Logo

    AI and Human Interplay with Rich Owen

    en-usDecember 05, 2023
    What was the main topic of the podcast episode?
    Summarise the key points discussed in the episode?
    Were there any notable quotes or insights from the speakers?
    Which popular books were mentioned in this episode?
    Were there any points particularly controversial or thought-provoking discussed in the episode?
    Were any current events or trending topics addressed in the episode?

    About this Episode

    Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work on the first local area network at the Michigan Control Center and Johnson Space Center, Rich shares intriguing real-life anecdotes that solidify his belief: it's the people, not the technology, that are the linchpin of security.

    In the back half of our chat, Rich delves into the untapped significance of human factors in cybersecurity. He astutely points out that the code we utilize is the product of human creators, complete with their own biases and potentially with a lack of regard for security. He navigates us through the complex maze of code reviews, code reusability, and the inherent risks involved. Rich's profound insights into these involved topics transform this discussion into an eye-opening episode you simply can't afford to skip!

    Josh Bruyning
    Rich Owen

    Recent Episodes from Security Market Watch

    Diving into the Potential of Microsoft's New Storage Innovation

    Diving into the Potential of Microsoft's New Storage Innovation

    Prepare to have your minds blown as we dig into Microsoft's new data storage technology. This is not your ordinary tech update - we're uncovering a game-changing solution that utilizes Quartz Glass and is built to withstand ransomware attacks. Small but mighty, this innovation packs an impressive one terabyte of data into a single square centimeter of quartz glass. It’s not quite on the market yet, but its potential is monumental, especially for safety-critical sectors like healthcare, finance, and research.

    Unveiling SideEploy: Transforming Security Patches and Configurations with Tina Williams-Coroma

    Unveiling SideEploy: Transforming Security Patches and Configurations with Tina Williams-Coroma

    Did you know that 80% of security breaches stem from misconfigured and unpatched systems? That's a staggering statistic in today's digital age. Join us as we welcome back security expert, Tina Williams-Koroma, who offers insights into how CyDeploy aims to alleviate this issue. As she sheds light on the SEC's new rule mandating succinct reporting periods, Tina discusses the reasons why many organizations hesitate to implement necessary changes, often out of fear that a patch or security configuration might disrupt their systems.

    In our chat, Tina further explains how CyDeploy can help organizations overcome this fear. With CyDeploy, you can get a clear understanding of the functional impact even before deploying the patch to production. Not only does it automate the creation of a test environment and script execution, but it also identifies the delta, giving organizations the confidence and motivation they need to act. Additionally, we delve into CyDeploy extensive reporting capabilities, which offer insights into the functional impact, potential failures, and reasons behind them. So no more patching in fear, as Cydeploy is here to guide your swift, focused, and timely adjustments.

    Josh Bruyning
    Tina Williams-Koroma

    Security Market Watch
    en-usDecember 12, 2023

    Rethinking Compliance and Cyber Security with Igor Volovich

    Rethinking Compliance and Cyber Security with Igor Volovich

    Discover the intriguing parallel worlds of cyber security and finance as we navigate through compelling discussions with our distinguished guest, Igor Volovich. Promising to equip you with a nuanced understanding of the convergence of risk and compliance, we catapult into the breach of SolarWinds and the ensuing SEC charges. With Igor's expert insights, we introduce the concept of the "ultimate audit", prompting you to rethink the necessity of a cyber Sybanes Oxley within the current regulations.

    Our journey doesn't stop there. We venture into the realms of evidence-based risk management, championing the need for factual data over subjective opinions to assess security posture. We challenge the traditional compliance models, urging for a shift towards an approach akin to medicine, where evidence is king. The episode culminates in a thought-provoking discourse on the interconnected dynamics of CUMULAS, SolarWinds, convergence, and the SEC, all in the context of Enron. So, are you ready to redefine your understanding of cyber security with Igor Volovich? Tune in.

