psw677

Paul’s Security Weekly Episode #677 – December 10, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. The State Of Penetration Testing Panel – 06:00 PM-07:00 PM

Sponsored By

sponsor
Visit https://securityweekly.com/coresecurity for more information!

Description

Join us for a lively discussion surrounding the topic of penetration testing. Sure, we’ve called out differences between vulnerability scanning and penetration testing. Moving past this particular issue, we’ll explore how to effectively use penetration testing in your environments.

This segment is sponsored by Core Security, A Help Systems Company.

Visit https://securityweekly.com/coresecurity to learn more about them!

We openly debate penetration testing on a regular basis throughout the year on Security Weekly shows. Many debate aspects of penetration testing within their own organizations. This segment will draw on the experiences of the panelists to help our audience understand penetration testing. This segment will include topics such as:

– How do you get the most out of penetration tests?
– How has penetration testing evolved over the last year?
– What are some of the types of penetration tests?
– What are the pros and cons of different types of penetration tests?
– When are you ready for your first penetration test?
– When are you ready to have your own internal team for penetration testing?
– How do you manage penetration testing from both external and internal teams?
– How can you integrate attack surface management or adversary simulation solutions into your penetration testing regime?
– What can you do to prepare for a penetration test?
– What’s next in the evolution of penetration testing?

Guest(s)

Diego Sor

Diego Sor –

Security Consulting Services, Director at Core Security, A Helpsystems Company

Diego Sor is the Director of Security Consulting Services at Core Security. With more than 20 years of experience in the security industry, first as a software developer and then as security consultant, Diego is passionate about new testing strategies, methodologies, and offensive security research. His primary focus and expertise is delivering infrastructure and application security penetration tests.

Ed Skoudis

Ed Skoudis –

Faculty Fellow at SANS

Ed Skoudis has taught cyber incident response and advanced penetration testing techniques to more than 12,000 cybersecurity professionals. He is a SANS Faculty Fellow and the lead for the SANS Penetration Testing Curriculum. His courses distill the essence of real-world, front-line case studies he accumulates because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost.

Travis Smith

Travis Smith –

Director, Malware Threat Research at Qualys

Travis is the Director of Malware Threat Research at Qualys. He has spent the past 15 years in the security industry with a focus on digital forensics and incident response. He holds a wide array of certifications ranging from GIAC Certified Penetration Tester to the CISSP, as well as an MBA with a concentration in information security. Travis has presented his research at conferences worldwide at venues such as BlackHat, RSA, and SecTor.

Hosts

DougWhite

Doug White –

Professor at Roger Williams University

JeffMan

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

JoffThyer

Joff Thyer –

Security Analyst at Black Hills Information Security

LarryPesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

LeeNeely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

PaulAssadorian

Paul Assadorian –

Founder/CIO at Security Weekly/CyberRisk Alliance

TylerRobinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc

2. Innovative Blue Team Techniques Panel – 07:15 PM-08:15 PM

Sponsored By

sponsor
Visit https://securityweekly.com/risksense for more information!

Description

We often hear that offensive security techniques are “sexier” than defensive blue team techniques. In this panel discussion, we attempt to level the playing field (on so many levels…) between attackers and defenders. Keeping the evil attackers out of our networks and systems is a daunting task that requires creative thinking and creative solutions.

This segment is sponsored by RiskSense.

Visit https://securityweekly.com/risksense to learn more about them!

The panel will discuss what works, and what doesn’t work when it comes to defending systems in the real world. Topics include:

– How does patching play into the strategy given you can’t patch everything and 0days exist?
– If most organizations will fall to a carefully crafted email phishing attack and some lateral movement to Domain Admin, what can we do to protect the most common attack paths?
– How do we keep our workforce safe while working from home? What are the successful pivots organizations have made to prevent successful attacks in this environment?
– What can we do to encourage teamwork that will lead to an effective cybersecurity program?
– Given the security of many organizations is vulnerable, what types of solutions work best to prevent, detect, and/or stop attacks?
– Do we need more innovative solutions?
– Do we need to use more of what we already have?
– How do we push forward to using immutable infrastructure and DevOps outside of creating and deploying our own software?

Guest(s)

Brian Donohue

Brian Donohue –

Intelligence Analyst at Red Canary

Brian has been writing about and researching information security for the last decade. He started his career as a journalist covering security and privacy. He later worked as a threat intelligence analyst, researching adversaries and threat techniques for a variety of major banks, retailers, and manufacturers. At Red Canary, Brian helps support open source tooling, and produces educational resources relating to threat research, intelligence, and detection engineering.

