Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Episode 231 - Identity is the new perimeter - interview with CyberArk
CyberArk has released the industry’s first AI-powered cloud security service with a privilege-first approach to reducing excessive permissions.
This interview with Thomas Fikentscher, Regional Director ANZ of CyberArk delves into the privilege first-approach and how identity is the new perimeter.
Recorded for MySec.TV, 27 November 2020
#CyberArk (https://www.youtube.com/results?search_query=%23CyberArk) #PAM (https://www.youtube.com/results?search_query=%23PAM) #IdentitySecurity (https://www.youtube.com/results?search_query=%23IdentitySecurity) #cybersecurity (https://www.youtube.com/results?search_query=%23cybersecurity) #privilagedaccessmanagement (https://www.youtube.com/results?search_query=%23privilagedaccessmanagement) #IAM (https://www.youtube.com/results?search_query=%23IAM) #identityaccessmanagement (https://www.youtube.com/results?search_query=%23identityaccessmanagement)
Episode 230 - Data Centre & PC market trends - Exclusive Lenovo interview via the Canalys Channel Forum APEC 2020
Interview with Sumir Bhatia, President of Lenovo DCG APAC, and Daniel Fields, Executive Director of APAC Services Business at Lenovo PCSD - insights into the Lenovo response to COVID-19 and business of data centres and PCs.
In September Lenovo Data Center Group (DCG) announced a range of new and updated hyperconverged infrastructure (HCI) solutions and Lenovo Cloud Services. The open platform of hyperconverged infrastructure solutions are in partnership with Nutanix, Microsoft and VMWare and expands software-defined systems management capabilities with Lenovo XClarity.
Hyperconverged infrastructure solutions are uniquely suited to provide virtual desktop infrastructure (VDI), supporting the need for people to work remotely across many industries such as education and healthcare.
Recorded between Sydney and Singapore, 26 November 2020.
Previous episodes with Lenovo from Canalys APAC Summit
Episode 182 - Lenovo 3S Strategy - Smart IoT, Smart Infrastructure & Smart Verticals - Takeaway from Canalys Channels Forum 2019, Taipei (https://blubrry.com/mysecurity/52783130/episode-182-lenovo-3s-strategy-smart-iot-smart-infrastructure-smart-verticals-takeaway-from-canalys-channels-forum-2019-taipei/)
Episode 134 - Navigating an age of devices and disruption - Insights with Lenovo in Australia and the Asia Pacific (https://blubrry.com/mysecurity/41072456/episode-134-navigating-an-age-of-devices-and-disruption-insights-with-lenovo-in-australia-and-the-asia-pacific/)
Episode 229 - Physical and cyber threat intelligence sharing in the Healthcare sector
As Chief Security Officer, Errol Weiss is responsible for the strategic vision and direction of the H-ISAC’s day-to-day Cyber and Physical Security Services offered to H-ISAC member organizations, including the delivery of Cyber and Physical Threat Intelligence, the H-ISAC Security Operations Center (SOC), Identity services, community exercises and other special interest services.
Weiss previously worked at Bank of America (BofA) where he was a Global Information Security executive working with internal partners to protect information, customers and staff by reducing the impact from cyber threats. Before BofA, Weiss worked for 10 years at Citigroup, where he created and ran the bank’s first Cyber Intelligence Center, a global team providing actionable intelligence to internal staff.
Weiss began his career at NSA conducting vulnerability analyses and penetrations of US Government systems and then spent ten years with consulting firms delivering information security services for Fortune 500 companies. Weiss was instrumental for the creation, implementation and operation of the Financial Services ISAC and is one of the four named inventors on the patent for Trusted and Anonymous Information Sharing.
Weiss has been involved with the ISAC concept from its foundation – first as part of the team that created the Financial Services ISAC in 1999 and then as a Board member where he also served as Treasurer and Vice Chair. Weiss has been an active user of ISAC services and served on the FS-ISAC Board of Directors for six years and Threat Intelligence Committee for ten years.
He’s been invited to speak internationally and has provided expert testimony before Congress to advocate for change and help influence information sharing legislation.
Interview by Jane Lo, Singapore Correspondent. Recorded between Singapore and Florida, 17/16 (SGT/US) November, 2020.
Episode 228 - MySecTV Takeaway - Interview and book review with Geoff Raby, former Australian Ambassador to China
China’s Grand Strategy and Australia’s Future in the New Global Order - Book review with Geoff Raby
Special interview, recorded 12 November, 2020 with Geoff Raby, author of a new book – ‘China’s Grand Strategy and Australia’s Future in the New Global Order’ Geoff Raby was Australia’s ambassador to China (2007–11); ambassador to APEC (2003–5); and ambassador to the World Trade Organization (1998–2001). He was awarded the Order of Australia in 2019 for services to Australia–China relations and to international trade.
This interview reviews Geoff’s work and the new emerging world order of competition and disruption, particularly in the APAC region with consideration to the impacts on Australia, ASEAN and US-China relations.
