educational outreach.</p><p>She has more than 15 years of experience in computer and network security that spans government, academic, and corporate environments. Her current role as Founder and Senior Consultant at <a href="https://sibertor.com/" target="_blank">Sibertor Forensics</a>, a security operations and incident response consulting company, provides daily challenges “in the trenches” and demands constant technical growth. Alissa is a frequent presenter at industry conferences (RSA, BSides, Shmoocon, Enfuse) and has taught hundreds of security professionals over the last 5 years in more than 12 countries. As the lead author of the <a href="https://www.sans.org/course/memory-forensics-in-depth" target="_blank">SANS FOR526 Advanced Memory Forensics and Threat Detection</a> course, she is passionate about memory management and forensic artifact hunting.</p><p>In this episode we discuss, being confused with <a href="https://www.linkedin.com/in/heather-mahalik-gasf-gcfe-cfce-ence-mfce-3615535/" target="_blank">Heather Mahalik</a>, running a helpdesk, file system forensics, memory forensics, balancing blue teams and red teams, when to add threat hunting to your program, the value of certifications, balancing work and life, keeping skills current, and so much more.</p><p>Where you can find Alissa:</p><ul><li><a href="https://www.linkedin.com/in/alissatorres" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/sibertor" target="_blank">Twitter</a></li><li><a href="https://www.sans.org/instructors/alissa-torres" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/066-alissa-torres-well-balanced-approach]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2382</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 15 Apr 2019 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f7601e12-3688-465c-9a61-f299b8de4bfd/066alissatorrescybersecurityinterviews.mp3" length="33423031" type="audio/mpeg"/><itunes:duration>39:10</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Alissa Torres is a SANS analyst and Principal SANS instructor specializing in advanced digital forensics and incident response (DFIR). Alissa was recognized by SC Magazine as one of its “2016 Women to Watch.” and a recipient of the Enfuse 2018 Difference Makers Award for her efforts in educational outreach. She has more than 15 years…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#065 – Lizzie Cookson: Attackers Adapt With Us</title><itunes:title>#065 – Lizzie Cookson: Attackers Adapt With Us</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/elizabeth-cookson-ms-ence-b7900b47/" target="_blank">Lizzie Cookson</a> is an Associate Director of Cyber Investigations at <a href="https://kivuconsulting.com" target="_blank">Kivu Consulting</a>. She specializes in cyber extortion and threat intelligence with a focus on attacker negotiations, threat actor profiling, and data breach remediation. Lizzie’s case work has included network intrusions, e-commerce compromise, business email compromise, wire/tax fraud, employee misconduct, and over 150 cyber extortion investigations.</p><p>Lizzie has over six years’ experience in legal services, incident response, and digital forensics. Prior to joining Kivu, she worked in regulatory roles at law firms in Massachusetts and Washington, DC while earning her graduate degree in digital forensics.</p><p>In this episode we discuss getting started in information security, how attackers have changed, ransomware changes, Ransomware-as-a-Service, banking trojans, types of cyber criminals, getting started with ransomware response, and so much more.</p><p>Where you can find Lizzie:</p><ul><li><a href="https://www.linkedin.com/in/elizabeth-cookson-ms-ence-b7900b47/" target="_blank">LinkedIn</a></li><li><a href="https://kivuconsulting.com/type/blog/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/elizabeth-cookson-ms-ence-b7900b47/" target="_blank">Lizzie Cookson</a> is an Associate Director of Cyber Investigations at <a href="https://kivuconsulting.com" target="_blank">Kivu Consulting</a>. She specializes in cyber extortion and threat intelligence with a focus on attacker negotiations, threat actor profiling, and data breach remediation. Lizzie’s case work has included network intrusions, e-commerce compromise, business email compromise, wire/tax fraud, employee misconduct, and over 150 cyber extortion investigations.</p><p>Lizzie has over six years’ experience in legal services, incident response, and digital forensics. Prior to joining Kivu, she worked in regulatory roles at law firms in Massachusetts and Washington, DC while earning her graduate degree in digital forensics.</p><p>In this episode we discuss getting started in information security, how attackers have changed, ransomware changes, Ransomware-as-a-Service, banking trojans, types of cyber criminals, getting started with ransomware response, and so much more.</p><p>Where you can find Lizzie:</p><ul><li><a href="https://www.linkedin.com/in/elizabeth-cookson-ms-ence-b7900b47/" target="_blank">LinkedIn</a></li><li><a href="https://kivuconsulting.com/type/blog/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/065-lizzie-cookson-attackers-adapt-us]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2378</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 08 Apr 2019 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2708433c-43fe-4b4f-a5dd-258d0bc34c09/065lizziecooksoncybersecurityinterviews.mp3" length="33524219" type="audio/mpeg"/><itunes:duration>41:11</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lizzie Cookson is an Associate Director of Cyber Investigations at Kivu Consulting. She specializes in cyber extortion and threat intelligence with a focus on attacker negotiations, threat actor profiling, and data breach remediation. Lizzie’s case work has included network intrusions, e-commerce compromise, business email compromise, wire/tax fraud, employee misconduct, and over 150 cyber extortion investigations.…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#064 – Georgia Weidman: Cyber Security Lion Repellent</title><itunes:title>#064 – Georgia Weidman: Cyber Security Lion Repellent</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/georgiaweidman" target="_blank">Georgia Weidman</a> is the founder and CTO of <a href="https://www.shevirah.com/" target="_blank">Shevirah</a> and is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, author, and angel investor. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications.</p><p>Her work in the field of smartphone exploitation has been featured internationally in print and on television including ABC World News Tonight, The New York Times, NBC Nightly News, and The Washington Post. She has presented or conducted training around the world including venues such as the NSA, West Point, and Black Hat. She was awarded a DARPA Cyber Fast Track grant for her work in mobile device security culminating in the release of the open source project, the <a href="https://bulbsecurity.com/products/smartphone-pentest-framework/" target="_blank">Smartphone Pentest Framework (SPF)</a>.&nbsp;She is the author of <a href="https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641" target="_blank">Penetration Testing: A Hands-On Introduction to Hacking</a> and the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.</p><p>In this episode we discuss, her early red team days, where to get direction when starting in the industry, pen testing steps, founding a start-up, mobile device security, <a href="https://medium.com/@georgiaweidman/cybersecurity-lion-repellant-f6c413d90639" target="_blank">cybersecurity lion repellent</a>, and so much more.</p><p>Where you an find Georgia:</p><ul><li><a href="https://www.linkedin.com/in/georgiaweidman" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/georgiaweidman" target="_blank">Twitter</a></li><li><a href="https://bulbsecurity.com/public-speaking/security-conferences/" target="_blank">Bulb Security</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/georgiaweidman" target="_blank">Georgia Weidman</a> is the founder and CTO of <a href="https://www.shevirah.com/" target="_blank">Shevirah</a> and is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, author, and angel investor. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications.</p><p>Her work in the field of smartphone exploitation has been featured internationally in print and on television including ABC World News Tonight, The New York Times, NBC Nightly News, and The Washington Post. She has presented or conducted training around the world including venues such as the NSA, West Point, and Black Hat. She was awarded a DARPA Cyber Fast Track grant for her work in mobile device security culminating in the release of the open source project, the <a href="https://bulbsecurity.com/products/smartphone-pentest-framework/" target="_blank">Smartphone Pentest Framework (SPF)</a>.&nbsp;She is the author of <a href="https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641" target="_blank">Penetration Testing: A Hands-On Introduction to Hacking</a> and the recipient of the 2015 Women’s Society of CyberJutsu Pentest Ninja award.</p><p>In this episode we discuss, her early red team days, where to get direction when starting in the industry, pen testing steps, founding a start-up, mobile device security, <a href="https://medium.com/@georgiaweidman/cybersecurity-lion-repellant-f6c413d90639" target="_blank">cybersecurity lion repellent</a>, and so much more.</p><p>Where you an find Georgia:</p><ul><li><a href="https://www.linkedin.com/in/georgiaweidman" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/georgiaweidman" target="_blank">Twitter</a></li><li><a href="https://bulbsecurity.com/public-speaking/security-conferences/" target="_blank">Bulb Security</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/064-georgia-weidman-cyber-security-lion-repellent]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2371</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 01 Apr 2019 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8a752f14-df6f-464e-b249-f7be8b335110/064georgiaweidmancybersecurityinterviews.mp3" length="36512121" type="audio/mpeg"/><itunes:duration>45:35</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Georgia Weidman is the founder and CTO of Shevirah and is a serial entrepreneur, penetration tester, security researcher, speaker, trainer, author, and angel investor. She holds a MS in computer science as well as holding CISSP, CEH, and OSCP certifications. Her work in the field of smartphone exploitation has been featured internationally in print and…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#063 – Dean Sysman: You Are Swamped With Data</title><itunes:title>#063 – Dean Sysman: You Are Swamped With Data</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/deansysman/" target="_blank">Dean Sysman</a>, is the CEO and co-founder, <a href="https://www.axonius.com/" target="_blank">Axonius</a>. Dean is a world renowned expert in cybersecurity and has been honored with being in the Forbes 30 Under 30 Israel 2017 list. Before founding Axonius, Dean co-founded <a href="https://cymmetria.com/" target="_blank">Cymmetria</a>, A YC-backed cyber deception company with Fortune 500 customers. He has spoken at major conferences including Blackhat, Defcon, CCC and more. He is an alumnus of an elite unit in the Israeli Intelligence Corps, where he served for 5 years as a team leader and officer.</p><p>Dean is a graduate of the special "Etgar" program, where he earned his B.Sc in computer science at the age of 19. In 2005, Dean was part of the gold medal winning team in the international Robotic Olympics in South Korea. Dean enjoys playing poker and reading existential philosophy.</p><p>In this episode we discuss, his start in infosec in Israel, being a founder, measuring security effectiveness, cyber security fundamentals, hiring the right people, participating in the community, and so much more.</p><p>Where you can find Dean:</p><ul><li><a href="https://www.linkedin.com/in/deansysman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/deansysman" target="_blank">Twitter</a></li><li><a href="https://medium.com/axonius" target="_blank">Blog</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/deansysman/" target="_blank">Dean Sysman</a>, is the CEO and co-founder, <a href="https://www.axonius.com/" target="_blank">Axonius</a>. Dean is a world renowned expert in cybersecurity and has been honored with being in the Forbes 30 Under 30 Israel 2017 list. Before founding Axonius, Dean co-founded <a href="https://cymmetria.com/" target="_blank">Cymmetria</a>, A YC-backed cyber deception company with Fortune 500 customers. He has spoken at major conferences including Blackhat, Defcon, CCC and more. He is an alumnus of an elite unit in the Israeli Intelligence Corps, where he served for 5 years as a team leader and officer.</p><p>Dean is a graduate of the special "Etgar" program, where he earned his B.Sc in computer science at the age of 19. In 2005, Dean was part of the gold medal winning team in the international Robotic Olympics in South Korea. Dean enjoys playing poker and reading existential philosophy.</p><p>In this episode we discuss, his start in infosec in Israel, being a founder, measuring security effectiveness, cyber security fundamentals, hiring the right people, participating in the community, and so much more.</p><p>Where you can find Dean:</p><ul><li><a href="https://www.linkedin.com/in/deansysman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/deansysman" target="_blank">Twitter</a></li><li><a href="https://medium.com/axonius" target="_blank">Blog</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/063-dean-sysman-swamped-data]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2365</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 Mar 2019 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cf1fdd69-d629-4102-a798-91ea276360d8/063deansysmancybersecurityinterviews.mp3" length="28217772" type="audio/mpeg"/><itunes:duration>32:20</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dean Sysman, is the CEO and co-founder, Axonius. Dean is a world renowned expert in cybersecurity and has been honored with being in the Forbes 30 Under 30 Israel 2017 list. Before founding Axonius, Dean co-founded Cymmetria, A YC-backed cyber deception company with Fortune 500 customers. He has spoken at major conferences including Blackhat, Defcon,…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#062 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy</title><itunes:title>#062 – Chad Loder: Just Because It’s Basic, Doesn’t Mean It’s Easy</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/chadloder/" target="_blank">Chad Loder</a> is the CEO and co-founder of <a href="https://www.habitu8.io/" target="_blank">Habitu8</a>, a Los Angeles-based cyber security startup that's transforming the security awareness industry away from its traditional "training-centric" approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors.</p><p>Prior to Habitu8, Chad was co-founder and VP of Engineering at <a href="https://www.rapid7.com/" target="_blank">Rapid7</a>, which he helped bring to a $900M IPO in 2015. Chad has also worked as a public company CISO and a strategic advisor to several security startups.</p><p>In this episode we discuss his start with phreaking, starting Rapid7, the focus on the human element in infosec, mistakes users make, how to measure your programs success, how people learn security, being a founder, and so much more.</p><p>Where you can find Chad:</p><ul><li><a href="https://www.linkedin.com/in/chadloder/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/chadloder" target="_blank">Twitter</a></li><li><a href="https://blog.habitu8.io/blog" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/chadloder/" target="_blank">Chad Loder</a> is the CEO and co-founder of <a href="https://www.habitu8.io/" target="_blank">Habitu8</a>, a Los Angeles-based cyber security startup that's transforming the security awareness industry away from its traditional "training-centric" approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors.</p><p>Prior to Habitu8, Chad was co-founder and VP of Engineering at <a href="https://www.rapid7.com/" target="_blank">Rapid7</a>, which he helped bring to a $900M IPO in 2015. Chad has also worked as a public company CISO and a strategic advisor to several security startups.</p><p>In this episode we discuss his start with phreaking, starting Rapid7, the focus on the human element in infosec, mistakes users make, how to measure your programs success, how people learn security, being a founder, and so much more.</p><p>Where you can find Chad:</p><ul><li><a href="https://www.linkedin.com/in/chadloder/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/chadloder" target="_blank">Twitter</a></li><li><a href="https://blog.habitu8.io/blog" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/62-chad-loder-just-basic-doesnt-mean-easy]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2353</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Dec 2018 07:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d057dd17-8255-444c-87af-6c4bf97407f3/062chadlodercybersecurityinterviews.mp3" length="38836708" type="audio/mpeg"/><itunes:duration>39:11</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Chad Loder is the CEO and co-founder of Habitu8, a Los Angeles-based cyber security startup that’s transforming the security awareness industry away from its traditional “training-centric” approach to an approach that is based on measurable risk reduction through influencing and measuring key employee behaviors. Prior to Habitu8, Chad was co-founder and VP of Engineering at…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#061 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised</title><itunes:title>#061 – Yonathan Klijnsma: If They Get Compromised, You Get Compromised</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/ydklijnsma/" target="_blank">Yonathan Klijnsma</a> is a threat researcher at <a href="https://www.riskiq.com" target="_blank">RiskIQ</a>, leading threat response and analysis efforts with the help of RiskIQ's expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work.</p><p>Outside of work Yonathan likes taking things apart and figuring out how they work; be it physical devices or digital like malware or ransomware. He is a regular presenter at industry conferences such as <a href="https://www.defcon.org/html/defcon-24/dc-24-speakers.html#Klijnsma" target="_blank">DEF CON</a> and is quoted in <a href="https://www.wired.com/story/black-friday-scams/" target="_blank">Wired</a>, <a href="https://www.foxnews.com/tech/black-friday-cyber-monday-shopping-scams-to-avoid-this-year" target="_blank">Fox News</a>, <a href="https://www.cnet.com/news/black-friday-brings-out-the-hackers-looking-to-rip-you-off/" target="_blank">C|NET</a>, and <a href="https://krebsonsecurity.com/tag/yonathan-klijnsma/" target="_blank">Krebs on Security</a> to name a few.</p><p>In this episode we discuss his start in information security, his current security research, Magecart, web application security, website asset management, supply chain security, and so much more.</p><p>Where you can find Yonathan:</p><ul><li><a href="https://www.linkedin.com/in/ydklijnsma/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ydklijnsma" target="_blank">Twitter</a></li><li><a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/" target="_blank">RiskIQ Blog</a></li><li><a href="https://github.com/0x3a" target="_blank">GitHub</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/ydklijnsma/" target="_blank">Yonathan Klijnsma</a> is a threat researcher at <a href="https://www.riskiq.com" target="_blank">RiskIQ</a>, leading threat response and analysis efforts with the help of RiskIQ's expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work.</p><p>Outside of work Yonathan likes taking things apart and figuring out how they work; be it physical devices or digital like malware or ransomware. He is a regular presenter at industry conferences such as <a href="https://www.defcon.org/html/defcon-24/dc-24-speakers.html#Klijnsma" target="_blank">DEF CON</a> and is quoted in <a href="https://www.wired.com/story/black-friday-scams/" target="_blank">Wired</a>, <a href="https://www.foxnews.com/tech/black-friday-cyber-monday-shopping-scams-to-avoid-this-year" target="_blank">Fox News</a>, <a href="https://www.cnet.com/news/black-friday-brings-out-the-hackers-looking-to-rip-you-off/" target="_blank">C|NET</a>, and <a href="https://krebsonsecurity.com/tag/yonathan-klijnsma/" target="_blank">Krebs on Security</a> to name a few.</p><p>In this episode we discuss his start in information security, his current security research, Magecart, web application security, website asset management, supply chain security, and so much more.</p><p>Where you can find Yonathan:</p><ul><li><a href="https://www.linkedin.com/in/ydklijnsma/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ydklijnsma" target="_blank">Twitter</a></li><li><a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/" target="_blank">RiskIQ Blog</a></li><li><a href="https://github.com/0x3a" target="_blank">GitHub</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/61-yonathan-klijnsma-get-compromised-get-compromised]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2350</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 03 Dec 2018 08:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6ee61448-21b6-4512-93a5-913470cc6289/061yonathanklijnsmacybersecurityinterviews.mp3" length="47458962" type="audio/mpeg"/><itunes:duration>43:27</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Yonathan Klijnsma is a threat researcher at RiskIQ, leading threat response and analysis efforts with the help of RiskIQ’s expansive data set. Both his work and hobbies focus on threat intelligence in the form of profiling threat actors as well as analyzing and taking apart the means by which digital crime groups work. Outside of…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#060 – Mike Johnson: Let’s Do The Right Thing</title><itunes:title>#060 – Mike Johnson: Let’s Do The Right Thing</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/mikevj/" target="_blank">Mike Johnson</a> is the <a href="https://www.ciodive.com/news/lyft-hires-first-ciso-prioritizing-security-in-self-driving-car-push/449112/" target="_blank">CISO of Lyft</a>, where he is responsible for Security, Data Privacy, and a few other key areas he can't talk about. He's been in the security field long enough to be able to use "decades" as a measure. In his time he's seen things, heard things, and shared his opinion on a great many things.</p><p>Prior to becoming <a href="https://blogs.wsj.com/cio/2017/08/03/lyft-hires-first-ciso-as-it-expands-into-self-driving-cars/" target="_blank">Lyft's first CISO</a>, he was at Salesforce working in various information security roles.</p><p>In this episode we discuss being an organizations first CISO, building a world class detection and response team, securing a development team, building security culture, data privacy, cyber security as a team sport, looking for non traditional skills, and so much more.</p><p>Where you can find Mike:</p><ul><li><a href="https://www.linkedin.com/in/mikevj/" target="_blank">LinkedIn</a></li><li><a href="https://blogs.wsj.com/cio/2017/08/03/lyft-hires-first-ciso-as-it-expands-into-self-driving-cars/" target="_blank">Wall Street Journal:&nbsp;Lyft Hires First CISO</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/mikevj/" target="_blank">Mike Johnson</a> is the <a href="https://www.ciodive.com/news/lyft-hires-first-ciso-prioritizing-security-in-self-driving-car-push/449112/" target="_blank">CISO of Lyft</a>, where he is responsible for Security, Data Privacy, and a few other key areas he can't talk about. He's been in the security field long enough to be able to use "decades" as a measure. In his time he's seen things, heard things, and shared his opinion on a great many things.</p><p>Prior to becoming <a href="https://blogs.wsj.com/cio/2017/08/03/lyft-hires-first-ciso-as-it-expands-into-self-driving-cars/" target="_blank">Lyft's first CISO</a>, he was at Salesforce working in various information security roles.</p><p>In this episode we discuss being an organizations first CISO, building a world class detection and response team, securing a development team, building security culture, data privacy, cyber security as a team sport, looking for non traditional skills, and so much more.</p><p>Where you can find Mike:</p><ul><li><a href="https://www.linkedin.com/in/mikevj/" target="_blank">LinkedIn</a></li><li><a href="https://blogs.wsj.com/cio/2017/08/03/lyft-hires-first-ciso-as-it-expands-into-self-driving-cars/" target="_blank">Wall Street Journal:&nbsp;Lyft Hires First CISO</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/060-mike-johnson-lets-right-thing]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2343</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 24 Sep 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b25ae224-a218-478b-b31b-96441006733a/060mikejohnsoncybersecurityinterviews.mp3" length="45674132" type="audio/mpeg"/><itunes:duration>48:51</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mike Johnson is the CISO of Lyft, where he is responsible for Security, Data Privacy, and a few other key areas he can’t talk about. He’s been in the security field long enough to be able to use “decades” as a measure. In his time he’s seen things, heard things, and shared his opinion on…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#059 – Jacob Williams: What Didn’t We Catch</title><itunes:title>#059 – Jacob Williams: What Didn’t We Catch</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jacob-williams-77938a16/" target="_blank">Jacob Williams</a> is the Founder and President of <a href="https://www.renditioninfosec.com/" target="_blank">Rendition Infosec</a>.&nbsp;Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. He's been involved in high-profile public sector cases including the malware analysis for the 2015 cyber attack on the Ukraine power grid. He's also tackled a variety of cases in the private sector.</p><p>Jake is a certified SANS instructor and co-author of <a href="https://www.sans.org/course/memory-forensics-in-depth" target="_blank">FOR526: Memory Forensics In-Depth</a> and <a href="https://www.sans.org/course/cyber-threat-intelligence" target="_blank">FOR578: Cyber Threat Intelligence</a> teaches a variety of other classes for SANS (SEC503, SEC504, SEC660, SEC760, FOR508, FOR526, FOR578, FOR610).</p><p>Given his accomplishments, it should come as no surprise that Jake lives, sleeps, and breathes Infosec. He's a regular speaker at industry conferences including DC3, BSides (including BSides Las Vegas), DEFCON, Blackhat, Shmoocon, EnFuse, ISSA Summits, ISACA Summits, SANS Summits, and Distributech. He has also presented security topics to a number of Fortune 100 executives. Jake is also a two-time victor at the annual DC3 Digital Forensics Challenge.</p><p>In this episode we discuss his passion for cyber security, changes in the industry, threat hunting vs. incident response, development of soft skills, AI and machine learning, holding back vulnerability disclosure, and so much more.</p><p>Where you can find Jake:</p><ul><li><a href="https://www.linkedin.com/in/jacob-williams-77938a16/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/MalwareJake" target="_blank">Twitter</a></li><li><a href="https://www.renditioninfosec.com/" target="_blank">Rendition InfoSec</a></li><li><a href="https://www.sans.org/instructors/jake-williams" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jacob-williams-77938a16/" target="_blank">Jacob Williams</a> is the Founder and President of <a href="https://www.renditioninfosec.com/" target="_blank">Rendition Infosec</a>.&nbsp;Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. He's been involved in high-profile public sector cases including the malware analysis for the 2015 cyber attack on the Ukraine power grid. He's also tackled a variety of cases in the private sector.</p><p>Jake is a certified SANS instructor and co-author of <a href="https://www.sans.org/course/memory-forensics-in-depth" target="_blank">FOR526: Memory Forensics In-Depth</a> and <a href="https://www.sans.org/course/cyber-threat-intelligence" target="_blank">FOR578: Cyber Threat Intelligence</a> teaches a variety of other classes for SANS (SEC503, SEC504, SEC660, SEC760, FOR508, FOR526, FOR578, FOR610).</p><p>Given his accomplishments, it should come as no surprise that Jake lives, sleeps, and breathes Infosec. He's a regular speaker at industry conferences including DC3, BSides (including BSides Las Vegas), DEFCON, Blackhat, Shmoocon, EnFuse, ISSA Summits, ISACA Summits, SANS Summits, and Distributech. He has also presented security topics to a number of Fortune 100 executives. Jake is also a two-time victor at the annual DC3 Digital Forensics Challenge.</p><p>In this episode we discuss his passion for cyber security, changes in the industry, threat hunting vs. incident response, development of soft skills, AI and machine learning, holding back vulnerability disclosure, and so much more.</p><p>Where you can find Jake:</p><ul><li><a href="https://www.linkedin.com/in/jacob-williams-77938a16/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/MalwareJake" target="_blank">Twitter</a></li><li><a href="https://www.renditioninfosec.com/" target="_blank">Rendition InfoSec</a></li><li><a href="https://www.sans.org/instructors/jake-williams" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/059-jacob-williams-didnt-catch]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2338</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 17 Sep 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/dad85c69-427b-4d78-b69d-e2fcdf7f4b67/059jakewilliamscybersecurityinterviews.mp3" length="42987008" type="audio/mpeg"/><itunes:duration>45:28</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jacob Williams is the Founder and President of Rendition Infosec. Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. He’s been involved in high-profile public sector cases including the malware analysis…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#058 – Josh Corman: The Absence of Good</title><itunes:title>#058 – Josh Corman: The Absence of Good</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/joshcorman/" target="_blank">Joshua Corman</a> is a Founder of <a href="https://www.iamthecavalry.org/" target="_blank">I am The Cavalry (dot org)</a> and CSO for <a href="https://www.ptc.com/" target="_blank">PTC</a>. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, &amp; strategy roles. He co-founded RuggedSoftware and <a href="https://www.iamthecavalry.org/" target="_blank">IamTheCavalry</a> to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure.</p><p>Josh's unique approach to security in the context of human factors, adversary motivations, and social impact, has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.</p><p>In this episode we discuss his start in information security, being a super hero, the start of I am The Cavalry, cyber security and public safety,&nbsp;government vs. hackers, IoT security, looking for non-traditional cyber skills, and so much more.</p><p>Where you can find Josh:</p><ul><li><a href="https://www.linkedin.com/in/joshcorman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/joshcorman" target="_blank">Twitter</a></li><li><a href="https://www.iamthecavalry.org/" target="_blank">I am The Cavalry</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/joshcorman/" target="_blank">Joshua Corman</a> is a Founder of <a href="https://www.iamthecavalry.org/" target="_blank">I am The Cavalry (dot org)</a> and CSO for <a href="https://www.ptc.com/" target="_blank">PTC</a>. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, &amp; strategy roles. He co-founded RuggedSoftware and <a href="https://www.iamthecavalry.org/" target="_blank">IamTheCavalry</a> to encourage new security approaches in response to the world’s increasing dependence on digital infrastructure.</p><p>Josh's unique approach to security in the context of human factors, adversary motivations, and social impact, has helped position him as one of the most trusted names in security. He also serves as an adjunct faculty for Carnegie Mellon’s Heinz College and on the Congressional Task Force for Healthcare Industry Cybersecurity.</p><p>In this episode we discuss his start in information security, being a super hero, the start of I am The Cavalry, cyber security and public safety,&nbsp;government vs. hackers, IoT security, looking for non-traditional cyber skills, and so much more.</p><p>Where you can find Josh:</p><ul><li><a href="https://www.linkedin.com/in/joshcorman/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/joshcorman" target="_blank">Twitter</a></li><li><a href="https://www.iamthecavalry.org/" target="_blank">I am The Cavalry</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/058-josh-corman-absence-good]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2331</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Sep 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9f8764dc-4dea-49a9-8571-e71dcbb35e68/058joshcormancybersecurityinterviews.mp3" length="40367833" type="audio/mpeg"/><itunes:duration>42:29</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Joshua Corman is a Founder of I am The Cavalry (dot org) and CSO for PTC. Josh previously served as Director of the Cyber Statecraft Initiative for the Atlantic Council, CTO for Sonatype, Director of Security Intelligence for Akamai, and in senior research, analyst, &amp;amp; strategy roles. He co-founded RuggedSoftware and IamTheCavalry to encourage new…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#057 – Ron Gula: Encourage People To Be Entrepreneurs</title><itunes:title>#057 – Ron Gula: Encourage People To Be Entrepreneurs</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/rongula/" target="_blank">Ron Gula</a> is the President of&nbsp;<a href="http://www.gula.tech/" target="_blank">Gula Tech Adventures</a>. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking's team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. As CEO and co-founder of Tenable Network Security, Ron led the company's rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20,000 customers worldwide, raise $300m in venture capital and achieve revenues in excess of $100m annually. Currently, Ron is President at Gula Tech Adventures which focuses on investing and advisement of cyber-security companies.</p><p>In this episode we discuss starting in security in the 1990's at the NSA, starting Tenable and its growth to IPO, different start-up spaces, where he gets involved in start-ups, advice he gives to founders, what he looks for to invest in, where he sees the cyber security market going, and so much more.</p><p>Where you can find Ron:</p><ul><li><a href="https://www.linkedin.com/in/rongula/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/rongula" target="_blank">Twitter</a></li><li><a href="https://medium.com/gula-tech-adventures" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/rongula/" target="_blank">Ron Gula</a> is the President of&nbsp;<a href="http://www.gula.tech/" target="_blank">Gula Tech Adventures</a>. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking's team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security monitoring and produced the Dragon Intrusion Detection System which was recognized as a market leader by Gartner in 2001. As CEO and co-founder of Tenable Network Security, Ron led the company's rapid growth and product vision from 2002 through 2016. He helped them scale to more than 20,000 customers worldwide, raise $300m in venture capital and achieve revenues in excess of $100m annually. Currently, Ron is President at Gula Tech Adventures which focuses on investing and advisement of cyber-security companies.</p><p>In this episode we discuss starting in security in the 1990's at the NSA, starting Tenable and its growth to IPO, different start-up spaces, where he gets involved in start-ups, advice he gives to founders, what he looks for to invest in, where he sees the cyber security market going, and so much more.</p><p>Where you can find Ron:</p><ul><li><a href="https://www.linkedin.com/in/rongula/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/rongula" target="_blank">Twitter</a></li><li><a href="https://medium.com/gula-tech-adventures" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/057-ron-gula-encourage-people-entrepreneurs]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2268</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 23 Jul 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/197b4dd3-3d6c-4de7-a4c7-e664f4ca3b94/057rongulacybersecurityinterviews.mp3" length="35192042" type="audio/mpeg"/><itunes:duration>36:37</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ron Gula is the President of Gula Tech Adventures. Ron started his cybersecurity career as a network penetration tester for the NSA. At BBN, he developed network honeypots to lure hackers and he ran US Internetworking’s team of penetration testers and incident responders. As CTO of Network Security Wizards, Ron pioneered the art of network security…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#056 – It’s Just Data!</title><itunes:title>#056 – It’s Just Data!</itunes:title><description><![CDATA[<p>This is a special episode where my guests actually turn the mics and spotlight on me. In this episode, I speak with&nbsp;<a href="https://www.linkedin.com/in/kriswasserman/" target="_blank">Kristopher Wasserman</a> and&nbsp;<a href="https://www.linkedin.com/in/richardbrooman/" target="_blank">Ricky Brooman</a>, both governance and eDiscovery experts that wanted to get deeper knowledge about cyber security. We discuss how folks in the litigation and eDiscovery world can help, compliment, and jump ship to cyber security. Additionally, we discuss what is similar and different in how organizations respond to government inquires, data breaches, and litigation.</p><p>Kristopher brings over 12 years of experience to his role as Vice President and Senior Consultant at D4. Kris oversees a team of Discovery Engineers that provide technical expertise and guidance to clients to develop defensible cost-effective solutions that involve managing data that may be used as evidence.</p><p>Ricky is a Litigation Support Project Manager at Saul Ewing Arnstein &amp; Lehr LLP. In this capacity, he consults clients on best practices for information governance and electronic discovery, and manages all phases of the EDRM for litigation matters. Ricky is also a member of ILTA's Program Planning Counsel.</p><p>I hope you enjoy this special episode of Cyber Security Interviews.</p>]]></description><content:encoded><![CDATA[<p>This is a special episode where my guests actually turn the mics and spotlight on me. In this episode, I speak with&nbsp;<a href="https://www.linkedin.com/in/kriswasserman/" target="_blank">Kristopher Wasserman</a> and&nbsp;<a href="https://www.linkedin.com/in/richardbrooman/" target="_blank">Ricky Brooman</a>, both governance and eDiscovery experts that wanted to get deeper knowledge about cyber security. We discuss how folks in the litigation and eDiscovery world can help, compliment, and jump ship to cyber security. Additionally, we discuss what is similar and different in how organizations respond to government inquires, data breaches, and litigation.</p><p>Kristopher brings over 12 years of experience to his role as Vice President and Senior Consultant at D4. Kris oversees a team of Discovery Engineers that provide technical expertise and guidance to clients to develop defensible cost-effective solutions that involve managing data that may be used as evidence.</p><p>Ricky is a Litigation Support Project Manager at Saul Ewing Arnstein &amp; Lehr LLP. In this capacity, he consults clients on best practices for information governance and electronic discovery, and manages all phases of the EDRM for litigation matters. Ricky is also a member of ILTA's Program Planning Counsel.</p><p>I hope you enjoy this special episode of Cyber Security Interviews.</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/056-just-data]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2245</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 16 Jul 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f2b22a6e-faa6-446b-b3e6-11a8121953f2/056itsjustdatacybersecurityinterviews.mp3" length="65098941" type="audio/mpeg"/><itunes:duration>01:07:49</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is a special episode where my guests actually turn the mics and spotlight on me. In this episode, I speak with Kristopher Wasserman and Ricky Brooman, both governance and eDiscovery experts that wanted to get deeper knowledge about cyber security. We discuss how folks in the litigation and eDiscovery world can help, compliment, and jump ship…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#055 – Mark Greisiger: What Could a Future Breach Cost Me</title><itunes:title>#055 – Mark Greisiger: What Could a Future Breach Cost Me</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/mark-greisiger-475b053/" target="_blank">Mark Greisiger</a> has led <a href="https://netdiligence.com/mark-greisiger/" target="_blank">NetDiligence</a>, a Cyber Risk Assessment and Data Breach Services company, since its inception in 2001. During that time, Mark has been responsible for the creation of highly-focused services that are used by leading cyber liability insurers in the U.S. and U.K. to support both loss-control and education objectives.</p><p>Prior to joining NetDiligence, Mark spent 12 years in the insurance industry, primarily with CIGNA P&amp;C, where he created the first generation of cyber risk insurance. Mark is also a frequently published contributor to various insurance &amp; risk management publications and a sought-after speaker on the topic of cyber risk and liability.