Mon, 18 June 2012
Synopsis Greetings fans, this episode promises to be a great one with the likes of Adam Shostack starting off talking about what the whole concept of "New School Security" is all about, and how it differs from the way we've all done it for the past 15+ years. Adam and I talked through some new interesting ideas for moving the information security community and discipline forward, and even commented on how we can start to overcome the security community's focus on 'secrecy' when things go wrong. How do security professionals understand what the desired outcomes should be, then start to move towards implemting pragmatic approaches to move closer to those desired outcomes - because in the end it's really about business and getting it done, not about 'security'. You will be sorry if you miss this episode! Guest
Links
Direct download: Episode_17_-_Adam_Shostack_on_New_School_Security.mp3
Category:Information Security -- posted at: 12:36pm CST |
Thu, 14 June 2012
Synopsis Last winter, on a frigid afternoon I got a chance to sit down with 2 of my favorite Iowa locals, Kevin and Kenneth to talk about the tenuous relationship between QA and Information Security. Earlier in the day I had given a workshop on software security testing (of the web variety) to a ViViT user group, and with that topic and their questions/concerns fresh in my mind I settled down for a 30 minute conversation with Kevin and Kenneth ... we essentially continued the conversation from Episode 3 (please give that a listen if you haven't yet to get a background). Some of the questions we tackled included "Which team within the software development or security organization is best positioned to test the security of applications?", and "Can Information Security ever really thoroughly test an application without the full context?" ...and much more. Give this episode a listen! Guests
Direct download: MicroCast_04_-_Kevin_Riggins__Kenneth_Johnson_-_QA__Security_Software_Testing.mp3
Category:Information Security -- posted at: 3:02pm CST |
Mon, 4 June 2012
Greetings friends! I am taking some time to do something a little out of the ordinary right now... I'm coming to you from beautiful Las Vegas, Nevada and HP Discover 2012 where the theme is Make it matter. Rather than doing yet another blog post on how beautiful the show floor is, and how amazing the content is going to be, I've recorded a little bit of audio, about 6:30 miutes or so to give you a feel for what we're up to, what's going on, and why I'm downright giddy with excitement.
Direct download: Welcome_to_HP_Discover_Las_Vegas_2012.mp3
Category:Information Security -- posted at: 5:50pm CST |
Tue, 29 May 2012
Synopsis This episode of Down the Rabbithole microcast (~15 minutes length) was recorded live at the Ohio Information Security Summit. Albert and Paul were kind enough to sit down with me and discuss metrics and process - and essentially what demonstrating "good security" means to an enterprise. "Can we ever get there?" Where is there? Understanding the basics of security, measurement, and whether if we really do a great job, Information Security can work itself out of a job ... those are some heavy topics for a mini-podcast. Enjoy! Feedback is always welcome Guests
Direct download: Down_the_Rabbithole_-_MicroCast_3_-_Paul_Elwell__Albert_School_-_Measuring_Security.mp3
Category:Information Security -- posted at: 10:00am CST |
Fri, 25 May 2012
Synopsis In this episode, streamed live and recorded for your listening pleasure, I'm joined by @SpaceRog and @Shpantzer from Security BSides Delaware. What started out as an off-the-cuff discussion on the 'Cyber Apocalypse' quickly materialized into a much longer discussionw which dove into various aspects of infrastructure security, critical protection and even the inability to separate the physical from the cyber worlds. Join us for a little bit of nostalgia, a little bit of knowledge and a lot of commentary from these two very smart staples of the security community. This is one of those conversations which I barely edited... it was free-flowing, entertaining and insightful. I hope you enjoy it! Guests