Chris Abella

Chris Abella –

Principal SE at ExtraHop Networks

Chris Abella is a Principal Systems Engineer with ExtraHop Networks, where he has spent eight years delivering network analytics and forensics at scale. His passion for data and applied machine learning shows up in the office and in his personal pursuits. Outside the office, he enjoys being a mediocre runner and passable cook.

David Kennedy

David Kennedy –

Co-Founder/CTO at TrustedSec

David Kennedy is the Founder of TrustedSec and Co-Founder and Chief Hacking Officer of Binary Defense Systems (BDS). David started both these companies with the belief in the betterment of the security industry and promoting the advancement of the industry through quality services. TrustedSec and BDS (both sister companies) provide consulting and MSSP services and can handle every aspect of an organization. Prior to TrustedSec and BDS, David was a Chief Security Officer (CSO) for Diebold Incorporated, an international Fortune 1000 global company.

Doug Burks

Doug Burks –

CEO at Security Onion Solutions

Doug Burks started Security Onion in 2008 to provide a comprehensive platform to help folks peel back the layers of their enterprise and make their adversaries cry. Today, Security Onion has over 1,000,000 downloads and is being used by organizations around the world for threat hunting, enterprise security monitoring, and log management. In 2014, Doug started Security Onion Solutions LLC to help those organizations by providing training, professional services, and hardware appliances. Doug is a CEO, public speaker, teacher, former president of the Greater Augusta ISSA, and co-founder of BSides Augusta, but what he really likes the most is catching bad guys.

Srinivas Mukkamala

Srinivas Mukkamala –

Chief Executive Officer and Co-Founder at RiskSense, Inc.

Dr. Srinivas Mukkamala is a co-founder and the CEO of RiskSense, Inc. He has been researching and developing security technologies for over 15 years, working on malware analytics (focusing on medical control systems and nontraditional computing devices), breach exposure management, web application security, and enterprise risk reduction. Mukkamala was one of the lead researchers for Computational Analysis of Cyber Terrorism against the U.S. (CACTUS). He has been published in over 120 peer-reviewed publications in the areas of information assurance, malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing. Mukkamala received his Bachelor of Engineering in Computer Science and Engineering from the University of Madras, before obtaining his Master of Science and Ph.D. in Computer Science from New Mexico Tech.

Hosts

DougWhite

Doug White –

Professor at Roger Williams University

JeffMan

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

JoffThyer

Joff Thyer –

Security Analyst at Black Hills Information Security

LarryPesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

LeeNeely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

PaulAssadorian

Paul Assadorian –

Founder/CIO at Security Weekly/CyberRisk Alliance

TylerRobinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc

3. Hacking Matters Panel – 08:30 PM-09:30 PM

Sponsored By

sponsor
Visit https://securityweekly.com/ilf for more information!

Description

Hacking matters. The term hacking has gotten away from us over the years. I believe we’ve reclaimed it, to a certain extent. The goal of this panel is to discuss all things hacking culture. What does it mean to be a hacker and how do we preserve the hacking ideology?

This segment is sponsored by Innocent Lives Foundation.

Visit https://securityweekly.com/ilf to learn more about them!

A play on words for sure, this panel will discuss “Hacking Matters”. We will address why hacking matters, to our community, and to society as a whole. It’s difficult to imagine a world without hackers. Which brings us to the second aspect of our panel, to address the matters of hacking. Specifically, we will aim to address the following:

– How do hackers help society today and into the future?
– How do we preserve the hacking spirit?
– How do we recognize the hacker in ourselves and in other people?
– How do we protect hackers from those creating and enforcing laws?
– What are some of the qualities of a hacker? Persistence? Creativity?
– How do we guide the youth of today to become ethical hackers? (Not so much in the penetration testing sense, but related to morals and ethics).
– Hackers love to explore, what advice do we have for those who explore technology to find vulnerabilities and are met with lawyers rather than open arms?
– What are some of the best examples of hacking in his-tory and popular culture?
– Can we teach someone to be a hacker? Or is hacking something you are born with and we can help you unlock it?
– How do we deal with this ethical dilemma: You’ve discovered a way to “break” a system, if you expose it good people will know about it (and hopefully fix it), but the evil attackers now also know about it and could abuse it?

