100 episodes

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Exploring Information Security - Exploring Information Security Timothy De Block

    • Technology

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

    What is FAIR (Factor Analysis of Information Risk)?

    What is FAIR (Factor Analysis of Information Risk)?

    Summary:

    In this insightful episode, Timothy De Block sits down with Jack Jones, the creator of the Factor Analysis of Information Risk (FAIR) model. Jack shares his journey and the challenges he faced that led to the creation of FAIR, a groundbreaking framework for understanding and quantifying information risk.

    Episode Highlights:

    Introduction to FAIR:

    FAIR stands for Factor Analysis of Information Risk.

    It is a logical decomposition of the factors that drive how much loss exposure a scenario represents.

    Jack's Catalyst for Creating FAIR:

    The need for a quantifiable measurement of risk during his tenure as a CISO at Nationwide Insurance.

    The pivotal moment when an executive asked him to quantify the organization's risk exposure.

    Understanding Quantitative vs. Qualitative Risk:

    Quantitative risk involves using units of measurement like percentages and dollar amounts.

    Qualitative risk is ordinal and involves categories like high, medium, and low without precise measurement units.

    Applying FAIR in Organizations:

    The process of using FAIR starts with understanding the decision you need to support, scoping the scenario, identifying assets, threats, and controls, and using ranges to estimate frequency and impact.

    FAIR helps in prioritizing risks and determining the ROI on security investments.

    Challenges and Solutions in Using FAIR:

    Common challenges include the perception that perfect data is needed, the skills gap, and the complexity of scaling quantitative analysis.

    Leveraging community resources, training, and new automated solutions from vendors can help overcome these challenges.

    Resources and Training:

    The FAIR Institute offers free membership and extensive resources.

    The Open Group provides professional certification and training materials.

    The book "Measuring and Managing Information Risk: A FAIR Approach" is a recommended read.

    Key Quotes:

    "FAIR is about critically thinking about risk. The quantitative measurement is a bonus, but it's really a framework for thinking more clearly about the scenarios we need to manage against." - Jack Jones

    "Protecting applications from session hijacking involves understanding the application's handling of temporary credentials and implementing robust security measures." - Jack Jones

    • 47 min
    What is the Innocent Lives Foundation (ILF)

    What is the Innocent Lives Foundation (ILF)

    Summary:

    In this episode of Exploring Information Security, Chris Hadnagy and Shane McCombs join the podcast to discuss the Innocent Lives Foundation (ILF). They delve into the challenges of running a nonprofit focused on identifying and reporting online predators, the importance of volunteer mental health, and their personal experiences and motivations behind ILF.

    Episode Highlights:

    Challenges of Running ILF: Chris and Shane discuss the operational complexities and the importance of back-end work, including finances and CPA dealings.

    Volunteer Involvement and Mental Health: Emphasis on mandatory wellness sessions for volunteers to ensure their mental well-being while dealing with disturbing content.

    Personal Journeys and ILF’s Growth: Chris shares his unexpected journey from founding ILF to growing it with 40 volunteers and collaborating with the FBI.

    Board Member Contributions: Stories about diverse board members, including actors and professionals from various fields contributing to ILF’s mission.

    Prevention and Education Efforts: Shane highlights ILF's focus on preventing exploitation through education and engaging with parents and schools.

    Quotes:

    "Your children need to see you as their advocate, not their adversary." - On the importance of parental support in preventing exploitation.

    Resources:

    Visit Innocent Lives Foundation to get involved or donate.

    Sign up for the 2nd Annual Ending Child Exploitation Gala in Los Angeles, CA, September 21, 2024.

    • 45 min
    What is Session Hijacking?

    What is Session Hijacking?

    Summary:

    In this informative episode, Timothy De Block discusses session hijacking with Web Application Security Engineer and PractiSec Founder Tim Tomes. The discussion delves into the intricacies of session hijacking, exploring its mechanics, vulnerabilities, and prevention strategies.

    Tim’s website: https://www.lanmaster53.com/

    You can reach out to Tim for Training, Consulting, Coaching, Remediation Support, and DevSecOps.

    Episode Highlights:

    Understanding Session Hijacking:

    Tim Tomes clarifies the common misconceptions about session hijacking, emphasizing its relation to temporary credentials rather than sessions alone.

    The conversation covers the technical aspects, including how sessions and tokens are hijacked, and the role of cookies in managing temporary credentials.

