Welcome to Women, Peace & Security: Voices of Change, a podcast produced by the Inter-American Defense College that delves into the critical intersection of gender, peace, and security across the Western Hemisphere. Each episode brings you closer to the forefront of the Women, Peace, and Security (WPS) agenda through insightful conversations with leading experts, practitioners, gender advisors, and academics. Join us as we explore the latest trends, policies, and research shaping the WPS lan ...
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
1
The Importance of Third-Party Risk Management (TP3M) in Cyber Security: David Beardshaw, CISO
45:15
On this episode, David Beardshaw, CISO of 3VRM, joins Yonatan Lipschitz. They discuss the importance of third-party risk management (TPRM) and its role in securing organizations. They explore the definition of TPRM and the risks associated with third-party relationships. They also discuss the challenges of questionnaire-based assessments and the ne…
…
continue reading
1
Breaking Ground with Tiffani Phillips and Claire Sneed
1:03:00
1:03:00
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:00
Join host Frieda Garcia, Gender Advisor at the Inter-American Defense College (IADC), as she sits down with Tiffani Phillips and Claire Sneed from USNORTHCOM to discuss their groundbreaking roles in Operation Allies Welcome (OAW). In this episode, Tiffani and Claire share their experiences spearheading the first deployment of gender advisors in a d…
…
continue reading
1
Transformation in Cyber Security Leadership: Carlo Schreurs, Global CISO at FrieslandCampina
48:57
Host Yonatan Lipschitz is joined in this conversation by Carlo Schreurs, Global CISO at FrieslandCampina. Carlo shares his journey from aeronautical engineering to becoming the CISO of Friesland Campina. He discusses the shift from IT to OT security, the importance of a transformational mindset in cybersecurity leadership, and the challenges of sta…
…
continue reading
In this episode of the Resilience Podcast, Javier Garcia-Quintela, the CISO of Spanish energy giant, Repsol, discusses his personal journey into cybersecurity and the importance of building relationships and collaboration within the industry. He also addresses the energy sector's challenges, including the lack of cybersecurity skills and the growin…
…
continue reading
1
Cyber threats to business and the impact of AI on your defense strategies: Joe Hubback, Managing Director of Istari (EMEA)
36:42
Yonatan is joined by Joe Hubback, Managing Director of Istari (EMEA).Di Yonatan Lipschitz
…
continue reading
After 5 seasons, it’s curtain call for Security Voices. In this final episode, Jack and I reflect on half a decade of podcasting together through times that were both extraordinary for the world and for each of us personally. We discuss some of our favorite moments, most memorable guests, and the lessons learned from roughly 60 episodes of explorin…
…
continue reading
1
Cultural Decryption: A Closer Look at Understanding the India/U.S. Relationship in Cyber
1:00:08
1:00:08
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:00:08
The ascendancy of India in Silicon Valley is undeniable. From top executives such as Satya Nadella (Microsoft) and Nikesh Arora (Palo Alto Networks) to leading investors, we’ve become well accustomed to working with and often for people who have immigrated from India. Given the wave of immigration from India started decades ago, our Indian coworker…
…
continue reading
1
Farewell, Sun Tzu: The Modern Security Mindset with Kelly Shortridge
1:03:12
1:03:12
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:12
The classic mindset of cyber security unmistakably originates from its early leaders: financial services, the defense industrial complex, and big companies that had too much to lose from ignoring what was called at the time “information security risk”. They tried to calculate largely unknowable risks to explain digital concepts to analog executives…
…
continue reading
Let’s say it’s 2012. And you're graduating Stanford with a comp sci degree. You could go to Google, Facebook or any of a number of well-paying emerging juggernauts. If you’re Frank Wang, you move across the coast and do your PhD in cybersecurity at MIT. Now you’re doing your PhD. And you make pals with a local VC. So naturally, you start a cybersec…
…
continue reading
1
Episode #57: Claroty’s Galina Antova on the global infrastructure war & building an $100M OT security juggernaut
1:06:24
1:06:24
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:06:24
This past weekend, the New York Times posted an article explaining the United States is scrambling to clean government systems from a deep, pervasive infiltration of the country’s infrastructure by the Chinese. Much like the Russian attacks on Ukrainian infrastructure, the intent appears to be to disrupt any U.S. action that would be a response to …
…
continue reading
1
Defending the U.S. Communications Backbone in the Age of CyberWar: Dialogue & Career Retro with Mary Haynes
1:14:59
1:14:59
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:14:59
"Any country that intervenes in Taiwan will face serious consequences, including cyber attacks." This statement in January by the Chinese Ministry of Foreign Affairs made clear that the United States must be ready to defend itself in what many assume to be an inevitable conflict over Taiwan’s independence. It begs the question, how will we defend o…
…
continue reading
1
The Hidden Dangers of Generative AI: Who is Responsible for Protecting our Data?