</p><p>In this episode we discuss cyber risk insurance, right sizing cyber insurance, gathering the metrics for breaches, the costs of breaches, the impact to SMB's, GDPR, data privacy, and so much more.</p><p>Where you can find Mark:</p><ul><li><a href="https://www.linkedin.com/in/mark-greisiger-475b053/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/NetDiligence" target="_blank">Twitter</a></li><li><a href="https://netdiligence.com/about/" target="_blank">NetDiligence</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/mark-greisiger-475b053/" target="_blank">Mark Greisiger</a> has led <a href="https://netdiligence.com/mark-greisiger/" target="_blank">NetDiligence</a>, a Cyber Risk Assessment and Data Breach Services company, since its inception in 2001. During that time, Mark has been responsible for the creation of highly-focused services that are used by leading cyber liability insurers in the U.S. and U.K. to support both loss-control and education objectives.</p><p>Prior to joining NetDiligence, Mark spent 12 years in the insurance industry, primarily with CIGNA P&amp;C, where he created the first generation of cyber risk insurance. Mark is also a frequently published contributor to various insurance &amp; risk management publications and a sought-after speaker on the topic of cyber risk and liability.</p><p>In this episode we discuss cyber risk insurance, right sizing cyber insurance, gathering the metrics for breaches, the costs of breaches, the impact to SMB's, GDPR, data privacy, and so much more.</p><p>Where you can find Mark:</p><ul><li><a href="https://www.linkedin.com/in/mark-greisiger-475b053/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/NetDiligence" target="_blank">Twitter</a></li><li><a href="https://netdiligence.com/about/" target="_blank">NetDiligence</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/055-mark-greisiger-future-breach-cost]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2238</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 Jun 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/9a356bbc-fa42-449e-8cf3-1a14ac8e68a4/055markgreisigericybersecurityinterviews.mp3" length="18025144" type="audio/mpeg"/><itunes:duration>18:44</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Mark Greisiger has led NetDiligence, a Cyber Risk Assessment and Data Breach Services company, since its inception in 2001. During that time, Mark has been responsible for the creation of highly-focused services that are used by leading cyber liability insurers in the U.S. and U.K. to support both loss-control and education objectives. Prior to joining…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#054 – Brian Vecci: Understanding the Value of What We Have</title><itunes:title>#054 – Brian Vecci: Understanding the Value of What We Have</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/brianvecci/" target="_blank">Brian Vecci</a> is the Technical Evangelist at <a href="https://www.varonis.com/?ref=cybersecurityinterviews.com" target="_blank">Varonis</a>&nbsp;where he&nbsp;supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges.</p><p>In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecurity. Brian joined Varonis in 2010 as director of education and development. Before joining Varonis, Brian worked on systems architecture at UBS. He holds a CISSP certification and frequently presents on topics related to security and technology. He has been quoted in news sources ranging from The Financial Times to <a href="https://www.darkreading.com/author-bio.asp?author_id=2721&amp;" target="_blank">Dark Reading</a> and has made multiple appearances on <a href="https://www.cnbc.com/video/2017/09/15/card-sharks.html" target="_blank">CNBC</a>.</p><p>In this episode we discuss his start on help desk and his move to developer, his current role as evangelist, using the word cyber, information governance and the value of data, GDPR, the future of data privacy, and so much more.</p><p>Where you can find Brian:</p><ul><li><a href="https://www.linkedin.com/in/brianvecci/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brianthevecci" target="_blank">Twitter</a></li><li><a href="https://blog.varonis.com/author/brianv/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/brianvecci/" target="_blank">Brian Vecci</a> is the Technical Evangelist at <a href="https://www.varonis.com/?ref=cybersecurityinterviews.com" target="_blank">Varonis</a>&nbsp;where he&nbsp;supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges.</p><p>In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial services, legal, and cybersecurity. Brian joined Varonis in 2010 as director of education and development. Before joining Varonis, Brian worked on systems architecture at UBS. He holds a CISSP certification and frequently presents on topics related to security and technology. He has been quoted in news sources ranging from The Financial Times to <a href="https://www.darkreading.com/author-bio.asp?author_id=2721&amp;" target="_blank">Dark Reading</a> and has made multiple appearances on <a href="https://www.cnbc.com/video/2017/09/15/card-sharks.html" target="_blank">CNBC</a>.</p><p>In this episode we discuss his start on help desk and his move to developer, his current role as evangelist, using the word cyber, information governance and the value of data, GDPR, the future of data privacy, and so much more.</p><p>Where you can find Brian:</p><ul><li><a href="https://www.linkedin.com/in/brianvecci/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brianthevecci" target="_blank">Twitter</a></li><li><a href="https://blog.varonis.com/author/brianv/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/054-brian-vecci-understanding-value]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2220</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Wed, 20 Jun 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/04cdb123-e1c0-4c60-9279-50d056d08340/053brianveccicybersecurityinterviews.mp3" length="43723477" type="audio/mpeg"/><itunes:duration>45:30</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Brian Vecci is the Technical Evangelist at Varonis where he supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges. In his 20-year technical career, Brian served as a developer, tech architect, engineer and product manager for companies in financial…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#053 – Cameron Williams: Make Your Day Easier</title><itunes:title>#053 – Cameron Williams: Make Your Day Easier</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/cameron-williams-3696a18b/" target="_blank">Cameron Williams</a> is the Founder and CTO of <a href="https://overwatchid.com/press/" target="_blank">OverWatchID</a>. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such as IBM, Boeing, Sony, BP, Chase and Washington Mutual. He has designed and built a multitude of access management systems including privileged access management, identity access management (SSO, SAML, OAuth and Federation) and cloud access security brokering systems.</p><p>Prior to cofounding OverWatchID, Cameron was VP Engineering at IntelliSecure, where he led the development of a next generation MSSP platform including multi-tenant PAM, correlation engine (SIEM software), deployment automation, and application monitoring systems.</p><p>In this episode we discuss the alphabet soup of identity and access management, cloud security, maturing the trust model, the problems he is trying to solve, why he switched to IT from pre-med, automation and orchestration, and so much more.</p><p>Where you can find Cam:</p><ul><li><a href="https://www.linkedin.com/in/cameron-williams-3696a18b/" target="_blank">LinkedIn</a></li><li><a href="https://overwatchid.com/press/" target="_blank">OverWatchID</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/cameron-williams-3696a18b/" target="_blank">Cameron Williams</a> is the Founder and CTO of <a href="https://overwatchid.com/press/" target="_blank">OverWatchID</a>. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such as IBM, Boeing, Sony, BP, Chase and Washington Mutual. He has designed and built a multitude of access management systems including privileged access management, identity access management (SSO, SAML, OAuth and Federation) and cloud access security brokering systems.</p><p>Prior to cofounding OverWatchID, Cameron was VP Engineering at IntelliSecure, where he led the development of a next generation MSSP platform including multi-tenant PAM, correlation engine (SIEM software), deployment automation, and application monitoring systems.</p><p>In this episode we discuss the alphabet soup of identity and access management, cloud security, maturing the trust model, the problems he is trying to solve, why he switched to IT from pre-med, automation and orchestration, and so much more.</p><p>Where you can find Cam:</p><ul><li><a href="https://www.linkedin.com/in/cameron-williams-3696a18b/" target="_blank">LinkedIn</a></li><li><a href="https://overwatchid.com/press/" target="_blank">OverWatchID</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/053-cameron-williams-make-day-easier]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2090</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 14 May 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b36e79e9-6720-47ec-8acb-dcd04f965b8d/053cameronwillimascybersecurityinterviews.mp3" length="41267948" type="audio/mpeg"/><itunes:duration>42:57</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cameron Williams is the Founder and CTO of OverWatchID. Cam has more than 22 years of experience as a leader in the cyber security industry. He has led breach mitigation and designed security solutions/countermeasures for leading global companies such as IBM, Boeing, Sony, BP, Chase and Washington Mutual. He has designed and built a multitude…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#052 – Jeremiah Grossman: The Cavalry Is Not Coming</title><itunes:title>#052 – Jeremiah Grossman: The Cavalry Is Not Coming</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/grossmanjeremiah/" target="_blank">Jeremiah Grossman</a> is the CEO of&nbsp;<a href="https://bitdiscovery.com/" target="_blank">Bit Discovery</a>.&nbsp;Jeremiah's career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry's biggest names.</p><p>Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as "the embodiment of converged IT and physical security.” In 2001, Jeremiah founded <a href="https://www.whitehatsec.com/" target="_blank">WhiteHat Security</a>, which today has one of the largest professional hacking armies on the planet. Jeremiah has received a number of industry awards, been publicly thanked by Microsoft, Mozilla, Google, Facebook, and many others for privately informing them of weaknesses in their systems -- a polite way of saying, ‘hacking them'.</p><p>In this episode we discuss RSAC 2018, starting in infosec, web application vulnerabilities, what to look for in application security developers, building security development metrics, why you need to inventory websites, making time to contribute to the community,&nbsp;and so much more.</p><p>Where you can find Jer:</p><ul><li><a href="https://www.linkedin.com/in/grossmanjeremiah/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jeremiahg" target="_blank">Twitter</a></li><li><a href="http://blog.jeremiahgrossman.com/" target="_blank">Blog</a></li><li><a href="https://www.jeremiahgrossman.com/" target="_blank">Jeremiahgrossman.com</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/grossmanjeremiah/" target="_blank">Jeremiah Grossman</a> is the CEO of&nbsp;<a href="https://bitdiscovery.com/" target="_blank">Bit Discovery</a>.&nbsp;Jeremiah's career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry's biggest names.</p><p>Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as "the embodiment of converged IT and physical security.” In 2001, Jeremiah founded <a href="https://www.whitehatsec.com/" target="_blank">WhiteHat Security</a>, which today has one of the largest professional hacking armies on the planet. Jeremiah has received a number of industry awards, been publicly thanked by Microsoft, Mozilla, Google, Facebook, and many others for privately informing them of weaknesses in their systems -- a polite way of saying, ‘hacking them'.</p><p>In this episode we discuss RSAC 2018, starting in infosec, web application vulnerabilities, what to look for in application security developers, building security development metrics, why you need to inventory websites, making time to contribute to the community,&nbsp;and so much more.</p><p>Where you can find Jer:</p><ul><li><a href="https://www.linkedin.com/in/grossmanjeremiah/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jeremiahg" target="_blank">Twitter</a></li><li><a href="http://blog.jeremiahgrossman.com/" target="_blank">Blog</a></li><li><a href="https://www.jeremiahgrossman.com/" target="_blank">Jeremiahgrossman.com</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/052-jeremiah-grossman-cavalry-not-coming]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2082</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 30 Apr 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/22d27994-0797-4ccb-8d1f-7d007f66ca88/052jeremiahgrossmancybersecurityinterviews.mp3" length="32305958" type="audio/mpeg"/><itunes:duration>33:37</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jeremiah Grossman is the CEO of Bit Discovery.  Jeremiah’s career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. Since Jeremiah earned a Brazilian Jiu-Jitsu black belt, the media has described him as “the embodiment of converged IT and physical security.” In 2001, Jeremiah…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult</title><itunes:title>#051 – Robert M. Lee: The Adversary’s Ability to Change Their Trade Craft is Difficult</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/robmichaellee/" target="_blank">Robert M. Lee</a> is the CEO and Founder of the industrial (ICS/IIoT) cyber security company<a href="http://dragos.com/" target="_blank"> Dragos, Inc</a>. He is also a non-resident National Cybersecurity Fellow at <a href="https://www.newamerica.org/cybersecurity-initiative/" target="_blank">New America</a> focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of <a href="http://passcode.csmonitor.com/influencers" target="_blank">Passcode’s Influencers</a>, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into <a href="http://www.forbes.com/pictures/mll45klmm/robert-lee-27/" target="_blank">Forbes’ 30 under 30</a> for Enterprise Technology (2016).</p><p>A passionate educator, Robert is the course author of <a href="http://www.sans.org/course/industrial-control-system-active-defense-and-incident-response" target="_blank">SANS ICS515</a> – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of <a href="https://www.sans.org/course/cyber-threat-intelligence" target="_blank">SANS FOR578</a> – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification.</p><p>Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission.</p><p>In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the <a href="https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/" target="_blank">2015 Ukrainian power grid attack</a>, starting and teaching a SANS ICS class, advice he would give someone starting in the industry, and <a href="https://q22018.hacknyc.com/en/" target="_blank">HACKNYC</a>, and so much more.</p><p>Where you can find Robert:</p><ul><li><a href="https://www.linkedin.com/in/robmichaellee/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/RobertMLee" target="_blank">Twitter</a></li><li><a href="http://www.robertmlee.org/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/robmichaellee/" target="_blank">Robert M. Lee</a> is the CEO and Founder of the industrial (ICS/IIoT) cyber security company<a href="http://dragos.com/" target="_blank"> Dragos, Inc</a>. He is also a non-resident National Cybersecurity Fellow at <a href="https://www.newamerica.org/cybersecurity-initiative/" target="_blank">New America</a> focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of <a href="http://passcode.csmonitor.com/influencers" target="_blank">Passcode’s Influencers</a>, awarded EnergySec’s Cyber Security Professional of the Year (2015), and inducted into <a href="http://www.forbes.com/pictures/mll45klmm/robert-lee-27/" target="_blank">Forbes’ 30 under 30</a> for Enterprise Technology (2016).</p><p>A passionate educator, Robert is the course author of <a href="http://www.sans.org/course/industrial-control-system-active-defense-and-incident-response" target="_blank">SANS ICS515</a> – “ICS Active Defense and Incident Response” with its accompanying GIAC certification GRID and the lead-author of <a href="https://www.sans.org/course/cyber-threat-intelligence" target="_blank">SANS FOR578</a> – “Cyber Threat Intelligence” with its accompanying GIAC GCTI certification.</p><p>Robert obtained his start in cyber security in the U.S. Air Force where he served as a Cyber Warfare Operations Officer. He has performed defense, intelligence, and attack missions in various government organizations including the establishment of a first-of-its-kind ICS/SCADA cyber threat intelligence and intrusion analysis mission.</p><p>In this episode we discuss threat hunting, SCADA/ICS, IIoT, IoT security, his start in cyber security, the <a href="https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/" target="_blank">2015 Ukrainian power grid attack</a>, starting and teaching a SANS ICS class, advice he would give someone starting in the industry, and <a href="https://q22018.hacknyc.com/en/" target="_blank">HACKNYC</a>, and so much more.</p><p>Where you can find Robert:</p><ul><li><a href="https://www.linkedin.com/in/robmichaellee/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/RobertMLee" target="_blank">Twitter</a></li><li><a href="http://www.robertmlee.org/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/051-robert-m-lee-adversarys-ability-change-trade-craft-difficult]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2072</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Tue, 24 Apr 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/c826004f-6384-4b16-a3f8-c772b50a9a00/051robertmleecybersecurityinterviews.mp3" length="50193989" type="audio/mpeg"/><itunes:duration>52:14</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Robert M. Lee is the CEO and Founder of the industrial (ICS/IIoT) cyber security company Dragos, Inc. He is also a non-resident National Cybersecurity Fellow at New America focusing on policy issues relating to the cyber security of critical infrastructure. For his research and focus areas, Robert was named one of Passcode’s Influencers, awarded EnergySec’s…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#050 – Chris Roberts: Make New Mistakes</title><itunes:title>#050 – Chris Roberts: Make New Mistakes</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/sidragon1/" target="_blank">Chris Roberts</a> is the Chief Security Architect at&nbsp;<a href="https://www.acalvio.com/company/#leadership" target="_blank">Acalvio</a> and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry.</p><p>At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients.</p><p>(In English) Acalvio has given him the opportunity to help shape the next generation of deception platforms, allowed him to spend time doing R&amp;D...and he still gets to break into companies and help them with their maturity modeling and overall solutions within the security industry.</p><p>For the 50th episode, I couldn't have picked a better guest and this was my favorite interview to date. We discuss scotch tasting and food, and how that relates to infosec, building a better cyber security community, learning from past mistakes, why giving back to the community is so important, why the new generation needs to make their own mistakes, the word hacker, and so much more.</p><p>Where you can find Chris:</p><ul><li><a href="https://www.linkedin.com/in/sidragon1/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/Sidragon1" target="_blank">Twitter</a></li><li><a href="https://www.google.com/search?q=chris+roberts+hacker&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwiat86l6araAhUM2IMKHV6ZAo4Q_AUICSgA&amp;biw=1920&amp;bih=984&amp;dpr=1" target="_blank">The Googles</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/sidragon1/" target="_blank">Chris Roberts</a> is the Chief Security Architect at&nbsp;<a href="https://www.acalvio.com/company/#leadership" target="_blank">Acalvio</a> and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry.</p><p>At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security posture of both enterprise, industrial and government clients.</p><p>(In English) Acalvio has given him the opportunity to help shape the next generation of deception platforms, allowed him to spend time doing R&amp;D...and he still gets to break into companies and help them with their maturity modeling and overall solutions within the security industry.</p><p>For the 50th episode, I couldn't have picked a better guest and this was my favorite interview to date. We discuss scotch tasting and food, and how that relates to infosec, building a better cyber security community, learning from past mistakes, why giving back to the community is so important, why the new generation needs to make their own mistakes, the word hacker, and so much more.</p><p>Where you can find Chris:</p><ul><li><a href="https://www.linkedin.com/in/sidragon1/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/Sidragon1" target="_blank">Twitter</a></li><li><a href="https://www.google.com/search?q=chris+roberts+hacker&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwiat86l6araAhUM2IMKHV6ZAo4Q_AUICSgA&amp;biw=1920&amp;bih=984&amp;dpr=1" target="_blank">The Googles</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/050-chris-roberts-make-new-mistakes]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2067</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 09 Apr 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/adf0c813-45a6-442a-af8e-3ffe53165236/050chrisrobertscybersecurityinterviews.mp3" length="45124826" type="audio/mpeg"/><itunes:duration>46:58</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Chris Roberts is the Chief Security Architect at Acalvio and is regarded as one of the world’s foremost experts on counter threat intelligence within the cyber security industry. At Acalvio, Chris helps drive Technology Innovation and Product Leadership. In addition, Roberts directs a portfolio of services within Acalvio designed to improve the physical and digital security…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#049 – Keith McCammon: We Have An Analysis Problem</title><itunes:title>#049 – Keith McCammon: We Have An Analysis Problem</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/keithmccammon/" target="_blank">Keith McCammon</a> is the Chief Security Officer and Co-founder of <a href="https://redcanary.com" target="_blank">Red Canary</a> in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in their customers’ environments.</p><p>Keith is a known expert in offensive cyber computing and defensive IT security from his background as Director of Commercial Security at Kyrus and Executive Director of Information Technology at ManTech.</p><p>In this episode we discuss his training and start in technology, working in the government space, founding and growing a cyber security firm, the problems he is trying to solve, scaling analysis, securing the cloud, solving the talent shortage problem, and so much more.</p><p>Where you can find Keith:</p><ul><li><a href="https://www.linkedin.com/in/keithmccammon/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/kwm" target="_blank">Twitter</a></li><li><a href="https://redcanary.com/blog/" target="_blank">Blog</a></li><li><a href="https://github.com/keithmccammon" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/keithmccammon/" target="_blank">Keith McCammon</a> is the Chief Security Officer and Co-founder of <a href="https://redcanary.com" target="_blank">Red Canary</a> in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in their customers’ environments.</p><p>Keith is a known expert in offensive cyber computing and defensive IT security from his background as Director of Commercial Security at Kyrus and Executive Director of Information Technology at ManTech.</p><p>In this episode we discuss his training and start in technology, working in the government space, founding and growing a cyber security firm, the problems he is trying to solve, scaling analysis, securing the cloud, solving the talent shortage problem, and so much more.</p><p>Where you can find Keith:</p><ul><li><a href="https://www.linkedin.com/in/keithmccammon/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/kwm" target="_blank">Twitter</a></li><li><a href="https://redcanary.com/blog/" target="_blank">Blog</a></li><li><a href="https://github.com/keithmccammon" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/049-keith-mccammon-analysis-problem]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2058</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 02 Apr 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/09693ece-4613-4a67-b231-5da39880e8f8/049keithmccammoncybersecurityinterviews.mp3" length="46178705" type="audio/mpeg"/><itunes:duration>48:04</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Keith McCammon is the Chief Security Officer and Co-founder of Red Canary in Denver, CO. Keith runs Red Canary’s Security Operations Center and leads a group of expert analysts that monitor a continuous stream of potential attacks detected in their customers’ environments. Keith is a known expert in offensive cyber computing and defensive IT security…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#048 – Tom Brennan: Engage the Community In a Positive Way</title><itunes:title>#048 – Tom Brennan: Engage the Community In a Positive Way</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/tombrennan/" target="_blank">Tom Brennan</a> is the Founder of <a href="https://www.proactiverisk.com" target="_blank">Proactive Risk</a> with two decades of hands on the keyboard experience&nbsp;building, breaking and defending data for clients worldwide. He is a an alumni of McAfee, Intel Security, SafeCode, Trustwave, WhiteHat, ADP, Datek Online, and the United States Marines. Tom served the <a href="https://www.owasp.org" target="_blank">OWASP</a> Foundation as an elected member of the Global Board of Directors for ten years. He also founded the New Jersey OWASP Chapter and grew the New York City as President for thirteen Years.</p><p>Today, Tom is associated with <a href="http://www.crest-approved.org/usa/crest-usa-chapter-board/index.html" target="_blank">CREST International</a> as its elected Chairman of the Americas Board and participates as technical advisor for New Jersey Institute of Technology, County College of Morris, Morris County Economic Development Corporation, Rockaway Township Official, and is a member of the CERT team.</p><p>In this episode we discuss his start in information security, building secure software, giving back to the cyber security community, mentors he has had, recommendations he gives to people starting in infosec, starting the <a href="http://hacknyc.com/" target="_blank">HACKNYC</a> conference, and so much more.</p><p>Where you can find Tom:</p><ul><li><a href="https://www.linkedin.com/in/tombrennan/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brennantom" target="_blank">Twitter</a></li><li><a href="https://www.owasp.org/index.php/User:Brennan" target="_blank">OWASP</a></li><li><a href="http://hacknyc.com/" target="_blank">HACKNYC</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/tombrennan/" target="_blank">Tom Brennan</a> is the Founder of <a href="https://www.proactiverisk.com" target="_blank">Proactive Risk</a> with two decades of hands on the keyboard experience&nbsp;building, breaking and defending data for clients worldwide. He is a an alumni of McAfee, Intel Security, SafeCode, Trustwave, WhiteHat, ADP, Datek Online, and the United States Marines. Tom served the <a href="https://www.owasp.org" target="_blank">OWASP</a> Foundation as an elected member of the Global Board of Directors for ten years. He also founded the New Jersey OWASP Chapter and grew the New York City as President for thirteen Years.</p><p>Today, Tom is associated with <a href="http://www.crest-approved.org/usa/crest-usa-chapter-board/index.html" target="_blank">CREST International</a> as its elected Chairman of the Americas Board and participates as technical advisor for New Jersey Institute of Technology, County College of Morris, Morris County Economic Development Corporation, Rockaway Township Official, and is a member of the CERT team.</p><p>In this episode we discuss his start in information security, building secure software, giving back to the cyber security community, mentors he has had, recommendations he gives to people starting in infosec, starting the <a href="http://hacknyc.com/" target="_blank">HACKNYC</a> conference, and so much more.</p><p>Where you can find Tom:</p><ul><li><a href="https://www.linkedin.com/in/tombrennan/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brennantom" target="_blank">Twitter</a></li><li><a href="https://www.owasp.org/index.php/User:Brennan" target="_blank">OWASP</a></li><li><a href="http://hacknyc.com/" target="_blank">HACKNYC</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/048-tom-brennan-engage-community-positive-way]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2052</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 26 Mar 2018 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/78b285aa-d332-4cab-9c9a-5c4fd48d8c35/048tombrennanlcybersecurityinterviews.mp3" length="39284024" type="audio/mpeg"/><itunes:duration>40:53</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Tom Brennan is the Founder of Proactive Risk with two decades of hands on the keyboard experience  building, breaking and defending data for clients worldwide. He is a an alumni of McAfee, Intel Security, SafeCode, Trustwave, WhiteHat, ADP, Datek Online, and the United States Marines. Tom served the OWASP Foundation as an elected member of…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#047 – Cody Cornell: Allow People to Focus on Interesting Things</title><itunes:title>#047 – Cody Cornell: Allow People to Focus on Interesting Things</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/codycornell/" target="_blank">Cody Cornell</a> is the Founder and CEO of <a href="https://swimlane.com/" target="_blank">Swimlane</a>. Cody is responsible for the strategic direction of Swimlane and the development of it’s security operations management platform. Collaborating with industry leading technology vendors, he works to identify opportunities to streamline and automate security activities saving customer operations costs and reducing risk.</p><p>In 2011, Cody co-founded Phoenix Data Security Inc., a focused cyber security professional services organization. Prior to Phoenix Data Security, he began his career in the U.S. Coast Guard, spent 15 years in IT and security including roles with the U.S. Defense Information Systems Agency (DISA), the Department of Homeland Security (DHS), American Express, and IBM Global Business Services. Cody has presented at information security forums such as the Secret Service Electronic Crimes Task Force, the DHS Security Subcommittee on Privacy and National Public Radio (NPR), as well as to many industry associations such as (ISC)2, ISACA and ISSA.</p><p>In this episode we discuss his start in information security, mentors he has had along the way, why he is building a business in Colorado, founding a information security company and the problems he is trying to solve, cyber security automation, so much more.</p><p>Where you can find Cody:</p><ul><li><a href="https://www.linkedin.com/in/codycornell/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/codycornell" target="_blank">Twitter</a></li><li><a href="https://swimlane.com/blog/" target="_blank">Swimlane Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/codycornell/" target="_blank">Cody Cornell</a> is the Founder and CEO of <a href="https://swimlane.com/" target="_blank">Swimlane</a>. Cody is responsible for the strategic direction of Swimlane and the development of it’s security operations management platform. Collaborating with industry leading technology vendors, he works to identify opportunities to streamline and automate security activities saving customer operations costs and reducing risk.</p><p>In 2011, Cody co-founded Phoenix Data Security Inc., a focused cyber security professional services organization. Prior to Phoenix Data Security, he began his career in the U.S. Coast Guard, spent 15 years in IT and security including roles with the U.S. Defense Information Systems Agency (DISA), the Department of Homeland Security (DHS), American Express, and IBM Global Business Services. Cody has presented at information security forums such as the Secret Service Electronic Crimes Task Force, the DHS Security Subcommittee on Privacy and National Public Radio (NPR), as well as to many industry associations such as (ISC)2, ISACA and ISSA.</p><p>In this episode we discuss his start in information security, mentors he has had along the way, why he is building a business in Colorado, founding a information security company and the problems he is trying to solve, cyber security automation, so much more.</p><p>Where you can find Cody:</p><ul><li><a href="https://www.linkedin.com/in/codycornell/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/codycornell" target="_blank">Twitter</a></li><li><a href="https://swimlane.com/blog/" target="_blank">Swimlane Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/047-cody-cornell-allow-people-focus-interesting-things]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2043</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 19 Mar 2018 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5fd11d64-035a-464b-9c89-cd0ebed45784/047codycornellcybersecurityinterviews.mp3" length="29201477" type="audio/mpeg"/><itunes:duration>30:22</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cody Cornell is the Founder and CEO of Swimlane. Cody is responsible for the strategic direction of Swimlane and the development of it’s security operations management platform. Collaborating with industry leading technology vendors, he works to identify opportunities to streamline and automate security activities saving customer operations costs and reducing risk. In 2011, Cody co-founded…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#046 – Bret Fund: Trying To Solve the Talent Gap Problem</title><itunes:title>#046 – Bret Fund: Trying To Solve the Talent Gap Problem</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/brfund/" target="_blank">Bret Fund</a> is the CEO of <a href="https://secureset.com" target="_blank">SecureSet</a>. As a founder of the business in 2014, he has led the growth of the organization from startup to multiple programs and campuses. He oversees the growth, strategy and financial operations for the company.</p><p>As a former professor, Bret has a great passion for and a strong executional focus on providing students with a quality education and success in the placement process. He formerly served as an Assistant Professor at the University of Colorado–Boulder and was the Executive Director for the Deming Center Venture Fund there.</p><p>In this episode we discuss cyber security education, filling the demand for cyber talent, the benefits of hiring people making a career change to information secuirty, the Denver, CO cyber security scene, giving back to the community, getting outside of your comfort zone, and so much more.</p><p>Where you can find Bret:</p><ul><li><a href="https://www.linkedin.com/in/brfund/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brfund" target="_blank">Twitter</a></li><li><a href="https://blog.secureset.com/@brfund" target="_blank">SecureSet</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/brfund/" target="_blank">Bret Fund</a> is the CEO of <a href="https://secureset.com" target="_blank">SecureSet</a>. As a founder of the business in 2014, he has led the growth of the organization from startup to multiple programs and campuses. He oversees the growth, strategy and financial operations for the company.</p><p>As a former professor, Bret has a great passion for and a strong executional focus on providing students with a quality education and success in the placement process. He formerly served as an Assistant Professor at the University of Colorado–Boulder and was the Executive Director for the Deming Center Venture Fund there.</p><p>In this episode we discuss cyber security education, filling the demand for cyber talent, the benefits of hiring people making a career change to information secuirty, the Denver, CO cyber security scene, giving back to the community, getting outside of your comfort zone, and so much more.</p><p>Where you can find Bret:</p><ul><li><a href="https://www.linkedin.com/in/brfund/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/brfund" target="_blank">Twitter</a></li><li><a href="https://blog.secureset.com/@brfund" target="_blank">SecureSet</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/046-bret-fund-trying-solve-talent-gap-problem]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2038</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 05 Mar 2018 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/32c14c18-b47f-4fae-8476-e929bb0788b9/046bretfundcybersecurityinterviews.mp3" length="38126107" type="audio/mpeg"/><itunes:duration>39:40</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Bret Fund is the CEO of SecureSet. As a founder of the business in 2014, he has led the growth of the organization from startup to multiple programs and campuses. He oversees the growth, strategy and financial operations for the company. As a former professor, Bret has a great passion for and a strong executional…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#045 – Kristinn Gudjonsson: You Don’t Want Analysts Spending All Their Time Extracting Data</title><itunes:title>#045 – Kristinn Gudjonsson: You Don’t Want Analysts Spending All Their Time Extracting Data</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/kristinng/" target="_blank">Kristinn Gudjonsson</a> is a manager with the Detection &amp; Response team at <a href="https://www.google.com/" target="_blank">Google</a>, where he has been for the last 6 1/2 years. Kristinn joined Google in 2011 as part of the incident response team, investigating and responding to security incidents, before making the move to management, where he now oversees the digital forensics and incident management teams in Sunnyvale, CA. Prior to his management adventures, Kristinn was known to dabble into coding, focusing on tools like <a href="https://github.com/log2timeline" target="_blank">Log2Timeline</a> and <a href="https://github.com/log2timeline/plaso/wiki" target="_blank">Plaso</a>.</p><p>In his previous life, Kristinn worked as an incident response and forensics consultant in Iceland. Kristinn holds an M.Sc. from Institut National des Telecommunications (INT, now Telecom &amp; Management) school from Paris and a B.Sc. in computer and electronic engineering from the University of Iceland.</p><p>In this episode we discuss moving to the US to do DFIR for Google, his start in sys admin and how forensics became his calling, the development of <a href="https://github.com/log2timeline/" target="_blank">Log2Timeline</a> and <a href="https://github.com/log2timeline/plaso/wiki" target="_blank">Plaso</a>, the DFIR support community, automating as much as you can, moving to management, and so much more</p><p>Where you can find&nbsp;Kristinn:</p><ul><li><a href="https://www.linkedin.com/in/kristinng/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/el_killerdwarf" target="_blank">Twitter</a></li><li><a href="http://blog.kiddaland.net/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/kristinng/" target="_blank">Kristinn Gudjonsson</a> is a manager with the Detection &amp; Response team at <a href="https://www.google.com/" target="_blank">Google</a>, where he has been for the last 6 1/2 years. Kristinn joined Google in 2011 as part of the incident response team, investigating and responding to security incidents, before making the move to management, where he now oversees the digital forensics and incident management teams in Sunnyvale, CA. Prior to his management adventures, Kristinn was known to dabble into coding, focusing on tools like <a href="https://github.com/log2timeline" target="_blank">Log2Timeline</a> and <a href="https://github.com/log2timeline/plaso/wiki" target="_blank">Plaso</a>.</p><p>In his previous life, Kristinn worked as an incident response and forensics consultant in Iceland. Kristinn holds an M.Sc. from Institut National des Telecommunications (INT, now Telecom &amp; Management) school from Paris and a B.Sc. in computer and electronic engineering from the University of Iceland.