Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/fb/60/22/fb6022be-6574-ff99-db72-110d772bba4b/mza_12810439187600552921.jpg/600x600bb.jpg
The Security Detail
Audra Streetman and Madeleine Tauber
28 episodes
11 months ago
The Security Detail is a podcast series by SURGe, Splunk’s strategic security research team. Every other week, co-hosts Audra Streetman and Kirsty Paine interview security experts about the top cyber threats in different industries. Episodes will examine the cyber threat landscape in healthcare, education, manufacturing, the technology sector, retail and hospitality, telecommunications, and the public sector.
Show more...
Technology
RSS
All content for The Security Detail is the property of Audra Streetman and Madeleine Tauber and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Security Detail is a podcast series by SURGe, Splunk’s strategic security research team. Every other week, co-hosts Audra Streetman and Kirsty Paine interview security experts about the top cyber threats in different industries. Episodes will examine the cyber threat landscape in healthcare, education, manufacturing, the technology sector, retail and hospitality, telecommunications, and the public sector.
Show more...
Technology
Episodes (20/28)
The Security Detail
Ep. 5: Browser Security with Fletcher Oliver, Chrome Browser Customer Engineer
Browser security is crucial for protecting personal information and preventing malicious attacks, ensuring safe and private online experiences. In Episode 6 of The Security Detail, Chrome browser customer engineer Fletcher Oliver shares some of the top browser security risks and how to defend against them. We also discuss SURGe research that examines security risks associated with Chrome browser extensions.    Links: - Chrome Safety: https://www.google.com/chrome/safety/ - Chrome Safe Browsing: https://support.google.com/chrome/answer/9890866 - Chrome Enhanced Safe Browsing: https://support.google.com/accounts/answer/11577602 - Chrome Enterprise Core:  https://chromeenterprise.google/ - SURGe research on Chrome browser extension security: https://www.splunk.com/en_us/blog/security/add-to-chrome-part-1-an-analysis-of-chrome-browser-extension-security.html - Google's Permission Risk whitepaper download: https://storage.googleapis.com/support-kms-prod/H67pelgBrKlKSgvA24ooNwVYYx6emmcuJ0LD - Chrome Enterprise Premium: https://chromeenterprise.google/products/chrome-enterprise-premium/ - Splunk integration in Chrome Enterprise Core: https://support.google.com/chrome/a/answer/12325467 - Google Chrome App for Splunk: https://splunkbase.splunk.com/app/6896    
Show more...
1 year ago
17 minutes 39 seconds

The Security Detail
Ep. 4: Application Security with Tanya Janca, head of community and education at Semgrep
Application security is crucial for protecting sensitive data and ensuring the integrity and trustworthiness of software systems against cyber threats. In this episode, Tanya Janca, head of community and education at Semgrep discusses the importance of “shifting left” in the software development lifecycle, along with the best and worst practices in DevSecOps. Tanya has been coding and working in IT for more than 25 years and is the best-selling author of the book ‘Alice and Bob Learn Application Security’. You can follow Tanya on social media under the handle @SheHacksPurple.   Resources:  Semgrep website: https://semgrep.dev/ 'Alice and Bob Learn Application Security': https://www.amazon.com/Alice-Bob-Learn-Application-Security/dp/B097NJSSV8 'Alice and Bob Learn Secure Coding': https://www.wiley.com/en-us/Alice+and+Bob+Learn+Secure+Coding-p-9781394171705 SheHacksPurple YouTube: https://www.youtube.com/channel/UCyxbNw11fMUgoR3XpVYVPIQ SheHacksPurple website: https://shehackspurple.ca/ OWASP Global AppSec Conference: https://sf.globalappsec.org/ CISA Secure by Design: https://www.cisa.gov/securebydesign Tanya's RSAC Talk on DevSecOps worst practices: https://www.rsaconference.com/library/Presentation/USA/2023/DevSecOps%20Worst%20Practices RSAC Presentation: 'The End of DevSecOps?' by DJ Schleen: https://www.rsaconference.com/Library/presentation/usa/2024/the%20end%20of%20devsecops Executive Order on Improving the Nation’s Cybersecurity (SBOMs): https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/    
Show more...
1 year ago
47 minutes 33 seconds