1:04:21
1:04:21
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:04:21
The breakaway success of ChatGPT is hiding an important fact and an even bigger problem. The next wave of generative AI will not be built by trawling the Internet but by mining hordes of proprietary data that have been piling up for years inside organizations. While Elon Musk and Reddit may breathe a sigh of relief, this ushers in a new set of conc…
…
continue reading
1
Threat modeling life: Prepping for the rest of us with Michal Zalewski (lcamtuf)
1:06:35
1:06:35
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:06:35
Hidden bunkers, stacks of canned food and piles of artillery. Disaster preparedness has become an Internet meme and these are some of the “prepper” community’s showcase images. But most of us who have lived through the recent pandemic, the Capital insurrection on January 6th and more no longer take the threat of a major disaster lightly. For those …
…
continue reading
1
10,000 to 5: The Improbable Odds of Securing the Nation’s Largest Child & Family Services Agency
52:16
Continuing from our dialogue with Tomas Maldonado who has the unique job of securing the NFL, we have a conversation with Allen Ohanian whose day job is to protect the Los Angeles Department of Child and Family Services (DCFS). LA DCFS is the largest agency of its type in the United States, its central focus is its 10,000 social workers who help de…
…
continue reading
1
Security Data Lakes with Omer Singer, Pathik Patel & ChatGPT
1:10:44
1:10:44
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:10:44
After 2 decades of trying to make SIEMs work, security data lakes are a hot topic as they present an increasingly attractive alternative. The only hotter topic is ChatGPT and the game changing potential of AI. So in episode 52 of Security Voices, we mash the two together as Dave, Pathik Patel (Informatica), and Omer Singer (Snowflake) explore the m…
…
continue reading
1
Massive Stakes & Undersized Budgets: Roundtable on Life After the Joe Sullivan Conviction
1:23:48
1:23:48
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:23:48
The winds of change are always blowing in cybersecurity, but there’s moments when they reach a gale force, When the landscape is reshaped dramatically by an event that hits us like a hurricane, changing how we feel about our jobs, our industry, and perhaps even shaking our resolve to continue on in the same career path. When Joe Sullivan, former he…
…
continue reading
In cybersecurity, we have teams focused on managing vulnerabilities. We have SOCs who spend their days obsessing over threats. App sec teams. Data privacy teams. In the typical, modern cybersecurity team, we have exactly zero people focused on helping humans defend themselves and the organization in spite of a massive increase in scams and fraud th…
…
continue reading
1
Hard Knocks: Tomás Maldonado, CISO of the NFL
1:02:46
1:02:46
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:02:46
Imagine you’re walking past the sports book in Las Vegas. People are betting on baseball, horses, and the usual fare. Something catches your eye, you look more closely and you can’t believe your eyes. People are betting on whether or not you're going to fail at doing your job this week! While this may sound far-fetched, this exact scenario played o…
…
continue reading
1
The Compliance Episode - History, Theater & Industry-Reshaping Impact
1:07:31
1:07:31
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:07:31
First, a confession: this is the last episode we would have envisioned when we started Security Voices. Compliance was as mundane as it is mandatory– where’s the fun in that? Where’s the untold, fascinating story of the person who summited the tallest mountain? Rose from ashes to improbable success? In the short years that have passed since we star…
…
continue reading
1
Designing Category Smashing Businesses with Oliver Friedrichs (Phantom, Pangea)
1:12:39
1:12:39
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:12:39
For the second episode in a row, we’ve caught a seasoned entrepreneur at that perfect moment when they’ve started a new company but still have time for a conversation before their new adventure kicks into high gear. Oliver Friedrichs, founder of several security companies including Immunenet and Phantom, joins us to talk product strategy as he emba…
…
continue reading
1
Startup Straight Talk with Serial Entrepreneur Alfred Huger