</p><p>In this episode we discuss moving to the US to do DFIR for Google, his start in sys admin and how forensics became his calling, the development of <a href="https://github.com/log2timeline/" target="_blank">Log2Timeline</a> and <a href="https://github.com/log2timeline/plaso/wiki" target="_blank">Plaso</a>, the DFIR support community, automating as much as you can, moving to management, and so much more</p><p>Where you can find&nbsp;Kristinn:</p><ul><li><a href="https://www.linkedin.com/in/kristinng/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/el_killerdwarf" target="_blank">Twitter</a></li><li><a href="http://blog.kiddaland.net/" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/045-kristinn-gudjonsson-dont-want-analysts-spending-time-extracting-data]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2028</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 26 Feb 2018 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/1cecd0a7-19e1-4c65-a200-e9f8c51455f0/045kristinngudjonssoncybersecurityinterviews.mp3" length="31575347" type="audio/mpeg"/><itunes:duration>32:51</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Kristinn Gudjonsson is a manager with the Detection &amp;amp; Response team at Google, where he has been for the last 6 1/2 years. Kristinn joined Google in 2011 as part of the incident response team, investigating and responding to security incidents, before making the move to management, where he now oversees the digital forensics and…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#044 – James Carder: Automate As Much As You Can</title><itunes:title>#044 – James Carder: Automate As Much As You Can</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/carderj/" target="_blank">James Carder</a>&nbsp;is the CISO of <a href="https://logrhythm.com" target="_blank">LogRythm</a> and brings more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity, and availability of information assets, oversees both threat and vulnerability management as well as the Security Operations Center (SOC). He also directs the mission and strategic vision for the LogRhythm Labs machine data intelligence, threat and compliance research teams.</p><p>Prior to joining LogRhythm, James&nbsp;was the Director of Security Informatics at Mayo Clinic where he had oversight of Threat Intelligence, Incident Response, Security Operations, and the Offensive Security groups. Prior to Mayo, James served as a Senior Manager at MANDIANT, where he led professional services and incident response engagements. He led criminal and national security related investigations at the city, state and federal levels, including those involving the theft of credit card information and Advanced Persistent Threats (APT).</p><p>James is a sought-after and frequent speaker at cybersecurity events and is a noted author of several cyber security publications. He holds a Bachelor of Science degree in Computer Information Systems from Walden University, an MBA from the University of Minnesota’s Carlson School of Management, and is a Certified Information Systems Security Professional (CISSP.)</p><p>In this episode we discuss the Colorado cyber security scene, solving CISO painpoints, thoughts on certifications, what to look for when hiring talent, where to find talent, the importance of networking, automating workflows, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/carderj/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/carderjames" target="_blank">Twitter</a></li><li><a href="https://logrhythm.com/blog/7-common-ciso-pain-points/" target="_blank">LogRhythm blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/carderj/" target="_blank">James Carder</a>&nbsp;is the CISO of <a href="https://logrhythm.com" target="_blank">LogRythm</a> and brings more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity, and availability of information assets, oversees both threat and vulnerability management as well as the Security Operations Center (SOC). He also directs the mission and strategic vision for the LogRhythm Labs machine data intelligence, threat and compliance research teams.</p><p>Prior to joining LogRhythm, James&nbsp;was the Director of Security Informatics at Mayo Clinic where he had oversight of Threat Intelligence, Incident Response, Security Operations, and the Offensive Security groups. Prior to Mayo, James served as a Senior Manager at MANDIANT, where he led professional services and incident response engagements. He led criminal and national security related investigations at the city, state and federal levels, including those involving the theft of credit card information and Advanced Persistent Threats (APT).</p><p>James is a sought-after and frequent speaker at cybersecurity events and is a noted author of several cyber security publications. He holds a Bachelor of Science degree in Computer Information Systems from Walden University, an MBA from the University of Minnesota’s Carlson School of Management, and is a Certified Information Systems Security Professional (CISSP.)</p><p>In this episode we discuss the Colorado cyber security scene, solving CISO painpoints, thoughts on certifications, what to look for when hiring talent, where to find talent, the importance of networking, automating workflows, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/carderj/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/carderjames" target="_blank">Twitter</a></li><li><a href="https://logrhythm.com/blog/7-common-ciso-pain-points/" target="_blank">LogRhythm blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/044-james-carder-automate-much-can]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=2020</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 19 Feb 2018 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/74eea4af-4876-4cb3-8b95-ca5e3978562f/044jamescardercybersecurityinterviews.mp3" length="36460900" type="audio/mpeg"/><itunes:duration>37:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>James Carder is the CISO of LogRythm and brings more than 19 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity, and availability of information assets, oversees both threat and…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#043 – David Navetta: The Year Of the Phishing Attack</title><itunes:title>#043 – David Navetta: The Year Of the Phishing Attack</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/davidnavetta/" target="_blank">David Navetta</a> is a US co-chair of <a href="http://www.nortonrosefulbright.com/us/our-services/technology-and-innovation/data-protection-privacy-and-cybersecurity/" target="_blank">Norton Rose Fulbright's Data Protection, Privacy and Cybersecurity</a> practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as "breach coach" or is on the approved panel for numerous cyber insurance carriers and companies, and has helped dozens of companies across multiple industries respond to data security breaches.</p><p>Prior to joining Norton Rose Fulbright, David co-founded <a href="https://www.infolawgroup.com/" target="_blank">InfoLawGroup LLP</a>, a law firm focusing on information technology, privacy, security and IP-related law. David and InfoLawGroup successfully served a wide assortment of US and foreign clients from large Fortune 500 multinationals, retailers, hotels and restaurants, sophisticated technology companies, financial institutions, and more.</p><p>David is a Certified Information Privacy Professional through the <a href="https://iapp.org/" target="_blank">International Association of Privacy Professionals</a>&nbsp;and previously served as a Co-Chair of the <a href="https://www.americanbar.org/aba.html" target="_blank">American Bar Association's</a> Information Security Committee and was also Co-Chair of the PCI Legal Risk and Liability Working Group. He has spoken and written frequently concerning technology, privacy and data security legal issues, and is frequently cited as an expert in the press and otherwise.</p><p>In this episode we discuss transitioning from litigation into data privacy and cyber security, starting a cyber focused law firm, the role of legal in a data breach, how to perform effective tabletop exercises, when to bring in law enforcement to an incident, breach threats to small and medium sizes businesses, and so much more.</p><p>Where you can find Dave:</p><ul><li><a href="https://www.linkedin.com/in/davidnavetta/" target="_blank">LinkedIn</a></li><li><a href="https://www.dataprotectionreport.com/author/davidnavetta/" target="_blank">Blog</a></li></ul><br/><p><em>A few disclaimers on this episode as well.&nbsp;For purposes of certain state ethics rules, this episode may constitute attorney advertising. This website and this episode does not constitute legal advice or create attorney-client relationship. Please be sure to contact your legal representatives with any legal questions</em>.</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/davidnavetta/" target="_blank">David Navetta</a> is a US co-chair of <a href="http://www.nortonrosefulbright.com/us/our-services/technology-and-innovation/data-protection-privacy-and-cybersecurity/" target="_blank">Norton Rose Fulbright's Data Protection, Privacy and Cybersecurity</a> practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as "breach coach" or is on the approved panel for numerous cyber insurance carriers and companies, and has helped dozens of companies across multiple industries respond to data security breaches.</p><p>Prior to joining Norton Rose Fulbright, David co-founded <a href="https://www.infolawgroup.com/" target="_blank">InfoLawGroup LLP</a>, a law firm focusing on information technology, privacy, security and IP-related law. David and InfoLawGroup successfully served a wide assortment of US and foreign clients from large Fortune 500 multinationals, retailers, hotels and restaurants, sophisticated technology companies, financial institutions, and more.</p><p>David is a Certified Information Privacy Professional through the <a href="https://iapp.org/" target="_blank">International Association of Privacy Professionals</a>&nbsp;and previously served as a Co-Chair of the <a href="https://www.americanbar.org/aba.html" target="_blank">American Bar Association's</a> Information Security Committee and was also Co-Chair of the PCI Legal Risk and Liability Working Group. He has spoken and written frequently concerning technology, privacy and data security legal issues, and is frequently cited as an expert in the press and otherwise.</p><p>In this episode we discuss transitioning from litigation into data privacy and cyber security, starting a cyber focused law firm, the role of legal in a data breach, how to perform effective tabletop exercises, when to bring in law enforcement to an incident, breach threats to small and medium sizes businesses, and so much more.</p><p>Where you can find Dave:</p><ul><li><a href="https://www.linkedin.com/in/davidnavetta/" target="_blank">LinkedIn</a></li><li><a href="https://www.dataprotectionreport.com/author/davidnavetta/" target="_blank">Blog</a></li></ul><br/><p><em>A few disclaimers on this episode as well.&nbsp;For purposes of certain state ethics rules, this episode may constitute attorney advertising. This website and this episode does not constitute legal advice or create attorney-client relationship. Please be sure to contact your legal representatives with any legal questions</em>.</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/043-david-navetta-year-phishing-attack]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1999</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 27 Nov 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3657d614-8ae8-410d-9828-fc020dd9ade0/043davidnavettacybersecurityinterviews.mp3" length="43999270" type="audio/mpeg"/><itunes:duration>45:47</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>David Navetta is a US co-chair of Norton Rose Fulbright’s Data Protection, Privacy and Cybersecurity practice group. David focuses on technology, privacy, information security and intellectual property law. His work ranges from compliance and transactional work to breach notification, regulatory response and litigation. David currently serves as “breach coach” or is on the approved panel…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#042 – Jared Coseglia: Those Numbers Are Real</title><itunes:title>#042 – Jared Coseglia: Those Numbers Are Real</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jaredcoseglia/" target="_blank">Jared Michael Coseglia</a>, founder and CEO of <a href="https://www.trustaffingpartners.com" target="_blank">TRU Staffing Partners</a>, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software community.</p><p>His ability to identify, deliver, mentor, and help retain talent has given him the privilege of quickly becoming the globally recognized “go-to” individual for clients and candidates in need of staffing solutions or career guidance and management in cybersecurity. Jared's unique style of representation, vast network of relationships, and subject matter expertise has helped earn him and TRU a host of awards including ranking on the <a href="https://www.trustaffingpartners.com/news-and-events/tru-staffing-partners-named-on-the-36th-annual-inc-5000-list-ranking-at-num-1189" target="_blank">Inc. 5000 Fastest Growing Private Companies in America</a> two years in a row. Jared was awarded Best Reviewed e-Discovery Session at Enfuse 2017 for his lecture and Q&amp;A on <a href="https://www.law.com/legaltechnews/almID/1202792035644/" target="_blank">“Transitioning Your Career from ESI to Cybersecurity.”</a></p><p>In this episode we discuss the commonalities between the eDiscovery a decade ago and the cyber security now, the cyber security talent gap and the numbers we hear, how to hire quality information security professionals, the drain on the federal talent pool, when to get kids involved in cyber security, security training, and so much more.</p><p>Where you can find Jared:</p><ul><li><a href="https://www.linkedin.com/in/jaredcoseglia/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/trustaffingpart" target="_blank">Twitter</a></li><li><a href="https://www.trustaffingpartners.com/news-and-events?category=publications" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jaredcoseglia/" target="_blank">Jared Michael Coseglia</a>, founder and CEO of <a href="https://www.trustaffingpartners.com" target="_blank">TRU Staffing Partners</a>, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software community.</p><p>His ability to identify, deliver, mentor, and help retain talent has given him the privilege of quickly becoming the globally recognized “go-to” individual for clients and candidates in need of staffing solutions or career guidance and management in cybersecurity. Jared's unique style of representation, vast network of relationships, and subject matter expertise has helped earn him and TRU a host of awards including ranking on the <a href="https://www.trustaffingpartners.com/news-and-events/tru-staffing-partners-named-on-the-36th-annual-inc-5000-list-ranking-at-num-1189" target="_blank">Inc. 5000 Fastest Growing Private Companies in America</a> two years in a row. Jared was awarded Best Reviewed e-Discovery Session at Enfuse 2017 for his lecture and Q&amp;A on <a href="https://www.law.com/legaltechnews/almID/1202792035644/" target="_blank">“Transitioning Your Career from ESI to Cybersecurity.”</a></p><p>In this episode we discuss the commonalities between the eDiscovery a decade ago and the cyber security now, the cyber security talent gap and the numbers we hear, how to hire quality information security professionals, the drain on the federal talent pool, when to get kids involved in cyber security, security training, and so much more.</p><p>Where you can find Jared:</p><ul><li><a href="https://www.linkedin.com/in/jaredcoseglia/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/trustaffingpart" target="_blank">Twitter</a></li><li><a href="https://www.trustaffingpartners.com/news-and-events?category=publications" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/042-jared-coseglia-numbers-real]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1992</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Nov 2017 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/894f7802-576c-4b5a-9390-ae6f898c1ec4/042jared-cosegliacybersecurityinterviews.mp3" length="41344667" type="audio/mpeg"/><itunes:duration>43:01</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jared Michael Coseglia, founder and CEO of TRU Staffing Partners, has over fourteen years of experience representing talent in e-discovery and cybersecurity. He has successfully placed over 2500 professionals in full-time and temporary positions at the Fortune 1000, AmLaw 200, Cyber 500, Big Four, and throughout the ESI and cyber consultancy, service provider and software…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#041 – Andrew Hay: Creative Solutions to Hard Problems</title><itunes:title>#041 – Andrew Hay: Creative Solutions to Hard Problems</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">Andrew Hay</a> is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder &amp; Chief Technology Officer (CTO) for <a href="http://leocybersecurity.com/" target="_blank">LEO Cyber Security</a>, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision for the company.</p><p>Prior to LEO, Andrew served as the Chief Information Security Officer (CISO) at <a href="https://www.hytrust.com/" target="_blank">DataGravity, Inc.</a>, where he advocated for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy. Before that, he served as the Director of Research at <a href="https://www.opendns.com/" target="_blank">OpenDNS</a> where he led the research efforts for the company. Prior to joining OpenDNS he was the Director of Applied Security Research and Chief Evangelist at <a href="https://www.cloudpassage.com/" target="_blank">CloudPassage, Inc.</a></p><p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">In this episode we discuss his start in dial-up text support, the role of the CISO, security in a start-up, the landscape of security solutions, managing his speaking engagements, speaking as edu-tainment, cloud forensics, and so much more.</a></p><p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">Where you can find Andrew:</a></p><ul><li><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/andrewsmhay" target="_blank">Twitter</a></li><li><a href="https://github.com/andrewsmhay" target="_blank">GitHub</a></li><li><a href="https://www.andrewhay.ca/blog" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">Andrew Hay</a> is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder &amp; Chief Technology Officer (CTO) for <a href="http://leocybersecurity.com/" target="_blank">LEO Cyber Security</a>, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision for the company.</p><p>Prior to LEO, Andrew served as the Chief Information Security Officer (CISO) at <a href="https://www.hytrust.com/" target="_blank">DataGravity, Inc.</a>, where he advocated for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy. Before that, he served as the Director of Research at <a href="https://www.opendns.com/" target="_blank">OpenDNS</a> where he led the research efforts for the company. Prior to joining OpenDNS he was the Director of Applied Security Research and Chief Evangelist at <a href="https://www.cloudpassage.com/" target="_blank">CloudPassage, Inc.</a></p><p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">In this episode we discuss his start in dial-up text support, the role of the CISO, security in a start-up, the landscape of security solutions, managing his speaking engagements, speaking as edu-tainment, cloud forensics, and so much more.</a></p><p><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">Where you can find Andrew:</a></p><ul><li><a href="https://www.linkedin.com/in/andrewhay/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/andrewsmhay" target="_blank">Twitter</a></li><li><a href="https://github.com/andrewsmhay" target="_blank">GitHub</a></li><li><a href="https://www.andrewhay.ca/blog" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/041-andrew-hay-creative-solutions-hard-problems]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1946</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 13 Nov 2017 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/fcdc4f9b-10cb-4c9a-ac79-a6893f4d1b4c/041andrewhaycybersecurityinterviews.mp3" length="34741670" type="audio/mpeg"/><itunes:duration>36:09</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Co-Founder &amp;amp; Chief Technology Officer (CTO) for LEO Cyber Security, he is a member of the senior executive leadership team responsible for the creation and driving of the strategic vision…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#040 – Michelangelo Sidagni: One Size Doesn’t Fit All</title><itunes:title>#040 – Michelangelo Sidagni: One Size Doesn’t Fit All</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/michelangelo-sidagni-0720141/" target="_blank">Michelangelo Sidagni</a> serves as Chief Technology Officer leading technical development, security research, and operations for <a href="https://www.nopsec.com/" target="_blank">NopSec</a>. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives.</p><p>Michelangelo holds numerous professional certifications in information security including CISSP, CISA, and CIA and is a frequent speaker at information security events around the country. He holds a Master’s of Business Administration from the University of Pavia – Italy.</p><p>In this episode we discuss his start in infosec audits, his transition to entrepreneur, the difference between vulnerability assessments and penetration testing, building a vulnerability management platform, rating vulnerabilities, change management, trends in security, and so much more.</p><p>Where you can find&nbsp;Michelangelo:</p><ul><li><a href="https://www.linkedin.com/in/michelangelo-sidagni-0720141/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/morpheuslaw" target="_blank">Twitter</a></li><li><a href="https://www.nopsec.com/blog/" target="_blank">NopSec Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/michelangelo-sidagni-0720141/" target="_blank">Michelangelo Sidagni</a> serves as Chief Technology Officer leading technical development, security research, and operations for <a href="https://www.nopsec.com/" target="_blank">NopSec</a>. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives.</p><p>Michelangelo holds numerous professional certifications in information security including CISSP, CISA, and CIA and is a frequent speaker at information security events around the country. He holds a Master’s of Business Administration from the University of Pavia – Italy.</p><p>In this episode we discuss his start in infosec audits, his transition to entrepreneur, the difference between vulnerability assessments and penetration testing, building a vulnerability management platform, rating vulnerabilities, change management, trends in security, and so much more.</p><p>Where you can find&nbsp;Michelangelo:</p><ul><li><a href="https://www.linkedin.com/in/michelangelo-sidagni-0720141/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/morpheuslaw" target="_blank">Twitter</a></li><li><a href="https://www.nopsec.com/blog/" target="_blank">NopSec Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/040-michelangelo-sidagni-one-size-doesnt-fit]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1935</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Nov 2017 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/708768f3-0f8c-4306-b377-17045e8873ce/040michelangelosidagnicybersecurityinterviews.mp3" length="38414047" type="audio/mpeg"/><itunes:duration>39:58</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Michelangelo Sidagni serves as Chief Technology Officer leading technical development, security research, and operations for NopSec. Prior to NopSec, Michelangelo was the Director of IT Security Services at Ciphertechs and served as a lead internal security consultant at Blue Cross Blue Shield advising on HIPAA security compliance and privacy initiatives. Michelangelo holds numerous professional certifications…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#039 – James Tarala: What Does the Risk Really Look Like</title><itunes:title>#039 – James Tarala: What Does the Risk Really Look Like</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jamestarala/" target="_blank">James Tarala</a> is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the <a href="https://www.sans.org/instructors/james-tarala" target="_blank">SANS Institute</a>, the <a href="https://www.iansresearch.com/" target="_blank">Institute of Applied Network Security</a> (IANS), and the Center for Internet Security for over 20 years. He has spoken at <a href="https://www.rsaconference.com/speakers/james-tarala" target="_blank">RSA</a> for numerous years and has enjoyed the chance to bring the experiences from working hands on with organizations into RSA sessions.</p><p>James has spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. He has provided valuable resources for information security professionals through <a href="http://www.auditscripts.com" target="_blank">Audit Scripts</a>, a child project of Enclave Security. James completed his undergraduate studies at Philadelphia Biblical University, his graduate work at the University of Maryland, and holds numerous professional certifications.</p><p>In this episode we discuss sys admin start, starting his own consulting firm, security frameworks, the CIS Critical Security Controls. cyber security auditing and managing risk, the best use of check lists, teaching for SANS, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/jamestarala/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/isaudit" target="_blank">Twitter</a></li><li><a href="http://www.auditscripts.com/author/jamestarala/" target="_blank">Audit Scripts Blog</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jamestarala/" target="_blank">James Tarala</a> is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the <a href="https://www.sans.org/instructors/james-tarala" target="_blank">SANS Institute</a>, the <a href="https://www.iansresearch.com/" target="_blank">Institute of Applied Network Security</a> (IANS), and the Center for Internet Security for over 20 years. He has spoken at <a href="https://www.rsaconference.com/speakers/james-tarala" target="_blank">RSA</a> for numerous years and has enjoyed the chance to bring the experiences from working hands on with organizations into RSA sessions.</p><p>James has spent a large amount of time consulting with organizations to assist them in their security management, operational practices, and regulatory compliance issues, and he often performs independent security audits and assists internal audit groups in developing their internal audit programs. He has provided valuable resources for information security professionals through <a href="http://www.auditscripts.com" target="_blank">Audit Scripts</a>, a child project of Enclave Security. James completed his undergraduate studies at Philadelphia Biblical University, his graduate work at the University of Maryland, and holds numerous professional certifications.</p><p>In this episode we discuss sys admin start, starting his own consulting firm, security frameworks, the CIS Critical Security Controls. cyber security auditing and managing risk, the best use of check lists, teaching for SANS, and so much more.</p><p>Where you can find James:</p><ul><li><a href="https://www.linkedin.com/in/jamestarala/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/isaudit" target="_blank">Twitter</a></li><li><a href="http://www.auditscripts.com/author/jamestarala/" target="_blank">Audit Scripts Blog</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/039-james-tarala-risk-really-look-like]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1930</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 30 Oct 2017 06:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/5eb2affd-ae23-4eb9-983e-9e7d2f399560/039jamestaralacybersecurityinterviews.mp3" length="45388540" type="audio/mpeg"/><itunes:duration>47:14</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>James Tarala is a principal consultant with Enclave Security and is based out of Venice, Florida. James Tarala has been a speaker with the SANS Institute, the Institute of Applied Network Security (IANS), and the Center for Internet Security for over 20 years. He has spoken at RSA for numerous years and has enjoyed the…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5</title><itunes:title>#038 – Eric Conrad: You Need To Be Interested Beyond 9 to 5</itunes:title><description><![CDATA[<p>SANS Senior Instructor <a href="https://www.linkedin.com/in/ericconrad/" target="_blank">Eric Conrad</a> is the lead author of <a href="https://www.sans.org/course/sans-plus-s-training-program-cissp-certification-exam" target="_blank">SANS MGT414: SANS Training Program for CISSP® Certification</a>, and coauthor of both <a href="https://www.sans.org/course/continuous-monitoring-security-operations" target="_blank">SANS SEC511: Continuous Monitoring and Security Operations</a> and <a href="https://www.sans.org/course/web-app-penetration-testing-ethical-hacking" target="_blank">SANS SEC542: Web App Penetration Testing and Ethical Hacking</a>. He is also the lead author of the books the <a href="https://www.amazon.com/CISSP-Study-Guide-Third-Conrad/dp/0128024372" target="_blank">CISSP Study Guide</a>, and the <a href="https://www.amazon.com/dp/0128112484/ref=la_B003GX931K_ob_2?s=books&amp;ie=UTF8&amp;qid=1507226651&amp;sr=1-2" target="_blank">Eleventh Hour CISSP: Study Guide</a>.</p><p>Eric's career began in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and health care. He is now CTO of <a href="https://www.backshore.net/" target="_blank">Backshore Communications</a>, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing. He is a graduate of the SANS Technology Institute with a master of science degree in information security engineering. In addition to the CISSP, he holds the prestigious <a href="https://www.giac.org/certification/security-expert-gse" target="_blank">GIAC Security Expert (GSE)</a> certification as well as the GIAC GPEN, GCIH, GCIA, GCFA, GAWN, and GSEC certifications. Eric also blogs about information security at <a href="http://www.ericconrad.com" target="_blank">www.ericconrad.com</a>.</p><p>In this episode we discuss starting in IT before there was infosec, the value of certifications, making blue teams sexy again, teaching for <a href="https://www.sans.org/" target="_blank">SANS</a>, what makes a good cyber security professional, threat hunting, the importance of PowerShell, <a href="http://www.ericconrad.com/2016/09/deepbluecli-powershell-module-for-hunt.html" target="_blank">DeepBlueCLI</a>, and so much more.</p><p>Where you can find Eric:</p><ul><li><a href="https://www.linkedin.com/in/ericconrad/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/eric_conrad" target="_blank">Twitter</a></li><li><a href="http://www.ericconrad.com" target="_blank">Blog</a></li><li><a href="https://www.sans.org/instructors/eric-conrad" target="_blank">SANS</a></li><li><a href="https://github.com/sans-blue-team/DeepBlueCLI" target="_blank">GitHub</a></li><li><a href="https://www.amazon.com/Eric-Conrad/e/B003GX931K/" target="_blank">Amazon</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>SANS Senior Instructor <a href="https://www.linkedin.com/in/ericconrad/" target="_blank">Eric Conrad</a> is the lead author of <a href="https://www.sans.org/course/sans-plus-s-training-program-cissp-certification-exam" target="_blank">SANS MGT414: SANS Training Program for CISSP® Certification</a>, and coauthor of both <a href="https://www.sans.org/course/continuous-monitoring-security-operations" target="_blank">SANS SEC511: Continuous Monitoring and Security Operations</a> and <a href="https://www.sans.org/course/web-app-penetration-testing-ethical-hacking" target="_blank">SANS SEC542: Web App Penetration Testing and Ethical Hacking</a>. He is also the lead author of the books the <a href="https://www.amazon.com/CISSP-Study-Guide-Third-Conrad/dp/0128024372" target="_blank">CISSP Study Guide</a>, and the <a href="https://www.amazon.com/dp/0128112484/ref=la_B003GX931K_ob_2?s=books&amp;ie=UTF8&amp;qid=1507226651&amp;sr=1-2" target="_blank">Eleventh Hour CISSP: Study Guide</a>.</p><p>Eric's career began in 1991 as a UNIX systems administrator for a small oceanographic communications company. He gained information security experience in a variety of industries, including research, education, power, Internet, and health care. He is now CTO of <a href="https://www.backshore.net/" target="_blank">Backshore Communications</a>, a company focusing on hunt teaming, intrusion detection, incident handling, and penetration testing. He is a graduate of the SANS Technology Institute with a master of science degree in information security engineering. In addition to the CISSP, he holds the prestigious <a href="https://www.giac.org/certification/security-expert-gse" target="_blank">GIAC Security Expert (GSE)</a> certification as well as the GIAC GPEN, GCIH, GCIA, GCFA, GAWN, and GSEC certifications. Eric also blogs about information security at <a href="http://www.ericconrad.com" target="_blank">www.ericconrad.com</a>.</p><p>In this episode we discuss starting in IT before there was infosec, the value of certifications, making blue teams sexy again, teaching for <a href="https://www.sans.org/" target="_blank">SANS</a>, what makes a good cyber security professional, threat hunting, the importance of PowerShell, <a href="http://www.ericconrad.com/2016/09/deepbluecli-powershell-module-for-hunt.html" target="_blank">DeepBlueCLI</a>, and so much more.</p><p>Where you can find Eric:</p><ul><li><a href="https://www.linkedin.com/in/ericconrad/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/eric_conrad" target="_blank">Twitter</a></li><li><a href="http://www.ericconrad.com" target="_blank">Blog</a></li><li><a href="https://www.sans.org/instructors/eric-conrad" target="_blank">SANS</a></li><li><a href="https://github.com/sans-blue-team/DeepBlueCLI" target="_blank">GitHub</a></li><li><a href="https://www.amazon.com/Eric-Conrad/e/B003GX931K/" target="_blank">Amazon</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/038-eric-conrad-need-interested-beyond-9-5]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1913</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 09 Oct 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a974e509-b7e2-4fd7-ac3e-b87de2b53500/038-ericconradcybersecurityinterviews.mp3" length="49514207" type="audio/mpeg"/><itunes:duration>51:32</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>SANS Senior Instructor Eric Conrad is the lead author of SANS MGT414: SANS Training Program for CISSP® Certification, and coauthor of both SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking. He is also the lead author of the books the CISSP Study Guide, and the Eleventh…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#037 – Johannes Ullrich: Solving That Puzzle In Your Network</title><itunes:title>#037 – Johannes Ullrich: Solving That Puzzle In Your Network</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">Dr.&nbsp;Johannes&nbsp;Ullrich</a> is currently responsible for the <a href="https://isc.sans.edu/" target="_blank">SANS Internet Storm Center (ISC)</a> and the <a href="https://www.giac.org/certifications/gold" target="_blank">GIAC Gold program</a>. In 2000, he founded <a href="https://secure.dshield.org/" target="_blank">DShield.org</a>, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry. Prior to working for SANS, Johannes worked as a lead support engineer for a web development company and as a research physicist.</p><p>Johannes holds a PhD in physics from SUNY Albany and is based in Jacksonville, Florida. His <a href="https://isc.sans.edu/podcast.html" target="_blank">daily podcast</a> summarizes current security news in a concise format.</p><p>In this episode we discuss his start in physics and switch to cyber security, building the SANS Internet Storm Center, security challenges posed by the cloud, <a href="https://www.sans.org/instructors/dr-johannes-ullrich" target="_blank">teaching for SANS</a>, AI and machine learning, IoT security, and so much more.</p><p>Where you can find Johannes:</p><ul><li><a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/johullrich" target="_blank">Twitter</a></li><li><a href="https://isc.sans.edu/" target="_blank">SANS Internet Storm Center</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">Dr.&nbsp;Johannes&nbsp;Ullrich</a> is currently responsible for the <a href="https://isc.sans.edu/" target="_blank">SANS Internet Storm Center (ISC)</a> and the <a href="https://www.giac.org/certifications/gold" target="_blank">GIAC Gold program</a>. In 2000, he founded <a href="https://secure.dshield.org/" target="_blank">DShield.org</a>, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in the networking industry. Prior to working for SANS, Johannes worked as a lead support engineer for a web development company and as a research physicist.</p><p>Johannes holds a PhD in physics from SUNY Albany and is based in Jacksonville, Florida. His <a href="https://isc.sans.edu/podcast.html" target="_blank">daily podcast</a> summarizes current security news in a concise format.</p><p>In this episode we discuss his start in physics and switch to cyber security, building the SANS Internet Storm Center, security challenges posed by the cloud, <a href="https://www.sans.org/instructors/dr-johannes-ullrich" target="_blank">teaching for SANS</a>, AI and machine learning, IoT security, and so much more.</p><p>Where you can find Johannes:</p><ul><li><a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/johullrich" target="_blank">Twitter</a></li><li><a href="https://isc.sans.edu/" target="_blank">SANS Internet Storm Center</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/037-johannes-ullrich-solving-puzzle-network]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1906</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Tue, 03 Oct 2017 00:26:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e830f9e6-dc0e-4070-bc55-23b83edbafd4/037johannesullrichcybersecurityinterviews.mp3" length="39324472" type="audio/mpeg"/><itunes:duration>40:55</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dr. Johannes Ullrich is currently responsible for the SANS Internet Storm Center (ISC) and the GIAC Gold program. In 2000, he founded DShield.org, which is now the data collection engine behind the ISC. His work with the ISC has been widely recognized, and in 2004, Network World named him one of the 50 most powerful people in…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#036 – Jorge Orchilles: Offense Informs Defense</title><itunes:title>#036 – Jorge Orchilles: Offense Informs Defense</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jorgeorchilles/" target="_blank">Jorge Orchilles</a>, author of <a href="https://www.amazon.com/Microsoft-Windows-Administrators-Reference-Upgrading/dp/1597495611/ref=cm_cr_pr_product_top" target="_blank">Microsoft Windows 7 Administrator’s Reference</a>, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter.</p><p>Jorge has been involved in the Information Technology field since 2001. Realizing his passion for IT, he founded The Business Strategy Partners – IT Consultants branch in 2002 and eventually went on to <a href="http://www.verizonenterprise.com/industry/public_sector/federal/contracts/gsa_mas/terremark/" target="_blank">Terremark (now Verizon)</a> as a system administrator. He developed a interest in Information Security and was eventually promoted to a Security Operations Center (SOC) Analyst position. After a year of defending critical infrastructure for federal and commercial customers, he moved to an offensive analyst position with a large financial institution&nbsp;where he now manages the Advanced Penetration Testing &amp; Vulnerability Assessments team.</p><p>In this episode we discuss his early IT system admin roots, the transition from consultant to enterprise security manager, his mentors, what he looks for in a security professional,&nbsp;giving back to the community, teaching for <a href="https://www.sans.org/" target="_blank">SANS</a>, and so much more.</p><p>Where you can find Jorge:</p><ul><li><a href="https://www.linkedin.com/in/jorgeorchilles/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jorgeorchilles" target="_blank">Twitter</a></li><li><a href="http://orchilles.com/" target="_blank">Personal Website</a></li><li><a href="https://www.amazon.com/Microsoft-Windows-Administrators-Reference-Upgrading/dp/1597495611/ref=cm_cr_pr_product_top" target="_blank">Amazon</a></li><li><a href="https://www.sans.org/instructors/jorge-orchilles" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jorgeorchilles/" target="_blank">Jorge Orchilles</a>, author of <a href="https://www.amazon.com/Microsoft-Windows-Administrators-Reference-Upgrading/dp/1597495611/ref=cm_cr_pr_product_top" target="_blank">Microsoft Windows 7 Administrator’s Reference</a>, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter.</p><p>Jorge has been involved in the Information Technology field since 2001. Realizing his passion for IT, he founded The Business Strategy Partners – IT Consultants branch in 2002 and eventually went on to <a href="http://www.verizonenterprise.com/industry/public_sector/federal/contracts/gsa_mas/terremark/" target="_blank">Terremark (now Verizon)</a> as a system administrator. He developed a interest in Information Security and was eventually promoted to a Security Operations Center (SOC) Analyst position. After a year of defending critical infrastructure for federal and commercial customers, he moved to an offensive analyst position with a large financial institution&nbsp;where he now manages the Advanced Penetration Testing &amp; Vulnerability Assessments team.</p><p>In this episode we discuss his early IT system admin roots, the transition from consultant to enterprise security manager, his mentors, what he looks for in a security professional,&nbsp;giving back to the community, teaching for <a href="https://www.sans.org/" target="_blank">SANS</a>, and so much more.