    Technical Mechanisms and Vulnerabilities:

    Detailed explanation of how session hijacking occurs, focusing on temporary credential management and the vulnerabilities that allow hijackers to exploit these credentials.

    Prevention and Security Best Practices:

    Strategies to prevent session hijacking, such as secure management of tokens and sessions, are discussed.

    Importance of using flags like HTTPOnly and Secure to protect data transmitted in cookies.

    Common Tools and Exploitation Techniques:

    Tim Tomes discusses common tools like Burp Suite and its Collaborator tool for detecting and exploiting session hijacking vulnerabilities.

    Real-world Application and Examples:

    Practical insights into how session hijacking is executed in the real world, including Tim’s personal experiences and how these vulnerabilities are identified during security assessments.

    Key Quotes:

    "Session hijacking is not just about stealing sessions; it's about exploiting the temporary credentials that represent a user." - Tim Tomes

    "Protecting applications from session hijacking involves understanding the application's handling of temporary credentials and implementing robust security measures." - Tim Tomes

    Recommended Resources:

    OWASP Guide on Session Management

    Web Security Academy by PortSwigger

    • 43 min
    How to Get Into Control Systems Security

    How to Get Into Control Systems Security

    In this episode, Mike Holcomb discusses the intricacies of Industrial Control Systems (ICS) and Operational Technology (OT) security. Michael provides a comprehensive overview of the challenges and strategies associated with securing ICS and OT environments.

    Episode Highlights:

    Michael discusses the evolution of the Bsides Greenville event, emphasizing the incorporation of OT topics and the balance they aim to maintain between IT and OT content.

    Michael shares insights into the unique cybersecurity challenges faced by different sectors, including manufacturing and power plants.

    A deep dive into network architecture in ICS environments reveals the importance of segmentation and controlled access between IT and OT networks.

    Michael emphasizes the critical nature of asset management and network monitoring in maintaining security in ICS environments.

    The conversation also covers the increasing convergence of IT and OT systems and the implications for security.

    Michael touches on the impact of ransomware on ICS environments and the need for robust incident response plans.

    • 52 min
    Catching Up with Mental Health Hackers at ShowMeCon

    Catching Up with Mental Health Hackers at ShowMeCon

    Summary:

    In this relaxed and engaging episode recorded from air loungers at Show Me Con, Timothy De Block catches up with Amanda Berlin from Mental Health Hackers during Mental Health Awareness Month. They discuss the importance of mental health in the IT security industry, which is often fraught with stress and high demands.

    Episode Highlights:

    Personal Stories of Mental Health: Timothy and Amanda share their personal experiences with mental health challenges, emphasizing the common struggles many face in the IT security field.

    Impact of Alcohol: The discussion explores the impact of alcohol on mental health, particularly how it affects sleep and stress levels. They touch upon efforts to create event spaces that offer alternatives to alcohol-centric activities.

    Mental Health Hackers: Amanda talks about the work of Mental Health Hackers, a group that attends various conferences to provide spaces for people to relax and decompress.

    Fundraising and Awareness: Mention of Mental Health Hackers' new t-shirt campaign designed to promote mental wellness, with proceeds supporting their activities at conferences. You can get T-Shirts here: https://www.customink.com/fundraising/mental-health-awareness-for-mhh

    Key Quotes:

    "It’s really about awareness... paying attention to how habits like drinking can impact our mental state and sleep." - Timothy De Block

    "We need to create environments at events where drinking isn’t the main focus, allowing people to enjoy without the pressure of alcohol." - Amanda Berlin

    • 43 min
    What is Have I Been Pwned

    What is Have I Been Pwned

    In this insightful episode of Exploring Information Security, Troy Hunt, the creator of the widely recognized website, Have I Been Pwned (HIBP) talks about the origins and evolution of the service. Troy discusses his transition from writing about application security to developing HIBP and delves into the impacts of data breaches on both individuals and companies.

    • 41 min

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Darknet Diaries
Jack Rhysider
Blockchain Bylines
Blockchain.com
Search Engine
PJ Vogt, Audacy, Jigsaw
Better Offline
Cool Zone Media and iHeartPodcasts

You Might Also Like

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
Risky Business
Patrick Gray
Hacking Humans
N2K Networks
Risky Business News
risky.biz
Darknet Diaries
Jack Rhysider