1:16:52
1:16:52
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:16:52
2+ years to interview Alfred Huger wasn’t too long to wait. After spending 8 years at Cisco following the acquisition of SourceFire, Al recently departed the networking giant to do his 4th startup in as many decades. Unbound from the usual PR police, Al candidly speaks on a wide range of topics from why he has stayed at companies long past acquisit…
…
continue reading
1
Pancakes & Machetes: A Dialogue with Lesley Carhart
1:24:59
1:24:59
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:24:59
There are few people, if any, who have given more of themselves to the cybersecurity community than Lesley Carhart. Our conversation with Lesley came immediately after the 3rd annual PancakesCon, a free conference she conceived with a unique “20 on, 20 off” format that celebrates who we are outside of work as much as what we accomplish as security …
…
continue reading
Your fledgling startup has just been sued by one of the most powerful companies in the world. How do you defend yourself? And keep your company afloat? This was the challenge faced by Amanda Gorton, CEO of Corellium, a company whose virtualization platform enables efficient mobile security research and quality testing across a massive variety of de…
…
continue reading
1
All the Latest Cybersecurity Research, Summarized: Rebooting ThinkstScapes with Jacob Torrey
56:31
What if there was someone who could take all of the best security research over recent months and distill it down into the greatest hits? Sort of like a Spotify “Release Radar”, but for the best talks at conferences. There is. It’s not in Blinkist. It’s (back) at ThinkstScapes after a multiyear hiatus. And it’s now gloriously free. This episode of …
…
continue reading
1
Satellite Hacking w/ Frank Pound
1:11:17
1:11:17
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:11:17
Hundreds of inexpensive satellites are now regularly launched into space through SpaceX’s Smallsat Rideshare program. Some are sophisticated and commercial, others are DIY and experimental. They share space with now over 3,000 other artificial satellites orbiting the Earth. What could possibly go wrong? Frank Pound joins Jack and Dave for a convers…
…
continue reading
1
Strange roommates: Whitney Merrill on the uneasy coupling of security & privacy
1:09:44
1:09:44
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:09:44
A clear pattern is emerging of security leaders also being anointed with responsibility for privacy. Some of the origins of this movement no doubt can be found in regulations like GDPR who blend requirements for both security and privacy in mandates for data breach response. While this may seem like a logical pairing for lawmakers, it can be anythi…
…
continue reading
1
From Tool to Sidekick - Human/Machine Teaming with Jamie Winterton
1:01:38
1:01:38
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:01:38
We’ve conditioned ourselves to look at our technology in a similar way we look at a box of tools: as instruments that passively do what we make them do. When we think of the future of artificial intelligence, it’s tempting to leap to fully autonomous solutions一 when exactly will that Tesla finally drive by itself? In our interview with Jamie Winter…
…
continue reading
1
Melanie Ensign Doesn’t like Clubhouse, Press Releases & FUDー & Neither Should You
1:08:16
1:08:16
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:08:16
Communications professionals are often quiet coaches. They work their magic behind the scenes. They hold their opinions tightly and express them infrequently. In short, their influence is everywhere but their fingerprints are often invisible. Melanie Ensign is having none of that. And we’re all the better for it. In this 64 minute interview, you’ll…
…
continue reading
We’ve met and passed the 1 year anniversary of the COVID-19 pandemic and cases of burnout are off the charts. We’re tired of Zoom. We’re tired of masks. Far too many kids are stuck at home instead of at school. The list could go on but the result is obvious: we’re burned out. The effect can be all the more profound for beleaguered security professi…
…
continue reading
1
Sh*t Talkin’, Deep Thoughts & Really Scary Phishing w/ Material Security
1:04:23
1:04:23
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:04:23