The Security Detail
Ep. 3: International Law and Cyber Operations with François Delerue, Assistant Professor of Law at IE University
International law establishes norms and frameworks to ensure that States conduct their activities in a manner consistent with principles of sovereignty, responsibility, and human rights. In this episode, François Delerue, Assistant Professor of Law at IE University, discusses the application of international law to cyber operations, including the challenges with attribution and the threshold for cyberwarfare.  Resources:  - François Delerue's biography: https://francoisdelerue.eu/ - Cyber Operations and International Law: https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE - Tallinn Manual 2.0: https://www.cambridge.org/core/books/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations/E4FFD83EA790D7C4C3C28FC9CA2FB6C9 - "Russia Is Fighting for a Treaty That Could Soon Change the Internet Forever" (Newsweek): https://www.newsweek.com/russia-fighting-treaty-that-could-soon-change-internet-forever-1865118 - Microsoft's Digital Geneva Convention Proposal: https://www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspace    
Show more...
1 year ago
52 minutes 54 seconds

The Security Detail
Ep. 2: LLM Research and CISO Liability with Liz Wharton, founder of Silver Key Strategies
In episode two of The Security Detail, Audra interviews Liz Wharton, founder of Silver Key Strategies, about her research on using large language models (LLMs) to analyze SEC 8-K filings and other public reporting to gain cybersecurity insights. Liz is an attorney who has two decades of legal, public policy, and business experience, including in cybersecurity. The interview also covers the heightened liability security executives face when reporting material incidents to the US Securities and Exchange Commission (SEC).    Resources:  SURGe Minicon talks at .conf24: https://conf.splunk.com/sessions/catalog.html?search=minicon#/ Silver Key Strategies: https://silverkeystrategies.com/about-silver-key Splunk's 2024 State of Security Report: https://www.splunk.com/en_us/campaigns/state-of-security.html
Show more...
1 year ago
26 minutes 26 seconds

The Security Detail
Ep. 1: Veterans in Cybersecurity with Tom Marsland, board chair of VetSec
Veterans bring invaluable skills in leadership, problem-solving, and discipline to the field of cybersecurity, making them highly sought-after candidates in the industry. In this episode, Tom Marsland, board chair of VetSec, explains how the non-profit helps veterans and transitioning military members find employment in the industry.  Resources:  VetSec: https://vetsec.org/ Veterans Affairs locations: https://www.va.gov/find-locations/ Til Valhalla Project: https://tilvalhallaproject.com/ Operation Code: https://operationcode.org/ Hiring our Heroes: https://www.hiringourheroes.org/ USO Careers: https://www.uso.org/careers/ Cloud Range: https://www.cloudrangecyber.com/    
Show more...
1 year ago
24 minutes 1 second

The Security Detail
Ep. 9: Top Cybersecurity Skills According to Past Interview Guests
In episode 9 of The Security Detail, hear from past interview guests about what they consider to be the most important cybersecurity skill for future practitioners.   
Show more...
1 year ago
10 minutes 6 seconds

The Security Detail
Ep. 8: Emerging Technology Predictions from Past Interview Guests
In episode 8 of The Security Detail, hear from past interview guests about their predictions for emerging technology, like artificial intelligence and quantum computing.  Resources:  Cipher Brief article: https://www.thecipherbrief.com/how-ai-is-helping-the-u-s-unravel-chinas-dangerous-hacking-operation  
Show more...
1 year ago
14 minutes 14 seconds