</p><p>Where you can find Jorge:</p><ul><li><a href="https://www.linkedin.com/in/jorgeorchilles/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jorgeorchilles" target="_blank">Twitter</a></li><li><a href="http://orchilles.com/" target="_blank">Personal Website</a></li><li><a href="https://www.amazon.com/Microsoft-Windows-Administrators-Reference-Upgrading/dp/1597495611/ref=cm_cr_pr_product_top" target="_blank">Amazon</a></li><li><a href="https://www.sans.org/instructors/jorge-orchilles" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/036-jorge-orchilles-offense-informs-defense]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1899</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 25 Sep 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b48d7dce-448d-408c-abd1-8c0cb10e6c25/036-jorgeorchillescybersecurityinterviews.mp3" length="45074475" type="audio/mpeg"/><itunes:duration>46:54</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jorge Orchilles, author of Microsoft Windows 7 Administrator’s Reference, holds a Masters of Science in Management Information Systems from Florida International University, leads a security team in a large financial institution, and serves on the board of the Information Systems Security Association South Florida Chapter. Jorge has been involved in the Information Technology field since…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#035 – David Kovar: Where Is the Best Application of Your Skill Set</title><itunes:title>#035 – David Kovar: Where Is the Best Application of Your Skill Set</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/davidkovar/" target="_blank">David Kovar</a> is the President and founder of <a href="http://www.kovarllc.com/" target="_blank">Kovar &amp; Associates</a> where he leads the development of URSA – <a href="http://www.kovarllc.com/solutions-2/" target="_blank">Unmanned &amp; Robotics Systems Analysis</a> – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads the firm’s consulting practice which addresses UAV cyber security and UAV threat management.</p><p>David founded the practice of UAV forensics in 2015 and is one of the leading practitioners in the country. David has worked in digital forensics and cyber security since the mid 90’s and, prior to founding his own company, led EY’s U.S. incident response program.</p><p>David earned a BA from Dartmouth in Computer Science and will receive an MA from the Fletcher School at Tufts in International Affairs this summer. David’s Master’s thesis is entitled “<em>Defending Against UAVs Operated by Non-State Actors</em>”.</p><p>David is a rated pilot, is the Advocacy Director for the <a href="http://www.nasar.org/" target="_blank">National Association of Search and Rescue</a> where he writes UAV policy papers and develops presentations on UAVs in SAR for various audiences, and is working on SAR UAV standards for <a href="https://www.astm.org/" target="_blank">ASTM</a>.</p><p>In this episode we discuss his early transition from IT to information security, good incident response planning, team building and communications, the development of <a href="https://github.com/dkovar/analyzeMFT" target="_blank">analyzeMFT</a>, giving back to the community, the emerging drone security and analysis field, founding a cyber security company, and so much more.</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/davidkovar/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/dckovar" target="_blank">Twitter</a></li><li><a href="http://www.kovarllc.com/blog/" target="_blank">Kovar &amp; Associates Blog</a></li><li><a href="https://integriography.wordpress.com" target="_blank">Personal Blog</a></li><li><a href="https://github.com/dkovar/analyzeMFT" target="_blank">GitHub - analyzeMFT</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/davidkovar/" target="_blank">David Kovar</a> is the President and founder of <a href="http://www.kovarllc.com/" target="_blank">Kovar &amp; Associates</a> where he leads the development of URSA – <a href="http://www.kovarllc.com/solutions-2/" target="_blank">Unmanned &amp; Robotics Systems Analysis</a> – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads the firm’s consulting practice which addresses UAV cyber security and UAV threat management.</p><p>David founded the practice of UAV forensics in 2015 and is one of the leading practitioners in the country. David has worked in digital forensics and cyber security since the mid 90’s and, prior to founding his own company, led EY’s U.S. incident response program.</p><p>David earned a BA from Dartmouth in Computer Science and will receive an MA from the Fletcher School at Tufts in International Affairs this summer. David’s Master’s thesis is entitled “<em>Defending Against UAVs Operated by Non-State Actors</em>”.</p><p>David is a rated pilot, is the Advocacy Director for the <a href="http://www.nasar.org/" target="_blank">National Association of Search and Rescue</a> where he writes UAV policy papers and develops presentations on UAVs in SAR for various audiences, and is working on SAR UAV standards for <a href="https://www.astm.org/" target="_blank">ASTM</a>.</p><p>In this episode we discuss his early transition from IT to information security, good incident response planning, team building and communications, the development of <a href="https://github.com/dkovar/analyzeMFT" target="_blank">analyzeMFT</a>, giving back to the community, the emerging drone security and analysis field, founding a cyber security company, and so much more.</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/davidkovar/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/dckovar" target="_blank">Twitter</a></li><li><a href="http://www.kovarllc.com/blog/" target="_blank">Kovar &amp; Associates Blog</a></li><li><a href="https://integriography.wordpress.com" target="_blank">Personal Blog</a></li><li><a href="https://github.com/dkovar/analyzeMFT" target="_blank">GitHub - analyzeMFT</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/035-david-kovar-best-application-skill-set]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1893</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 18 Sep 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b7167ea8-62e8-4b7f-a9f0-ee2d8c63964c/035davidkovarcybersecurityinterviews.mp3" length="50630817" type="audio/mpeg"/><itunes:duration>52:42</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>David Kovar is the President and founder of Kovar &amp;amp; Associates where he leads the development of URSA – Unmanned &amp;amp; Robotics Systems Analysis – a suite of tools designed to collect, integrate, analyze, and present UAV related data for many purposes including fleet management, criminal investigations, failure analysis, and predictive analysis. He also leads…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#034 – Harlan Carvey: You Have To Apply the Data To Your Theory</title><itunes:title>#034 – Harlan Carvey: You Have To Apply the Data To Your Theory</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/harlan-carvey-86a8694b/" target="_blank">Harlan Carvey</a> is&nbsp;currently the Director of Intelligence Integration at <a href="https://www.nuix.com/" target="_blank">Nuix</a>.</p><p>Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident response services.</p><p>Harlan is an accomplished public speaker and a prolific author. He is the author of several open source tools, including <a href="https://github.com/keydet89/RegRipper2.8" target="_blank">RegRipper</a>, and is the author of the <a href="http://windowsir.blogspot.com/" target="_blank">WindowsIR blog</a>.</p><p>In this episode we discuss&nbsp;his start in information security, windows registry forensics, new artifacts, the importance of communications, mistakes examiners make, ransomware, the commonalities between information security and home beer brewing, so much more.</p><p>Where you can find Harlan:</p><ul><li><a href="https://www.linkedin.com/in/harlan-carvey-86a8694b/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/keydet89" target="_blank">Twitter</a></li><li><a href="http://windowsir.blogspot.com/" target="_blank">WindowsIR Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/harlan-carvey-86a8694b/" target="_blank">Harlan Carvey</a> is&nbsp;currently the Director of Intelligence Integration at <a href="https://www.nuix.com/" target="_blank">Nuix</a>.</p><p>Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident response services.</p><p>Harlan is an accomplished public speaker and a prolific author. He is the author of several open source tools, including <a href="https://github.com/keydet89/RegRipper2.8" target="_blank">RegRipper</a>, and is the author of the <a href="http://windowsir.blogspot.com/" target="_blank">WindowsIR blog</a>.</p><p>In this episode we discuss&nbsp;his start in information security, windows registry forensics, new artifacts, the importance of communications, mistakes examiners make, ransomware, the commonalities between information security and home beer brewing, so much more.</p><p>Where you can find Harlan:</p><ul><li><a href="https://www.linkedin.com/in/harlan-carvey-86a8694b/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/keydet89" target="_blank">Twitter</a></li><li><a href="http://windowsir.blogspot.com/" target="_blank">WindowsIR Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/034-harlan-carvey-apply-data-theory]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1884</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 11 Sep 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f3fe0450-07c2-4672-a359-59e06e405c11/034harlancarveycybersecurityinterviews.mp3" length="58540853" type="audio/mpeg"/><itunes:duration>01:00:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Harlan Carvey is currently the Director of Intelligence Integration at Nuix. Harlan has been involved in information security for 28 years, which began during his military career. After leaving active duty 20 years ago, he started in consulting, performing vulnerability assessments and penetration testing. From there, it was a natural progression to digital forensics and incident…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#033 – Perry Carpenter: Security Culture Management</title><itunes:title>#033 – Perry Carpenter: Security Culture Management</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/perrycarpenter/" target="_blank">Perry Carpenter</a> currently serves as Chief Evangelist and Strategy Officer for <a href="https://www.knowbe4.com/" target="_blank">KnowBe4</a>.</p><p>Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at <a href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner Research</a>, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies.</p><p>With a long career as a security professional and researcher, Perry&nbsp;has broad experience in North America and Europe, providing security consulting and advisory services for many of the best-known global brands. His passion is helping people make better security decisions by applying strategic behavior and culture management practices to the intersection of technology and humanity.</p><p>Perry holds a Master of Science in Information Assurance (MSIA) from Norwich University in Vermont and is a Certified Chief Information Security Officer (C|CISO).</p><p>In this episode we discuss his focus on the human side of information security, building a security culture, working with famous hacker Kevin Mitnick, rewarding users for reporting, changing user's behavior, how CISO's can effect change and evaluate products, and so much more.</p><p>Where you can find Perry:</p><ul><li><a href="https://www.linkedin.com/in/perrycarpenter/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/perrycarpenter" target="_blank">Twitter</a></li><li><a href="http://themindspyguy.com/" target="_blank">The Mind Spy Guy&nbsp;</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/perrycarpenter/" target="_blank">Perry Carpenter</a> currently serves as Chief Evangelist and Strategy Officer for <a href="https://www.knowbe4.com/" target="_blank">KnowBe4</a>.</p><p>Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at <a href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner Research</a>, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies.</p><p>With a long career as a security professional and researcher, Perry&nbsp;has broad experience in North America and Europe, providing security consulting and advisory services for many of the best-known global brands. His passion is helping people make better security decisions by applying strategic behavior and culture management practices to the intersection of technology and humanity.</p><p>Perry holds a Master of Science in Information Assurance (MSIA) from Norwich University in Vermont and is a Certified Chief Information Security Officer (C|CISO).</p><p>In this episode we discuss his focus on the human side of information security, building a security culture, working with famous hacker Kevin Mitnick, rewarding users for reporting, changing user's behavior, how CISO's can effect change and evaluate products, and so much more.</p><p>Where you can find Perry:</p><ul><li><a href="https://www.linkedin.com/in/perrycarpenter/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/perrycarpenter" target="_blank">Twitter</a></li><li><a href="http://themindspyguy.com/" target="_blank">The Mind Spy Guy&nbsp;</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/033-perry-carpenter-security-culture-management]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1876</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 04 Sep 2017 13:06:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/975e635d-39e8-4f97-b349-80f54971a76a/033perrycarpentercybersecurityinterviews.mp3" length="43642050" type="audio/mpeg"/><itunes:duration>45:25</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Perry Carpenter currently serves as Chief Evangelist and Strategy Officer for KnowBe4. Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at Gartner Research, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies. With a long career as a security professional and…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#032 – Ryan Kalember: We’ve Moved From Mass Surveillance to Targeted Attacks</title><itunes:title>#032 – Ryan Kalember: We’ve Moved From Mass Surveillance to Targeted Attacks</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/kalember/" target="_blank">Ryan Kalember</a> has over 15-years of experience in the information security industry. Ryan currently leads cybersecurity strategy for <a href="https://www.proofpoint.com/us" target="_blank">Proofpoint</a> and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry.</p><p>Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.</p><p>In this episode we discuss his start in cyber security, his transition to marketing and product management, the importance of communication skills, the changing role of the CISO, AI and machine learning, the malware research his team does, the spread of ransomware, and so much more.</p><p>Where you can find Ryan:</p><ul><li><a href="https://www.linkedin.com/in/kalember/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/rkalember" target="_blank">Twitter</a></li><li><a href="https://www.proofpoint.com/us/corporate-blog" target="_blank">Proofpoint Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/kalember/" target="_blank">Ryan Kalember</a> has over 15-years of experience in the information security industry. Ryan currently leads cybersecurity strategy for <a href="https://www.proofpoint.com/us" target="_blank">Proofpoint</a> and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry.</p><p>Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.</p><p>In this episode we discuss his start in cyber security, his transition to marketing and product management, the importance of communication skills, the changing role of the CISO, AI and machine learning, the malware research his team does, the spread of ransomware, and so much more.</p><p>Where you can find Ryan:</p><ul><li><a href="https://www.linkedin.com/in/kalember/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/rkalember" target="_blank">Twitter</a></li><li><a href="https://www.proofpoint.com/us/corporate-blog" target="_blank">Proofpoint Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/032-ryan-kalember-weve-moved-mass-surveillance-targeted-attacks]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1868</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 28 Aug 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/329001bd-4725-4042-91f0-842313b9226c/032ryankalembercybersecurityinterviews.mp3" length="50048803" type="audio/mpeg"/><itunes:duration>52:05</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Ryan Kalember has over 15-years of experience in the information security industry. Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#031 – Jobert Abma: All Bugs Are Shallow</title><itunes:title>#031 – Jobert Abma: All Bugs Are Shallow</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jobertabma/" target="_blank">Jobert Abma</a> is a co-founder and technical lead at <a href="https://www.hackerone.com/" target="_blank">HackerOne</a>, one of the leading bug bounty service platforms. He is an avid hacker, developer and advocate for transparent and safe vulnerability disclosure.&nbsp;He and co-founder <a href="https://www.linkedin.com/in/michiel3/" target="_blank">Michiel Prins</a> have been named one of <a href="https://www.forbes.com/pictures/gjjh45khmk/jobert-abma-26-and-mic/#29732699479b" target="_blank">Forbes 30 under 30 for 2017 in tech</a>.</p><p>As a hacker himself, Jobert has reported critical vulnerabilities to GitLab, Yahoo, Slack, Snapchat among others. Before founding HackerOne, he was a successful penetration tester for a company he founded with customers included: Twitter, Facebook, Evernote and Airbnb, among others. He studied Computer Science at Hanze University Groningen.</p><p>In this episode we discuss his early hacking days, how he turned hacking into a job, why he started HackerOne, secure software development, lessons learned as a founder, Internet of Things vulnerabilities, and so much more.</p><p>Where you can find Jobert:</p><ul><li><a href="https://www.linkedin.com/in/jobertabma/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jobertabma" target="_blank">Twitter</a></li><li><a href="https://hackerone.com/jobert?sort_type=latest_disclosable_activity_at&amp;filter=type%3Aall%20from%3Ajobert&amp;page=1&amp;range=forever" target="_blank">HackerOne</a></li><li><a href="https://github.com/jobertabma" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jobertabma/" target="_blank">Jobert Abma</a> is a co-founder and technical lead at <a href="https://www.hackerone.com/" target="_blank">HackerOne</a>, one of the leading bug bounty service platforms. He is an avid hacker, developer and advocate for transparent and safe vulnerability disclosure.&nbsp;He and co-founder <a href="https://www.linkedin.com/in/michiel3/" target="_blank">Michiel Prins</a> have been named one of <a href="https://www.forbes.com/pictures/gjjh45khmk/jobert-abma-26-and-mic/#29732699479b" target="_blank">Forbes 30 under 30 for 2017 in tech</a>.</p><p>As a hacker himself, Jobert has reported critical vulnerabilities to GitLab, Yahoo, Slack, Snapchat among others. Before founding HackerOne, he was a successful penetration tester for a company he founded with customers included: Twitter, Facebook, Evernote and Airbnb, among others. He studied Computer Science at Hanze University Groningen.</p><p>In this episode we discuss his early hacking days, how he turned hacking into a job, why he started HackerOne, secure software development, lessons learned as a founder, Internet of Things vulnerabilities, and so much more.</p><p>Where you can find Jobert:</p><ul><li><a href="https://www.linkedin.com/in/jobertabma/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jobertabma" target="_blank">Twitter</a></li><li><a href="https://hackerone.com/jobert?sort_type=latest_disclosable_activity_at&amp;filter=type%3Aall%20from%3Ajobert&amp;page=1&amp;range=forever" target="_blank">HackerOne</a></li><li><a href="https://github.com/jobertabma" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/031-jobert-abma-bugs-shallow]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1858</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 21 Aug 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/549882d3-4135-4542-9278-34bd2308d120/031jobertabmacybersecurityinterviews.mp3" length="47948056" type="audio/mpeg"/><itunes:duration>49:57</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jobert Abma is a co-founder and technical lead at HackerOne, one of the leading bug bounty service platforms. He is an avid hacker, developer and advocate for transparent and safe vulnerability disclosure. He and co-founder Michiel Prins have been named one of Forbes 30 under 30 for 2017 in tech. As a hacker himself, Jobert has…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#030 – Joseph Carson: We Need a People-Centric Approach</title><itunes:title>#030 – Joseph Carson: We Need a People-Centric Approach</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/josephcarson" target="_blank">Joseph Carson</a> is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security &amp; virtualization, access controls, and privileged account management. He currently&nbsp;serves as Chief Security Scientist at <a href="https://thycotic.com/" target="_blank">Thycotic</a>.</p><p>Joseph is a Certified Information Systems Security Professional (CISSP), active member of the cyber security community, frequent speaker at cyber security conferences globally, and is often quoted and contributes to global cyber security publications. He is also the author of <a href="https://thycotic.com/resources/wiley-dummies-privileged-account-management/" target="_blank">Privileged Account Management for Dummies</a>.</p><p>Joseph regularly shares his knowledge and experience by giving workshops on vulnerabilities assessments, patch management best practices, and the evolving cyber security perimeter and the EU General Data Protection Regulation.</p><p>In this episode we discuss his transition from IT to cyber security, privacy vs. security, international information security, IoT privacy, credential management, why you shouldn't blame the users, people-centric security, hiring information security professionals, cyber security metrics, and so much more.</p><p>Where you can find Joe:</p><ul><li><a href="https://www.linkedin.com/in/josephcarson" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/joe_carson" target="_blank">Twitter</a></li><li><a href="https://thycotic.com/company/blog/" target="_blank">Thycotic Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/josephcarson" target="_blank">Joseph Carson</a> is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security &amp; virtualization, access controls, and privileged account management. He currently&nbsp;serves as Chief Security Scientist at <a href="https://thycotic.com/" target="_blank">Thycotic</a>.</p><p>Joseph is a Certified Information Systems Security Professional (CISSP), active member of the cyber security community, frequent speaker at cyber security conferences globally, and is often quoted and contributes to global cyber security publications. He is also the author of <a href="https://thycotic.com/resources/wiley-dummies-privileged-account-management/" target="_blank">Privileged Account Management for Dummies</a>.</p><p>Joseph regularly shares his knowledge and experience by giving workshops on vulnerabilities assessments, patch management best practices, and the evolving cyber security perimeter and the EU General Data Protection Regulation.</p><p>In this episode we discuss his transition from IT to cyber security, privacy vs. security, international information security, IoT privacy, credential management, why you shouldn't blame the users, people-centric security, hiring information security professionals, cyber security metrics, and so much more.</p><p>Where you can find Joe:</p><ul><li><a href="https://www.linkedin.com/in/josephcarson" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/joe_carson" target="_blank">Twitter</a></li><li><a href="https://thycotic.com/company/blog/" target="_blank">Thycotic Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/030-joseph-carson-need-people-centric-approach]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1831</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 14 Aug 2017 11:53:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b00cf9e2-f786-4b5a-b98b-c70426a2ae92/030joesphcarsoncybersecurityinterviews.mp3" length="52464573" type="audio/mpeg"/><itunes:duration>54:36</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Joseph Carson is a cyber security professional and ethical hacker with more than 25 years’ experience in enterprise security specializing in blockchain, endpoint security, network security, application security &amp;amp; virtualization, access controls, and privileged account management. He currently serves as Chief Security Scientist at Thycotic. Joseph is a Certified Information Systems Security Professional (CISSP), active member…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#029 – Don’t Hire Security Consultants</title><itunes:title>#029 – Don’t Hire Security Consultants</itunes:title><description><![CDATA[<p>This is a solo episode between interviews.</p><p>I have been doing IT and security consulting for a long time. Over this time, I have noticed a few things that are worth noting when hiring a security consultant. In fact, I would say until you perform some basics and perform some due diligence on your own, don't hire me or <em>any other</em> security consultant. Yes, this seems a little counter intuitive for me to say, "Don't hire me," but there are many common elements I see in environment after environment both on the proactive and responsive engagements.</p><p>This episode will touch on some of these elements and is by no means all inclusive.</p><p>The take away is to get to know thy self and do your home work!</p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>This is a solo episode between interviews.</p><p>I have been doing IT and security consulting for a long time. Over this time, I have noticed a few things that are worth noting when hiring a security consultant. In fact, I would say until you perform some basics and perform some due diligence on your own, don't hire me or <em>any other</em> security consultant. Yes, this seems a little counter intuitive for me to say, "Don't hire me," but there are many common elements I see in environment after environment both on the proactive and responsive engagements.</p><p>This episode will touch on some of these elements and is by no means all inclusive.</p><p>The take away is to get to know thy self and do your home work!</p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/029-dont-hire-security-consultants]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1824</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 07 Aug 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/aac1c432-2793-4446-8871-6f0a0ed8675a/029donthireconsultantscybersecurityinterviews.mp3" length="5879992" type="audio/mpeg"/><itunes:duration>06:05</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is a solo episode between interviews. I have been doing IT and security consulting for a long time. Over this time, I have noticed a few things that are worth noting when hiring a security consultant. In fact, I would say until you perform some basics and perform some due diligence on your own,…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#028 – Brett Shavers: It’s Not the Machine, But the Examiner</title><itunes:title>#028 – Brett Shavers: It’s Not the Machine, But the Examiner</itunes:title><description><![CDATA[<p><a href="http://brettshavers.cc" target="_blank">Brett Shavers</a> is a consultant to corporations and government agencies in computer related cases as well as being the author of "<a href="https://www.amazon.com/Placing-Suspect-Behind-Keyboard-Investigative/dp/1597499854/ref=la_B00C8B490Q_1_4?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-4" target="_blank">Placing the Suspect Behind the Keyboard</a>", co-author of "<a href="https://www.amazon.com/Hiding-Behind-Keyboard-Uncovering-Communication/dp/0128033401/ref=la_B00C8B490Q_1_2?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-2" target="_blank">Hiding Behind the Keyboard</a>" and co-author of the “<a href="https://www.amazon.com/X-Ways-Forensics-Practitioners-Guide-Shavers/dp/0124116051/ref=la_B00C8B490Q_1_1?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-1" target="_blank">X-Ways Forensics Practitioner's Guide</a>."</p><p>Brett began his career as a digital forensics investigator in law enforcement and was trained by the Federal Law Enforcement Training Center, the US Department of Homeland Security, the <a href="https://www.nw3c.org/" target="_blank">National White Collar Crime Center</a>, and a multitude of forensic software manufacturers. Brett has taught over 1,000 persons in law enforcement, colleges, and law firms in topics including high tech investigative methods and forensic analysis and gives presentations on high-tech investigations regularly.</p><p>His prior law enforcement duties included assignments in state and federal task forces, with investigations spanning multiple countries and states where his cases targeted career criminals and international criminal organizations.</p><p>In this episode we discuss starting forensics in law enforcement, his approaches to investigations, what makes a good DFIR examiner, forensic tools, Windows FE, book writing advice, IoT surveillance, and so much more.</p><p>Where you can find Brett:</p><ul><li><a href="http://brettshavers.cc/" target="_blank">Web</a></li><li><a href="https://twitter.com/Brett_Shavers" target="_blank">Twitter</a></li><li><a href="https://keybase.io/brett_shavers" target="_blank">Keybase</a></li><li><a href="https://www.amazon.com/Brett-Shavers/e/B00C8B490Q/ref=sr_ntt_srch_lnk_1?qid=1501108546&amp;sr=1-1" target="_blank">Amazon</a></li><li><a href="http://courses.dfironlinetraining.com/" target="_blank">DFIR Online Training</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="http://brettshavers.cc" target="_blank">Brett Shavers</a> is a consultant to corporations and government agencies in computer related cases as well as being the author of "<a href="https://www.amazon.com/Placing-Suspect-Behind-Keyboard-Investigative/dp/1597499854/ref=la_B00C8B490Q_1_4?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-4" target="_blank">Placing the Suspect Behind the Keyboard</a>", co-author of "<a href="https://www.amazon.com/Hiding-Behind-Keyboard-Uncovering-Communication/dp/0128033401/ref=la_B00C8B490Q_1_2?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-2" target="_blank">Hiding Behind the Keyboard</a>" and co-author of the “<a href="https://www.amazon.com/X-Ways-Forensics-Practitioners-Guide-Shavers/dp/0124116051/ref=la_B00C8B490Q_1_1?s=books&amp;ie=UTF8&amp;qid=1501108551&amp;sr=1-1" target="_blank">X-Ways Forensics Practitioner's Guide</a>."</p><p>Brett began his career as a digital forensics investigator in law enforcement and was trained by the Federal Law Enforcement Training Center, the US Department of Homeland Security, the <a href="https://www.nw3c.org/" target="_blank">National White Collar Crime Center</a>, and a multitude of forensic software manufacturers. Brett has taught over 1,000 persons in law enforcement, colleges, and law firms in topics including high tech investigative methods and forensic analysis and gives presentations on high-tech investigations regularly.</p><p>His prior law enforcement duties included assignments in state and federal task forces, with investigations spanning multiple countries and states where his cases targeted career criminals and international criminal organizations.</p><p>In this episode we discuss starting forensics in law enforcement, his approaches to investigations, what makes a good DFIR examiner, forensic tools, Windows FE, book writing advice, IoT surveillance, and so much more.</p><p>Where you can find Brett:</p><ul><li><a href="http://brettshavers.cc/" target="_blank">Web</a></li><li><a href="https://twitter.com/Brett_Shavers" target="_blank">Twitter</a></li><li><a href="https://keybase.io/brett_shavers" target="_blank">Keybase</a></li><li><a href="https://www.amazon.com/Brett-Shavers/e/B00C8B490Q/ref=sr_ntt_srch_lnk_1?qid=1501108546&amp;sr=1-1" target="_blank">Amazon</a></li><li><a href="http://courses.dfironlinetraining.com/" target="_blank">DFIR Online Training</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/028-brett-shavers-not-machine-examiner]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1817</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 31 Jul 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e80d1978-94d3-430e-8486-4711e1e7c151/028brettshaverscybersecurityinterviews.mp3" length="46207434" type="audio/mpeg"/><itunes:duration>48:05</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Brett Shavers is a consultant to corporations and government agencies in computer related cases as well as being the author of “Placing the Suspect Behind the Keyboard“, co-author of “Hiding Behind the Keyboard” and co-author of the “X-Ways Forensics Practitioner’s Guide.” Brett began his career as a digital forensics investigator in law enforcement and was…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#027 – Lance Spitzner: What Behaviors Do We Care About</title><itunes:title>#027 – Lance Spitzner: What Behaviors Do We Care About</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/" target="_blank">Lance Spitzner</a> is the Director of the <a href="https://www.sans.org/instructors/lance-spitzner" target="_blank">SANS Security Awareness</a> program. Lance has over 20 years of security experience in cyber threat research, awareness, and training.</p><p>He invented the concept of honeynets, founded the <a href="https://www.honeynet.org/" target="_blank">Honeynet Project</a>, and published three <a href="https://www.amazon.com/Lance-Spitzner/e/B001IXMNRQ/ref=sr_ntt_srch_lnk_1?qid=1500506325&amp;sr=8-1" target="_blank">security books</a>. Lance has worked and consulted in over 25 countries and helped over 350 organizations plan, maintain, and measure their security awareness programs. In addition, Lance is a member of the Board of Directors for the <a href="https://staysafeonline.org/" target="_blank">National Cyber Security Alliance</a>, frequent presenter, serial tweeter, and works on numerous community security projects. Before working in information security, Lance&nbsp;served as an armor officer in the Army's Rapid Deployment Force and earned his MBA from the University of Illinois.</p><p>In this episode we discuss moving from technical to human security controls, designing a effective security awareness program, changing human behavior, metrics to use in awareness programs, what is different with IoT and security, the <a href="https://securingthehuman.sans.org/resources/security-awareness-report-2017" target="_blank">2017 SANS Security Awareness report</a>, picking organizational leads for training programs, and so much more.</p><p>Where you can find Lance:</p><ul><li><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/lspitzner" target="_blank">Twitter</a></li><li><a href="https://securingthehuman.sans.org/blog" target="_blank">Blog</a></li><li><a href="https://securingthehuman.sans.org/" target="_blank">Securing the Human</a></li><li><a href="https://securingthehuman.sans.org/resources/newsletters/ouch/2017" target="_blank">OUCH! Newsletter</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/" target="_blank">Lance Spitzner</a> is the Director of the <a href="https://www.sans.org/instructors/lance-spitzner" target="_blank">SANS Security Awareness</a> program. Lance has over 20 years of security experience in cyber threat research, awareness, and training.</p><p>He invented the concept of honeynets, founded the <a href="https://www.honeynet.org/" target="_blank">Honeynet Project</a>, and published three <a href="https://www.amazon.com/Lance-Spitzner/e/B001IXMNRQ/ref=sr_ntt_srch_lnk_1?qid=1500506325&amp;sr=8-1" target="_blank">security books</a>. Lance has worked and consulted in over 25 countries and helped over 350 organizations plan, maintain, and measure their security awareness programs. In addition, Lance is a member of the Board of Directors for the <a href="https://staysafeonline.org/" target="_blank">National Cyber Security Alliance</a>, frequent presenter, serial tweeter, and works on numerous community security projects. Before working in information security, Lance&nbsp;served as an armor officer in the Army's Rapid Deployment Force and earned his MBA from the University of Illinois.</p><p>In this episode we discuss moving from technical to human security controls, designing a effective security awareness program, changing human behavior, metrics to use in awareness programs, what is different with IoT and security, the <a href="https://securingthehuman.sans.org/resources/security-awareness-report-2017" target="_blank">2017 SANS Security Awareness report</a>, picking organizational leads for training programs, and so much more.</p><p>Where you can find Lance:</p><ul><li><a href="https://www.linkedin.com/in/lance-spitzner-0ab0ba1/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/lspitzner" target="_blank">Twitter</a></li><li><a href="https://securingthehuman.sans.org/blog" target="_blank">Blog</a></li><li><a href="https://securingthehuman.sans.org/" target="_blank">Securing the Human</a></li><li><a href="https://securingthehuman.sans.org/resources/newsletters/ouch/2017" target="_blank">OUCH! Newsletter</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/027-lance-spitzner-behaviors-care]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1806</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 24 Jul 2017 14:08:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cd1da25d-5214-4c00-9bc9-e65bdc43073a/027lancespitznercybersecurityinterviews.mp3" length="43081729" type="audio/mpeg"/><itunes:duration>44:50</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lance Spitzner is the Director of the SANS Security Awareness program. Lance has over 20 years of security experience in cyber threat research, awareness, and training. He invented the concept of honeynets, founded the Honeynet Project, and published three security books. Lance has worked and consulted in over 25 countries and helped over 350 organizations…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#026 – Casey Ellis: I Enjoy Thinking Like a Criminal</title><itunes:title>#026 – Casey Ellis: I Enjoy Thinking Like a Criminal</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/caseyjohnellis/" target="_blank">Casey Ellis</a> is founder and CEO of <a href="https://www.bugcrowd.com/" target="_blank">Bugcrowd</a>. He started life in infosec as pentester, moved to the dark side of solutions architecture and sales, and finally landed as a career entrepreneur. He’s been in the industry for 15 years, working with clients ranging from startups to government to multinationals, and awkwardly straddles the fence of the technical and business sides of information security.</p><p>Casey pioneered the Bug Bounty as-a-Service model launching the first programs on Bugcrowd in 2012, and has presented at Blackhat, Defcon, Derbycon, SOURCE Boston, AISA National, and many others. He is happy as long as he's got a problem to solve, an opportunity to develop, a kick ass group of people to bring along for the ride, and free reign on t-shirt designs.</p><p>In this episode we discuss fixing the Internet, bug bounty programs, designing software with security in mind, IoT security, changing security training and recruitment, responsible disclosure, entrepreneurship and starting a company, and so much more.</p><p>Where you can find Casey:</p><ul><li><a href="https://www.linkedin.com/in/caseyjohnellis/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/caseyjohnellis" target="_blank">Twitter</a></li><li><a href="https://blog.bugcrowd.com/author/casey-ellis" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/caseyjohnellis/" target="_blank">Casey Ellis</a> is founder and CEO of <a href="https://www.bugcrowd.com/" target="_blank">Bugcrowd</a>. He started life in infosec as pentester, moved to the dark side of solutions architecture and sales, and finally landed as a career entrepreneur. He’s been in the industry for 15 years, working with clients ranging from startups to government to multinationals, and awkwardly straddles the fence of the technical and business sides of information security.</p><p>Casey pioneered the Bug Bounty as-a-Service model launching the first programs on Bugcrowd in 2012, and has presented at Blackhat, Defcon, Derbycon, SOURCE Boston, AISA National, and many others. He is happy as long as he's got a problem to solve, an opportunity to develop, a kick ass group of people to bring along for the ride, and free reign on t-shirt designs.</p><p>In this episode we discuss fixing the Internet, bug bounty programs, designing software with security in mind, IoT security, changing security training and recruitment, responsible disclosure, entrepreneurship and starting a company, and so much more.</p><p>Where you can find Casey:</p><ul><li><a href="https://www.linkedin.com/in/caseyjohnellis/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/caseyjohnellis" target="_blank">Twitter</a></li><li><a href="https://blog.bugcrowd.com/author/casey-ellis" target="_blank">Blog</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/026-casey-ellis-enjoy-thinking-like-criminal]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1800</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 17 Jul 2017 13:27:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d34152bc-234f-4ca2-8f04-470896962a37/026caseyelliscybersecurityinterviews.mp3" length="32619265" type="audio/mpeg"/><itunes:duration>33:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Casey Ellis is founder and CEO of Bugcrowd. He started life in infosec as pentester, moved to the dark side of solutions architecture and sales, and finally landed as a career entrepreneur. He’s been in the industry for 15 years, working with clients ranging from startups to government to multinationals, and awkwardly straddles the fence…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#025 – Robb Reck &amp; Alex Wood: We Need To Understand the Technology We are Securing</title><itunes:title>#025 – Robb Reck &amp; Alex Wood: We Need To Understand the Technology We are Securing</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/robbreck/" target="_blank">Rob Reck</a> and Alex Wood are both seasoned security professionals in the Denver, CO area and hosts of their own podcast, <a href="https://www.colorado-security.com/" target="_blank">Colorado = Security</a>.