This episode of Security Voices is different. Let’s say you sat down at the end of a long day and had a casual drink with a few industry friends before dinner. The conversation quickly turns to serious topics which are all discussed with thoughtful insight, biting humor and some well-placed profanity. Welcome to the latest episode of Security Voice…
…
continue reading
1
Cloud Security Series Wrap-up w/ Justin Brodley: A look back at 2020, a glance ahead at 21's top threats & key trends
1:06:51
1:06:51
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:06:51
In our 1st episode of ‘21, we cap off our cloud security series with a recap of the major milestones, key trends and surprises across 2020 through the eyes of cloud expert and podcaster, Justin Brodley. If you think you might have missed a few things that happened in the public cloud last year while waiting for news on COVID-19 vaccines, hitting re…
…
continue reading
1
Winners, Losers & Long Shots: Kleiner Perkins’ Bucky Moore Breaks Down Cloud Security
1:10:02
1:10:02
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:10:02
Investors make their money seeing things others don’t. Making big bets based on both digging into painstaking detail and their ability to forecast what will happen many years into the future. In this 5th and (almost!) final episode of our series on public cloud security, we get deep into the mind of Bucky Moore from Kleiner Perkins to learn how the…
…
continue reading
1
Cloud native invasion! An interview with Datadog’s Marc Tremsal in Public Cloud Security Series #4
1:10:10
1:10:10
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:10:10
As longstanding cybersecurity companies lumber their way into the public cloud and "born in the cloud" startups fight for attention, cloud observability titan Datadog entered the security market in 2020 with two new products. This is far from the first time a company has used an adjacent market to make the cybersecurity leap. Oftentimes it fails, b…
…
continue reading
1
Public Cloud Security Series #3: How to catch up, survive multi-cloud & when to tap out with Rich Mogull
1:07:00
1:07:00
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:07:00
Our conversation with Rich Mogull was intended to provide an analyst view point on public cloud security. While Rich certainly delivered on this promise, the episode turned into something more important: therapy. If you find yourself wondering if you’re burnt out from cyber security and life in general, this is for you. Our conversation with Rich s…
…
continue reading
1
Cloud Security Series #2 - Yelp’s Zach Musgrave on Defending a Cloud Native Business at Scale
1:04:22
1:04:22
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:04:22
In our 1st episode of this series, Teri provided an expert’s broad view of what’s happening with security in the public cloud. In this episode, Yelp’s Zach Musgrave does the opposite: we go into the trenches to understand what it takes to protect a fully cloud native business on a daily basis. While Yelp was born in ‘04, 2 years before Amazon launc…
…
continue reading
1
Cloud Sec Series #1 - A Public Cloud Security Primer With Expert Teri Radichel (AWS, GCP & Azure)
1:06:04
1:06:04
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:06:04
Initially led by software as a service (SaaS), the transition to the public cloud is one of the most important changes we’ve witnessed in information technology to date. From the early days of SaaS to the current stage where adoption of infrastructure, platform and function as a service (IaaS, PaaS, FaaS) are catching on like wildfire, there’s an i…
…
continue reading
1
The Cyber Career Doctor Is In: An Interview With Kathleen Smith
1:20:11
1:20:11
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:20:11
If you’ve been laid off, furloughed or are just plain tired of everything, this episode is for you. Kathleen Smith, the longstanding cyber career expert at B-Sides (and beyond) joins us for a dialogue on what’s happening in the security job landscape. Lost your job? Kathleen explains a tried and true process for recovery, reflection and finding you…
…
continue reading
1
Transforming healthcare & protecting privacy in a post-quantum world with RSA’s CTO, Dr. Zulfikar Ramzan
1:11:45
1:11:45
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:11:45
Discussing cryptography is usually a surefire way to end a dinner conversation. It combines two things that intimidate (and bore) many people: hard tech and complex math. In spite of this, cryptography is on center stage today as it is the very foundation of defending our privacy and perhaps unlocking how we can safely share health information in t…