The Security Detail
Ep. 7: MITRE ATT&CK framework featuring Adam Pennington, MITRE ATT&CK Lead
The MITRE ATT&CK framework provides a standardized taxonomy and knowledge base of adversary tactics, techniques, and procedures (TTPs), enabling organizations to enhance threat detection, response, and mitigation strategies effectively. In this episode, Adam Pennington tells us about the origins of the ATT&CK project, how organizations can effectively leverage it, and the journey that led Adam to his current role as the project's leader.     Resources:  Mitre ATT&CK website: https://attack.mitre.org/ .conf24 agenda: https://conf.splunk.com/  ATT&CKCon Presentations: https://attack.mitre.org/resources/learn-more-about-attack/ ATT&CK Evaluations Program: https://mitre-engenuity.org/cybersecurity/attack-evaluations/ Adam's BSides Talk (Bringing Intelligence into Cyber Deception with MITRE ATT&CK): https://www.youtube.com/watch?v=eL4iLUw1ee8 Adam's DEF CON Talk (Emulating Adversary w Imperfect Intelligence): https://www.youtube.com/watch?v=cXlWY3OnjO0 David Bianco's Pyramid of Pain: https://www.youtube.com/watch?v=3Xrl6ICxKxI  Dr. Fetterman’s blog: https://www.splunk.com/en_us/blog/security/revisiting-the-big-picture-macro-level-att-ck-updates-for-2023.html
Show more...
1 year ago
36 minutes 58 seconds

The Security Detail
Ep. 6: Electric featuring Robert M. Lee, CEO and Co-Founder of Dragos
Cybersecurity is crucial for the electric sector to safeguard critical infrastructure from cyber threats and potential disruptions, ensuring the reliable and secure delivery of electricity to homes, businesses, and essential services. In episode 6, Robert M. Lee, CEO and Co-Founder of Dragos provides an overview of the top cyber threats facing electric utilities and the role that Dragos plays in strengthening ICS and OT resilience.   Resources:  Dragos Community Defense Program: https://www.dragos.com/community/community-defense-program/ Dragos 2023 OT Cybersecurity Year in Review report: https://www.dragos.com/ot-cybersecurity-year-in-review/ SANS Instructor Biography: https://www.sans.org/profiles/robert-m-lee/ Sandworm book: https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405 'U.S. Government Disrupts Botnet People’s Republic of China Used to Conceal Hacking of Critical Infrastructure': https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical 'Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU)': https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian 'A Global Police Operation Just Took Down the Notorious LockBit Ransomware Gang': https://www.wired.com/story/lockbit-ransomware-takedown-website-nca-fbi/ 'Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology': https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology The Five ICS Cybersecurity Critical Controls: https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/ SECURING OPERATIONAL TECHNOLOGY: A DEEP DIVE INTO THE WATER SECTOR: https://homeland.house.gov/hearing/securing-operational-technology-a-deep-dive-into-the-water-sector/
Show more...
1 year ago
54 minutes 26 seconds

The Security Detail
Ep. 5: Food and Agriculture featuring Jonathan Braley, director of the Food and Ag-ISAC
The food and agriculture industry is a critical sector that represents nearly a fifth of US economic activity. Businesses in this sector also rely on other important industries such as water, transportation, and energy. In this episode, Jonathan Braley, director of the Food and Ag-ISAC shares the top cyber threats facing the industry, as well as the various services offered through the ISAC.    Resources:  Food and Agriculture ISAC website: https://www.foodandag-isac.org/ Cybersecurity Guide for Food and Ag Small and Medium Enterprises: https://www.foodandag-isac.org/resources CISA publication on Chinese-manufactured UAS: https://www.cisa.gov/resources-tools/resources/cybersecurity-guidance-chinese-manufactured-uas  
Show more...
1 year ago
21 minutes 2 seconds

The Security Detail
Ep. 4: Elections with Marci Andino, senior director, Election Infrastructure Information Sharing and Analysis Center (EI-ISAC)
In this episode of The Security Detail, we explore the complex domain of election cybersecurity with Marci Andino, senior director of the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). From international interference threats to localized phishing attacks, discover the varied challenges election offices face and the strategies deployed to safeguard the integrity of electoral processes.   Resources: EI-ISAC Resources: https://www.cisecurity.org/ei-isac Marci Andino Bio: https://safeelections.org/marci-andino/ EI-ISAC's Essential Guide to Election Security: https://essentialguide.docs.cisecurity.org/en/latest/index.html How Investigators Solved the Biden Deepfake Robocall Mystery (Bloomberg): https://www.bloomberg.com/news/newsletters/2024-02-07/how-investigators-solved-the-biden-deepfake-robocall-mystery Splunk research on generative AI spear phishing email translation: https://www.splunk.com/en_us/blog/security/old-school-vs-new-school.html  
Show more...
1 year ago
23 minutes 43 seconds

