Ted Demopoulos is a Senior SANS Instructor, a recipient of the Department of Defense Award of Excellence, and the author of Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far. Full Show Notes Subscribe to YouTube Channel
Tom Parker is the Group Technology Officer of Accenture Security and a recognized thought leader in the security industry. He’s known for his research in adversary and threat profiling and software vulnerability. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Michele Jordan is the Founder and Principal Consultant of Under the Oak Consulting. She has worked in IT and network security for over 35 years. Michele delves into her background in security, her trials and tribulations running the Radar Page, and more! Full Show Notes Subscribe to YouTube Channel
Kyle Wilhoit is a Senior Security Researcher at DomainTools; he focuses on research DNS-related exploits, investigate current cyber threats, and exploration of attack origins and threat actors. Kyle joins us to discuss the merit and concept of pivoting off domain information! Discuss the concept and merit of pivoting off domain information Why pivot off domain […]
Richard Moulds is the General Manager of Whitewood Security. Whitewood aims to help its customers to take control of the generation of random numbers across their application infrastructure. Full Show Notes Subscribe to YouTube Channel
Bryson Bort is the Founder and CEO of GRIMM, a Washington, D.C. based security engineering and consulting services company. Bryson delves in-depth into his entrepreneurship journey, the problems GRIMM aims to solve, and the current state of pen testing, malware analysis, and more! Full Show Notes Subscribe to YouTube Channel
Mike Nichols, Director of Products at Endgame, joins us to discuss EDR, threat detection, and customer relations! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Aram is the Founder and CEO of BeSafe (formerly Skycryptor), an encrypted cloud company that uses proxy re-encryption techniques to protect user data. He provides a demo on his techniques to ensure user data security! Full Show Notes Subscribe to YouTube Channel
Danny Miller, the Director of Product Marketing at Ericom Software, joins us to discuss how enterprises can protect themselves by utilizing isolated browsing and other techniques! Full Show Notes Subscribe to YouTube Channel
Ping Look serves as the Executive Advisor of security communications and awareness at Optiv. Ping joins us to discuss security awareness, business diversity, and more! Full Show Notes Visit http://securityweekly.com/esw for all the latest episodes!