Episodes
Business Email Compromise is rampant, with annual losses in the billions of dollars. Every type of organization is at risk. We discuss key things your org and users should know about BEC, plus the most effective way to respond and recover some of the losses. Our guests are with the U.S. Secret Service: Stephen Dougherty, Financial Fraud Investigator, and Michael Johns, Asst. Special Agent in Charge. New Trend Micro report, "Void Balaur: Tracking a Cybermercenary's Activities":...
Published 12/07/21
Published 12/07/21
What is a cyber mercenary group and who are they attacking through cyberspace? In this episode, Feike Hacquebord, Sr. Threat Researcher at Trend Micro, reveals extensive details of a cyber mercenary group he calls Void Balaur and has been tracking for more than a year. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner. Check out their report, "Void Balaur: Tracking a Cybermercenary's Activities": https://bit.ly/TM_mercenary
Published 11/17/21
This discussion on the cybersecurity talent pipeline problem is unlike any other you have heard before. And you and your organization could play a part in growing the future of the cybersecurity workforce. We're talking with the founders of the Last Mile Education Fund: Rian Walker, Sarah Lee, and Ruthe Farmer. www.lastmile-ed.org Thank you to Trend Micro, our premier podcast partner. Download their 2021-1H Linux threat report: https://bit.ly/TM_Linux
Published 11/04/21
Can brain hacks and cybersecurity habits improve the security posture at your company? CISO George Finney of SMU believes so and he makes his case. And here's a big idea: InfoSec doesn't slow down digital transformation, it speeds it up. Gigamon CTO Shehzad Merchant explains how and looks at Big Data and its underpinning technologies. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner. Download their 2021 Linux Threat Report:...
Published 10/27/21
Andrew Jarrett is Applied Cybersecurity Program Manager at the Cyber Readiness Center and Texas A&M Engineering Extension Service. He's been a wildland firefighter for 10+ years and believes Emergency Response frameworks that save lives can apply to IT security and incident response to help protect orgs and make InfoSec better. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner. Download their free "Linux Threat Report 2021":...
Published 10/22/21
Ed Cabrera is the former CISO of the U.S. Secret Service and current Chief Cybersecurity Officer at Trend Micro. He believes we are at an inflection point in cybersecurity and is cautiously optimistic. During this conversation with SecureWorld, Cabrera also discusses ransomware, cryptocurrency, threat intelligence, cyber insurance, and more. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner. RESOURCE:...
Published 10/13/21
Three Chief Information Security Officers play a game show around modern cyber resilience. What is cyber resiliency and how do you align it with business objectives? Contestants include Ricardo Lafosse, CISO, The Kraft Heinz Company; Michael Boucher, Americas CISO, JLL; and Glenn Kapetansky, CSO, Trexin Group. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner and providing new research for this episode: https://bit.ly/TN_2021_Midyear
Published 10/07/21
Our guest on this episode is Jeremy C. Sheridan, Assistant Director, Office of Investigations, at the United States Secret Service. We discuss the evolution of ransomware in cybercrime, including: advances in technology, cyber insurance, the cryptocurrency challenge, the sophistication of ransomware actors, and much more. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner and providing new research for this episode....
Published 09/28/21
Princeton University implemented a multi-year program to create a culture of cybersecurity throughout campus. CISO David Sherry and InfoSec Awareness Manager Tara Schaufler share ideas, inspiration, and lessons learned—including risk reduction, implementing new technologies, broadening security knowledge, and strengthening partnerships. Thank you to premier podcast partner Trend Micro, a global leader in cloud and XDR security, for providing new research for this episode:...
Published 09/09/21
What can organizations, the U.S. government, and everyday citizens do to stop the surge of cyber threats hitting us from overseas? Col. Cedric Leighton, CNN analyst and former Air Force cyber leader, explains the threats and motives of America's top nation-state enemies, and how we're thinking of the ransomware problem in the wrong way. Thank you to Trend Micro, a global leader in cloud and XDR security, for being our premier podcast partner and providing new research on Earth Baku:...
Published 09/01/21
Are CISOs getting sued? Yes. Investors filed a lawsuit that specifically names the CISO of SolarWinds as a defendant. Is this the beginning of a trend to sue the CISO after a cyber incident? We hear from experts Rebecca Rakoski of XPAN Law Partners and CISO Glenn Kapetansky of Trexin and University of Chicago Medical School. Thank you to our premier podcast sponsor Trend Micro for providing new research analyzing millions of Linux security events. "Linux Threat Report 2021 1H":...