The Security Detail
Ep. 3: Media with Runa Sandvik, security researcher and founder of Granitt
Cybersecurity is crucial for journalists and newsrooms to safeguard sensitive information, protect sources, and ensure the integrity of their reporting in an increasingly digital and interconnected media landscape. Episode 3 of The Security Detail features an interview with Runa Sandvik, a security researcher and founder of Granitt, a consulting firm that focuses on digital security for journalists and other at-risk people.   Resources:  Granitt Website Runa's Website Follow Runa on X Runa's blog posts Tor Project Google Summer of Code Security Expert: Apple's Lockdown Mode Still Defeats Commercial Spyware Columbia Journalism Review profile on Runa Citizen Lab Amnesty International
Show more...
1 year ago
21 minutes 3 seconds

The Security Detail
Ep. 2: Water with CISA's Amy Thomas, cyber risk analyst and Noah Powers, RVA program lead, penetration testing capabilities
Water treatment facilities are part of the critical infrastructure that supports essential services. A cyberattack on these facilities could disrupt the supply of clean water, leading to severe consequences for public health, safety, and the economy. In this episode, two representatives from the US Cybersecurity and Infrastructure Security Agency, or CISA, share strategies to defend the water sector from cyberattacks. They also provide an update on CISA's investigation into an Iranian-linked campaign targeting Israeli-made Programmable Logic Controllers (PLCs) at a number of US water utilities. Resources:  CISA Risk and Vulnerability Assessments program CISA Security Advisors Top Ten Cybersecurity Misconfigurations (NSA and CISA Advisory) IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities (CISA Advisory) CISA and Partners Release Joint Advisory on IRGC-Affiliated Cyber Actors Exploiting PLCs (CISA Alert) CISA Secure by Design Alert Urges Manufacturers to Eliminate Default Passwords (CISA Alert) States and Congress wrestle with cybersecurity after Iran attacks small town water utilities (Associated Press) CVE-2023-6448 (NIST NVD) CISA's Known Exploited Vulnerabilities Catalog  Report a cyber issue to CISA Water and Wastewater Cybersecurity toolkit (CISA) China’s cyber army is invading critical U.S. services (Washington Post) Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft) Stop Ransomware website (CISA) The Dragos Community Defense Program Helps Secure Industrial Infrastructure for Small Utilities (Dragos) Cybersecurity for Rural Water Systems Act Energy Circuit Riders Act    
Show more...
1 year ago
21 minutes 28 seconds

The Security Detail
Ep. 1: Tour of Cyber Coalition 2023, NATO’s flagship cyber defence exercise
Season 2 of The Security Detail kicks off with an inside look at Cyber Coalition 2023, NATO's flagship cyber defence exercise. Audra Streetman traveled to Tallinn, Estonia to tour the exercise and interview creators and participants about the knowledge and collaboration needed to defend the Alliance from cyber threats.    Links:  Cyber Coalition 2023 NATO Blog
Show more...
2 years ago
10 minutes 48 seconds

The Security Detail
Ep. 14: Cybersecurity Career Advice from Past Interview Guests
Wrapping up Season 1 of The Security Detail, episode 14 features interviews with a number of past guests about the best advice they've received in their career along with the failures they've learned the most from.  Stay tuned for Season 2 of The Security Detail, which kicks off on January 3, 2024 with an episode about Cyber Coalition 2023, NATO's flagship cyber defense exercise. Audra Streetman traveled to Tallinn, Estonia to tour the exercise and interview creators and participants about the knowledge and collaboration needed to defend the Alliance from cyber threats. 
Show more...
2 years ago
22 minutes 13 seconds