Copies of the book for purchase are available via: https://www.mup.com.au/books/chinas-g... (https://www.youtube.com/redirect?v=eTrCpJn-8eo&event=video_description&q=https%3A%2F%2Fwww.mup.com.au%2Fbooks%2Fchinas-grand-strategy-and-australias-future-in-the-new-global-order-paperback-softback&redir_token=QUFFLUhqa213SXo3N2hxVDh3WERsYzJ4N285RGZ1QzItQXxBQ3Jtc0ttR1RXWmZnSmVhVjQ2S0hkV3hoNHQwSm5rNG1CRlZsVmhlMkpwbHVubDJVV01wcERzOWZWRkVqZEEtVkNuNzFXcEtwaTBMeDQ3YWQwVGNKN3c2Y3JSU2oxOVNoTm1lTXBpd0JHcFo0ODhSSXB1cGlLSQ%3D%3D)
For further viewing on MySecurityTV – Aerospace, Defence & Security Technology Market Trends 2020 – India’s Reach Series (Episodes 1 – 8); Indo-Pacific Series (Episodes 1 – 10) – visit www.MySec.TV (https://mysecuritymarketplace.com/av-channel/my-security-tv/)
Episode 227 - MySecTV Takeaway - The new normal in the InfoWars - Russia & Iran take on the US Election
Introducing a takeaway interview from Episode 1 - MySecurityTV Tech & Sec Weekly Series - Aerospace, Defence & Security Technology Market Trends - Watch now...
Russian State-Sponsored APT Actor Compromises U.S. Government Targets: Interview with Professor Matthew Warren, Director of RMIT University Centre for Cyber Security Research and Innovation.
“Since at least September 2020, a Russian state-sponsored APT actor—known variously as Berserk Bear, Energetic Bear, TeamSpy, Dragonfly, Havex, Crouching Yeti, and Koala in open-source reporting — has conducted a campaign against a wide variety of U.S. targets.” National Cyber Awareness System Alert (AA20-296A) - Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets: October 22, 2020
Just two weeks out from the US federal election, the CISA-FBI jointly warned (AA20-296A/B) that “Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the U.S. electoral process.
The APT actors are creating fictitious media sites and spoofing legitimate media sites to spread obtained U.S. voter-registration data, anti-American propaganda, and misinformation about voter suppression, voter fraud, and ballot fraud.
The APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, structured query language (SQL) injections attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.
The Russian state-sponsored APT actor has targeted dozens of SLTT government and aviation networks, attempted intrusions at several SLTT organizations, successfully compromised network infrastructure, and as of October 1, 2020, exfiltrated data from at least two victim servers.”
Alongside this latest allegation Russia and Iran are again sponsoring attacks against US democracy and government information system infrastructure, the United States is also facing a third wave of COVID-19, reaching over 80,000 daily cases (25 Oct) and with some forecasts calculating that over 500,000 Americans will die from the pandemic by the end of February 2021. How the US responds to these issues, and a myriad of other significant domestic and international challenges is up to voters and the ultimate outcome to the election.
Link to the Cyber Risk Leaders Magazine, Issue 3 (https://mysecuritymarketplace.com/books/cyber-risk-leaders-magazine-issue-3-2020/)
Link to the MySecurityTV Series (https://mysecuritymarketplace.com/av-channel/my-security-tv/)
Recorded 27 October 2020 - #MySecurityTV
Episode 226 - Faking a Factory: Creating and Operating a Realistic Honeypot - BlackHat Asia 2020 takeaway
Jane Lo, Singapore Correspondent for MySecurity Media speaks with Charles Perine, a Senior Threat Researcher for Trend Micro.
In this podcast, Charles provides insights into his joint work with Stephen Hilt, Federico Maggi, Lord Remorin, Martin Rösler, Rainer Vosseler on conceptualising and running a manufacturing facility honey pot. To determine how knowledgeable and imaginative attackers could be in compromising a manufacturing facility, they built an ideal environment to monitor and learn about the attackers attracted to the honeypot. He discussed the attacks observed, which included a malicious cryptocurrency mining campaign, two ransomware attacks, another that posed as a ransomware attack, and several scanners.
Charles has 15 years of experience in computer and network security. Much of his focus during that time has been dedicated to ICS security, including research projects at Sandia National Laboratories (OPSAID) and Digital Bond (Portaledge), and work on securing ICS environments for customers while working for Revolutionary Security and Lockheed Martin. Previously, he had also tested internal products and helped create the Product Security Incident Response Team (PSIRT) process while working for General Electric. Charles enjoys breaking hardware and software.
He had also presented on other TrendMicro research “Lost in Translation: When Industrial Protocol Translation Goes Wrong”, at CRITIS: Critical Information Infrastructures Security 2020.
Recorded in association with MySecurity Media as media partners to BlackHat Asia 2020, 29 Sept - 2 October 2020.