</p><p>Rob is the Chief Information Security Officer at <a href="https://www.pingidentity.com/en.html" target="_blank">Ping Identity</a>. In addition to his job at Ping Identity, Robb is an active member of the Colorado security community. In early 2017 he co-founded the Colorado = Security podcast with Alex. Robb serves on the board for the mountain region’s largest security conference, <a href="https://www.rmisc.org/" target="_blank">Rocky Mountain Information Security Conference</a> and he recently ended his term as President of <a href="http://denver.issa.org/" target="_blank">ISSA Denver</a>, the largest ISSA chapter in the world.</p><p>Alex is the Chief Information Security Officer for <a href="http://www.pultegroupinc.com/" target="_blank">Pulte Financial Services</a> and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the <a href="http://universitycollege.du.edu/ict/degree/masters/information-systems-security-online/degreeid/402" target="_blank">University of Denver</a>.</p><p>In this episode we discuss volunteering in the cyber security community, the local Denver security community, security leadership, recruiting outside of traditional, the importance of IR planning, selling security within an organization, and so more.</p><p><a href="https://www.colorado-security.com/" target="_blank"><strong>Colorado = Security Website</strong></a></p><p>Where you can find Rob:</p><ul><li><a href="https://www.linkedin.com/in/robbreck/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/robbreck" target="_blank">Twitter</a></li><li><a href="https://inforeck.wordpress.com/" target="_blank">Blog</a></li></ul><br/><p>Where you can find Alex:</p><ul><li><a href="https://www.linkedin.com/in/alexbwood/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/abwoodrow" target="_blank">Twitter</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/robbreck/" target="_blank">Rob Reck</a> and Alex Wood are both seasoned security professionals in the Denver, CO area and hosts of their own podcast, <a href="https://www.colorado-security.com/" target="_blank">Colorado = Security</a>.</p><p>Rob is the Chief Information Security Officer at <a href="https://www.pingidentity.com/en.html" target="_blank">Ping Identity</a>. In addition to his job at Ping Identity, Robb is an active member of the Colorado security community. In early 2017 he co-founded the Colorado = Security podcast with Alex. Robb serves on the board for the mountain region’s largest security conference, <a href="https://www.rmisc.org/" target="_blank">Rocky Mountain Information Security Conference</a> and he recently ended his term as President of <a href="http://denver.issa.org/" target="_blank">ISSA Denver</a>, the largest ISSA chapter in the world.</p><p>Alex is the Chief Information Security Officer for <a href="http://www.pultegroupinc.com/" target="_blank">Pulte Financial Services</a> and has over 18 years of experience in information security. Previously he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has a MAS in Information Security from the <a href="http://universitycollege.du.edu/ict/degree/masters/information-systems-security-online/degreeid/402" target="_blank">University of Denver</a>.</p><p>In this episode we discuss volunteering in the cyber security community, the local Denver security community, security leadership, recruiting outside of traditional, the importance of IR planning, selling security within an organization, and so more.</p><p><a href="https://www.colorado-security.com/" target="_blank"><strong>Colorado = Security Website</strong></a></p><p>Where you can find Rob:</p><ul><li><a href="https://www.linkedin.com/in/robbreck/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/robbreck" target="_blank">Twitter</a></li><li><a href="https://inforeck.wordpress.com/" target="_blank">Blog</a></li></ul><br/><p>Where you can find Alex:</p><ul><li><a href="https://www.linkedin.com/in/alexbwood/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/abwoodrow" target="_blank">Twitter</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/025-robb-reck-alex-wood-need-understand-technology-securing]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1794</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Jul 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/79ffa834-f706-48ae-8c7d-e9386f5ffbff/025robbreckalexwoodcybersecurityinterviews.mp3" length="43588434" type="audio/mpeg"/><itunes:duration>45:22</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Rob Reck and Alex Wood are both seasoned security professionals in the Denver, CO area and hosts of their own podcast, Colorado = Security. Rob is the Chief Information Security Officer at Ping Identity. In addition to his job at Ping Identity, Robb is an active member of the Colorado security community. In early 2017…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#024 – Independence</title><itunes:title>#024 – Independence</itunes:title><description><![CDATA[<p>This is another short podcast&nbsp;before&nbsp;we get back into full interviews next week.</p><p>In this episode, I&nbsp;explore&nbsp;the concept of&nbsp;Independence. In the US, this week we are celebrating Independence Day. This got me thinking&nbsp;about&nbsp;what that means in my business experience. I wanted to share a few observations for those who are thinking about going out on their own either as an independent contractor or to start their own business.</p><p>Please take a listen and let me and other listeners know of any tips or experiences you may have had if you were working independently or started a business.</p><p>Also, go back and listen to episodes with <a href="https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants/" target="_blank">David Cowen</a> and <a href="https://cybersecurityinterviews.com/018-hal-pomeranz-take-deep-breath-relax/" target="_blank">Hal Pomeranz</a>. Both have taken the independent route and have shared advice in their episodes.</p><p>I hope everyone celebrating July 4th has a safe and fun holiday. Please subscribe so you don't miss any episodes. Next week, we are back to interviews with leaders and experts in cyber security.</p>]]></description><content:encoded><![CDATA[<p>This is another short podcast&nbsp;before&nbsp;we get back into full interviews next week.</p><p>In this episode, I&nbsp;explore&nbsp;the concept of&nbsp;Independence. In the US, this week we are celebrating Independence Day. This got me thinking&nbsp;about&nbsp;what that means in my business experience. I wanted to share a few observations for those who are thinking about going out on their own either as an independent contractor or to start their own business.</p><p>Please take a listen and let me and other listeners know of any tips or experiences you may have had if you were working independently or started a business.</p><p>Also, go back and listen to episodes with <a href="https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants/" target="_blank">David Cowen</a> and <a href="https://cybersecurityinterviews.com/018-hal-pomeranz-take-deep-breath-relax/" target="_blank">Hal Pomeranz</a>. Both have taken the independent route and have shared advice in their episodes.</p><p>I hope everyone celebrating July 4th has a safe and fun holiday. Please subscribe so you don't miss any episodes. Next week, we are back to interviews with leaders and experts in cyber security.</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/024-independence]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1785</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 03 Jul 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/816730b9-520a-417a-8839-e4d0533728cd/024independencecybersecurityinterviews.mp3" length="5384097" type="audio/mpeg"/><itunes:duration>05:34</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is another short podcast before we get back into full interviews next week. In this episode, I explore the concept of Independence. In the US, this week we are celebrating Independence Day. This got me thinking about what that means in my business experience. I wanted to share a few observations for those who are thinking about going out on their…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#023 – Coming Back</title><itunes:title>#023 – Coming Back</itunes:title><description><![CDATA[<p>So many of you are wondering why the break in Cyber Security Interviews.</p><p>There is a bit of a story that goes along with it. I wanted to share this story because I think sheds light into life and career changes that others can learn from. Sharing stories on careers and challenges is a big part of this podcast. Many people can feel alone in their cyber security journeys and I some of the struggles that I have been going through lately can allow those going through their own challenges feel connected and hopefully cope&nbsp;with uncertainty.</p><p>I know there are others out there that have gone through some major life and career challenges. Know you are not alone, and you can get through it.</p><p>So the podcast is firing back-up. Look for some great interviews in the coming weeks. I greatly appreciate all of the listener support and feed back I receive. It has definitely helped me recently.</p><p>So please take a listen to this episode and stay tuned for the next round of episodes!</p>]]></description><content:encoded><![CDATA[<p>So many of you are wondering why the break in Cyber Security Interviews.</p><p>There is a bit of a story that goes along with it. I wanted to share this story because I think sheds light into life and career changes that others can learn from. Sharing stories on careers and challenges is a big part of this podcast. Many people can feel alone in their cyber security journeys and I some of the struggles that I have been going through lately can allow those going through their own challenges feel connected and hopefully cope&nbsp;with uncertainty.</p><p>I know there are others out there that have gone through some major life and career challenges. Know you are not alone, and you can get through it.</p><p>So the podcast is firing back-up. Look for some great interviews in the coming weeks. I greatly appreciate all of the listener support and feed back I receive. It has definitely helped me recently.</p><p>So please take a listen to this episode and stay tuned for the next round of episodes!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/023-coming-back]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1780</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 26 Jun 2017 19:49:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/e39a97e3-1880-4f63-aae2-bde5066db37a/023comingbackcybersecurityinterviews.mp3" length="8049260" type="audio/mpeg"/><itunes:duration>08:21</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>So many of you are wondering why the break in Cyber Security Interviews. There is a bit of a story that goes along with it. I wanted to share this story because I think sheds light into life and career changes that others can learn from. Sharing stories on careers and challenges is a big…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#022 – Alex Kreilein &amp; David Odom: The Problems In the Industry</title><itunes:title>#022 – Alex Kreilein &amp; David Odom: The Problems In the Industry</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/alexkreilein/" target="_blank">Alex Kreilein</a> and <a href="https://twitter.com/davesblend" target="_blank">David Odom</a> are both Managing Partners at <a href="https://securesetaccelerator.com/" target="_blank">SecureSet Accelerator</a>. SecureSet is a Denver, CO based firm which is a startup accelerator (<a href="https://securesetaccelerator.com/" target="_blank">SecureSet Accelerator</a>)&nbsp;taking on the lack of novel and quality products in the information security field.</p><p>In addition to overseeing the SecureSet Accelerator, Alex is also the Cofounder of SecureSet and the companies former CTO. He served as a Tech Strategist for the Department of Homeland Security, Guest Researcher to the National Institute of Standards and Technology, and Legislative Assistant to the US Congress. He served on the Integrated Task Force for the <a href="https://www.nist.gov/cyberframework" target="_blank">NIST Cybersecurity Framework</a> and serves on the board of a number of security startups. Alex has an M.S. from <a href="http://www.colorado.edu/engineering/" target="_blank">CU Boulder School of Engineering</a> and Applied Science and an M.A. from the US Naval War College. He is a Fellow with the <a href="https://www.newamerica.org/cybersecurity-initiative/" target="_blank">New America Foundation’s Cybersecurity Initiative </a>and was a speaker at <a href="https://www.defcon.org/html/defcon-24/dc-24-speakers.html#CINCVolFLT" target="_blank">DEFCON 2016</a>.</p><p>David is a Managing Partner of the SecureSet Accelerator, focusing on Venture Operations. David spent the past 20+ years engaged with leading edge startups, vibrant thought leaders, and imaginative technologists. He remains active as an advisor and mentor for early stage cyber security startups and university systems.</p><p>In this episode we discuss investing in cyber security companies, tips for starting a new company, how to make better information security products, cyber security education that works, the machine learning and AI buzzwords, Denver, CO's growing cyber security community, how the government can help improve cyber security, and so much more.</p><p>Where you can find Alex:</p><ul><li><a href="https://www.linkedin.com/in/alexkreilein/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ak3r303" target="_blank">Twitter</a></li><li><a href="https://blog.secureset.com/" target="_blank">SecureSet Blog</a></li></ul><br/><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/daveodomco/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/davesblend" target="_blank">Twitter</a></li><li><a href="https://www.facebook.com/SecureSet/" target="_blank">SecureSet Facebook</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/alexkreilein/" target="_blank">Alex Kreilein</a> and <a href="https://twitter.com/davesblend" target="_blank">David Odom</a> are both Managing Partners at <a href="https://securesetaccelerator.com/" target="_blank">SecureSet Accelerator</a>. SecureSet is a Denver, CO based firm which is a startup accelerator (<a href="https://securesetaccelerator.com/" target="_blank">SecureSet Accelerator</a>)&nbsp;taking on the lack of novel and quality products in the information security field.</p><p>In addition to overseeing the SecureSet Accelerator, Alex is also the Cofounder of SecureSet and the companies former CTO. He served as a Tech Strategist for the Department of Homeland Security, Guest Researcher to the National Institute of Standards and Technology, and Legislative Assistant to the US Congress. He served on the Integrated Task Force for the <a href="https://www.nist.gov/cyberframework" target="_blank">NIST Cybersecurity Framework</a> and serves on the board of a number of security startups. Alex has an M.S. from <a href="http://www.colorado.edu/engineering/" target="_blank">CU Boulder School of Engineering</a> and Applied Science and an M.A. from the US Naval War College. He is a Fellow with the <a href="https://www.newamerica.org/cybersecurity-initiative/" target="_blank">New America Foundation’s Cybersecurity Initiative </a>and was a speaker at <a href="https://www.defcon.org/html/defcon-24/dc-24-speakers.html#CINCVolFLT" target="_blank">DEFCON 2016</a>.</p><p>David is a Managing Partner of the SecureSet Accelerator, focusing on Venture Operations. David spent the past 20+ years engaged with leading edge startups, vibrant thought leaders, and imaginative technologists. He remains active as an advisor and mentor for early stage cyber security startups and university systems.</p><p>In this episode we discuss investing in cyber security companies, tips for starting a new company, how to make better information security products, cyber security education that works, the machine learning and AI buzzwords, Denver, CO's growing cyber security community, how the government can help improve cyber security, and so much more.</p><p>Where you can find Alex:</p><ul><li><a href="https://www.linkedin.com/in/alexkreilein/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ak3r303" target="_blank">Twitter</a></li><li><a href="https://blog.secureset.com/" target="_blank">SecureSet Blog</a></li></ul><br/><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/daveodomco/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/davesblend" target="_blank">Twitter</a></li><li><a href="https://www.facebook.com/SecureSet/" target="_blank">SecureSet Facebook</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/022-alex-kreilein-david-odom-problems-industry]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1765</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 24 Apr 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/72c3d859-097e-49bf-a60e-d715430e7950/022alexkreileindavidodomcybersecurityinterviews.mp3" length="54462564" type="audio/mpeg"/><itunes:duration>56:41</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Alex Kreilein and David Odom are both Managing Partners at SecureSet Accelerator. SecureSet is a Denver, CO based firm which is a startup accelerator (SecureSet Accelerator) taking on the lack of novel and quality products in the information security field. In addition to overseeing the SecureSet Accelerator, Alex is also the Cofounder of SecureSet and the…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#021 – Troy Hunt: It’s Fun to Build Stuff</title><itunes:title>#021 – Troy Hunt: It’s Fun to Build Stuff</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/troyhunt" target="_blank">Troy Hunt</a> is an internationally recognized <a href="https://haveibeenpwned.com/About" target="_blank">cyber security researcher</a>, <a href="https://www.troyhunt.com/speaking/" target="_blank">speaker</a>, <a href="https://www.troyhunt.com/" target="_blank">blogger</a>, and <a href="https://www.troyhunt.com/workshops/" target="_blank">instructor</a>. He is the author of many top-rating security courses for web developers on <a href="https://www.pluralsight.com/authors/troy-hunt" target="_blank">Pluralsight </a>and is a Microsoft Regional Director and a six time <a href="https://mvp.microsoft.com/en-us/PublicProfile/4031649?fullName=Troy%20Hunt" target="_blank">Microsoft Most Valued Professional (MVP)</a> specializing in online security and cloud development.</p><p>Prior to becoming an independent security consultant, Troy worked at Pfizer with the last seven years being responsible for application architecture in the Asia Pacific region. This time spent in a large corporate environment gave him huge exposure to all aspects of technology as well as the diverse cultures his role spanned. Many of the things he teaches in post-corporate life are based on these experiences, particularly as a result of working with a large number of outsourcing vendors across the globe.</p><p>Troy is most famously know for creating the the <a href="https://haveibeenpwned.com/About" target="_blank">Have I been pwned? (HIBP) website</a>, a free service that aggregates data breaches and helps people establish if they've been impacted by malicious activity on the web. As well as being a useful service for the security community, HIBP has given him an avenue to ship code that runs at scale on Microsoft's Azure cloud platform.&nbsp;Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech.</p><p>In this episode we discuss teaching developers security, learning on your own, becoming an instructor, cyber security in enterprise organizations, budgeting for security, building a personal brand, and so much more.</p><p>Where you can find Troy:</p><ul><li><a href="https://www.troyhunt.com/" target="_blank">TroyHunt.com</a></li><li><a href="https://www.linkedin.com/in/troyhunt" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/troyhunt" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/channel/UCD6MWz4A61JaeGrvyoYl-rQ" target="_blank">YouTube</a></li><li><a href="https://www.pluralsight.com/authors/troy-hunt" target="_blank">Pluralsight</a></li><li><a href="https://haveibeenpwned.com/" target="_blank">Have I been pwned?</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/troyhunt" target="_blank">Troy Hunt</a> is an internationally recognized <a href="https://haveibeenpwned.com/About" target="_blank">cyber security researcher</a>, <a href="https://www.troyhunt.com/speaking/" target="_blank">speaker</a>, <a href="https://www.troyhunt.com/" target="_blank">blogger</a>, and <a href="https://www.troyhunt.com/workshops/" target="_blank">instructor</a>. He is the author of many top-rating security courses for web developers on <a href="https://www.pluralsight.com/authors/troy-hunt" target="_blank">Pluralsight </a>and is a Microsoft Regional Director and a six time <a href="https://mvp.microsoft.com/en-us/PublicProfile/4031649?fullName=Troy%20Hunt" target="_blank">Microsoft Most Valued Professional (MVP)</a> specializing in online security and cloud development.</p><p>Prior to becoming an independent security consultant, Troy worked at Pfizer with the last seven years being responsible for application architecture in the Asia Pacific region. This time spent in a large corporate environment gave him huge exposure to all aspects of technology as well as the diverse cultures his role spanned. Many of the things he teaches in post-corporate life are based on these experiences, particularly as a result of working with a large number of outsourcing vendors across the globe.</p><p>Troy is most famously know for creating the the <a href="https://haveibeenpwned.com/About" target="_blank">Have I been pwned? (HIBP) website</a>, a free service that aggregates data breaches and helps people establish if they've been impacted by malicious activity on the web. As well as being a useful service for the security community, HIBP has given him an avenue to ship code that runs at scale on Microsoft's Azure cloud platform.&nbsp;Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech.</p><p>In this episode we discuss teaching developers security, learning on your own, becoming an instructor, cyber security in enterprise organizations, budgeting for security, building a personal brand, and so much more.</p><p>Where you can find Troy:</p><ul><li><a href="https://www.troyhunt.com/" target="_blank">TroyHunt.com</a></li><li><a href="https://www.linkedin.com/in/troyhunt" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/troyhunt" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/channel/UCD6MWz4A61JaeGrvyoYl-rQ" target="_blank">YouTube</a></li><li><a href="https://www.pluralsight.com/authors/troy-hunt" target="_blank">Pluralsight</a></li><li><a href="https://haveibeenpwned.com/" target="_blank">Have I been pwned?</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/021-troy-hunt-fun-build-stuff]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1749</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 17 Apr 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/95a70ad3-5d9c-4edb-82ea-47d28797ccaf/021troyhuntcybersecurityinterviews.mp3" length="62577589" type="audio/mpeg"/><itunes:duration>43:26</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Troy Hunt is an internationally recognized cyber security researcher, speaker, blogger, and instructor. He is the author of many top-rating security courses for web developers on Pluralsight and is a Microsoft Regional Director and a six time Microsoft Most Valued Professional (MVP) specializing in online security and cloud development. Prior to becoming an independent security…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#020 – Jad Saliba: The Thirst For Knowledge</title><itunes:title>#020 – Jad Saliba: The Thirst For Knowledge</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/jadatmagnet/" target="_blank">Jad Saliba</a> is the founder and CTO of <a href="https://www.magnetforensics.com/" target="_blank">Magnet Forensics</a>, a leading digital forensics company. Jad guides the organization to create products that meet the needs of customers from law enforcement, consultancies, or the corporate world. A former digital forensics investigator with a background in computer science, Jad can uniquely identify issues faced by forensics professionals and apply new ways of using technology to solve these problems.</p><p>Prior to starting Magnet Forensics, Jad spent seven years with the Waterloo Regional Police Service. While with the police department, Jad was responsible for recovering Internet evidence from computers to support the force's investigations. He then developed Internet Evidence Finder which quickly became one of the most popular digital forensic tools for law enforcement and commercial practitioners.</p><p>Jad is a recognized digital forensics speaker at industry events including: CEIC, Crimes Against Children Conference, EuroForensics, F3, HTCIA, ICDDF, SANS, and the Canadian Police College. Jad holds a Diploma in Computer Science and Network Security from Mohawk College (Hamilton, Canada).</p><p>In this episode we discuss the Operation Underground Railroad sting, being a police officer vs. running a business, the most important skill an&nbsp;investigator needs, his favorite tool outside of his, cloud forensics, and so much more.</p><p>Where you can find Jad:</p><ul><li><a href="https://www.linkedin.com/in/jadatmagnet/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jadatmagnet" target="_blank">Twitter</a></li><li><a href="https://twitter.com/jadatmagnet" target="_blank">Magenet Forensic Blog</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/jadatmagnet/" target="_blank">Jad Saliba</a> is the founder and CTO of <a href="https://www.magnetforensics.com/" target="_blank">Magnet Forensics</a>, a leading digital forensics company. Jad guides the organization to create products that meet the needs of customers from law enforcement, consultancies, or the corporate world. A former digital forensics investigator with a background in computer science, Jad can uniquely identify issues faced by forensics professionals and apply new ways of using technology to solve these problems.</p><p>Prior to starting Magnet Forensics, Jad spent seven years with the Waterloo Regional Police Service. While with the police department, Jad was responsible for recovering Internet evidence from computers to support the force's investigations. He then developed Internet Evidence Finder which quickly became one of the most popular digital forensic tools for law enforcement and commercial practitioners.</p><p>Jad is a recognized digital forensics speaker at industry events including: CEIC, Crimes Against Children Conference, EuroForensics, F3, HTCIA, ICDDF, SANS, and the Canadian Police College. Jad holds a Diploma in Computer Science and Network Security from Mohawk College (Hamilton, Canada).</p><p>In this episode we discuss the Operation Underground Railroad sting, being a police officer vs. running a business, the most important skill an&nbsp;investigator needs, his favorite tool outside of his, cloud forensics, and so much more.</p><p>Where you can find Jad:</p><ul><li><a href="https://www.linkedin.com/in/jadatmagnet/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/jadatmagnet" target="_blank">Twitter</a></li><li><a href="https://twitter.com/jadatmagnet" target="_blank">Magenet Forensic Blog</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/020-jad-saliba-thirst-knowledge]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1737</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 10 Apr 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6120ca11-263a-4783-8368-76ebea30fc09/020jadsalibacybersecurityinterviews.mp3" length="63165645" type="audio/mpeg"/><itunes:duration>43:50</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Jad Saliba is the founder and CTO of Magnet Forensics, a leading digital forensics company. Jad guides the organization to create products that meet the needs of customers from law enforcement, consultancies, or the corporate world. A former digital forensics investigator with a background in computer science, Jad can uniquely identify issues faced by forensics…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#019 – Theresa Payton: Design For the Human</title><itunes:title>#019 – Theresa Payton: Design For the Human</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/theresapayton/" target="_blank">Theresa Payton</a> is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of <a href="http://www.fortalicesolutions.com/" target="_blank">Fortalice Solutions</a>, an industry-leading security consulting company, and co-founder of <a href="https://darkcubed.com/" target="_blank">Dark Cubed</a>, a cybersecurity product company, Theresa is a proven leader and influencer who works with clients and colleagues to uncover strategic opportunities and identify new and emerging threats.</p><p>Theresa began her career in financial services, where she coupled her deep understanding of technology systems with visionary leadership, executing complex IT strategies and winning new business. Following executive roles Bank of America and Wachovia, Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.</p><p>In 2015, Theresa was named a William J. Clinton distinguished lecturer by the Clinton School of Public Service. She is the author of several publications on IT strategy and cybersecurity and a frequent speaker on IT risk. In 2014 she co-authored, with Ted Claypoole, the book <a href="https://www.amazon.com/Privacy-Age-Big-Data-Recognizing/dp/1442242574/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=1c7fcad3b480801c9b6733aaf28e2b34&amp;creativeASIN=1442242574" target="_blank">Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family</a>, which was subsequently featured on the <a href="http://www.cc.com/video-clips/la3puz/the-daily-show-with-jon-stewart-theresa-payton" target="_blank">Daily Show with John Stewart</a>.</p><p>Among her numerous accolades and recognitions, Theresa was named one of the top <a href="http://www.securitymagazine.com/articles/76269-most-influential-people-in-security?page=2" target="_blank">25 Most Influential People in Security</a> by Security Magazine and One of <a href="https://www.tripwire.com/state-of-security/security-data-protection/infosecs-rising-stars-and-hidden-gems-the-educators/" target="_blank">Infosec’s Rising Stars and Hidden Gems</a> by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.</p><p>In this episode we discuss managing risk, communicating with business owners about security, why security needs to be designed around the human, her role at the White House, privacy vs. security, how the government can help with cyber security, and so much more.</p><p>Where you can find Theresa:</p><ul><li><a href="https://www.linkedin.com/in/theresapayton/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/trackerpayton?lang=en" target="_blank">Twitter</a></li><li><a href="http://www.fortalicesolutions.com/wall" target="_blank">Fortalice Blog</a></li><li><a href="http://www.cbs.com/shows/hunted/photos/1007157/meet-the-command-center-investigators-from-hunted/118023/theresa-payton-former-white-house-chief-information-officer/" target="_blank">CBS</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/theresapayton/" target="_blank">Theresa Payton</a> is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of <a href="http://www.fortalicesolutions.com/" target="_blank">Fortalice Solutions</a>, an industry-leading security consulting company, and co-founder of <a href="https://darkcubed.com/" target="_blank">Dark Cubed</a>, a cybersecurity product company, Theresa is a proven leader and influencer who works with clients and colleagues to uncover strategic opportunities and identify new and emerging threats.</p><p>Theresa began her career in financial services, where she coupled her deep understanding of technology systems with visionary leadership, executing complex IT strategies and winning new business. Following executive roles Bank of America and Wachovia, Theresa served as the first female chief information officer at the White House, overseeing IT operations for President George W. Bush and his staff.</p><p>In 2015, Theresa was named a William J. Clinton distinguished lecturer by the Clinton School of Public Service. She is the author of several publications on IT strategy and cybersecurity and a frequent speaker on IT risk. In 2014 she co-authored, with Ted Claypoole, the book <a href="https://www.amazon.com/Privacy-Age-Big-Data-Recognizing/dp/1442242574/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=1c7fcad3b480801c9b6733aaf28e2b34&amp;creativeASIN=1442242574" target="_blank">Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family</a>, which was subsequently featured on the <a href="http://www.cc.com/video-clips/la3puz/the-daily-show-with-jon-stewart-theresa-payton" target="_blank">Daily Show with John Stewart</a>.</p><p>Among her numerous accolades and recognitions, Theresa was named one of the top <a href="http://www.securitymagazine.com/articles/76269-most-influential-people-in-security?page=2" target="_blank">25 Most Influential People in Security</a> by Security Magazine and One of <a href="https://www.tripwire.com/state-of-security/security-data-protection/infosecs-rising-stars-and-hidden-gems-the-educators/" target="_blank">Infosec’s Rising Stars and Hidden Gems</a> by Tripwire. In 2005 she was honored as Charlotte, NC’s Woman of the Year.</p><p>In this episode we discuss managing risk, communicating with business owners about security, why security needs to be designed around the human, her role at the White House, privacy vs. security, how the government can help with cyber security, and so much more.</p><p>Where you can find Theresa:</p><ul><li><a href="https://www.linkedin.com/in/theresapayton/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/trackerpayton?lang=en" target="_blank">Twitter</a></li><li><a href="http://www.fortalicesolutions.com/wall" target="_blank">Fortalice Blog</a></li><li><a href="http://www.cbs.com/shows/hunted/photos/1007157/meet-the-command-center-investigators-from-hunted/118023/theresa-payton-former-white-house-chief-information-officer/" target="_blank">CBS</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/019-theresa-payton-design-human]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1728</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 03 Apr 2017 04:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2c630401-f2d6-4195-b6d6-b3b95a8bd5e9/019theresapaytoncybersecurityinterviews.mp3" length="76923448" type="audio/mpeg"/><itunes:duration>53:23</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Theresa Payton is one of the nation’s leading experts in cybersecurity and IT strategy. As CEO of Fortalice Solutions, an industry-leading security consulting company, and co-founder of Dark Cubed, a cybersecurity product company, Theresa is a proven leader and influencer who works with clients and colleagues to uncover strategic opportunities and identify new and emerging…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#018 – Hal Pomeranz: Take a Deep Breath and Relax</title><itunes:title>#018 – Hal Pomeranz: Take a Deep Breath and Relax</itunes:title><description><![CDATA[<p><a href="http://www.linkedin.com/in/halpomeranz" target="_blank">Hal Pomeranz</a> is the Founder and Principal Consultant for <a href="http://www.deer-run.com" target="_blank">Deer Run Associates</a> with over 25 years of cyber security experience. As a digital forensic investigator, Hal has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime, and malicious software infrastructures. He has worked with law enforcement agencies in the United States and Europe, and with global corporations.</p><p>While perfectly at home in the Windows and Mac forensics world, Hal is a recognized expert in the analysis of Linux and Unix systems, and has made key contributions in this domain. His <a href="https://github.com/halpomeranz" target="_blank">EXT3 file recovery tools</a> were the direct result of an investigation, recovering data that led to multiple indictments and successful prosecutions. His research on EXT4 file system forensics provided a basis for the development of open source forensic support for this file system. Hal has also contributed a popular tool for automating Linux memory acquisition and analysis.</p><p>Hal is a SANS Faculty Fellow and SANS' longest tenured instructor and primary instructor for the <a href="https://www.sans.org/course/securing-linux-unix" target="_blank">Securing Linux/Unix (SEC506) course</a>. Hals&nbsp;is also a regular contributor to the SANS Digital Forensics and Incident Response blog and co-author of the <a href="http://blog.commandlinekungfu.com/" target="_blank">Command Line Kung Fu blog</a>.</p><p>In this episode we discuss Linux and Unix forensics, his start at Bell Labs, helping others in the industry, data enterprises should collect, running your own security firm, and so much more.</p><p>Where you can find Hal:</p><ul><li><a href="http://www.linkedin.com/in/halpomeranz" target="_blank">LinkedIn</a></li><li><a href="http://www.twitter.com/hal_pomeranz" target="_blank">Twitter</a></li><li><a href="https://github.com/halpomeranz" target="_blank">GitHub</a></li><li><a href="https://righteousit.wordpress.com/" target="_blank">Righteous IT</a></li><li><a href="http://blog.commandlinekungfu.com/" target="_blank">Command Line Kung Fu</a></li><li><a href="https://digital-forensics.sans.org/blog/author/halpomeranz" target="_blank">SANS</a></li><li><a href="http://www.deer-run.com/~hal/" target="_blank">Deer Run Associates&nbsp;</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="http://www.linkedin.com/in/halpomeranz" target="_blank">Hal Pomeranz</a> is the Founder and Principal Consultant for <a href="http://www.deer-run.com" target="_blank">Deer Run Associates</a> with over 25 years of cyber security experience. As a digital forensic investigator, Hal has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime, and malicious software infrastructures. He has worked with law enforcement agencies in the United States and Europe, and with global corporations.</p><p>While perfectly at home in the Windows and Mac forensics world, Hal is a recognized expert in the analysis of Linux and Unix systems, and has made key contributions in this domain. His <a href="https://github.com/halpomeranz" target="_blank">EXT3 file recovery tools</a> were the direct result of an investigation, recovering data that led to multiple indictments and successful prosecutions. His research on EXT4 file system forensics provided a basis for the development of open source forensic support for this file system. Hal has also contributed a popular tool for automating Linux memory acquisition and analysis.</p><p>Hal is a SANS Faculty Fellow and SANS' longest tenured instructor and primary instructor for the <a href="https://www.sans.org/course/securing-linux-unix" target="_blank">Securing Linux/Unix (SEC506) course</a>. Hals&nbsp;is also a regular contributor to the SANS Digital Forensics and Incident Response blog and co-author of the <a href="http://blog.commandlinekungfu.com/" target="_blank">Command Line Kung Fu blog</a>.</p><p>In this episode we discuss Linux and Unix forensics, his start at Bell Labs, helping others in the industry, data enterprises should collect, running your own security firm, and so much more.</p><p>Where you can find Hal:</p><ul><li><a href="http://www.linkedin.com/in/halpomeranz" target="_blank">LinkedIn</a></li><li><a href="http://www.twitter.com/hal_pomeranz" target="_blank">Twitter</a></li><li><a href="https://github.com/halpomeranz" target="_blank">GitHub</a></li><li><a href="https://righteousit.wordpress.com/" target="_blank">Righteous IT</a></li><li><a href="http://blog.commandlinekungfu.com/" target="_blank">Command Line Kung Fu</a></li><li><a href="https://digital-forensics.sans.org/blog/author/halpomeranz" target="_blank">SANS</a></li><li><a href="http://www.deer-run.com/~hal/" target="_blank">Deer Run Associates&nbsp;</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/018-hal-pomeranz-take-deep-breath-relax]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1718</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Mar 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d29e3dfe-f870-444e-b0e0-3acd45bc8389/018halpomeranzcybersecurityinterviews.mp3" length="73155543" type="audio/mpeg"/><itunes:duration>50:46</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Hal Pomeranz is the Founder and Principal Consultant for Deer Run Associates with over 25 years of cyber security experience. As a digital forensic investigator, Hal has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime, and malicious software infrastructures. He has worked with law enforcement agencies in the United…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#017 – Marie Hattar &amp; Dave Ginsburg: What Keeps the CISO Up at Night</title><itunes:title>#017 – Marie Hattar &amp; Dave Ginsburg: What Keeps the CISO Up at Night</itunes:title><description><![CDATA[<p>In this episode I am speaking with <a href="https://www.linkedin.com/in/mariehattar/" target="_blank">Marie Hattar</a> and <a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">David Ginsburg</a>. This is also my first podcast episode with two guests.