The Security Detail
Ep. 13: Energy featuring Joe Slowik, threat intelligence manager at Huntress
Cybersecurity in the energy sector is crucial for safeguarding critical infrastructure, preventing potential disruptions to power grids, and mitigating the risk of cyberattacks that could have severe economic, environmental, and societal consequences. In this episode, Joe Slowik, threat intelligence manager at Huntress, discusses the top cyber threats to the energy sector.    Resources:  Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology (Mandiant) Attaining Focus: Evaluating Vulnerabilities In The Current Threat Environment Exorcising the Ghost in the Machine: Debunking Myths Around Supply Chain Intrusions Assessing The Balance Between Visibility & Confidentiality In ICS Network Traffic E-ISAC Cybersecurity Risk Information Sharing Program (CRISP)
Show more...
2 years ago
21 minutes 14 seconds

The Security Detail
Ep. 12: Defence with Luke O’Brien, principal engineer for cyber defence at NATO
Cybersecurity is crucial for the defence industry as it safeguards sensitive information, intellectual property, and critical infrastructure from cyber threats, ensuring the integrity and resilience of military technologies. In this episode, Luke O’Brien, NATO's principal engineer for cyber defence explains NATO’s unique approach to cybersecurity.   Resources:  NATO Cyber Defence NATO Malware Information Sharing Platform (MISP) NATO Crisis Management Exercise 2023 (CMX23) 2023 NATO Summit in Vilnius NATO Rapid Reaction Team Albania weighed invoking NATO’s Article 5 over Iranian cyberattack (Politico)
Show more...
2 years ago
17 minutes 32 seconds

The Security Detail
Ep. 11: Geopolitics with Dmitri Alperovitch, executive chairman at Silverado Policy Accelerator
Cybersecurity has become a critical element in geopolitics, shaping international relations as nations grapple with the challenges of protecting their digital infrastructures and safeguarding national security in an interconnected world. In this episode, Dmitri Alperovitch, Executive Chairman at Silverado Policy Accelerator, discusses the intersection between cybersecurity and geopolitics and the evolving role of cyber in modern conflict.   Resources: World on the Brink: How America Can Beat China in the Race for the Twenty-First Century Geopolitics Decanted podcast by Silverado Follow Dmitri on X Infamous Chisel report Storm-0558 Report Volt Typhoon Report The Alperovitch Institute Silverado Policy Accelerator
Show more...
2 years ago
35 minutes 49 seconds

The Security Detail
Ep. 10: Aviation featuring Richard Waine, head of SecOps at easyJet
Cybersecurity in aviation is paramount as it safeguards critical systems, ensuring the safety of passengers and the integrity of flight operations. In this episode, Richard Waine, head of SecOps at easyJet, discusses the aviation cyber threat landscape and how easyJet is tackling a range of technical and policy issues.  Resources:  easyJet.com Aviation ISAC
Show more...
2 years ago
17 minutes 6 seconds

The Security Detail
Ep. 9: Education featuring Brett Callow, threat analyst at Emsisoft
The cyber threat landscape for education has evolved rapidly, with ransomware attacks and data breaches targeting schools and universities, highlighting the critical need for robust cybersecurity measures in the sector. In this episode, Brett Callow, threat analyst at Emsisoft, shares his observations about the cybercrime ecosystem and how schools and universities can best defend against these attacks.    Resources:  Unpacking the MOVEit Breach: Statistics and Analysis (Emsisoft) The State of Ransomware in the US: Report and Statistics 2022 (Emsisoft) Protecting Our Future: Partnering to Safeguard K-12 Organizations from Cybersecurity (CISA)
Show more...
2 years ago
27 minutes 29 seconds

The Security Detail
The Security Detail is a podcast series by SURGe, Splunk’s strategic security research team. Every other week, co-hosts Audra Streetman and Kirsty Paine interview security experts about the top cyber threats in different industries. Episodes will examine the cyber threat landscape in healthcare, education, manufacturing, the technology sector, retail and hospitality, telecommunications, and the public sector.