    What's New in Vulnerability Management with Dr. Nikki Robinson, IBM Lead Security Architect

    What's New in Vulnerability Management with Dr. Nikki Robinson, IBM Lead Security Architect

    Ready for a crash course in cybersecurity? Grab your note-taking tools and join us for a riveting conversation with the esteemed Dr. Nikki Robinson, the trailblazing STSM and lead architect at IBM, and a Cybersecurity Influencer of the Year. Armed with a wealth of knowledge and insights, Dr. Robinson guides us through the labyrinth of vulnerability management, unpacking the latest tools, processes, and strategies that are setting new benchmarks in the security realm.

    Prepare to delve into the nuances of CVSS 4.0, CISA, the known exploited vulnerability catalog, and the exploitability predictability scoring system (EPSS), as Dr. Robinson brilliantly elucidates their vital role in vulnerability scoring and prioritization. She underscores the importance of these tools in aiding organizations streamline their remediation efforts, a pressing challenge many security leaders grapple with today. This enlightening episode promises a clear understanding of the complexities of cybersecurity, helping listeners appreciate the challenges and solutions in today's rapidly evolving digital landscape. So buckle up and let's decode cybersecurity together with Dr. Nikki Robinson.

    AI and Human Interplay with Rich Owen

    AI and Human Interplay with Rich Owen

    Get ready to have your assumptions about cybersecurity turned on their head! Cybersecurity veteran and acclaimed author, Rich Owen, joins us in a riveting conversation exploring the surprising intersection of artificial intelligence (AI) and the human element in cybersecurity. Drawing from his 50 years of experience, including his pioneering work on the first local area network at the Michigan Control Center and Johnson Space Center, Rich shares intriguing real-life anecdotes that solidify his belief: it's the people, not the technology, that are the linchpin of security.

    In the back half of our chat, Rich delves into the untapped significance of human factors in cybersecurity. He astutely points out that the code we utilize is the product of human creators, complete with their own biases and potentially with a lack of regard for security. He navigates us through the complex maze of code reviews, code reusability, and the inherent risks involved. Rich's profound insights into these involved topics transform this discussion into an eye-opening episode you simply can't afford to skip!

    Josh Bruyning
    Rich Owen

    A Deep Dive into the Revolutionary World of EPSS and Security Discussion

    A Deep Dive into the Revolutionary World of EPSS and Security Discussion

    Are you ready to unravel the mysteries of cybersecurity and exploit prediction? We're joined by our esteemed guest, Jay Jacobs. Today's episode promises to be a thrilling ride into the world of data insecurity as we welcome the innovator behind the groundbreaking EPSS (exploit prediction scoring system). This ingenious machine learning model, launched in 2021, predicts the likelihood of a vulnerability being exploited. Not only does it help us zero in on potential threats, but it also offers us the luxury of knowing which ones can be put on the back-burner for patching. With daily updates and a scoring system that ranges from 0 to 1, we'll discuss how this system has become indispensable in the realm of cybersecurity.

    Josh Bruyning LinkedIn
    Jay Jacobs LinkedIn

    Cyber Security, Investment, and DEI dynamics with CISO Charles Payne, Neptune Media

    Cyber Security, Investment, and DEI dynamics with CISO Charles Payne, Neptune Media

    Today's guest, Charles Payne, brings a unique perspective to cybersecurity with his background in finance, his current roles as CISO and CTO at Neptune Media, and his experiences as an angel investor. Charles shines a light on his transition from finance to cybersecurity, unraveling how his technical knowledge has given him a unique perspective on investment opportunities. He also shares strategies to overcome the challenges of selling to different regions and how to build an effective BS meter.

    The conversation gets captivating as Payne emphasizes the importance of building relationships within the cybersecurity industry. He explores the gender dynamics at play, shedding light on how men and women measure success differently, and the disparities women face in the industry. We also discuss the necessity of Diversity, Equality, and Inclusion (DEI) initiatives in closing the gender gap and fostering a supportive sisterhood within the cybersecurity realm.

    As we delve into the ever-evolving cybersecurity landscape, our discussion takes an intriguing turn with the Joe Sullivan case and its potential implications for C-suite executives. We explore the legal responsibilities of corporate executives and the importance of having a proactive approach to cybersecurity. We also discuss the initial steps a new CISO should take to set the stage for success. Join us for this insightful conversation as we uncover the intricacies of cybersecurity and strategic partnerships.