</p><p>Marie is the CMO at&nbsp;<a href="https://www.ixiacom.com/" target="_blank">IXIA</a> and is responsible for their brand and global marketing efforts. Marie has more than 20 years of marketing leadership experience spanning the security, routing, switching, telecom and mobility markets. Before joining Ixia, Marie was CMO at <a href="https://www.checkpoint.com/" target="_blank">Check Point Software Technologies</a> where she reestablished the company as the leading end-to-end security vendor. Prior to that, she was Vice President at <a href="http://www.cisco.com/c/en/us/index.html" target="_blank">Cisco</a> where she led the company’s enterprise networking and security portfolio.</p><p>David is the VP of Marketing for <a href="https://www.cavirin.com/" target="_blank">Cavirin</a>. Dave has over 25 years of experience spanning corporate and product marketing, product management, digital marketing, and marketing automation. Previous roles included CMO at <a href="https://www.teridion.com/" target="_blank">Teridion</a>, <a href="http://www.pluribusnetworks.com/" target="_blank">Pluribus</a>, <a href="http://www.extremenetworks.com/" target="_blank">Extreme</a>, and Riverstone Networks as well as senior marketing leadership positions at Nortel and Cisco. His expertise spans information security, networking, cloud deployments, and SaaS.</p><p>I really enjoyed this conversation with them. They are both very technical, but can bridge the gap between the technical teams and the C suite. In this episode we discussed how the industry got to where it is now, the pluses and minuses of using FUD to get peoples attention, how marketing teams can be security enablers within an organization, and advice for companies coming to market in the information security space, and so much more.</p><p>Where you can find Marie:</p><ul><li><a href="https://www.ixiacom.com/company/blog?tags_id=All&amp;author_id=536&amp;items_per_page=8" target="_blank">Ixia Blog</a></li><li><a href="https://www.linkedin.com/in/mariehattar/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/MarieHattar" target="_blank">Twitter</a></li></ul><br/><p>Where you can find Dave:</p><ul><li><a href="https://www.cavirin.com/blog.html" target="_blank">Cavirin Blog</a></li><li><a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/daveginsburg" target="_blank">Twitter</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>In this episode I am speaking with <a href="https://www.linkedin.com/in/mariehattar/" target="_blank">Marie Hattar</a> and <a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">David Ginsburg</a>. This is also my first podcast episode with two guests.</p><p>Marie is the CMO at&nbsp;<a href="https://www.ixiacom.com/" target="_blank">IXIA</a> and is responsible for their brand and global marketing efforts. Marie has more than 20 years of marketing leadership experience spanning the security, routing, switching, telecom and mobility markets. Before joining Ixia, Marie was CMO at <a href="https://www.checkpoint.com/" target="_blank">Check Point Software Technologies</a> where she reestablished the company as the leading end-to-end security vendor. Prior to that, she was Vice President at <a href="http://www.cisco.com/c/en/us/index.html" target="_blank">Cisco</a> where she led the company’s enterprise networking and security portfolio.</p><p>David is the VP of Marketing for <a href="https://www.cavirin.com/" target="_blank">Cavirin</a>. Dave has over 25 years of experience spanning corporate and product marketing, product management, digital marketing, and marketing automation. Previous roles included CMO at <a href="https://www.teridion.com/" target="_blank">Teridion</a>, <a href="http://www.pluribusnetworks.com/" target="_blank">Pluribus</a>, <a href="http://www.extremenetworks.com/" target="_blank">Extreme</a>, and Riverstone Networks as well as senior marketing leadership positions at Nortel and Cisco. His expertise spans information security, networking, cloud deployments, and SaaS.</p><p>I really enjoyed this conversation with them. They are both very technical, but can bridge the gap between the technical teams and the C suite. In this episode we discussed how the industry got to where it is now, the pluses and minuses of using FUD to get peoples attention, how marketing teams can be security enablers within an organization, and advice for companies coming to market in the information security space, and so much more.</p><p>Where you can find Marie:</p><ul><li><a href="https://www.ixiacom.com/company/blog?tags_id=All&amp;author_id=536&amp;items_per_page=8" target="_blank">Ixia Blog</a></li><li><a href="https://www.linkedin.com/in/mariehattar/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/MarieHattar" target="_blank">Twitter</a></li></ul><br/><p>Where you can find Dave:</p><ul><li><a href="https://www.cavirin.com/blog.html" target="_blank">Cavirin Blog</a></li><li><a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/daveginsburg" target="_blank">Twitter</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/017-marie-hattar-dave-ginsburg-keeps-ciso-night]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1711</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 13 Mar 2017 12:05:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc3c4239-eeb7-4aa6-8de1-7f38feb82af7/017mariehattardaveginsburgcybersecurityinterviews.mp3" length="48144667" type="audio/mpeg"/><itunes:duration>50:06</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>In this episode I am speaking with Marie Hattar and David Ginsburg. This is also my first podcast episode with two guests. Marie is the CMO at IXIA and is responsible for their brand and global marketing efforts. Marie has more than 20 years of marketing leadership experience spanning the security, routing, switching, telecom and mobility…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#016 – Kristin Lovejoy: Security Is a Team Sport</title><itunes:title>#016 – Kristin Lovejoy: Security Is a Team Sport</itunes:title><description><![CDATA[<p><a href="http://linkedin.com/in/klovejoy" target="_blank">Kristin Lovejoy</a> is the CEO of <a href="https://bluvector.io/" target="_blank">BluVector</a>. Prior to her role at BluVector, she served as general manager of IBM’s Security Services Division, charged with development and delivery of managed and professional security services to IBM clients worldwide. In addition, she served as IBM's Global CISO and VP of IT Risk.</p><p>Kris is a recognized expert in the field on security, risk, compliance and governance, with appearances in Forbes, CNBC, NPR and USA Today. Within the past five years she has been recognized as 2015 SC Magazine Top 25 Security Managers, 2014 SC Magazine Power Player, 2012 Compass Award Winner by CSO Magazine, one of E-Week’s 2012 “Top Women in Information Security That Everyone Should Know”, Top 25 CTO by InfoWorld, as Top 25 Most Influential Security Executives by Security Magazine. She also holds U.S. and EU patents for Object Oriented Risk Management Models and Methods. Additionally, she is a member of numerous external boards and advisory panels, including <a href="https://www.scmagazine.com/editorial-advisory-board/section/6370/" target="_blank">SC Magazine’s Editorial Board</a> and <a href="http://www.grotech.com/" target="_blank">Grotech Ventures</a>.</p><p>In this episode we discuss her start information security and risk, what worries her about the RSA conference, AI and Machine Learning - and what it means for security, emerging threats, advice for CISOs, communicating risk management, and so much more.</p><p>Where you can find Kris:</p><ul><li><a href="https://bluvector.io/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/bluvector" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/watch?v=QjD3NZvzPUM" target="_blank">HITBGSEC 2015 - Kristin Lovejoy - Keynote: Security vs Privacy</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="http://linkedin.com/in/klovejoy" target="_blank">Kristin Lovejoy</a> is the CEO of <a href="https://bluvector.io/" target="_blank">BluVector</a>. Prior to her role at BluVector, she served as general manager of IBM’s Security Services Division, charged with development and delivery of managed and professional security services to IBM clients worldwide. In addition, she served as IBM's Global CISO and VP of IT Risk.</p><p>Kris is a recognized expert in the field on security, risk, compliance and governance, with appearances in Forbes, CNBC, NPR and USA Today. Within the past five years she has been recognized as 2015 SC Magazine Top 25 Security Managers, 2014 SC Magazine Power Player, 2012 Compass Award Winner by CSO Magazine, one of E-Week’s 2012 “Top Women in Information Security That Everyone Should Know”, Top 25 CTO by InfoWorld, as Top 25 Most Influential Security Executives by Security Magazine. She also holds U.S. and EU patents for Object Oriented Risk Management Models and Methods. Additionally, she is a member of numerous external boards and advisory panels, including <a href="https://www.scmagazine.com/editorial-advisory-board/section/6370/" target="_blank">SC Magazine’s Editorial Board</a> and <a href="http://www.grotech.com/" target="_blank">Grotech Ventures</a>.</p><p>In this episode we discuss her start information security and risk, what worries her about the RSA conference, AI and Machine Learning - and what it means for security, emerging threats, advice for CISOs, communicating risk management, and so much more.</p><p>Where you can find Kris:</p><ul><li><a href="https://bluvector.io/" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/bluvector" target="_blank">Twitter</a></li><li><a href="https://www.youtube.com/watch?v=QjD3NZvzPUM" target="_blank">HITBGSEC 2015 - Kristin Lovejoy - Keynote: Security vs Privacy</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/016-kristin-lovejoy-security-team-sport]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1707</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Mar 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/2e060e1c-0960-4499-8e1f-c0e6131867f7/016kristinlovejoycybersecurityinterviews.mp3" length="50138434" type="audio/mpeg"/><itunes:duration>52:11</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Kristin Lovejoy is the CEO of BluVector. Prior to her role at BluVector, she served as general manager of IBM’s Security Services Division, charged with development and delivery of managed and professional security services to IBM clients worldwide. In addition, she served as IBM’s Global CISO and VP of IT Risk. Kris is a recognized…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#015 – Cris Thomas (aka Space Rogue): This Isn’t a New Problem</title><itunes:title>#015 – Cris Thomas (aka Space Rogue): This Isn’t a New Problem</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">Cris Thomas</a> (aka Space Rogue) is a strategist for <a href="https://www.tenable.com" target="_blank">Tenable</a>. With more than two decades of experience, he commands an uncanny ability to link disparate events, read between the lines and distill complex, technical information into readily understandable, accessible and actionable intelligence.</p><p>Cris is a founding member of <a href="http://www.l0pht.com/" target="_blank">L0pht Heavy Industries</a>, a hacker think tank from the late '90s and has <a href="https://www.youtube.com/watch?v=VVJldn_MmMY" target="_blank">testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs</a>. He has also been interviewed for his security expertise by media organizations such as Wired, MSNBC, CNBC and even MTV. Before joining Tenable, he created the<a href="http://www.spacerogue.net/hnn/061600.html" target="_blank"> Hacker News Network</a> and produced the <a href="https://www.trustwave.com/Company/SpiderLabs/" target="_blank">SpiderLabs</a> Radio weekly news podcast. As a <a href="https://www.tenable.com/profile/cris-thomas" target="_blank">strategist for Tenable</a>, Cris helps clients understand how to apply the unique advantages of continuous monitoring as well as how to meet compliance and security challenges.</p><p>I have been following Space Rogue's work since the 90's and am delighted to have him on the show. I encourage people to go back and watch the famous&nbsp;testimony&nbsp;from Cris and the rest of L0pht from almost 20 years ago. It's scary that so many of the issues called out then, still exist today.</p><p>In this episode we discuss&nbsp;<a href="http://cybersquirrel1.com/" target="_blank">CyberSquirrel1</a>, FUD and cyber war, the growth of the <a href="https://www.rsaconference.com/" target="_blank">RSA conference</a>, the start of L0pht&nbsp;heavy industries, L0pht's famous testimony before congress, security basics, and much more.</p><p>Where you can find Cris:</p><ul><li><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">LinkedIn</a></li><li><a href="http://www.spacerogue.net/" target="_blank">Spacerogue.net</a></li><li><a href="https://twitter.com/spacerog" target="_blank">Twitter</a></li><li><a href="http://cybersquirrel1.com/" target="_blank">CyberSquirrel1</a></li><li><a href="https://www.tenable.com/profile/cris-thomas" target="_blank">Tenable Blog</a></li></ul><br/><p>Plus, everyone should just watch this. It's almost 20 years old and it still is very relevant.</p><p>[embed]https://www.youtube.com/watch?v=VVJldn_MmMY[/embed]</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">Cris Thomas</a> (aka Space Rogue) is a strategist for <a href="https://www.tenable.com" target="_blank">Tenable</a>. With more than two decades of experience, he commands an uncanny ability to link disparate events, read between the lines and distill complex, technical information into readily understandable, accessible and actionable intelligence.</p><p>Cris is a founding member of <a href="http://www.l0pht.com/" target="_blank">L0pht Heavy Industries</a>, a hacker think tank from the late '90s and has <a href="https://www.youtube.com/watch?v=VVJldn_MmMY" target="_blank">testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs</a>. He has also been interviewed for his security expertise by media organizations such as Wired, MSNBC, CNBC and even MTV. Before joining Tenable, he created the<a href="http://www.spacerogue.net/hnn/061600.html" target="_blank"> Hacker News Network</a> and produced the <a href="https://www.trustwave.com/Company/SpiderLabs/" target="_blank">SpiderLabs</a> Radio weekly news podcast. As a <a href="https://www.tenable.com/profile/cris-thomas" target="_blank">strategist for Tenable</a>, Cris helps clients understand how to apply the unique advantages of continuous monitoring as well as how to meet compliance and security challenges.</p><p>I have been following Space Rogue's work since the 90's and am delighted to have him on the show. I encourage people to go back and watch the famous&nbsp;testimony&nbsp;from Cris and the rest of L0pht from almost 20 years ago. It's scary that so many of the issues called out then, still exist today.</p><p>In this episode we discuss&nbsp;<a href="http://cybersquirrel1.com/" target="_blank">CyberSquirrel1</a>, FUD and cyber war, the growth of the <a href="https://www.rsaconference.com/" target="_blank">RSA conference</a>, the start of L0pht&nbsp;heavy industries, L0pht's famous testimony before congress, security basics, and much more.</p><p>Where you can find Cris:</p><ul><li><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">LinkedIn</a></li><li><a href="http://www.spacerogue.net/" target="_blank">Spacerogue.net</a></li><li><a href="https://twitter.com/spacerog" target="_blank">Twitter</a></li><li><a href="http://cybersquirrel1.com/" target="_blank">CyberSquirrel1</a></li><li><a href="https://www.tenable.com/profile/cris-thomas" target="_blank">Tenable Blog</a></li></ul><br/><p>Plus, everyone should just watch this. It's almost 20 years old and it still is very relevant.</p><p>[embed]https://www.youtube.com/watch?v=VVJldn_MmMY[/embed]</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/015-cris-thomas-aka-space-rogue-isnt-new-problem]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1703</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 27 Feb 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/577707c4-c9fb-4e1d-b451-3a0aa647de90/015spaceroguecybersecurityinterviews.mp3" length="29356300" type="audio/mpeg"/><itunes:duration>30:32</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cris Thomas (aka Space Rogue) is a strategist for Tenable. With more than two decades of experience, he commands an uncanny ability to link disparate events, read between the lines and distill complex, technical information into readily understandable, accessible and actionable intelligence. Cris is a founding member of L0pht Heavy Industries, a hacker think tank…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#014 – RSA Conference 2017</title><itunes:title>#014 – RSA Conference 2017</itunes:title><description><![CDATA[<p>The <a href="https://www.rsaconference.com/" target="_blank">RSA Conference</a> (or "RSAC") held annually in San Francisco, CA has become one of the largest information security conferences. I was able to get a press pass to the event this year&nbsp;and was pitched heavily for product focused interviews. Most I kindly declined, but there were a few people I did connect with and recorded some great conversations which I will post in the coming weeks.</p><p>I recorded episodes with:</p><ul><li><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">Cris Thomas (aka Space Rogue)</a>, Strategist for <a href="http://www.tenable.com/" target="_blank">Tenable Network Security</a></li><li><a href="https://www.linkedin.com/in/klovejoy/" target="_blank"> Kristin&nbsp;Lovejoy</a>, CEO of <a href="http://bluvector.io/" target="_blank">BluVector</a></li><li>And my first two person interview with&nbsp;<a href="https://www.linkedin.com/in/mariehattar/" target="_blank">Marie Hattar</a>, CMO of <a href="https://www.ixiacom.com/" target="_blank">IXIA </a>and <a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">David Ginsburg</a>, VP Marketing at <a href="https://www.cavirin.com/" target="_blank">Cavirin Systems</a></li></ul><br/><p>I really enjoyed my conversations with each of them and look forward to your feedback. Please make sure you are <a href="https://cybersecurityinterviews.com/email-sign-up/" target="_blank">subscribed here</a>&nbsp;so you don't miss any&nbsp;episodes.</p><p>In the interim, please listen to this short episode on my take of the event.</p><p>Thanks!</p><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>The <a href="https://www.rsaconference.com/" target="_blank">RSA Conference</a> (or "RSAC") held annually in San Francisco, CA has become one of the largest information security conferences. I was able to get a press pass to the event this year&nbsp;and was pitched heavily for product focused interviews. Most I kindly declined, but there were a few people I did connect with and recorded some great conversations which I will post in the coming weeks.</p><p>I recorded episodes with:</p><ul><li><a href="https://www.linkedin.com/in/spacerogue/" target="_blank">Cris Thomas (aka Space Rogue)</a>, Strategist for <a href="http://www.tenable.com/" target="_blank">Tenable Network Security</a></li><li><a href="https://www.linkedin.com/in/klovejoy/" target="_blank"> Kristin&nbsp;Lovejoy</a>, CEO of <a href="http://bluvector.io/" target="_blank">BluVector</a></li><li>And my first two person interview with&nbsp;<a href="https://www.linkedin.com/in/mariehattar/" target="_blank">Marie Hattar</a>, CMO of <a href="https://www.ixiacom.com/" target="_blank">IXIA </a>and <a href="https://www.linkedin.com/in/david-ginsburg-4774904/" target="_blank">David Ginsburg</a>, VP Marketing at <a href="https://www.cavirin.com/" target="_blank">Cavirin Systems</a></li></ul><br/><p>I really enjoyed my conversations with each of them and look forward to your feedback. Please make sure you are <a href="https://cybersecurityinterviews.com/email-sign-up/" target="_blank">subscribed here</a>&nbsp;so you don't miss any&nbsp;episodes.</p><p>In the interim, please listen to this short episode on my take of the event.</p><p>Thanks!</p><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/014-rsa-conference-2017]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1694</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 20 Feb 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/d2110cf6-ccaf-4af5-8c62-e7746646d160/014rsa2017cybersecurityinterviews.mp3" length="6614858" type="audio/mpeg"/><itunes:duration>06:51</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>The RSA Conference (or “RSAC”) held annually in San Francisco, CA has become one of the largest information security conferences. I was able to get a press pass to the event this year and was pitched heavily for product focused interviews. Most I kindly declined, but there were a few people I did connect with and…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#013 – Gary McGraw: Security Is Hard Work</title><itunes:title>#013 – Gary McGraw: Security Is Hard Work</itunes:title><description><![CDATA[<p>Dr. Gary McGraw is the Vice President of Security Technology at <a href="https://www.synopsys.com/" target="_blank">Synopsys</a> (SNPS). Gary quite literally helped create the field of software security. He is a globally recognized authority on software security&nbsp;and the author of several bestselling books on this topic. His titles include <a href="https://www.amazon.com/gp/product/0321356705/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321356705&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=417ecc37df732e8ad6383b6c4ec155ae" target="_blank">Software Security</a>, <a href="https://www.amazon.com/gp/search/ref=as_li_qf_sp_sr_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;keywords=0201786958&amp;index=aps&amp;camp=1789&amp;creative=9325&amp;linkCode=ur2&amp;linkId=224bfb88103109010acfd8b5cd660acc" target="_blank">Exploiting Software</a>, <a href="https://www.amazon.com/gp/product/0321774957/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321774957&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=3df2b736994d4194703778d4bcfa64ea" target="_blank">Building Secure Software</a>, <a href="https://www.amazon.com/Java-Security-Gary-McGraw/dp/047117842X/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=500e0538eb5e7eb3a8c32a0c6464deaa&amp;creativeASIN=047117842X" target="_blank">Java Security</a>, <a href="https://www.amazon.com/Exploiting-Online-Games-Massively-Distributed/dp/0132271915/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=2b3efa27084aed29604adbe958d64c41&amp;creativeASIN=0132271915" target="_blank">Exploiting Online Games</a>, and <a href="http://amzn.to/2ljjgaJ" target="_blank">6 other books</a>. He is&nbsp;also the editor of the <a href="http://www.buildingsecurityin.com/" target="_blank">Addison-Wesley Software Security</a> series. Gary&nbsp;has also written over 100 peer-reviewed scientific publications, authors a periodic security column for <a href="http://www.techtarget.com/contributor/Gary-McGraw" target="_blank">SearchSecurity</a>, is frequently quoted in the press, and regularly speaks at major cyber security conferences. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Max Financial, NTrepid, and Ravenwhite. He has also served as Advisor to Dasient (acquired by Twitter), Fortify Software (acquired by HP), and Invotas (acquired by FireEye).</p><p>Gary holds a dual PhD in Cognitive Science and Computer Science from Indiana University where he serves on the <a href="http://www.soic.indiana.edu/about/advisory-council.html" target="_blank">Dean’s Advisory Council for the School of Informatics</a>. Gary served on the <a href="https://www.computer.org/web/volunteers/bog" target="_blank">IEEE Computer Society Board of Governors</a>. He also produces and hosts his <em>own</em> the monthly podcast, the&nbsp;<a href="https://www.garymcgraw.com/technology/silver-bullet-podcast/" target="_blank">Silver Bullet Security Podcast</a> for IEEE Security &amp; Privacy Magazine (syndicated by SearchSecurity).</p><p>Gary is also a self described "alpha geek" and a pioneer in the field of computer security. However, Gary also is a big proponent of life out side of tech. He lives on a farmhouse in Virginia, collects art, plays several musical instruments, an experienced cook, and shares a hobby of mine,&nbsp;craft cocktails. I am truly honored to have him on the show.</p><p>In this episode we discuss <a href="http://www.kindredcocktails.com/cocktail/liberal" target="_blank">craft cocktails</a>, his <a href="https://archive.org/details/ShmooCon2017" target="_blank">Shmoocon 2017</a> key note, building in software security, <a href="https://www.garymcgraw.com/technology/bsimm/" target="_blank">the BSIMM project</a>, breakers as builders, leadership in infosec, cyber security in the media, government relations,&nbsp;<a...]]></description><content:encoded><![CDATA[<p>Dr. Gary McGraw is the Vice President of Security Technology at <a href="https://www.synopsys.com/" target="_blank">Synopsys</a> (SNPS). Gary quite literally helped create the field of software security. He is a globally recognized authority on software security&nbsp;and the author of several bestselling books on this topic. His titles include <a href="https://www.amazon.com/gp/product/0321356705/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321356705&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=417ecc37df732e8ad6383b6c4ec155ae" target="_blank">Software Security</a>, <a href="https://www.amazon.com/gp/search/ref=as_li_qf_sp_sr_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;keywords=0201786958&amp;index=aps&amp;camp=1789&amp;creative=9325&amp;linkCode=ur2&amp;linkId=224bfb88103109010acfd8b5cd660acc" target="_blank">Exploiting Software</a>, <a href="https://www.amazon.com/gp/product/0321774957/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321774957&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=3df2b736994d4194703778d4bcfa64ea" target="_blank">Building Secure Software</a>, <a href="https://www.amazon.com/Java-Security-Gary-McGraw/dp/047117842X/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=500e0538eb5e7eb3a8c32a0c6464deaa&amp;creativeASIN=047117842X" target="_blank">Java Security</a>, <a href="https://www.amazon.com/Exploiting-Online-Games-Massively-Distributed/dp/0132271915/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=2b3efa27084aed29604adbe958d64c41&amp;creativeASIN=0132271915" target="_blank">Exploiting Online Games</a>, and <a href="http://amzn.to/2ljjgaJ" target="_blank">6 other books</a>. He is&nbsp;also the editor of the <a href="http://www.buildingsecurityin.com/" target="_blank">Addison-Wesley Software Security</a> series. Gary&nbsp;has also written over 100 peer-reviewed scientific publications, authors a periodic security column for <a href="http://www.techtarget.com/contributor/Gary-McGraw" target="_blank">SearchSecurity</a>, is frequently quoted in the press, and regularly speaks at major cyber security conferences. Besides serving as a strategic counselor for top business and IT executives, Gary is on the Advisory Boards of Max Financial, NTrepid, and Ravenwhite. He has also served as Advisor to Dasient (acquired by Twitter), Fortify Software (acquired by HP), and Invotas (acquired by FireEye).</p><p>Gary holds a dual PhD in Cognitive Science and Computer Science from Indiana University where he serves on the <a href="http://www.soic.indiana.edu/about/advisory-council.html" target="_blank">Dean’s Advisory Council for the School of Informatics</a>. Gary served on the <a href="https://www.computer.org/web/volunteers/bog" target="_blank">IEEE Computer Society Board of Governors</a>. He also produces and hosts his <em>own</em> the monthly podcast, the&nbsp;<a href="https://www.garymcgraw.com/technology/silver-bullet-podcast/" target="_blank">Silver Bullet Security Podcast</a> for IEEE Security &amp; Privacy Magazine (syndicated by SearchSecurity).</p><p>Gary is also a self described "alpha geek" and a pioneer in the field of computer security. However, Gary also is a big proponent of life out side of tech. He lives on a farmhouse in Virginia, collects art, plays several musical instruments, an experienced cook, and shares a hobby of mine,&nbsp;craft cocktails. I am truly honored to have him on the show.</p><p>In this episode we discuss <a href="http://www.kindredcocktails.com/cocktail/liberal" target="_blank">craft cocktails</a>, his <a href="https://archive.org/details/ShmooCon2017" target="_blank">Shmoocon 2017</a> key note, building in software security, <a href="https://www.garymcgraw.com/technology/bsimm/" target="_blank">the BSIMM project</a>, breakers as builders, leadership in infosec, cyber security in the media, government relations,&nbsp;<a href="http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare" target="_blank">the NASCAR effect</a>,&nbsp;<a href="https://www.garymcgraw.com/life/philanthropy/" target="_blank">giving back to your community</a>, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Gary:</p><ul><li><a href="https://www.garymcgraw.com" target="_blank">GaryMcgraw.com</a></li><li><a href="https://twitter.com/cigitalgem" target="_blank">Twitter</a></li><li><a href="https://www.cigital.com/blog/author/gem/" target="_blank">Cigital Blog</a></li></ul><br/><p>Books:</p><ul><li><a href="https://www.amazon.com/gp/product/0321356705/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321356705&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=417ecc37df732e8ad6383b6c4ec155ae" target="_blank">Software Security</a></li><li><a href="https://www.amazon.com/gp/search/ref=as_li_qf_sp_sr_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;keywords=0201786958&amp;index=aps&amp;camp=1789&amp;creative=9325&amp;linkCode=ur2&amp;linkId=224bfb88103109010acfd8b5cd660acc" target="_blank">Exploiting Software</a></li><li><a href="https://www.amazon.com/gp/product/0321774957/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=0321774957&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=3df2b736994d4194703778d4bcfa64ea" target="_blank">Building Secure Software</a></li><li><a href="https://www.amazon.com/Java-Security-Gary-McGraw/dp/047117842X/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=500e0538eb5e7eb3a8c32a0c6464deaa&amp;creativeASIN=047117842X" target="_blank">Java Security</a></li><li><a href="https://www.amazon.com/Exploiting-Online-Games-Massively-Distributed/dp/0132271915/ref=as_sl_pc_qf_sp_asin_til?tag=cybersecur030-20&amp;linkCode=w00&amp;linkId=2b3efa27084aed29604adbe958d64c41&amp;creativeASIN=0132271915" target="_blank">Exploiting Online Games</a></li><li><a href="http://amzn.to/2ljjgaJ" target="_blank">Amazon author page for Gary</a></li></ul><br/><p><em>The Liberal Cocktail</em></p><p>1 1⁄2 oz Rye</p><p>1⁄2 oz Sweet vermouth</p><p>1⁄4 oz Amer Picon (<em>Note: </em><a href="https://cybersecurityinterviews.com/contact/" target="_blank"><em>email me</em></a><em> for substitution&nbsp;reccomendations</em>)</p><p>1 ds Orange bitters</p><p>Instructions:</p><p>Stir, strain, straight up, cocktail glass</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/013-gary-mcgraw-security-hard-work]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1683</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 13 Feb 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3a0bfd7a-00a0-4747-b1f1-c41138d61bcc/013garymcgrawcybersecurityinterviews.mp3" length="50838978" type="audio/mpeg"/><itunes:duration>52:54</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dr. Gary McGraw is the Vice President of Security Technology at Synopsys (SNPS). Gary quite literally helped create the field of software security. He is a globally recognized authority on software security and the author of several bestselling books on this topic. His titles include Software Security, Exploiting Software, Building Secure Software, Java Security, Exploiting Online…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#012 – Cindy Murphy: Learn How To Learn</title><itunes:title>#012 – Cindy Murphy: Learn How To Learn</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/detectivecindymurphy" target="_blank">Cindy Murphy</a> served in law enforcement&nbsp;&nbsp;for more than thirty years&nbsp;(twenty-five of those years at the Madison Police Department in Wisconsin) before leaving the force to&nbsp;launch <a href="https://www.gillware.com/forensics/" target="_blank">Gillware Digital Forensics</a>, where she is co-owner and serves as president and lead examiner. Her peers have called her "one of the most dedicated people in the field of digital forensics." Cindy has also been teaching digital forensics since 2002, is a certified <a href="https://www.sans.org/instructors/cindy-murphy" target="_blank">SANS&nbsp;instructor</a> and helped develop the SANS Mobile Device and <a href="https://www.sans.org/course/advanced-smartphone-mobile-device-forensics" target="_blank">Advanced Smartphone Forensics courses</a>. Her extensive experience has given her both the real-world experience and the foundation in training that it takes to excel in the mobile forensics field and share her knowledge with others.</p><p>Throughout her career, Cindy has always looked for opportunities to help in meaningful ways. In one notable case, experts spent a year trying to unlock the phone of a 16-year-old girl who was killed in a tragic traffic accident. As the family prepared to spread the girl's ashes in a ceremony a year after her death, Cindy was given the victim's locked phone. She was able to unlock it, enabling the family to see their daughter's last photos. The family sent Cindy a thank you note that said: "We so appreciate this opportunity you've given us to hold onto a piece of our daughter's life we were sure was lost to us." This is just one example how digital forensics, and a good examiner, can have a tremendously positive impact in peoples lives.</p><p>Cindy has also developed the&nbsp;"<a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.431.8292&amp;rep=rep1&amp;type=pdf" target="_blank">Fraternal Clone Method</a>" for Cell Phones, a&nbsp;<a href="https://forensic4cast.com/forensic-4cast-awards/2012-results/" target="_blank">Forensic 4Cast Forensic Examiner of the Year Award</a> winner, a&nbsp;<a href="https://www.sans.org/cyber-innovation-awards/year/2014" target="_blank">SANS People Who Made a Difference in Security Award</a> winner, and was named a <a href="https://www.scmagazine.com/women-of-influence/article/530276/5/" target="_blank">2016&nbsp;Women of Influence in IT Security by SC Magazine</a>. She is also one of the nicest and most&nbsp;approachable&nbsp;people in the cyber security and digital forensic industry.</p><p>In this interview we&nbsp;discuss starting digital forensics in law enforcement, how she started with mobile forensics in the early 2000's, moving from law enforcement to the private sector, the concerns she has with mobile phones, mobile malware, recruiting and retaining women in DF/IR, developing SANS mobile forensics courses, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Cindy:</p><ul><li><a href="https://www.linkedin.com/in/detectivecindymurphy" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/CindyMurph" target="_blank">Twitter</a></li><li><a href="https://www.gillware.com/forensics/" target="_blank">Gillware Digital Forensics</a></li><li><a href="https://www.sans.org/instructors/cindy-murphy" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/detectivecindymurphy" target="_blank">Cindy Murphy</a> served in law enforcement&nbsp;&nbsp;for more than thirty years&nbsp;(twenty-five of those years at the Madison Police Department in Wisconsin) before leaving the force to&nbsp;launch <a href="https://www.gillware.com/forensics/" target="_blank">Gillware Digital Forensics</a>, where she is co-owner and serves as president and lead examiner. Her peers have called her "one of the most dedicated people in the field of digital forensics." Cindy has also been teaching digital forensics since 2002, is a certified <a href="https://www.sans.org/instructors/cindy-murphy" target="_blank">SANS&nbsp;instructor</a> and helped develop the SANS Mobile Device and <a href="https://www.sans.org/course/advanced-smartphone-mobile-device-forensics" target="_blank">Advanced Smartphone Forensics courses</a>. Her extensive experience has given her both the real-world experience and the foundation in training that it takes to excel in the mobile forensics field and share her knowledge with others.</p><p>Throughout her career, Cindy has always looked for opportunities to help in meaningful ways. In one notable case, experts spent a year trying to unlock the phone of a 16-year-old girl who was killed in a tragic traffic accident. As the family prepared to spread the girl's ashes in a ceremony a year after her death, Cindy was given the victim's locked phone. She was able to unlock it, enabling the family to see their daughter's last photos. The family sent Cindy a thank you note that said: "We so appreciate this opportunity you've given us to hold onto a piece of our daughter's life we were sure was lost to us." This is just one example how digital forensics, and a good examiner, can have a tremendously positive impact in peoples lives.</p><p>Cindy has also developed the&nbsp;"<a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.431.8292&amp;rep=rep1&amp;type=pdf" target="_blank">Fraternal Clone Method</a>" for Cell Phones, a&nbsp;<a href="https://forensic4cast.com/forensic-4cast-awards/2012-results/" target="_blank">Forensic 4Cast Forensic Examiner of the Year Award</a> winner, a&nbsp;<a href="https://www.sans.org/cyber-innovation-awards/year/2014" target="_blank">SANS People Who Made a Difference in Security Award</a> winner, and was named a <a href="https://www.scmagazine.com/women-of-influence/article/530276/5/" target="_blank">2016&nbsp;Women of Influence in IT Security by SC Magazine</a>. She is also one of the nicest and most&nbsp;approachable&nbsp;people in the cyber security and digital forensic industry.</p><p>In this interview we&nbsp;discuss starting digital forensics in law enforcement, how she started with mobile forensics in the early 2000's, moving from law enforcement to the private sector, the concerns she has with mobile phones, mobile malware, recruiting and retaining women in DF/IR, developing SANS mobile forensics courses, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Cindy:</p><ul><li><a href="https://www.linkedin.com/in/detectivecindymurphy" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/CindyMurph" target="_blank">Twitter</a></li><li><a href="https://www.gillware.com/forensics/" target="_blank">Gillware Digital Forensics</a></li><li><a href="https://www.sans.org/instructors/cindy-murphy" target="_blank">SANS</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/012-cindy-murphy-learn-learn]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1662</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 06 Feb 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/a88986c5-a6df-4154-801d-4d263f7fad09/012cindymurphycybersecurityinterviews.mp3" length="62568611" type="audio/mpeg"/><itunes:duration>01:05:07</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Cindy Murphy served in law enforcement  for more than thirty years (twenty-five of those years at the Madison Police Department in Wisconsin) before leaving the force to launch Gillware Digital Forensics, where she is co-owner and serves as president and lead examiner. Her peers have called her “one of the most dedicated people in the field of digital…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#011 – Scott Schober: What Makes It Work</title><itunes:title>#011 – Scott Schober: What Makes It Work</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/snschober" target="_blank">Scott Schober</a> is the President and CEO of <a href="https://www.bvsystems.com/" target="_blank">Berkeley Varitronics Systems</a> (BVS), a 44 year-old company and leading provider&nbsp;of advanced, world-class wireless test and security solutions.&nbsp;Scott&nbsp;starting with BVS in 1989 and the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT as well as other&nbsp;advanced radio devices. As an experienced software engineer, Scott has developed cellular test instruments used for measuring, optimizing&nbsp;and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development of BVS’ cell phone detection tools, used to enforce a "no cell phone policy" in various markets including government, corporate, military, educational, correctional and law&nbsp;enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world.</p><p>Scott&nbsp;is a highly sought after subject expert on the topic of cyber security and wireless&nbsp;technology for media appearances and commentary. He is often seen on ABC News,&nbsp;Bloomberg TV, Al Jazeera America, CBS This Morning News, CCTV America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition,&nbsp;MSNBC and many more.&nbsp;His precautionary advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The&nbsp;Peggy Smedley Show. He regularly presents on visionary issues at conferences around the globe discussing wireless technology and its role in the current cyber security breaches along with his vision for best practices to stay safe in the future.&nbsp;Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily&nbsp;News, Newsweek, USA Today, and The New York Times.</p><p>In his latest book, <a href="https://www.amazon.com/gp/product/099690221X/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=099690221X&amp;linkId=4780187684dd0f450e4ae5dd2e74c90f" target="_blank">Hacked Again</a>, Scott&nbsp;explores the ins and outs of&nbsp;his experience when&nbsp;his <em>own</em> small business was hacked. Several times. In this eye opening book, he details mayhem and tries understand the motives behind his being hacked.</p><p>In this interview we will discuss his experience being hacked, the importance of layer security, how to improve IoT security, drone security, common themes in big breaches, cyber security education, finding your niche, and much more.