Direct download: Down_the_Rabbithole_-_Episode_16_-_Spacerog_and_Shpantzer_talk_CyberPocalypse.mp3
Category:Information Security -- posted at: 11:27am CST |
Tue, 8 May 2012
Synopsis It's rare that I get to be a spectator at a podcast, but in this case I was listening to some of the conversations and talks being given at Chicago's very own THOTCON 0x3, and decided it would be valueable to you to get some of the conversation movers on the microphone. We started talking about the applicability of information security conferences to your "day job", got into a discussion on "hallway con" and then went down the rabbithole on some interesting tangential topics ... and of course the fresh rap from DualCore was awesome. I hope you enjoy the episode ... Guests
Direct download: Down_the_Rabbithole_-_Episode_15_-_Backstage_at_THOTCON_0x3.mp3
Category:Information Security -- posted at: 1:04am CST |
Fri, 27 April 2012
Synopsis In this short microcast we rap about the THOTCON 0x3 experience, why we think the Chicago community has taken off so much, and what sorts of interesting things make THOTCON, and the local hacker con here in Chicago, so attractive to people from around the world. Yes, there is comedy involved... Guests
Direct download: Down_the_Rabbithole_-_Microcast_-_THOTCON_0x3_1.mp3
Category:Information Security -- posted at: 4:23pm CST |
Tue, 24 April 2012
Synopsis This episode I sit down with Dave Frederickon who has a unique viewpoint on cloud computing from a Canadian point of view, as well as a VP of the HP Canada business. I pose some tough questions to Dave including "Is 'cloud' just marketing hype?" and other discussion topics and we have a good chat on the reality of cloud computing, who's adopting it and how it's changing and revolutionizing Information Technology at the pace of business. This is another great podcast in the cloud series, and you should not miss it! Guest
Direct download: Down_the_Rabbithole_Podcast_-_Episode_14_-_Dave_Frederickson_on_Cloud_Reality.mp3
Category:Information Security -- posted at: 12:32pm CST |
Mon, 2 April 2012
Synopsis On this episode of Down the Rabbithole I get the distinct pleasure of sitting down with one of Silicon Valley's top attorneys to talk Cloud Computing T's and C's ...and let me tell you this was a wild ride. I learned a lot, including the fact that I know a famous legal court case about a tugboat captain and the use of radar ... and what all that CAPSLOCK PRINT ON SOFTWARE LICENSE AGREEMENTS means ...and so very much more. Join me, and learn a little bit more about the legal aspects of cloud, before you find out the hard way. This is a do not miss episode. Guest Mark Radcliffe [DLA Piper] - Mark F. Radcliffe concentrates in strategic intellectual property advice, private financing, corporate partnering, software licensing, Internet licensing and copyright and trademark. More on Mark on his profile page: http://www.dlapiper.com/mark_radcliffe/
Direct download: Episode_13_-_Mark_Radcliffe_-_The_Ts_and_Cs_of_Cloud_Security.mp3
Category:Information Security -- posted at: 12:00am CST |
Wed, 21 March 2012
Summary This 1 hour podcast was recorded live at the March 7th, Chicago Cloud Security Alliance chapter meeting, where we were fortunate enough to have a panel of attorneys discuss the issues with cloud security from a legal perspective. I hope you find the content stimulating, if not a little bit worrisome. Apologies for some of the flaws in the audio, but this was an ad-hoc recording and I didn't have time to clean up the taps and paper shuffling that the super-sensitive microphone picked up. This was the first recording using the mobile Zoom H4n, and I think you'll agree it's an amazing piece of tech. This podcast is posted as-is, and hosting is provided courtesy of HP.