    Navigating the Future of AI and Blockchain with Futurist Jonathan Capriola

    Navigating the Future of AI and Blockchain with Futurist Jonathan Capriola

    Get set for a mind-expanding journey as we navigate the intriguing world of AI and blockchain with our special guest, Jonathan Capriola, the innovative CEO and founder of AI Blockchain Ventures. Jonathan, a best-selling author, successful entrepreneur, and futurist, captivates with his unique perspective on the rapidly evolving world of technology. As we unpack his journey from creating a Lego embedded with a LED that drew attention from significant investors, to using AI to write his bestselling book, you'll find yourself fascinated by the complexity and potential of AI and blockchain.

    We turn our gaze to the future, exploring Elon Musk's ambitious plans for AI-enabled chipsets and robots, Amazon's robot rollout, and the curious AI girlfriend phenomenon. Discussing the intersection of AI and blockchain, you'll find our conversation compelling as we delve into the potential of these technologies in security, privacy, and record-keeping. Jonathan's insights on how AI can help scale blockchain to increase efficiency, and the potential societal impacts of AI, will leave you contemplating the exciting future that lies ahead.

    Finally, we explore how embracing AI and blockchain technologies can revolutionize organizations. Jonathan offers his insights on how AI's automation of mundane tasks can lead to efficiency and growth. We also highlight the critical aspect of cybersecurity, emphasizing the need for investment in security software and effective planning to shield organizations from cyber threats. Through our enlightening conversation, we aim to inspire you to consider the potential of these technologies in your own lives and businesses. Buckle up for this riveting journey into the future of AI and blockchain.

    Security Market Watch
    en-usNovember 01, 2023

    Cybersecurity Education and Online Safety with Dana Mantilia, the Cybersecurity Social Media Queen

    Cybersecurity Education and Online Safety with Dana Mantilia, the Cybersecurity Social Media Queen

    Dubbed the Oprah of Cybersecurity and the Cybersecurity Social Media Queen, Dana Mantilia joins us for an exhilarating journey into the world of cybersecurity. Starting from zero just four years ago, Dana has since built a notable presence on LinkedIn and YouTube with her accessible approach to educating the everyday person about cybersecurity. The episode peels back the layers on the importance of CMMC (Cybersecurity Maturity Model Certification), the pivotal role universities play in educating and certifying future cybersecurity professionals, and how companies stand to benefit from it all.

    We also delve into the nitty-gritty of safe online practices. Do you realize how crucial secure passwords and multi-factor authentication are to your online safety? Cyber threats don’t care if you’re a tech whiz or a tech novice - they strike indiscriminately. As we further underscore the role of a Business Information Security Officer in enlightening the masses, we also shed light on the challenges posed by budget cuts and hiring freezes, emphasizing the need to grow talent from within.

    Social media isn't just for sharing vacation snaps and foodie pics - it's also a frontier for career development in cybersecurity. Dana shares insights into the potentials of LinkedIn for video content creation and how a YouTube account can serve as a resource library for those seeking to carve a path in the cybersecurity field. And as we wrap up the conversation, we explore the murky world of scams, giving you the know-how to protect yourself and your loved ones from being exploited. This episode is more than a warm chat with Dana. It’s a deep dive into a world that affects us all, offering invaluable insights for both the cybersecurity enthusiast and the online safety curious. Tune in!

    Dana Mantilia
    Josh Bruyning
    Maggie Dillon 

    Demystifying Policy Orchestration with Gerry Geble, Strata Identity

    Demystifying Policy Orchestration with Gerry Geble, Strata Identity

    Ready to get your mind blown by the intriguing world of policy orchestration? Gain a whole new perspective as we dissect this cutting-edge concept alongside Gerry Geble from Strata. Gerry introduces us to the fascinating world of identity query language (IDQL) - a revolutionary approach to defining access rules and policies. Come along on this invigorating journey as Gerry details Strata's mission to transform the way we handle multiple cloud systems access.

    The discussion deepens as we unravel how Strata is making strides to simplify identity policy complexities and mitigate risk. Find out how establishing standard access rules and implementing them across different environments can reduce complexity. Hear about the integration of risk metrics into Strata's system and how this serves to bolster security.

    Josh Bruyning
    Maggie Dillon
    Gerry Gebel
    Strata

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io