Published 08/24/21
In this true cybercrime episode, we uncover the case of an insider threat scheme at an AT&T Wireless Call Center. Court documents reveal how rogue employees collected approximately $1 million in bribes. Plus, Dr. Larry Ponemon discusses the Insider Threat risk, and John Grimm discusses Insider Threat best practices. RESOURCE: Trend Micro report, "Risks in Telecommunications IT" https://www.trendmicro.com/en_us/research/21/g/risks-in-telecommunications-IT.html
Published 08/10/21
We interview Myra Rosario-Fuentes, Senior Threat Researcher at Trend Micro, who just completed an in-depth, two-year research project on Dark Web markets, especially those selling cybersecurity exploits to hackers. How much is a Zero Day vulnerability worth on the Dark Web? How did COVID-19 impact cybercriminals? What's the latest on ransomware operators and affiliate programs? New Report, "The Rise and Fall of the N-day Exploit Market in Cybercriminal Underground": https://bit.ly/TM_Nday
Published 08/03/21
In this true cybercrime podcast episode, we interview Alexander Urbelis, cyber attorney and threat intelligence expert, who uncovered a cyberattack against the World Health Organization at the start of the coronavirus pandemic. RESOURCE LINKS: •  Trend Micro phishing and ransomware white paper: https://resources.trendmicro.com/rs/945-CXD-062/images/Reduce-Phishing-Ransomware_Trend-Micro.pdf •  SecureWorld conferences: https://www.secureworldexpo.com/events
Published 07/20/21
In this true cybercrime episode, we interview Cam, who was arrested for hacking when he was 14 years old. One of his focused cyberattacks was against SeaWorld San Diego. Now, he works as a cybersecurity professional. How did he get into cybercrime and then into a role defending against it? It all started with gaming. RESOURCES: •  Trend Micro's Close the Gap program: https://www.trendmicro.com/closethegap •  SecureWorld conferences: https://www.secureworldexpo.com/events
Published 07/13/21
How can we scale up the development of our collective cybersecurity talent pipeline, and what role can you play in this? How can your organization help develop talent? How can your alma mater or current university play a part in this? Hear about a model for this kind of work underway through partnerships at NYU Tandon School of Engineering. RESOURCE LINKS: • Trend Micro special supported SCORE program: https://www.score.org/technology-resources • NYU Tandon Cybersecurity Program:...
Published 06/29/21
State cybersecurity leaders discuss key topics: •  coming year priorities •  the ransomware surge and preparing for security incidents •  their org's security culture and training to deal with issues •  innovative, special projects ahead With Vinod Brahmapuram, CISO, State of Washington; Deborah Blyth, CISO, Colorado; Maria Thompson, former Chief Risk Officer, North Carolina; and moderator Dan Lohrmann, former CSO, Michigan. RESOURCE: Trend Micro CISO Resource Center portal: https://bi
Published 06/22/21
Nancy Rainosek is the CISO for the State of Texas. She knows all about ransomware incident response. Her team played a key role in remediation after a coordinated ransomware attack hit 22 state agencies in a single day. 1. What was that ransomware day like for Rainosek and her team? 2. Was there a common vulnerability among the attack victims? 3. What did Texas learn from the incident that can help your organization now? RESOURCE: Trend Micro special report on ransomware:...
Published 06/15/21
Josh Jackson is Founder and Executive Director of the AI Association, which advocates for the furtherance of artificial intelligence and automation in the U.S. In this wide-ranging discussion about AI, Jackson unpacks the following: • How should we define AI? • Where is the intersection of cybersecurity and AI? • What does the AI arms race look like, and what about AI ethics? • What if your organization does not have an AI strategy? RESOURCE: Trend Micro report on ICS Security: http://bit.l
Published 05/25/21
Shawn Tuma is a nationally known "breach quarterback" or "incident response coach" who walks victimized companies through the fallout of a ransomware attack. In this episode, he discusses: 1. The stages of a ransomware incident 2. Would making ransom payments illegal disrupt this cybercrime epidemic? 3. Is the Colonial Pipeline cyberattack a watershed moment for security? RESOURCE: Trend Micro report, "What We Know About the DarkSide Ransomware and the US Pipeline Attack":...
Published 05/18/21
Join a CISO panel of Britney Hommertzheim, Kevin Hardcastle, and Cindi Carter for a fast-moving discussion on these topics: 1. State of cybersecurity: what can we understand from the rise of security and the CISO? 2. What does the business need more of from security teams and security leaders? 3. Are InfoSec job postings way out of line with reality? 4. What is something you've learned from a mentor or experience? RESOURCE: MITRE Engenuity ATT&CK Evaluations by Trend Micro:...
Published 05/11/21
2020 was a "blender" year, as data privacy and cybersecurity seemingly took a backseat to the other major, pressing health and social issues. Now as we emerge from that, we must refocus on the new threat landscape; new privacy and security laws impacting data collection; and best practices for addressing these evolving issues. Join Rebecca Rakoski of XPAN Law Partners and Glenn Kapetansky, CSO at Trexin Group, as they discuss. Trend Micro resource, Patch Management and Beyond:...
Published 05/04/21
Are you "stuck" somewhere along your cybersecurity career path? Are you planning to pursue your InfoSec career goals "someday" down the road? Belinda Enoma has a cybersecurity and privacy background, and she's a Certified Information Privacy Professional in the U.S. She is also a career advice expert and the Founder of Activate & Implement LLC. In this episode, Belinda shares strategies for overcoming career obstacles. RESOURCE: Patch management best practices from Trend Micro:...
Published 04/27/21
In this episode, Michael Meyer, Chief Risk Officer and Chief Innovation Officer at MRS BPO, exposes three crucial myths around IAM in cloud, especially a multi-cloud environment. Are you believing the myths that stand in the way of properly implementing IAM (Identity and Access Management) in your cloud environments? Also, today's Trend Micro Top 3 is built around the Trend Micro Cloud One platform....
Published 04/20/21