…
continue reading
1
The Longevity Formula: CSO Andy Ellis’ Wit, Wisdom & Wine Advice from 20+ Years at Akamai
1:23:46
1:23:46
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:23:46
The average tenure of a CISO is 26 months due to high stress and burnout, according to a recent survey. In stark contrast, Andy Ellis has now been CSO at industry titan Akamai for over 20 years. Jack & Dave explore Andy’s longevity formula in a 70 minute interview that spans everything from his advice to young security leaders to the death of live …
…
continue reading
1
Untangling Zoom's Security Issues, Contact Tracing & End to End Encryption with Kenneth White
1:03:06
1:03:06
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:06
The misinformation spread during the COVID-19 pandemic has made what happened with the 2016 U.S. elections look like the “good old days.” Epidemiologists are on center stage trying to explain complex topics to billions of people concerned for their lives-- and sometimes politicians are aiming to do the same. The multiplier effect is how hopelessly …
…
continue reading
1
Next Gen Social Engineering: Hacking Humans with Social Roboticist, Straithe
1:03:42
1:03:42
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:42
In the midst of the COVID-19 pandemic, it’s easy for thoughts to stray to the apocalypse. Nowhere is this tendency more common than when we talk about robots. Decades of books, movies and television have explored the topic of “when robots attack” and the calamity that follows. Today, domestic robots struggle to make it up the stairs and Siri can’t …
…
continue reading
1
Scaling Data Science & Defending Machine Learning with CrowdStrike's Chief Scientist, Dr. Sven Krasser
1:11:39
1:11:39
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:11:39
In this episode we step far beyond the hype cycle and dive into the details of scaling a data science team in the security industry with Dr. Sven Krasser. Sven joined CrowdStrike in the early days and the initial part of the conversation with Dave is an incredibly timely conversation covering how to structure and work with remote teams effectively.…
…
continue reading
1
Day Job Series | BSides Origins, Present & Future
1:03:19
1:03:19
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:19
Di Security Voices
…
continue reading
1
Day Job Series | Launching Open Raven
1:03:39
1:03:39
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:03:39
Di Security Voices
…
continue reading
1
Security Snake Oil & the Products We Deserve - a Conversation with Haroon Meer
1:09:05
1:09:05
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:09:05
Di Security Voices
…
continue reading
1
Machine Learning & Connected Cars with Security Journeyman Josh Lemos
1:14:38
1:14:38
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:14:38
Di Security Voices
…
continue reading
1
Election Security with Camille Stewart: Looking ahead to 2020...are we ready?
1:17:59
1:17:59
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:17:59
Di Security Voices
…
continue reading
It all changed one day while Nand was sitting in traffic on the 101 freeway. Why am I doing this? Nand had experienced no less than 4 successful exits of cyber security companies where he was founder or CEO. He was one of the most accomplished cyber security entrepreneurs in the Silicon Valley. At that moment, Nand decided to leave corporate life a…
…
continue reading
1
Niloo Razi Howe: A Life of Adventure, Purpose & Epic Badassery (Part 2 of 2, Niloo's time in Washington D.C.)
39:19
The 2nd half of our conversation with Niloo focuses on her recent work in Washington DC where she holds several positions and recently (October 22nd, 2019) testified to Congress on the United State’s cyber security readiness. We begin with the topic of retaliation: What’s the proper response to a cyber attack if you want to discourage future aggres…
…
continue reading
There are stories, and then there are “epics”: tales of a journey so full of unexpected twists and excitement that you’re left wondering how all that could happen to a single person. Niloo Razi Howe’s life is such an epic. Whereas most epics feature men with swords, this one focuses on a woman with heels and a hockey stick. While Niloo’s story as a…
…
continue reading