60 episodes

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

The Security Table Izar Tarandach, Matt Coles, and Chris Romeo

    • Technology

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

    The Stages of Grief in Incident Response

    The Stages of Grief in Incident Response

    Join Chris, Izar, and Matt as they sit around the Security Table to dissect and discuss the different stages of dealing with security incidents. In this episode, they explore the developer's stages of grief during an incident, and discuss a recent large-scale IT incident. They share insights from their multi-decade experience in security, analyze the fragility of current systems, and discuss the role of luck and probability in security failures. FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @SecTab...

    • 24 min
    To SSH or Not?

    To SSH or Not?

    In this episode of 'The Security Table,' we are back from our midsummer break to discuss OpenSSH regression vulnerability. We dig into the nuances of this race condition leading to remote code execution, explore the chain of security updates, and the role of QA in preventing such regressions. We debate the necessity of SSH in modern cloud-native environments and its alternatives. Plus, we answer the critical question of who should catch these vulnerabilities first — QA teams, pentesters, or a...

    • 28 min
    Rethinking Security Conferences: Engagement and Innovation

    Rethinking Security Conferences: Engagement and Innovation

    In this episode Chris, Matt, and Izar discuss the current state of security conferences and gatherings for professionals in the field. They discuss the value and viability of different types of gatherings, the importance of networking and community-building at events, innovative approaches to conference formats and the need for something more engaging and participatory that caters to both introverts and extroverts.Personal experiences and preferences for conference attendance and speaking eng...

    • 26 min
    Privacy vs. Security: Complexity at the Crossroads

    Privacy vs. Security: Complexity at the Crossroads

    In this episode of the Security Table, Chris, Izar, and Matt delve into the evolving landscape of cybersecurity. The episode has a humorous start involving t-shirts and Frogger as a metaphor for the cybersecurity journey, the conversation shifts to the significant topic of cybersecurity being at a crossroads as suggested by a CSO Online article. They explore the concept of moving from a product-centric to an architectural-centric approach in cybersecurity, discussing the design and integratio...

    • 35 min
    Security, Stories, Jazz and Stage Presence with Brook Schoenfield

    Security, Stories, Jazz and Stage Presence with Brook Schoenfield

    In this episode of 'The Security Table,' hosts Chris Romeo, Izar Tarandach, and Matt Coles are joined by Brook Schoenfield, a seasoned security professional, to share insights and stories from his extensive career. The conversation covers Brook's experience in writing books on security, lessons learned from his 40-year career, and personal anecdotes about his life as a musician, including playing with legends like Bo Diddley and Chuck Berry. Brook highlights the importance of ensemble wo...

    • 52 min
    Debating the CISA Secure by Design Pledge

    Debating the CISA Secure by Design Pledge

    In this episode of 'The Security Table,' hosts Chris Romeo, Matt Coles, and Izar Tarandach discuss the CISA Secure by Design Pledge, a recent initiative where various companies commit to improving software security practices. The hosts critique the pledge, arguing that many of the signatory companies have long been focused on software security, making the pledge redundant for them. They dissect specific goals of the pledge, such as increasing multi-factor authentication (MFA) and reducing def...

    • 39 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
Darknet Diaries
Jack Rhysider
Data Skeptic
Kyle Polich
The ReadME Podcast
The ReadME Project, GitHub
Not So Standard Deviations
Roger Peng and Hilary Parker
Запуск завтра
libo/libo

You Might Also Like

The Threat Modeling Podcast
Chris Romeo
The Application Security Podcast
Chris Romeo and Robert Hurlbut
Defense in Depth
David Spark
CISO Tradecraft®
CISO Tradecraft®
Risky Business
Patrick Gray
Unsupervised Learning
Daniel Miessler