</p><p>&nbsp;</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>&nbsp;</p><p>Where you can find Scott:</p><ul><li><a href="https://www.amazon.com/gp/product/099690221X/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=099690221X&amp;linkId=4780187684dd0f450e4ae5dd2e74c90f" target="_blank">Hacked Again (Amazon)</a></li><li><a href="https://www.linkedin.com/in/snschober" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ScottBVS" target="_blank">Twitter</a></li><li><a href="https://scottschober.com/blog/" target="_blank">Blog</a></li><li><a href="http://www.hackeducate.com/" target="_blank">HackEd</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/snschober" target="_blank">Scott Schober</a> is the President and CEO of <a href="https://www.bvsystems.com/" target="_blank">Berkeley Varitronics Systems</a> (BVS), a 44 year-old company and leading provider&nbsp;of advanced, world-class wireless test and security solutions.&nbsp;Scott&nbsp;starting with BVS in 1989 and the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular, WiMAX, LTE, IoT as well as other&nbsp;advanced radio devices. As an experienced software engineer, Scott has developed cellular test instruments used for measuring, optimizing&nbsp;and plotting signal coverage, primarily for the initial cellular build-out throughout the United States. Scott’s recent focus has been development of BVS’ cell phone detection tools, used to enforce a "no cell phone policy" in various markets including government, corporate, military, educational, correctional and law&nbsp;enforcement. Thousands of these security tools have been deployed throughout every state in the U.S. and around the world.</p><p>Scott&nbsp;is a highly sought after subject expert on the topic of cyber security and wireless&nbsp;technology for media appearances and commentary. He is often seen on ABC News,&nbsp;Bloomberg TV, Al Jazeera America, CBS This Morning News, CCTV America, CNBC, CNN, Fox Business, Fox News, Good Morning America, Inside Edition,&nbsp;MSNBC and many more.&nbsp;His precautionary advice is heard on dozens of radio stations such as National Public Radio, Sirius XM Radio, Bloomberg Radio, and The&nbsp;Peggy Smedley Show. He regularly presents on visionary issues at conferences around the globe discussing wireless technology and its role in the current cyber security breaches along with his vision for best practices to stay safe in the future.&nbsp;Scott has been interviewed in WSJ, Forbes, Fortune, Success, NY Daily&nbsp;News, Newsweek, USA Today, and The New York Times.</p><p>In his latest book, <a href="https://www.amazon.com/gp/product/099690221X/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=099690221X&amp;linkId=4780187684dd0f450e4ae5dd2e74c90f" target="_blank">Hacked Again</a>, Scott&nbsp;explores the ins and outs of&nbsp;his experience when&nbsp;his <em>own</em> small business was hacked. Several times. In this eye opening book, he details mayhem and tries understand the motives behind his being hacked.</p><p>In this interview we will discuss his experience being hacked, the importance of layer security, how to improve IoT security, drone security, common themes in big breaches, cyber security education, finding your niche, and much more.</p><p>&nbsp;</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>&nbsp;</p><p>Where you can find Scott:</p><ul><li><a href="https://www.amazon.com/gp/product/099690221X/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&amp;tag=cybersecur030-20&amp;camp=1789&amp;creative=9325&amp;linkCode=as2&amp;creativeASIN=099690221X&amp;linkId=4780187684dd0f450e4ae5dd2e74c90f" target="_blank">Hacked Again (Amazon)</a></li><li><a href="https://www.linkedin.com/in/snschober" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/ScottBVS" target="_blank">Twitter</a></li><li><a href="https://scottschober.com/blog/" target="_blank">Blog</a></li><li><a href="http://www.hackeducate.com/" target="_blank">HackEd</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/011-scott-schober-makes-work]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1650</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 30 Jan 2017 05:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/6b192301-3955-465b-87f8-14d48ee72566/011scottschobercybersecurityinterviews.mp3" length="40288009" type="audio/mpeg"/><itunes:duration>41:55</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Scott Schober is the President and CEO of Berkeley Varitronics Systems (BVS), a 44 year-old company and leading provider of advanced, world-class wireless test and security solutions.  Scott starting with BVS in 1989 and the company’s product line of wireless test and security instruments has increased to over 100 products with a core focus on Wi-Fi, Cellular,…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#010 – ShmooCon 12 (2017)</title><itunes:title>#010 – ShmooCon 12 (2017)</itunes:title><description><![CDATA[<p>Early each year, for the past 12 years, the hacker conference <a href="http://shmoocon.org/" target="_blank">ShmooCon</a> takes place in Washington, DC. This year I was honored and fortunate to get a press pass to this sold out event which the organizers call, "an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues."</p><p>It was a great time and in this episode I will recap my experience&nbsp;over the three days.</p><p>More ShmooCon information:</p><ul><li><a href="http://shmoocon.org/" target="_blank">ShmooCon Website</a></li><li><a href="https://twitter.com/shmoocon" target="_blank">Twitter</a></li><li><a href="https://twitter.com/ShmooConPuzzle" target="_blank">ShmooConPuzzle</a></li><li><a href="http://www.shmooganography.org/Welcome" target="_blank">Shmooganography</a></li></ul><br/><p>Thank you to ShmooCon and the organizers for letting me be part of this event!</p>]]></description><content:encoded><![CDATA[<p>Early each year, for the past 12 years, the hacker conference <a href="http://shmoocon.org/" target="_blank">ShmooCon</a> takes place in Washington, DC. This year I was honored and fortunate to get a press pass to this sold out event which the organizers call, "an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues."</p><p>It was a great time and in this episode I will recap my experience&nbsp;over the three days.</p><p>More ShmooCon information:</p><ul><li><a href="http://shmoocon.org/" target="_blank">ShmooCon Website</a></li><li><a href="https://twitter.com/shmoocon" target="_blank">Twitter</a></li><li><a href="https://twitter.com/ShmooConPuzzle" target="_blank">ShmooConPuzzle</a></li><li><a href="http://www.shmooganography.org/Welcome" target="_blank">Shmooganography</a></li></ul><br/><p>Thank you to ShmooCon and the organizers for letting me be part of this event!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/010-shmoocon-12-2017]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1675</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 23 Jan 2017 03:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/b92bb698-6afe-45fb-8888-87799e5e74f1/010shmoocon122017cybersecurityinterviews.mp3" length="10687547" type="audio/mpeg"/><itunes:duration>11:06</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Early each year, for the past 12 years, the hacker conference ShmooCon takes place in Washington, DC. This year I was honored and fortunate to get a press pass to this sold out event which the organizers call, “an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#009 – Ismael Valenzuela: Let’s See What Happens</title><itunes:title>#009 – Ismael Valenzuela: Let’s See What Happens</itunes:title><description><![CDATA[<p>Defined by his peers as a “passionate, experienced and visionary individual who is always striving to improve himself,” <a href="https://www.linkedin.com/in/ivalenzuela" target="_blank">Ismael Valenzuela</a> is one of the few individuals that has done almost all in the InfoSec arena, from founding one of the first IT Security companies in Spain to managing a distributed CERT across the world as well as teaching for highly reputed institutions such as <a href="https://www.sans.org/" target="_blank">SANS</a>, BSi or the Spanish National Center of Intelligence.</p><p>His command of both the business and technical aspects of information security has allowed him to specialize in building and boosting highly technical security teams and successful security businesses across North America, EMEA, India and Australia in the last 15 years.</p><p>As a top cybersecurity expert with strong technical background and deep knowledge of penetration testing, security architectures, intrusion detection and computer forensics, Ismael has provided security consultancy, advice and guidance to large government and private organisations, including major EU Institutions and US Government Agencies.</p><p>Prior to joining <a href="http://www.mcafee.com/us/services/foundstone-services/index.aspx" target="_blank">Foundstone Services</a> at <a href="http://www.intelsecurity.com/" target="_blank">Intel Security</a>, Ismael worked as Global IT Security Manager for <a href="http://www.isofthealth.com/" target="_blank">iSOFT Group Ltd</a>, one of the world’s largest providers of healthcare IT solutions, focusing on establishing and managing the IT Security program in more than 40 countries while providing risk-driven strategic planning, defining an ISO 27001 compliant policy framework and working with the applications team to ensure that security was embedded into their SDLC.</p><p>Author of security articles for Hakin9, INSECURE Magazine and the <a href="https://digital-forensics.sans.org/blog" target="_blank">SANS Forensics Blog</a>, Ismael also serves on the GIAC Advisory Board and is a Community SANS Instructor.</p><p>He holds a Bachelor's degree in Computer Science from the University of Malaga, is certified in Business Administration, and holds numerous professional certifications including the highly regarded <a href="http://www.giac.org/certification/security-expert-gse" target="_blank">GIAC Security Expert</a> (GSE #132) any many others from <a href="http://www.giac.org/" target="_blank">GIAC</a>, <a href="https://www.isc2.org/" target="_blank">ISC2 </a>and <a href="https://www.isaca.org/pages/default.aspx" target="_blank">ISACA</a>.</p><p>In this interview we will discuss learning security on his own, scoping penetration testing projects, security in the healthcare industry, running&nbsp;international&nbsp;teams, how to drive an internal security&nbsp;culture, developing internal training programs, threat hunting and his <a href="https://github.com/aboutsecurity/rastrea2r" target="_blank">rastrea2r</a> threat hunting tool, lessons learned&nbsp;from&nbsp;his IR work, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Ismael:</p><ul><li><a href="https://www.linkedin.com/in/ivalenzuela" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/aboutsecurity" target="_blank">Twitter</a></li><li><a href="https://digital-forensics.sans.org/blog/author/ismaelvalenzuela" target="_blank">SANS Blog</a></li><li><a href="http://blog.ismaelvalenzuela.com/" target="_blank">Blog</a></li><li><a href="https://github.com/aboutsecurity" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p>Defined by his peers as a “passionate, experienced and visionary individual who is always striving to improve himself,” <a href="https://www.linkedin.com/in/ivalenzuela" target="_blank">Ismael Valenzuela</a> is one of the few individuals that has done almost all in the InfoSec arena, from founding one of the first IT Security companies in Spain to managing a distributed CERT across the world as well as teaching for highly reputed institutions such as <a href="https://www.sans.org/" target="_blank">SANS</a>, BSi or the Spanish National Center of Intelligence.</p><p>His command of both the business and technical aspects of information security has allowed him to specialize in building and boosting highly technical security teams and successful security businesses across North America, EMEA, India and Australia in the last 15 years.</p><p>As a top cybersecurity expert with strong technical background and deep knowledge of penetration testing, security architectures, intrusion detection and computer forensics, Ismael has provided security consultancy, advice and guidance to large government and private organisations, including major EU Institutions and US Government Agencies.</p><p>Prior to joining <a href="http://www.mcafee.com/us/services/foundstone-services/index.aspx" target="_blank">Foundstone Services</a> at <a href="http://www.intelsecurity.com/" target="_blank">Intel Security</a>, Ismael worked as Global IT Security Manager for <a href="http://www.isofthealth.com/" target="_blank">iSOFT Group Ltd</a>, one of the world’s largest providers of healthcare IT solutions, focusing on establishing and managing the IT Security program in more than 40 countries while providing risk-driven strategic planning, defining an ISO 27001 compliant policy framework and working with the applications team to ensure that security was embedded into their SDLC.</p><p>Author of security articles for Hakin9, INSECURE Magazine and the <a href="https://digital-forensics.sans.org/blog" target="_blank">SANS Forensics Blog</a>, Ismael also serves on the GIAC Advisory Board and is a Community SANS Instructor.</p><p>He holds a Bachelor's degree in Computer Science from the University of Malaga, is certified in Business Administration, and holds numerous professional certifications including the highly regarded <a href="http://www.giac.org/certification/security-expert-gse" target="_blank">GIAC Security Expert</a> (GSE #132) any many others from <a href="http://www.giac.org/" target="_blank">GIAC</a>, <a href="https://www.isc2.org/" target="_blank">ISC2 </a>and <a href="https://www.isaca.org/pages/default.aspx" target="_blank">ISACA</a>.</p><p>In this interview we will discuss learning security on his own, scoping penetration testing projects, security in the healthcare industry, running&nbsp;international&nbsp;teams, how to drive an internal security&nbsp;culture, developing internal training programs, threat hunting and his <a href="https://github.com/aboutsecurity/rastrea2r" target="_blank">rastrea2r</a> threat hunting tool, lessons learned&nbsp;from&nbsp;his IR work, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Ismael:</p><ul><li><a href="https://www.linkedin.com/in/ivalenzuela" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/aboutsecurity" target="_blank">Twitter</a></li><li><a href="https://digital-forensics.sans.org/blog/author/ismaelvalenzuela" target="_blank">SANS Blog</a></li><li><a href="http://blog.ismaelvalenzuela.com/" target="_blank">Blog</a></li><li><a href="https://github.com/aboutsecurity" target="_blank">GitHub</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/009-ismael-valenzuela-lets-see-happens]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1630</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 16 Jan 2017 03:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/32a2640f-8e4b-4c98-b117-28a3b6266331/009ismaelvalenzuelacybersecurityinterviews.mp3" length="58252987" type="audio/mpeg"/><itunes:duration>01:00:38</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Defined by his peers as a “passionate, experienced and visionary individual who is always striving to improve himself,” Ismael Valenzuela is one of the few individuals that has done almost all in the InfoSec arena, from founding one of the first IT Security companies in Spain to managing a distributed CERT across the world as…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#008 – Darren Hayes: Be Cautious and Think It Through</title><itunes:title>#008 – Darren Hayes: Be Cautious and Think It Through</itunes:title><description><![CDATA[<p>Dr. Darren Hayes is the Director of Cybersecurity and an Assistant Professor at <a href="http://www.pace.edu/seidenberg/" target="_blank">Pace University</a>, New York and a leading expert in the field of digital forensics and cyber security. In 2013, he was listed as one of the <a href="http://www.forensicscolleges.com/blog/profs/10-top-computer-forensics-professors" target="_blank">Top 10 Computer Forensics Professors, by Forensics Colleges</a>. He has developed four distinct courses in digital forensics, at Pace University, at the undergraduate and graduate levels. Also through Pace, Darren continually conducts research to&nbsp;support of law enforcement agencies both domestically and internationally. He has successfully been awarded grants, in the field of computer forensics, by the Department of Defense, National Science Foundation and other notable foundations. Daren is also a professional consultant in computer forensics and cyber law for the Department of Education in New York.</p><p>For a number of years, Hayes has served on the Board of the High Technology Crime Investigation Association (HTCIA) Northeast Chapter and was the President of the HTCIA Northeast. Currently, he&nbsp;serves as Second Vice President of the HTCIA Northeast.</p><p>Darren is also an accomplished author with numerous peer-reviewed articles on computer forensics. He has co-authored two textbooks and published “<a href="https://www.amazon.com/gp/product/B012HTZ8BC/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B012HTZ8BC&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=90fb74422660e0aeef62fcf9a1afe338" target="_blank">A Practical Guide to Computer Forensics Investigations</a>”. Darren has appeared on&nbsp;numerous media and news outlets such as Bloomberg Television, The Street and Fox 5 News and been quoted by CNN, The Guardian (UK), The Times (UK), Wall Street Journal, Financial Times, Forbes, Investor’s Business Daily, MarketWatch, CNBC, ABC News, Forensic Magazine, SC Magazine, PC Magazine, USA Today, Washington Post, New York Post, Daily News and Wired News (to name but a few!). He has also been invited to lecture for the Harvard Business Review, University College Dublin and, more recently, was Visiting Professor at Sapienza University, Rome, Italy.</p><p>In this interview we will discuss how he supports law enforcement, developing teaching skills, the importance of problem solving abilities, the challenges when authoring books, misinformation in the media, his involvement with HTCIA, gender roles in information security, foundational skills necessary to be good in information security, immigration challenges, real world physical threats from cyber attacks, the growth of ransomware, the "brain drain" in the government sector, how to learn cyber security on a budget, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Darren:</p><ul><li><a href="https://www.linkedin.com/in/darren-hayes-05b8517" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/CyberOSINT" target="_blank">Twitter</a></li><li><a href="http://csis.pace.edu/~dhayes/" target="_blank">Pace University</a></li><li><a href="https://www.amazon.com/gp/product/B012HTZ8BC/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B012HTZ8BC&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=90fb74422660e0aeef62fcf9a1afe338" target="_blank">A Practical Guide to Computer Forensics Investigations</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p>Dr. Darren Hayes is the Director of Cybersecurity and an Assistant Professor at <a href="http://www.pace.edu/seidenberg/" target="_blank">Pace University</a>, New York and a leading expert in the field of digital forensics and cyber security. In 2013, he was listed as one of the <a href="http://www.forensicscolleges.com/blog/profs/10-top-computer-forensics-professors" target="_blank">Top 10 Computer Forensics Professors, by Forensics Colleges</a>. He has developed four distinct courses in digital forensics, at Pace University, at the undergraduate and graduate levels. Also through Pace, Darren continually conducts research to&nbsp;support of law enforcement agencies both domestically and internationally. He has successfully been awarded grants, in the field of computer forensics, by the Department of Defense, National Science Foundation and other notable foundations. Daren is also a professional consultant in computer forensics and cyber law for the Department of Education in New York.</p><p>For a number of years, Hayes has served on the Board of the High Technology Crime Investigation Association (HTCIA) Northeast Chapter and was the President of the HTCIA Northeast. Currently, he&nbsp;serves as Second Vice President of the HTCIA Northeast.</p><p>Darren is also an accomplished author with numerous peer-reviewed articles on computer forensics. He has co-authored two textbooks and published “<a href="https://www.amazon.com/gp/product/B012HTZ8BC/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B012HTZ8BC&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=90fb74422660e0aeef62fcf9a1afe338" target="_blank">A Practical Guide to Computer Forensics Investigations</a>”. Darren has appeared on&nbsp;numerous media and news outlets such as Bloomberg Television, The Street and Fox 5 News and been quoted by CNN, The Guardian (UK), The Times (UK), Wall Street Journal, Financial Times, Forbes, Investor’s Business Daily, MarketWatch, CNBC, ABC News, Forensic Magazine, SC Magazine, PC Magazine, USA Today, Washington Post, New York Post, Daily News and Wired News (to name but a few!). He has also been invited to lecture for the Harvard Business Review, University College Dublin and, more recently, was Visiting Professor at Sapienza University, Rome, Italy.</p><p>In this interview we will discuss how he supports law enforcement, developing teaching skills, the importance of problem solving abilities, the challenges when authoring books, misinformation in the media, his involvement with HTCIA, gender roles in information security, foundational skills necessary to be good in information security, immigration challenges, real world physical threats from cyber attacks, the growth of ransomware, the "brain drain" in the government sector, how to learn cyber security on a budget, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Darren:</p><ul><li><a href="https://www.linkedin.com/in/darren-hayes-05b8517" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/CyberOSINT" target="_blank">Twitter</a></li><li><a href="http://csis.pace.edu/~dhayes/" target="_blank">Pace University</a></li><li><a href="https://www.amazon.com/gp/product/B012HTZ8BC/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=B012HTZ8BC&amp;linkCode=as2&amp;tag=cybersecur030-20&amp;linkId=90fb74422660e0aeef62fcf9a1afe338" target="_blank">A Practical Guide to Computer Forensics Investigations</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/008-darren-hayes-cautious-think]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1565</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 09 Jan 2017 03:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/58b4017b-1341-4f30-b195-b968d0415a46/008darrenhayescybersecurityinterviews.mp3" length="55820848" type="audio/mpeg"/><itunes:duration>58:06</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Dr. Darren Hayes is the Director of Cybersecurity and an Assistant Professor at Pace University, New York and a leading expert in the field of digital forensics and cyber security. In 2013, he was listed as one of the Top 10 Computer Forensics Professors, by Forensics Colleges. He has developed four distinct courses in digital…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#007 – What I Am Learning So Far</title><itunes:title>#007 – What I Am Learning So Far</itunes:title><description><![CDATA[<p>This is going to be the second holiday break episode and the first of 2017.</p><p>In this episode, I am taking a quick look back at the <a href="https://cybersecurityinterviews.com/episodes/" target="_blank">first five episodes</a> with my guests&nbsp;to date:</p><ul><li><a href="https://cybersecurityinterviews.com/001-chris-pogue-like-chihuahua-pork-chop/" target="_blank">Chris Pogue</a></li><li><a href="https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants/" target="_blank">David Cowen</a></li><li><a href="https://cybersecurityinterviews.com/003-lenny-zeltser-can-never-know-everything/" target="_blank">Lenny Zeltser</a></li><li><a href="https://cybersecurityinterviews.com/004-nicholas-percoco-dont-second-guess/" target="_blank">Nicholas Percoco</a></li><li><a href="https://cybersecurityinterviews.com/005-morgan-wright-rule-threes/" target="_blank">Morgan Wright</a></li></ul><br/><p>Each of these cyber security professionals have had their own, unique journeys to get where they are. In each interview, I learned a lot about them as individuals, but also got their perspectives on a variety of topics that influence the industry as well as some valuable advice.</p><p>Thanks everyone for listening to the first episodes of Cyber Security Interviews. I hope you are all getting some valuable insight to the industry as well as some sage advice.</p><p>Next week we are back with our regular schedule of interviews with top cyber security pros. Have a safe and happy new year everyone, I look forward to speaking to you all soon.</p><p>Remember to <a href="https://cybersecurityinterviews.com/email-sign-up/" target="_blank">sign up here</a> for email notifications of new episodes.</p>]]></description><content:encoded><![CDATA[<p>This is going to be the second holiday break episode and the first of 2017.</p><p>In this episode, I am taking a quick look back at the <a href="https://cybersecurityinterviews.com/episodes/" target="_blank">first five episodes</a> with my guests&nbsp;to date:</p><ul><li><a href="https://cybersecurityinterviews.com/001-chris-pogue-like-chihuahua-pork-chop/" target="_blank">Chris Pogue</a></li><li><a href="https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants/" target="_blank">David Cowen</a></li><li><a href="https://cybersecurityinterviews.com/003-lenny-zeltser-can-never-know-everything/" target="_blank">Lenny Zeltser</a></li><li><a href="https://cybersecurityinterviews.com/004-nicholas-percoco-dont-second-guess/" target="_blank">Nicholas Percoco</a></li><li><a href="https://cybersecurityinterviews.com/005-morgan-wright-rule-threes/" target="_blank">Morgan Wright</a></li></ul><br/><p>Each of these cyber security professionals have had their own, unique journeys to get where they are. In each interview, I learned a lot about them as individuals, but also got their perspectives on a variety of topics that influence the industry as well as some valuable advice.</p><p>Thanks everyone for listening to the first episodes of Cyber Security Interviews. I hope you are all getting some valuable insight to the industry as well as some sage advice.</p><p>Next week we are back with our regular schedule of interviews with top cyber security pros. Have a safe and happy new year everyone, I look forward to speaking to you all soon.</p><p>Remember to <a href="https://cybersecurityinterviews.com/email-sign-up/" target="_blank">sign up here</a> for email notifications of new episodes.</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/007-learning-far]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1618</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 02 Jan 2017 03:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/8a8962c2-2f46-4d98-8a55-316d7d366c8a/007whatiamlearningcybersecurityinterviews.mp3" length="6607173" type="audio/mpeg"/><itunes:duration>06:51</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is going to be the second holiday break episode and the first of 2017. In this episode, I am taking a quick look back at the first five episodes with my guests to date: Chris Pogue David Cowen Lenny Zeltser Nicholas Percoco Morgan Wright Each of these cyber security professionals have had their own, unique…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#006 – 2016: A Look Back Through the Year</title><itunes:title>#006 – 2016: A Look Back Through the Year</itunes:title><description><![CDATA[<p>This is going to be one of two special holiday break episodes as we end out the year. We will be returning to our regular interviews with top security experts right after the start of the new year.</p><p>In this episode, I reflect on 2016 and cyber security. It was an interesting year and information security took a spot light more than I could remember for years past (and probably more than I could have imagined a year ago). Even“hackers” even took runner up as <a href="http://time.com/time-person-of-the-year-2016-hackers-runner-up/" target="_blank">Time’s 2016 Person of the Year</a>!</p><p>I will talk about:</p><ul><li>The cyber-attacks against the <a href="https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01" target="_blank">Ukrainian Critical Infrastructure</a>, also known as Black Energy</li><li>The <a href="http://www.reuters.com/investigates/special-report/cyber-heist-federal/" target="_blank">Central Bank of Bangladesh heist</a></li><li>The <a href="https://panamapapers.icij.org/" target="_blank">Panama Papers</a></li><li>The Internet of Things, <a href="https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/" target="_blank">Distributed Denial of Service attacks against Dyn DNS</a></li><li><a href="https://news.vice.com/story/yahoos-data-breach-was-so-big-its-presenting-a-challenge-to-regulators" target="_blank">Yahoo's breach</a></li><li>The email <a href="https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak" target="_blank">hack of the Democratic National Party</a></li></ul><br/><p>I wish everyone a safe and happy holiday season this year. Next week I am going to take a quick look back at the <a href="https://cybersecurityinterviews.com/episodes/" target="_blank">first five episodes</a> and some of the lessons I learned from my guests.</p><p>Thanks, I look forward to speaking to you all soon!</p>]]></description><content:encoded><![CDATA[<p>This is going to be one of two special holiday break episodes as we end out the year. We will be returning to our regular interviews with top security experts right after the start of the new year.</p><p>In this episode, I reflect on 2016 and cyber security. It was an interesting year and information security took a spot light more than I could remember for years past (and probably more than I could have imagined a year ago). Even“hackers” even took runner up as <a href="http://time.com/time-person-of-the-year-2016-hackers-runner-up/" target="_blank">Time’s 2016 Person of the Year</a>!</p><p>I will talk about:</p><ul><li>The cyber-attacks against the <a href="https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01" target="_blank">Ukrainian Critical Infrastructure</a>, also known as Black Energy</li><li>The <a href="http://www.reuters.com/investigates/special-report/cyber-heist-federal/" target="_blank">Central Bank of Bangladesh heist</a></li><li>The <a href="https://panamapapers.icij.org/" target="_blank">Panama Papers</a></li><li>The Internet of Things, <a href="https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/" target="_blank">Distributed Denial of Service attacks against Dyn DNS</a></li><li><a href="https://news.vice.com/story/yahoos-data-breach-was-so-big-its-presenting-a-challenge-to-regulators" target="_blank">Yahoo's breach</a></li><li>The email <a href="https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak" target="_blank">hack of the Democratic National Party</a></li></ul><br/><p>I wish everyone a safe and happy holiday season this year. Next week I am going to take a quick look back at the <a href="https://cybersecurityinterviews.com/episodes/" target="_blank">first five episodes</a> and some of the lessons I learned from my guests.</p><p>Thanks, I look forward to speaking to you all soon!</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/006-2016-look-back-year]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1607</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 26 Dec 2016 12:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/cd88170e-1d21-441c-bae1-6008587b28d2/0062016lookbackcybersecurityinterviews.mp3" length="7450223" type="audio/mpeg"/><itunes:duration>07:43</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>This is going to be one of two special holiday break episodes as we end out the year. We will be returning to our regular interviews with top security experts right after the start of the new year. In this episode, I reflect on 2016 and cyber security. It was an interesting year and information…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#005 – Morgan Wright: The Rule of Threes</title><itunes:title>#005 – Morgan Wright: The Rule of Threes</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/morganwright150" target="_blank">Morgan Wright</a> is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark <a href="http://docs.house.gov/meetings/SY/SY15/20150212/102961/HHRG-114-SY15-Wstate-WrightM-20150212.pdf" target="_blank">testimony before Congress on Healthcare.gov</a> changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world about cyber security.</p><p>Previously Morgan was a Senior Advisor in the US State Department Antiterrorism Assistance Program and Senior Law Enforcement Advisor for the 2012 Republican National Convention. In addition to 18 years in state and local law enforcement, Morgan has developed solutions in defense, justice and intelligence for the largest technology companies in the world.&nbsp;He has trained over 2,000 law enforcement officers in the investigation of computer crime, including one year training the FBI on internet investigations. He has also taught behavioral analysis interviewing at the National Security Agency.</p><p>A highly seasoned interviewer and moderator, Morgan has over 400 appearances on national news shows. In his interviews, he always tries to inspire, inform and entertain with just the right amount of humor and wit.</p><p>In this interview we discuss cyber security in the 2016 Presidential election, accountability in cyber security and the failure of leadership, investing in people, machine learning, cyber warfare, insider threats, compliance versus security, on the job training, the importance of communication skills, productivity tips and personal development, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Morgan:</p><ul><li><a href="https://www.linkedin.com/in/morganwright150" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/morganwright_us" target="_blank">Twitter</a></li><li><a href="https://www.morganwright.us/" target="_blank">morganwright.us</a></li><li><a href="https://www.identitysecurity.com/" target="_blank">identitysecurity.com</a></li><li><a href="http://morgan.thinkific.com/courses/passwords" target="_blank">morgan.thinkific.com/courses/passwords</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/morganwright150" target="_blank">Morgan Wright</a> is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark <a href="http://docs.house.gov/meetings/SY/SY15/20150212/102961/HHRG-114-SY15-Wstate-WrightM-20150212.pdf" target="_blank">testimony before Congress on Healthcare.gov</a> changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world about cyber security.</p><p>Previously Morgan was a Senior Advisor in the US State Department Antiterrorism Assistance Program and Senior Law Enforcement Advisor for the 2012 Republican National Convention. In addition to 18 years in state and local law enforcement, Morgan has developed solutions in defense, justice and intelligence for the largest technology companies in the world.&nbsp;He has trained over 2,000 law enforcement officers in the investigation of computer crime, including one year training the FBI on internet investigations. He has also taught behavioral analysis interviewing at the National Security Agency.</p><p>A highly seasoned interviewer and moderator, Morgan has over 400 appearances on national news shows. In his interviews, he always tries to inspire, inform and entertain with just the right amount of humor and wit.</p><p>In this interview we discuss cyber security in the 2016 Presidential election, accountability in cyber security and the failure of leadership, investing in people, machine learning, cyber warfare, insider threats, compliance versus security, on the job training, the importance of communication skills, productivity tips and personal development, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Morgan:</p><ul><li><a href="https://www.linkedin.com/in/morganwright150" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/morganwright_us" target="_blank">Twitter</a></li><li><a href="https://www.morganwright.us/" target="_blank">morganwright.us</a></li><li><a href="https://www.identitysecurity.com/" target="_blank">identitysecurity.com</a></li><li><a href="http://morgan.thinkific.com/courses/passwords" target="_blank">morgan.thinkific.com/courses/passwords</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/005-morgan-wright-rule-threes]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1433</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 19 Dec 2016 02:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/3a03075b-08c0-46c0-8e9c-46be620f33a4/005morganwrightcybersecurityinterviews.mp3" length="72876195" type="audio/mpeg"/><itunes:duration>01:15:50</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyberterrorism, identity theft and privacy. His landmark testimony before Congress on Healthcare.gov changed how the government collected personally identifiable information. He has made hundreds of appearances on national news, radio, print and web, and has spoken to audiences around the world about cyber security. Previously…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#004 – Nicholas Percoco: Don’t Second Guess Yourself</title><itunes:title>#004 – Nicholas Percoco: Don’t Second Guess Yourself</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/c7five" target="_blank">Nicholas Percoco</a> has more than 19 years of information security experience and is currently the Chief Information Security Officer at <a href="https://uptake.com/" target="_blank">Uptake</a>.</p><p>Prior to Uptake, Nicholas was the Vice President of Global Services at <a href="https://www.rapid7.com/" target="_blank">Rapid7</a>. Nick has also been a Director at KPMG and the head of SpiderLabs at <a href="https://www.trustwave.com/home/" target="_blank">Trustwave </a>where he led more than 2000 incident response and forensic investigations globally, ran thousands of ethical hacking &amp; application security tests for clients, and conducted bleeding-edge security research to improve Trustwave's products.</p><p>Before Trustwave, Nick ran the security consulting practices at VeriSign, &amp; Internet Security Systems. In 2004, he drafted an application security framework that became known as the Payment Application Best Practices (PABP). In 2008, this framework was adopted as a global standard called Payment Application Data Security Standard (PA-DSS).</p><p>As a speaker, he has provided unique insight around security breaches, malware, mobile security and InfoSec trends to public (<a href="https://www.blackhat.com" target="_blank">Black Hat</a>, <a href="https://www.defcon.org/" target="_blank">DEFCON</a>, and <a href="https://www.owasp.org/" target="_blank">OWASP</a>) &amp; private audiences (Including DHS, US-CERT, Interpol, United States Secret Service) throughout the world.</p><p>Nick's research has been featured by media including: The Washington Post, eWeek, PC World, CNET, Wired, Network World, Dark Reading, Fox News, USA Today, Forbes, Computerworld, CSO Magazine, CNN, The Times of London, NPR, Gizmodo, Fast Company, Financial Times &amp; The Wall Street Journal.</p><p>Nick is also&nbsp;the creator of <a href="http://thotcon.org/" target="_blank">THOTCON</a> (a hacking conference held in Chicago each year), &amp; co-founder of <a href="https://www.iamthecavalry.org/about/overview/" target="_blank">The Cavalry</a> movement.</p><p>In this interview we discuss his early start with computers, what is a hacker,&nbsp;developing a methodology for penetration testing, how he developed the SpiderLabs name,&nbsp;analytics and automation, when you should evaluate opportunities,&nbsp;moving past the fear of public speaking, his personal "drink-a-different-beer-a-day" contest, research and public disclosure of vulnerabilities, how to secure Internet connected devices, where he recruits talent, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Nick:</p><ul><li><a href="https://www.linkedin.com/in/c7five" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/c7five" target="_blank">Twitter</a></li><li><a href="http://thotcon.org/" target="_blank">THOTCON</a></li><li><a href="https://www.iamthecavalry.org/about/overview/" target="_blank">I am the Cavalry</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/c7five" target="_blank">Nicholas Percoco</a> has more than 19 years of information security experience and is currently the Chief Information Security Officer at <a href="https://uptake.com/" target="_blank">Uptake</a>.</p><p>Prior to Uptake, Nicholas was the Vice President of Global Services at <a href="https://www.rapid7.com/" target="_blank">Rapid7</a>. Nick has also been a Director at KPMG and the head of SpiderLabs at <a href="https://www.trustwave.com/home/" target="_blank">Trustwave </a>where he led more than 2000 incident response and forensic investigations globally, ran thousands of ethical hacking &amp; application security tests for clients, and conducted bleeding-edge security research to improve Trustwave's products.</p><p>Before Trustwave, Nick ran the security consulting practices at VeriSign, &amp; Internet Security Systems. In 2004, he drafted an application security framework that became known as the Payment Application Best Practices (PABP). In 2008, this framework was adopted as a global standard called Payment Application Data Security Standard (PA-DSS).