Logo

    #infosec

    Explore " #infosec" with insightful episodes like "Unveiling the Inside Courthouse Break-In with Gary De Mercurio: A Dive into Ethical Hacking and the Overlooked Realm of Physical Security", "Zero Proof with John Kindervag", "Cyber Laws with Brandon Zumwalt" and "BONUS: Cyber Security in Healthcare and Spring NH-ISAC Recap" from podcasts like ""Cybberssecurity Podcast", "BarCode", "Talk Law Radio Podcast" and "The Business of Security"" and more!

    Episodes (4)

    Unveiling the Inside Courthouse Break-In with Gary De Mercurio: A Dive into Ethical Hacking and the Overlooked Realm of Physical Security

    Unveiling the Inside Courthouse Break-In with Gary De Mercurio: A Dive into Ethical Hacking and the Overlooked Realm of Physical Security

    Step into the fascinating world of cybersecurity with our latest podcast featuring Gary De Mercurio, a distinguished penetration tester renowned for his involvement in an classic penetration test courthouse break-in  that sent shockwaves through the industry. In this gripping interview, Gary takes us on a journey around his experience and helps us appreciate all aspects of security including the often-overlooked aspect of physical security.

    Zero Proof with John Kindervag

    Zero Proof with John Kindervag

    Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Zero Trust is one of the most misused “buzzwords” in the industry today. Vendor marketing and other misleading data has unfortunately caused mass confusion about what Zero Trust really is and how to use it properly.

    Former Forrester Research analyst and creator of Zero Trust, John Kindervag, stops in to demystify the term, while explaining how it’s a proven security strategy within enterprise security. Our conversation at the bar includes properly defining the term, the value of adoption, implementation techniques, exemptions, and more!

    SYMLINKS
    LinkedIn
    Twitter
    ON2IT
    Zero Trust (Wikipedia)
    No More Chewy Centers: Introducing The Zero Trust Model Of Information Security (2010)
    Build Security Into Your Network’s DNA: The Zero Trust Network Architecture (2010)
    Biden Executive Order on Improving the Nation’s Cybersecurity
    The US vs PCF Manning case
    The Conrad Hilton Hotel Bar (Dublin)
    The Claridge Hotel Bar (London)
    Driscol Hotel Bar (Austin TX)

    DRINK INSTRUCTION
    PYTHON
    1 1/2 oz White Rum
    1 oz Mint Liqueur
    1 oz Pineapple Juice
    Lemon Lime Soda
    Half Lemon
    Add all ingredients into a cocktail shaker. Shake and strain over glass with ice. Squeeze half of lemon in. Top with Lemon Lime soda.

    CONNECT WITH US
    www.barcodesecurity.com
    Become a Sponsor
    Follow us on LinkedIn
    Tweet us at @BarCodeSecurity
    Email us at info@barcodesecurity.com

    Cyber Laws with Brandon Zumwalt

    Cyber Laws with Brandon Zumwalt

    In the ever expanding cyber world, its easy to forget the different levels of predators stalking your Internet connected devices to take anything or anyone of value. Do you know the cyber security laws in your state and it’s requirements? Brandon Zumwalt has been running SecureTech, formerly Internet Contrasts, with the mission to help businesses better serve their customers through expert IT solutions since 2002. Whether it’s protecting: medical records, your digital financial files, or social media accounts, you don’t want to miss this episode

    Aired 2/15/2020 

     

    See omnystudio.com/listener for privacy information.

    BONUS: Cyber Security in Healthcare and Spring NH-ISAC Recap

    BONUS: Cyber Security in Healthcare and Spring NH-ISAC Recap
    Aaron Pritz of Aaron Pritz & Associates (www.aaronpritz.com) sits down and talks with us about cyber security in healthcare and common threads from the May 2018 Spring Summit of NH-ISAC. This conversation evolves into data breach management, incident response readiness. This discussion goes into managing risk as an ongoing activity to maintain appropriate balance with business and technology.
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io