Guest(s)

Bill Swearingen

Bill Swearingen –

Sr Cyber Strategist at IronNet Cybersecurity

Bill has devoted his career to protecting critical infrastructure and Fortune100 companies from advanced cyber threats. He brings direct experience with being on the front lines, and an in-depth understanding of the challenges our customers are faced with — and what problems they are wanting to solve. Bill has a proven track record of creating, developing, and managing strong technical teams needed to provide Incident Response, Digital Forensics, Vulnerability Assessment, Penetration Testing, and Policy enforcement for large (Fortune 150) corporations such as CenturyLink and Sprint.

Chloé Messdaghi

Chloé Messdaghi –

VP of Strategy at Point3 Security

Chloé Messdaghi is the VP of Strategy at Point3 Security. In addition to her passion of keeping people safe and empowered both on and offline, she is also interested in increasing the numbers of marginalized genders in information security. She is the co-founder of Women of Security (WoSEC) and Hacking is NOT a Crime, and the founder of WeAreHackerz (WomenHackerz). She is a keynote speaker at major information security conferences and events, and serves as a trusted source for national and sector reporters and editors. She holds a Master of Science (M.S.) from The University of Edinburgh, and a BA in International Relations from University of California, Davis, as well as a Certificate in Entrepreneurship from Wharton and other professional certificates.

Cyndi Gula

Cyndi Gula –

Partner at Gula Tech Adventures

Cyndi is a Managing Partner at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. Cyndi is a cyber start up operations expert. She has started and run licensing, human resources, legal, facilities, accounting, marketing, channel, support and sales operations for both Tenable Network Security, which went public on the NASDAQ in 2018, and Network Security Wizards, where she was President and helped it grow to a successful exit 18 months after being founded. As a Gula Tech Adventures managing partner, she is helping our cyber start-ups scale and make important decisions about their organizational structure, facilities, product licensing, customer support, recruiting strategy, culture, managing their cash flow and having the processes in place to succeed and have fun.

John Loucaides

John Loucaides –

VP of Research & Development at Eclypsium

John Loucaides is the VP of Research and Development at Eclypsium, the comprehensive cloud-based device security platform that protects enterprise devices all the way down to the firmware and hardware level. Headquartered in Portland, Oregon, the company was named to Fast Company’s annual list of the World’s Most innovative Security Companies for 2020, the CNBC Upstart 100 list, and Gartner’s Cool Vendor list for Security Operations and Threat Intelligence. John has extensive history in hardware and firmware threats from experience at Intel Corporation and the United States government. At Intel he served as the Director of Advanced Threat Research, Platform Armoring and Resiliency, PSIRT, and was a CHIPSEC maintainer. Prior to this, he was Technical Team Lead for Specialized Platforms for the federal government.

Ron Gula

Ron Gula –

President at Gula Tech Adventures

Ron is President at Gula Tech Adventures which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA and got to participate in some of the nation’s first cyber exercises. Ron is involved in a variety of cyber nonprofits and think tanks including Defending Digital Campaigns, the Center for Internet Security, the National Security Institute and the Wilson Center. In 2020, Ron was honored to receive the Northern Virginia Technology Council Cyber Investor of the Year award and the Baltimore Business Journal Power 10 CEO award.

Shane McCombs

Shane McCombs –

COO at Innocent Lives Foundation

Shane comes to ILF with more than 25 years of experience in the tech industry, combined with more than a decade of experience in C-level roles. In those critical capacities, Shane led enterprise-wide initiatives within project management, customer relationship management and acquisition, policies and procedures, process improvement, and infrastructure. Shane is also an accomplished public speaker and trainer, focused on change management, professionalism, social engineering, and corporate security.

Hosts

DougWhite

Doug White –

Professor at Roger Williams University

JeffMan

Jeff Man –

Sr. InfoSec Consultant at Online Business Systems

JoffThyer

Joff Thyer –

Security Analyst at Black Hills Information Security

LarryPesce

Larry Pesce –

Senior Managing Consultant and Director of Research at InGuardians

LeeNeely

Lee Neely –

Senior Cyber Analyst at Lawrence Livermore National Laboratory

PaulAssadorian

Paul Assadorian –

Founder/CIO at Security Weekly/CyberRisk Alliance

TylerRobinson

Tyler Robinson –

Managing Director of Network Operations at Nisos, Inc