</p><p>As a speaker, he has provided unique insight around security breaches, malware, mobile security and InfoSec trends to public (<a href="https://www.blackhat.com" target="_blank">Black Hat</a>, <a href="https://www.defcon.org/" target="_blank">DEFCON</a>, and <a href="https://www.owasp.org/" target="_blank">OWASP</a>) &amp; private audiences (Including DHS, US-CERT, Interpol, United States Secret Service) throughout the world.</p><p>Nick's research has been featured by media including: The Washington Post, eWeek, PC World, CNET, Wired, Network World, Dark Reading, Fox News, USA Today, Forbes, Computerworld, CSO Magazine, CNN, The Times of London, NPR, Gizmodo, Fast Company, Financial Times &amp; The Wall Street Journal.</p><p>Nick is also&nbsp;the creator of <a href="http://thotcon.org/" target="_blank">THOTCON</a> (a hacking conference held in Chicago each year), &amp; co-founder of <a href="https://www.iamthecavalry.org/about/overview/" target="_blank">The Cavalry</a> movement.</p><p>In this interview we discuss his early start with computers, what is a hacker,&nbsp;developing a methodology for penetration testing, how he developed the SpiderLabs name,&nbsp;analytics and automation, when you should evaluate opportunities,&nbsp;moving past the fear of public speaking, his personal "drink-a-different-beer-a-day" contest, research and public disclosure of vulnerabilities, how to secure Internet connected devices, where he recruits talent, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Nick:</p><ul><li><a href="https://www.linkedin.com/in/c7five" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/c7five" target="_blank">Twitter</a></li><li><a href="http://thotcon.org/" target="_blank">THOTCON</a></li><li><a href="https://www.iamthecavalry.org/about/overview/" target="_blank">I am the Cavalry</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/004-nicholas-percoco-dont-second-guess]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1427</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 12 Dec 2016 02:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/ca34dfe5-5d44-47db-be50-8de775f749ac/004nicholaspercococybersecurityinterviews.mp3" length="82785106" type="audio/mpeg"/><itunes:duration>01:26:11</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Nicholas Percoco has more than 19 years of information security experience and is currently the Chief Information Security Officer at Uptake. Prior to Uptake, Nicholas was the Vice President of Global Services at Rapid7. Nick has also been a Director at KPMG and the head of SpiderLabs at Trustwave where he led more than 2000…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#003 – Lenny Zeltser: You Can Never Know Everything</title><itunes:title>#003 – Lenny Zeltser: You Can Never Know Everything</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/lennyzeltser" target="_blank">Lenny Zeltser</a> is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization's security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by CenturyLink), where he managed the US team of service professionals, aligning their expertise to the firm’s cloud solutions.</p><p>Lenny helps shape global infosec practices by teaching incident response and malware defenses at <a href="https://www.sans.org/" target="_blank">SANS Institute</a> and by sharing knowledge through writing, public speaking and community projects. He has earned the prestigious GIAC Security Expert professional designation and developed the Linux toolkit <a href="https://remnux.org/" target="_blank">REMnux</a>, which is used by malware analysts throughout the world. Lenny is on the Board of Directors of <a href="http://www.sans.edu/" target="_blank">SANS Technology Institute</a> and on the Advisory Board of <a href="https://www.minerva-labs.com/" target="_blank">Minerva Labs</a>.</p><p>Lenny’s approaches to business and technology are built upon his work experience, independent research, as well as a Computer Science degree from the University of Pennsylvania and an MBA degree from MIT Sloan. His expertise is strongest at the intersection of business, technology, and information security, and spans incident response, infosec cloud services and business strategy. To get a sense for Lenny’s thought process and knowledge areas, take a look at his <a href="https://zeltser.com/" target="_blank">blog</a>.</p><p>In this interview we will discuss&nbsp;why he is passionate about security, stagnating in information security and going back to grad school, public speaking, who has inspired him, his personal challenge asking for advice, early failures in technology, why he developed REMnux to make malware analysis accessible to as many people as possible, cloud security, writing better job descriptions, refining communication skills to technical and non-technical audiences, how to use certifications as a signaling mechanism, building industry relationships, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Lenny:</p><ul><li><a href="https://www.linkedin.com/in/lennyzeltser" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/lennyzeltser" target="_blank">Twitter</a></li><li><a href="https://zeltser.com/" target="_blank">Lenny's Blog</a></li><li><a href="https://remnux.org/" target="_blank">REMnux</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/lennyzeltser" target="_blank">Lenny Zeltser</a> is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization's security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by CenturyLink), where he managed the US team of service professionals, aligning their expertise to the firm’s cloud solutions.</p><p>Lenny helps shape global infosec practices by teaching incident response and malware defenses at <a href="https://www.sans.org/" target="_blank">SANS Institute</a> and by sharing knowledge through writing, public speaking and community projects. He has earned the prestigious GIAC Security Expert professional designation and developed the Linux toolkit <a href="https://remnux.org/" target="_blank">REMnux</a>, which is used by malware analysts throughout the world. Lenny is on the Board of Directors of <a href="http://www.sans.edu/" target="_blank">SANS Technology Institute</a> and on the Advisory Board of <a href="https://www.minerva-labs.com/" target="_blank">Minerva Labs</a>.</p><p>Lenny’s approaches to business and technology are built upon his work experience, independent research, as well as a Computer Science degree from the University of Pennsylvania and an MBA degree from MIT Sloan. His expertise is strongest at the intersection of business, technology, and information security, and spans incident response, infosec cloud services and business strategy. To get a sense for Lenny’s thought process and knowledge areas, take a look at his <a href="https://zeltser.com/" target="_blank">blog</a>.</p><p>In this interview we will discuss&nbsp;why he is passionate about security, stagnating in information security and going back to grad school, public speaking, who has inspired him, his personal challenge asking for advice, early failures in technology, why he developed REMnux to make malware analysis accessible to as many people as possible, cloud security, writing better job descriptions, refining communication skills to technical and non-technical audiences, how to use certifications as a signaling mechanism, building industry relationships, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find Lenny:</p><ul><li><a href="https://www.linkedin.com/in/lennyzeltser" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/lennyzeltser" target="_blank">Twitter</a></li><li><a href="https://zeltser.com/" target="_blank">Lenny's Blog</a></li><li><a href="https://remnux.org/" target="_blank">REMnux</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/003-lenny-zeltser-can-never-know-everything]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1408</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Mon, 05 Dec 2016 00:01:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/f1298796-b023-4056-8e26-67c28daa96e7/003lennyzeltsercybersecurityinterviews.mp3" length="67890415" type="audio/mpeg"/><itunes:duration>01:10:40</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Lenny Zeltser is a seasoned business and tech leader with extensive information security expertise. As a product portfolio owner at a Fortune 500 company, he delivers the financial success and expansion of his orgnization’s security services and SaaS products. He has also been a national lead of the security consulting practice at Savvis (acquired by…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#002 – David Cowen: Standing On the Shoulders of Giants</title><itunes:title>#002 – David Cowen: Standing On the Shoulders of Giants</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/dcowen" target="_blank">David Cowen</a> has more than sixteen years of experience in the areas of security integration, architecture, assessment, programming, forensic analysis and investigations. He started out as a penetration tester then&nbsp;moved to digital forensics. Currently, he&nbsp;is a partner at <a href="http://www.g-cpartners.com/" target="_blank">G-C Partners, LLC</a>, a full service digital forensics investigation company, and has experience working in a variety of environments ranging from high security military installations to large/small private sector companies.</p><p>David is also one of the most passionate&nbsp;and active contributors within the cyber security and&nbsp;forensic communities. I&nbsp;look at David's contributions and think he doesn't sleep and/or someone in Dallas, TX there is cloning facility that has produced David Cowens versions 2 -5 which are all running around outputting awesome contributions to the community (yes, like the movie <a href="http://www.imdb.com/title/tt0117108/?ref_=nm_flmg_act_44" target="_blank">Multiplicity</a>).</p><p>Here is just a short list of what David' does to give back to the&nbsp;industry:</p><ul><li>Regular speaker at conferences such as <a href="http://www.osdfcon.org/2016-event/2016-agenda/" target="_blank">OSDFCon</a></li><li>Ran his blog, <a href="http://www.hecfblog.com/" target="_blank">Hacking Exposed Computer Forensics</a>, <em>daily</em>&nbsp;which included a weekly forensic challenge</li><li>Is a Red Team Captain for the <a href="http://www.nationalccdc.org/" target="_blank">National Collegiate Cyber Defense Competition</a></li><li>Has his own regular video podcast, <a href="https://www.youtube.com/user/LearnForensics" target="_blank">Forensic Lunch&nbsp;</a></li><li>Author of <a href="https://www.amazon.com/Computer-Forensics-InfoSec-Pro-Guide/dp/007174245X" target="_blank">Computer Forensics: InfoSec Pro Guide</a></li><li>Co-author of <a href="https://www.amazon.com/Hacking-Exposed-Computer-Forensics-Second/dp/0071626778" target="_blank">Hacking Exposed: Computer Forensics</a></li><li>Co-author of&nbsp;<a href="https://www.amazon.com/Anti-Hacker-Tool-Third-Mike-Shema/dp/0072262877" target="_blank">Anti-Hacker Tool Kit, Third Edition</a></li><li>Is a <a href="https://www.sans.org/instructors/david-cowen" target="_blank">SANS Institute Certified&nbsp;Instructor</a></li><li>Developed <a href="https://www.gettriforce.com/product/triforce-anjp/" target="_blank">TriForce ANJP</a>, forensic software for parsing NTFS journals (also working on <a href="https://www.gettriforce.com/product/hfs-journal-parser/" target="_blank">HFS+ capabilities</a>)</li></ul><br/><p>He is also&nbsp;a two-time <a href="https://forensic4cast.com/forensic-4cast-awards/" target="_blank">Forensic 4cast</a> award winner for both Digital Forensic Article of the Year and Digital Forensic Blog of the year.</p><p>When he is not doing all of this, he is also a family man and BBQ aficionado.</p><p>Nope. Zero chance this is one person.</p><p>In this interview we will discuss how he has accomplished all of this, why he loves being an expert witness, why he moved from pen tester to&nbsp;forensicator, his inspiration to start programming, his favorite type of investigation and the questions to ask, how to hire good talent, what it took to develop TriForce ANJP and how it was a community effort, how no one stands on their own in the industry, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/dcowen" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/HECFBlog" target="_blank">Twitter</a></li><li><a href="http://www.hecfblog.com/" target="_blank">Hacking Exposed Computer Forensics</a></li><li><a href="https://www.youtube.com/user/LearnForensics" target="_blank">Forensic Lunch&nbsp;</a></li></ul><br/><p><br></p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/dcowen" target="_blank">David Cowen</a> has more than sixteen years of experience in the areas of security integration, architecture, assessment, programming, forensic analysis and investigations. He started out as a penetration tester then&nbsp;moved to digital forensics. Currently, he&nbsp;is a partner at <a href="http://www.g-cpartners.com/" target="_blank">G-C Partners, LLC</a>, a full service digital forensics investigation company, and has experience working in a variety of environments ranging from high security military installations to large/small private sector companies.</p><p>David is also one of the most passionate&nbsp;and active contributors within the cyber security and&nbsp;forensic communities. I&nbsp;look at David's contributions and think he doesn't sleep and/or someone in Dallas, TX there is cloning facility that has produced David Cowens versions 2 -5 which are all running around outputting awesome contributions to the community (yes, like the movie <a href="http://www.imdb.com/title/tt0117108/?ref_=nm_flmg_act_44" target="_blank">Multiplicity</a>).</p><p>Here is just a short list of what David' does to give back to the&nbsp;industry:</p><ul><li>Regular speaker at conferences such as <a href="http://www.osdfcon.org/2016-event/2016-agenda/" target="_blank">OSDFCon</a></li><li>Ran his blog, <a href="http://www.hecfblog.com/" target="_blank">Hacking Exposed Computer Forensics</a>, <em>daily</em>&nbsp;which included a weekly forensic challenge</li><li>Is a Red Team Captain for the <a href="http://www.nationalccdc.org/" target="_blank">National Collegiate Cyber Defense Competition</a></li><li>Has his own regular video podcast, <a href="https://www.youtube.com/user/LearnForensics" target="_blank">Forensic Lunch&nbsp;</a></li><li>Author of <a href="https://www.amazon.com/Computer-Forensics-InfoSec-Pro-Guide/dp/007174245X" target="_blank">Computer Forensics: InfoSec Pro Guide</a></li><li>Co-author of <a href="https://www.amazon.com/Hacking-Exposed-Computer-Forensics-Second/dp/0071626778" target="_blank">Hacking Exposed: Computer Forensics</a></li><li>Co-author of&nbsp;<a href="https://www.amazon.com/Anti-Hacker-Tool-Third-Mike-Shema/dp/0072262877" target="_blank">Anti-Hacker Tool Kit, Third Edition</a></li><li>Is a <a href="https://www.sans.org/instructors/david-cowen" target="_blank">SANS Institute Certified&nbsp;Instructor</a></li><li>Developed <a href="https://www.gettriforce.com/product/triforce-anjp/" target="_blank">TriForce ANJP</a>, forensic software for parsing NTFS journals (also working on <a href="https://www.gettriforce.com/product/hfs-journal-parser/" target="_blank">HFS+ capabilities</a>)</li></ul><br/><p>He is also&nbsp;a two-time <a href="https://forensic4cast.com/forensic-4cast-awards/" target="_blank">Forensic 4cast</a> award winner for both Digital Forensic Article of the Year and Digital Forensic Blog of the year.</p><p>When he is not doing all of this, he is also a family man and BBQ aficionado.</p><p>Nope. Zero chance this is one person.</p><p>In this interview we will discuss how he has accomplished all of this, why he loves being an expert witness, why he moved from pen tester to&nbsp;forensicator, his inspiration to start programming, his favorite type of investigation and the questions to ask, how to hire good talent, what it took to develop TriForce ANJP and how it was a community effort, how no one stands on their own in the industry, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below!</p><p>Where you can find David:</p><ul><li><a href="https://www.linkedin.com/in/dcowen" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/HECFBlog" target="_blank">Twitter</a></li><li><a href="http://www.hecfblog.com/" target="_blank">Hacking Exposed Computer Forensics</a></li><li><a href="https://www.youtube.com/user/LearnForensics" target="_blank">Forensic Lunch&nbsp;</a></li></ul><br/><p><br></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/002-david-cowen-standing-shoulders-giants]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1362</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Wed, 23 Nov 2016 00:01:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/62e11155-2d94-4479-b095-446e782ba71f/002davidcowencybersecurityinterviews.mp3" length="74708685" type="audio/mpeg"/><itunes:duration>01:17:47</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>David Cowen has more than sixteen years of experience in the areas of security integration, architecture, assessment, programming, forensic analysis and investigations. He started out as a penetration tester then moved to digital forensics. Currently, he  is a partner at G-C Partners, LLC, a full service digital forensics investigation company, and has experience working in a…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#001 – Chris Pogue: Like a Chihuahua On a Pork Chop</title><itunes:title>#001 – Chris Pogue: Like a Chihuahua On a Pork Chop</itunes:title><description><![CDATA[<p><a href="https://www.linkedin.com/in/christopher-pogue-msit-cissp-ceh-crea-gcfa-qsa-6148441" target="_blank">Chris Pogue</a>, Chief Information Security Officer at <a href="https://www.nuix.com" target="_blank">Nuix</a>, has more than fifteen years’ experience and 2,000 breach investigations under his belt. Over his career, Chris has led multiple professional security services organizations and corporate security initiatives to investigate thousands of security breaches worldwide.</p><p>His extensive experience is drawn from careers as a cyber crimes investigator, ethical hacker, military officer, and law enforcement and military instructor. In 2010, Chris was named a <a href="https://www.sans.org/thought-leaders/" target="_blank">SANS Thought Leader</a>, ran an award-winning security blog (<a href="http://thedigitalstandard.blogspot.com/" target="_blank">The Digital Standard</a>), and has contributed to multiple security publications. Chris holds a Master's Degree in Information Security and is also an adjunct cyber security professor at Southern Utah University. He also was a contributing author for&nbsp;<a href="https://www.amazon.com/Data-Breach-Preparation-Response-Breaches/dp/0128034513" target="_blank">Data Breach Preparation and Response: Breaches are Certain, Impact is Not</a>.</p><p>Chris is just one of those guys in cyber security I knew I had to have on the show out of the gate. He is an extremely bright guy and very passionate about information security. He is also pleasure to talk to. He coined the methodology and term "<a href="https://www.google.com/webhp?sourceid=chrome-instant&amp;ion=1&amp;espv=2&amp;ie=UTF-8#q=sniper%20forensics" target="_blank">Sniper Forensics</a>" a few years back, and it had a huge impact on the way I approach digital forensic investigations.</p><p>In this interview we discuss his military background, his start as a penetration tester, his transition from tech to executive, <a href="https://www.amazon.com/What-Got-Here-Wont-There/dp/1401301304/ref=pd_sbs_14_img_0?ie=UTF8&amp;psc=1&amp;refRID=7CZNMRAS6PVBJ7ZEDSFB" target="_blank">books that have influenced him</a>, using the scientific method, the merger of cyber crime and physical crime, training cyber security staff, the importance of communication skills, cognitive biases and&nbsp;<a href="https://en.wikipedia.org/wiki/Law_of_triviality" target="_blank">Parkinson's Law of Triviality</a>, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below</p><p>Where you can find Chris:</p><ul><li><a href="https://twitter.com/cpbeefcake" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cpbeefcake" target="_blank">Twitter</a></li><li><a href="http://thedigitalstandard.blogspot.com/" target="_blank">The Digital Standard</a></li><li><a href="https://www.nuix.com/chris-pogue" target="_blank">Nuix Blog</a></li></ul><br/><p>&nbsp;</p>]]></description><content:encoded><![CDATA[<p><a href="https://www.linkedin.com/in/christopher-pogue-msit-cissp-ceh-crea-gcfa-qsa-6148441" target="_blank">Chris Pogue</a>, Chief Information Security Officer at <a href="https://www.nuix.com" target="_blank">Nuix</a>, has more than fifteen years’ experience and 2,000 breach investigations under his belt. Over his career, Chris has led multiple professional security services organizations and corporate security initiatives to investigate thousands of security breaches worldwide.</p><p>His extensive experience is drawn from careers as a cyber crimes investigator, ethical hacker, military officer, and law enforcement and military instructor. In 2010, Chris was named a <a href="https://www.sans.org/thought-leaders/" target="_blank">SANS Thought Leader</a>, ran an award-winning security blog (<a href="http://thedigitalstandard.blogspot.com/" target="_blank">The Digital Standard</a>), and has contributed to multiple security publications. Chris holds a Master's Degree in Information Security and is also an adjunct cyber security professor at Southern Utah University. He also was a contributing author for&nbsp;<a href="https://www.amazon.com/Data-Breach-Preparation-Response-Breaches/dp/0128034513" target="_blank">Data Breach Preparation and Response: Breaches are Certain, Impact is Not</a>.</p><p>Chris is just one of those guys in cyber security I knew I had to have on the show out of the gate. He is an extremely bright guy and very passionate about information security. He is also pleasure to talk to. He coined the methodology and term "<a href="https://www.google.com/webhp?sourceid=chrome-instant&amp;ion=1&amp;espv=2&amp;ie=UTF-8#q=sniper%20forensics" target="_blank">Sniper Forensics</a>" a few years back, and it had a huge impact on the way I approach digital forensic investigations.</p><p>In this interview we discuss his military background, his start as a penetration tester, his transition from tech to executive, <a href="https://www.amazon.com/What-Got-Here-Wont-There/dp/1401301304/ref=pd_sbs_14_img_0?ie=UTF8&amp;psc=1&amp;refRID=7CZNMRAS6PVBJ7ZEDSFB" target="_blank">books that have influenced him</a>, using the scientific method, the merger of cyber crime and physical crime, training cyber security staff, the importance of communication skills, cognitive biases and&nbsp;<a href="https://en.wikipedia.org/wiki/Law_of_triviality" target="_blank">Parkinson's Law of Triviality</a>, and much more.</p><p>I hope you enjoy this discussion. Please leave your comments below</p><p>Where you can find Chris:</p><ul><li><a href="https://twitter.com/cpbeefcake" target="_blank">LinkedIn</a></li><li><a href="https://twitter.com/cpbeefcake" target="_blank">Twitter</a></li><li><a href="http://thedigitalstandard.blogspot.com/" target="_blank">The Digital Standard</a></li><li><a href="https://www.nuix.com/chris-pogue" target="_blank">Nuix Blog</a></li></ul><br/><p>&nbsp;</p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/001-chris-pogue-like-chihuahua-pork-chop]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1346</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Wed, 23 Nov 2016 00:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/50074c91-663b-4cee-8cdc-2beea1a7a368/001chrispoguecybersecurityinterviews.mp3" length="47023923" type="audio/mpeg"/><itunes:duration>48:56</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Chris Pogue, Chief Information Security Officer at Nuix, has more than fifteen years’ experience and 2,000 breach investigations under his belt. Over his career, Chris has led multiple professional security services organizations and corporate security initiatives to investigate thousands of security breaches worldwide. His extensive experience is drawn from careers as a cyber crimes investigator,…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item><item><title>#000 – Douglas A. Brush: You’re Always a Student – You Never Stop Learning</title><itunes:title>#000 – Douglas A. Brush: You’re Always a Student – You Never Stop Learning</itunes:title><description><![CDATA[<p>Before we tackle the hearts and minds of some of the leaders and influencers in cyber security, I wanted to provide a little background about me and how I got started in cyber security.</p><p class="ql-align-center"><em>As far back as I can remember, I always wanted to be a hacker.</em></p><p>In 1981, at an impressionable age five, I plopped down in front of a <a href="http://oldcomputers.net/ti994a.html" target="_blank">Texas Instruments TI99/4A computer</a>. It had a whopping 3MHz CPU, 16K of RAM, and 16 colors. My parents got one for the home and I mostly used it to play video games. My favorite game was <a href="https://en.wikipedia.org/wiki/Hunt_the_Wumpus" target="_blank">Hunt the Wumpus</a>.</p><p>At some point, I came across <a href="https://archive.org/details/compute-magazine&amp;tab=about" target="_blank">Compute!</a> magazine that had instructional pages of BASIC, spaghetti code programs that you could use to run on your computer. After hours of painstakingly transcribing lines and lines of GOTO commands into the TI99, I would have a small colored box bounce from one side of the screen to the other. Then back again. #Fun.</p><p>[caption id="attachment_1332" align="alignleft" width="173"]<em>“Hi sugar. After you store my 'portable' computer, can you please light my Pall Mall and fetch me a double Alabama Slammer?" Image source: </em><a href="http://oldcomputers.net/compaqi.html" target="_blank"><em>Oldcomputers</em></a>[/caption]</p><p>The Reagan 1980's roared on and computers gained greater adoption in the business community, particularly in finance and accounting. However, computers for the general public consumption were still in their infancy. Glorified calculators with some generic word processing capabilities. Then movies like Tron and War Games came out. Whoa. They depicted the anti-heros as computer <em>users</em>, but different. They were hacker misfits, but cool in their own way. They could command computers to do powerful things. I wanted to do that.</p><p>My parents continued to bring technology into the home (they&nbsp;were leading communication consultants and authors)&nbsp;including new computers to play with, break, and hopefully, repair. In the summer of 1983 we made the investment in a <a href="http://oldcomputers.net/compaqi.html" target="_blank">Compaq Portable Plus</a>. This was also a deciding point because it set me down the IBM/PC market path (sorry Apple). Mind you, this beast of plastic and metal was marketed as "portable" at 28 pounds. Nine-inch monochrome monitor and detachable keyboard? Heck yeah I'll travel with this thing! And we did!</p><p>The real selling point to me on this computer was WordPerfect 3 with the spell checking feature and a printer. No longer was I chained to homework assignments of handwritten drafts! I was able to write a book report on birds, it showed me how horrid my spelling was, and I could print it. Sold. However, my final submission caused a certain amount of controversy with my teacher. She accused my parents of writing this masterpiece. With Kerouac-esque lines like "Cardinals are red," I can see the confusion. She simply couldn’t understand how a <em>kid </em>could use a computer to write a paper. This resulted in my parents meeting&nbsp;with the teacher and principal to explain how I could possibly do such a thing.</p><p>Luckily things started to change and computers were becoming more mainstream. They were more and more likely to be common appliances in the home.</p><p><br></p><p><em>“I asked for a car, I got a computer. How’s that for being born under a bad sign.”– Ferris Buller</em></p><p>&nbsp;</p><p>[caption id="attachment_1333" align="alignleft" width="568"]<a href="https://cybersecurityinterviews.com/wp-content/uploads/2016/11/MUD1_screenshot.gif" target="_blank"><img src="https://cybersecurityinterviews.com/wp-content/uploads/2016/11/MUD1_screenshot.gif" alt="mud1_screenshot" height="281" width="568"></a><em>A MUD. By Source, Fair use,...]]></description><content:encoded><![CDATA[<p>Before we tackle the hearts and minds of some of the leaders and influencers in cyber security, I wanted to provide a little background about me and how I got started in cyber security.</p><p class="ql-align-center"><em>As far back as I can remember, I always wanted to be a hacker.</em></p><p>In 1981, at an impressionable age five, I plopped down in front of a <a href="http://oldcomputers.net/ti994a.html" target="_blank">Texas Instruments TI99/4A computer</a>. It had a whopping 3MHz CPU, 16K of RAM, and 16 colors. My parents got one for the home and I mostly used it to play video games. My favorite game was <a href="https://en.wikipedia.org/wiki/Hunt_the_Wumpus" target="_blank">Hunt the Wumpus</a>.</p><p>At some point, I came across <a href="https://archive.org/details/compute-magazine&amp;tab=about" target="_blank">Compute!</a> magazine that had instructional pages of BASIC, spaghetti code programs that you could use to run on your computer. After hours of painstakingly transcribing lines and lines of GOTO commands into the TI99, I would have a small colored box bounce from one side of the screen to the other. Then back again. #Fun.</p><p>[caption id="attachment_1332" align="alignleft" width="173"]<em>“Hi sugar. After you store my 'portable' computer, can you please light my Pall Mall and fetch me a double Alabama Slammer?" Image source: </em><a href="http://oldcomputers.net/compaqi.html" target="_blank"><em>Oldcomputers</em></a>[/caption]</p><p>The Reagan 1980's roared on and computers gained greater adoption in the business community, particularly in finance and accounting. However, computers for the general public consumption were still in their infancy. Glorified calculators with some generic word processing capabilities. Then movies like Tron and War Games came out. Whoa. They depicted the anti-heros as computer <em>users</em>, but different. They were hacker misfits, but cool in their own way. They could command computers to do powerful things. I wanted to do that.</p><p>My parents continued to bring technology into the home (they&nbsp;were leading communication consultants and authors)&nbsp;including new computers to play with, break, and hopefully, repair. In the summer of 1983 we made the investment in a <a href="http://oldcomputers.net/compaqi.html" target="_blank">Compaq Portable Plus</a>. This was also a deciding point because it set me down the IBM/PC market path (sorry Apple). Mind you, this beast of plastic and metal was marketed as "portable" at 28 pounds. Nine-inch monochrome monitor and detachable keyboard? Heck yeah I'll travel with this thing! And we did!</p><p>The real selling point to me on this computer was WordPerfect 3 with the spell checking feature and a printer. No longer was I chained to homework assignments of handwritten drafts! I was able to write a book report on birds, it showed me how horrid my spelling was, and I could print it. Sold. However, my final submission caused a certain amount of controversy with my teacher. She accused my parents of writing this masterpiece. With Kerouac-esque lines like "Cardinals are red," I can see the confusion. She simply couldn’t understand how a <em>kid </em>could use a computer to write a paper. This resulted in my parents meeting&nbsp;with the teacher and principal to explain how I could possibly do such a thing.</p><p>Luckily things started to change and computers were becoming more mainstream. They were more and more likely to be common appliances in the home.</p><p><br></p><p><em>“I asked for a car, I got a computer. How’s that for being born under a bad sign.”– Ferris Buller</em></p><p>&nbsp;</p><p>[caption id="attachment_1333" align="alignleft" width="568"]<a href="https://cybersecurityinterviews.com/wp-content/uploads/2016/11/MUD1_screenshot.gif" target="_blank"><img src="https://cybersecurityinterviews.com/wp-content/uploads/2016/11/MUD1_screenshot.gif" alt="mud1_screenshot" height="281" width="568"></a><em>A MUD. By Source, Fair use, </em><a href="https://en.wikipedia.org/w/index.php?curid=34822448" target="_blank"><em>Wikipedia.org</em></a>[/caption]</p><p>In the late 1980’s, we started using CompuServe and then Prodigy. A whole other world with computers opened up. Computers, and me, were now connected to people all over. I could chat and play text based online games. Hardly worth PewDiePie commentary, but it was fun to explore these <a href="https://en.wikipedia.org/wiki/MUD1" target="_blank">MUD's (Multi-User Dungeons)</a>.</p><p>For those old enough to remember, this also created some lessons in POTS and the North American Numbering Plan (NANP). For those <em>not </em>old enough to remember, for these services we had to find "local" numbers to have our computers dial into (yes on landline phones, now get off my lawn). If you didn't use a local number, the Bell carriers would charge you long distant charges per minute <em>on top of</em> the per minute charges of the online service. Whoops, sorry dad.</p><p>In early 1990's while in high school I became the "go to" family member and friend who could fix computers. "Doug, the stupid thing won't turn on." "Windows won't open." "I have no sound." I have edited my fair share of Autoexec.bat files and fixed paths in Config.sys files just to get computers to boot or play noises (Sound Blaster drivers anyone?).</p><p>At some point, we moved away from Prodigy and got on this new thing called the "Internet" with a local ISP. I wasn't limited to messaging users on closed systems or bulletin boards anymore. Now, I could email people with a publicly routable address and post and search Usenet forums. It was pretty cool to suddenly be able interact with people all over the world. I even saved my pennies to make the big jump to a 28.8k modem for some real speed!</p><p>After graduating high school, I was faced with a “do what you love” (computers) or “do what you should” (college) scenario. The options to combine the two scenarios at that particular time was not appealing. The big push for college computer science in the early/mid 1990’s was still focused around mainframe computers and COBOL programming. Um, no thanks. It was not appealing to get pushed towards what I felt was an antiquated architecture when home and small business PC’s were on an exponential rise, the Internet was gaining visibility, and LAN equipment prices were falling.</p><p>Through my parent’s communication consulting company, I gave&nbsp;presentations at business groups in Poughkeepsie, NY (IBM country!<a href="#_ftn1" target="_blank">[1]</a>) about using the Internet and the World-Wide-Web to market and promote your business. After one of these talks, a gentleman came up to me and said, “Kid this is all great, but no one knows what the hell you are talking about. People and businesses need more general help with computers.”&nbsp;Good point. I took my&nbsp;college savings and started a computer consulting company called Computer House Calls. Business quickly took off and I grew a decent client base serving the Hudson Valley in New York. The best part was I was doing what I loved: troubleshooting and exploring technology.</p><p>I also started to get more interested in cyber security as well as hacker culture. I was very intrigued by the interplay between technology, law, activism, privacy, and security. I devoured books like the <a href="https://www.amazon.com/CUCKOOS-EGG-Clifford-Stoll-ebook/dp/B0083DJXCM/" target="_blank">The Cuckoo's Egg</a> and <a href="https://www.amazon.com/Hacker-Crackdown-Disorder-Electronic-Frontier/dp/055356370X" target="_blank">The Hacker Crackdown</a>. I consumed back issues of <a href="https://www.2600.com/" target="_blank">2600</a> and <a href="http://phrack.org/" target="_blank">Phrack</a> and regularly listened to <a href="https://en.wikipedia.org/wiki/Off_the_Hook_(radio_program)" target="_blank">Off the Hook</a> (which as far as I can surmise, is the first “podcast”/radio show dedicated to cyber security). When the movie <a href="http://www.imdb.com/title/tt0105435/" target="_blank">Sneakers</a> came out, I wanted to be Robert Redford’s character Marty Bishop and run a team that would get paid to hack in to places.</p><p>I closely followed the exploits and (mis)adventures of hackers like Kevin Mitnick and Kevin Poulsen. I was amazed by what they were able to pull off. What was even more shocking was the fearful reaction they garnered from law enforcement and the media. When Mitnick was finally caught, the prosecution made claims that he could start a nuclear war by whistling into a payphone. To me, this demonstrated a huge disconnect with the public’s understanding of how to secure technology work, even while becoming voracious consumers of all things digital.</p><p>During the Internet bubble of the late 1990’s and into the early 2000’s I started and built various IT consulting companies with services around networking, desktops, support, web design, and home automation. I did a ton of malware and virus remediation for clients and was exposed to the various tools that let me see how these nasty pieces of software propagated and infected machines.</p><p>By the time the global financial crisis hit, I decided to focus exclusively on cyber security. It was (and still is) what I loved doing and the marketplace for these services was maturing. I started The Digital Forensic Group, a firm focused on digital forensics, incident response, electronic discovery, and security consulting. I then moved my practice to larger consulting firms to cover end to end security consulting. I have worked investigations involving computer hacking, insider threats, massive corporate espionage, and trade secret theft, as well as assisted clients improve their defenses by having me break into their networks.</p><p>Currently, I run an amazing “A” team of forensicators, penetration testers, security analysts, and data privacy experts. We provide a full range of cyber security and information governance consulting services to clients around the globe. Most importantly, I get to do what I am passionate about and love doing. Every day I get to be a hacker, solve complex problems, and help people achieve a better state of information security. It’s a dream come true.</p><p>However, as I look back on my journey and talk to others, I realize there is no “one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. There is no one path. Additionally, that type of diversity of professionals only makes the industry stronger. We all need to learn from each other and share our experiences. There is not one person who knows it all.</p><p>I also love the willingness to help each other and the collaboration to solve problems from this diverse set of professionals in cyber security. There truly is a security “community.” Whether it is a technical problem or a career hurdle, there is someone else out there who has overcome that same obstacle. I have had countless discussions for&nbsp;years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. Sometimes, it was just enough to hear that I was not alone when mulling an opinion or thought.</p><p>So, that is where my idea to create this podcast started. What if I can&nbsp;capture those moments and frank discussions? I want to share the stories from other cyber security leaders and influencers so everyone can learn from <em>their</em> respective journeys and challenges. Why did they take the path they did? Who were their mentors? How did they tackle some of their biggest career challenges? Where do they think the industry is going?</p><p>By hearing how the industry leaders and influencers got to where they are and how they overcame some of the problems they faced, I hope to shed light on the path for other professionals. Also, the cyber security professionals I have come to know over the years are some of the funniest, intelligent, and most interesting people I have ever met. It has been very rewarding to get to know them want to share this experience with others.</p><p>So please join me as we meet&nbsp;the leaders and influencers in cyber security. I will discover what motivates them, explore their journey in cyber security, and discuss where they think the industry is going. Cyber Security Interviews&nbsp;will let listeners learn from the experts' stories and hear their opinions on what works (and doesn't) in cyber security.</p><p>Thank you, I look forward to hearing all of your stories.</p><p>- Douglas A. Brush</p><p><a href="#_ftnref1" target="_blank"><em>[1] I still have a weird vision of Lou Gerstner riding horseback through the Hudson Valley, dressed like the Marlboro man, corralling thousands mid-level mainframe production managers.</em></a></p>]]></content:encoded><link><![CDATA[https://cybersecurityinterviews.com/000-douglas-brush-youre-always-student-never-stop-learning]]></link><guid isPermaLink="false">https://cybersecurityinterviews.com/?p=1324</guid><itunes:image href="https://artwork.captivate.fm/b067dc76-1ecc-486d-81cf-e9174bf4cd09/cybersecurityinterviews_1400x1400.jpg"/><dc:creator><![CDATA[Douglas A. Brush | Weekly Interviews w/ InfoSec Pros]]></dc:creator><pubDate>Tue, 22 Nov 2016 00:00:00 -0400</pubDate><enclosure url="https://podcasts.captivate.fm/media/222ad5b1-eace-4fe0-90de-bd0bce93e184/000douglasbrushcybersecurityinterviews.mp3" length="10328439" type="audio/mpeg"/><itunes:duration>10:42</itunes:duration><itunes:explicit>no</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:summary>Before we tackle the hearts and minds of some of the leaders and influencers in cyber security, I wanted to provide a little background about me and how I got started in cyber security. As far back as I can remember, I always wanted to be a hacker. In 1981, at an impressionable age five,…</itunes:summary><itunes:author>Douglas A. Brush | Weekly Interviews w/ InfoSec Pros</itunes:author></item></channel></rss>