Direct download: CSA_Chicago_Chapter_-_Legal_Panel_03-07-2012.mp3
Category:Information Security -- posted at: 1:16am CST |
Mon, 5 March 2012
Synopsis The guest on this podcast will blow your mind ... literally. He is none other than the "human hacker" himself, Christopher Hadnagy, who has written a book and now runs social-engineer.org. Chris is a long-time friend of mine and an invaluable resource in the psy-ops James Bond style social engineering world. Chris knows his stuff, and he's willing to teach you if you're willing to listen... so buckle down and get educated on social engineering background, tricks and even the 6 things your company must do to prevent being a victim of social engineering attacks. Oh ... and let's not forget, somewhere in this episode Chris makes you an offer you can't refuse, just for you Down the Rabbithole listeners, how cool is that? If you've ever thought about taking a class, or having your organization fortified against social engineering attacks but didn't think it was within your budget - listen to this podcast ... Guest Christopher Hadnagy - Chris, or as his friends on Twitter know him - @HumanHacker - is a fountain of knowledge on social engineering and the art and science behind corporate-level offense and defense using the human mind. Chris has written a book called Social Engineering: The art of human hacking, and runs social-engineer.org contributing to community through teaching, speaking and writing as well as hosting a heck of a podcast on the fascinating topic of social engineering. Chris's organization offers SE penetration testing, education and is at the forefront of social engineering tactics for the defensive good. Links
Direct download: Down_the_Rabbithole_-_Episode_12_-_Chris_Hadnagy_-_Hacking_the_Human_mind.mp3
Category:Information Security -- posted at: 12:52pm CST |
Wed, 29 February 2012
Synopsis I had the pleasure of sitting down with Nathaniel Dean, someone I had met through a mutual colleague's introduction, and hear about a neat concept that takes the software security program to a new level. Interestingly enough, Nathaniel runs a red team but it's guaranteed to be unlike any red team you've probably ever worked with. The crazy thing? It's working. We talk through the mechanics, psychology, and business implications of what he's driving, and how he's rollig up his sleeves and getting it done which is probably more important than anything else. Jack in and get a 25-minute does of knowledge from someone I know you'll learn something from. Guest
Direct download: Episode_11_-_Nathaniel_Dean_-_Software_Security_Remediation_Red_Teaming.mp3
Category:Information Security -- posted at: 8:16pm CST |
Fri, 10 February 2012
Synopsis We were "live to tape" (as Adam says) from HP's Master the Cloud event in Calgary. As we wrap up the road tour in the frozen city of Calgary I had the pleasure of sitting down with a comedian and celebrity, a technical expert on virtualization from HP, and the manager of Intel's advanced server technologies team. This was a wild, off-the-rails discussion and you can really tell we were just having a good time and excited to wrap up the tour. Great topics of discussion... Topics covered in this episode include...
Special Guests
Links
Direct download: Master_the_Cloud_-_Live_from_Calgary_w_Jake_Smith_Adam_Growe.mp3
Category:Information Security -- posted at: 7:56pm CST |
Mon, 6 February 2012
Synopsis World-renowned author, researcher, speaker and founder of legendary TripWire joins me semi-live from LASCON in Austin, Texas to talk about his current project(s) [The DevOps Cookbook, and When IT Fails: A Novel], and his book Visible Ops and how this can all be applied to security in today's tough business climate. Gene and I discuss what in the DNA of well-performing (or "agile") IT organizations, based on Gene's research and experience, enables them to not only perform better, but also serve the business faster. These high-performing organizations all have things in common, and you may be shocked to hear it's not heaps of money, or resources, or "powerful" CISOs. The experience was a pleasure and I guarantee you'll learn something from this podcast, and I highly encourage you to add Gene's books as a staple of your career-building library. Guest
Links
Direct download: Down_the_Rabbithole_-_Episode_10_-_The_real_Gene_Kim_on_DevOps_KPIs_and_high_performance_IT.mp3
Category:Information Security -- posted at: 12:00am CST |
Tue, 31 January 2012
Synopsis I sat down at the HP Master the Cloud (hp.com/go/cloud) event in Toronto, Canada to answer some Twitter-based questions, talk about the trade show, and listen to some of the fantastic things Victor and his team are working on right now in their incubator ... and it was a really great 20 minutes. We covered the questions below (posted directly from Twitter, special thanks to all who participated) and talked about technology, the evolution of security, and how organizations can take advantage of this shift as technology turns the corner in a new operating and delivery paradigm. Is cloud right for everyone? Probably not. Is cloud right in every situation? Probably not. This is exactly why you need to listen to Victor ... this is definitely a worthwhile way to spend 20 minutes of your time. Questions from Twitter
Guest
Links
Direct download: Master_the_Cloud_-_Toronto-_Victor_Garcia_CTO_HP_Canada.mp3
Category:Information Security -- posted at: 3:10pm CST |
