41 episodes

"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.

Secure Networks: Endace Packet Forensics Files Michael Morris

    • Technology

"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.

    Episode 41: Andrew Stewart, Senior National Security and Government Strategist, Cisco

    Episode 41: Andrew Stewart, Senior National Security and Government Strategist, Cisco

    In this episode of the Endace Packet Forensic files, Michael Morris talks with Andrew Stewart, Senior National Security and Government Strategist at Cisco.  Andrew, CAPT, USN (Ret.) is a Senior Federal Strategist at Cisco where he implements strategies to support innovative cybersecurity and AI/ML solutions across the Federal Government.  He also served as the Commanding Officer and Program Manager at the Navy Cyber Warfare Development Group (NCWDG).
    With Andrew’s experience in national security and government agencies, Michael asks him for his thoughts about all the new Whitehouse mandates, and cybersecurity policies from CISA such as the emphasis on Zero Trust and other important initiatives.  We discuss whether what organizations are doing is sufficient given the risks posed by nation-state threat actors.
    Andrew highlights some cybersecurity trends, including the ever-changing nature of threats as hybrid cloud operating environments continue to expand the threat spectrum and transform the way we work.  Visibility, he says, remains the key to mastering and controlling such a dynamic threat environment.

    • 19 min
    Episode 40: Chris Greer, Packet Pioneer

    Episode 40: Chris Greer, Packet Pioneer

    Threat hunting is a critical cybersecurity activity that is growing in importance and prevalence around the globe.  Are your SOC analysts developing the skills and toolsets they need to enable more efficient and effective threat hunting?  What are the inhibitors your teams face and do you have the right tools and processes in place?
    In this episode of the Endace Packet Forensic files, Michael Morris talks with Chris Greer of Packet Pioneer.

    Chris is an experienced protocol analyst and forensics expert. He is a renowned instructor for Wireshark University as well as the host of a popular YouTube channel where he shares insights into threat hunting and demonstrates the importance of understanding how to investigate and resolve issues using packet analysis. In this episode, In this episode, Chris talks about some of the problems or threats you can only see as part of your incident response investigation processes and workflows if you have access to full packet data
    Finally, Chris highlights some of the gaps that organizations have in their security stacks that make it hard for them to confirm or deny false positives and how to resolve this visibility issue. He offers recommendations for training and suggests how to improve your organization’s threat-hunting capability.

    • 24 min
    Episode 39: Justin Fier, VP Tactical Risk and Response, Darktrace

    Episode 39: Justin Fier, VP Tactical Risk and Response, Darktrace

    In this episode, Endace's Michael Morris welcomes back Justin Fier, VP Tactical Risk and Response at Darktrace (who was our very first guest in this series almost 40 episodes ago!) to talk about nation-state cyber, where he sees the threats lie, and what organizations can do to better prepare for possible attacks.

    Justin talks about some of the great work being done by organizations like CISA, and the signs of increased collaboration between nation state defenders as being positive indications that things are moving in the right direction. 

    But there are also significant challenges. Overcoming the slow pace of organizational change, addressing the dearth of skilled cybersecurity professionals, and building the agility to respond to the constantly evolving threat landscape are all major issues that we need to respond to as an industry – whether that’s in government defense or in securing the enterprise.

    Don't miss this episode!

    • 18 min
    Episode 38: Hakan Holmgren, EVP of Sales, Cubro

    Episode 38: Hakan Holmgren, EVP of Sales, Cubro

    As data growth accelerates and distributed workloads increase, enterprises are prioritising cost efficiency and space minimization in modern datacenters. They are looking to leverage new technologies and use smaller, more cost-efficient appliances to reduce cost and improve efficiency.
    By architecting infrastructure to prioritize stability and robustness and focusing on reducing carbon footprint, organizations can dramatically reduce power, storage and cooling requirements while also improving efficiency. A win-win outcome.
    In this podcast, Hakan Holmgren, EVP Sales  at Cubro, talks about how new technologies like Intel barefoot ASICs can accelerate packet processing for cloud datacenters and edge deployments and enable consolidation of infrastructure to reduce cost and minimize environmental impact.

    • 11 min
    Episode 37: Rick Jenssen, VP of Global Operations, Plixer

    Episode 37: Rick Jenssen, VP of Global Operations, Plixer

    In this episode of the Endace Packet Forensic files, Endace's Michael Morris talks with Rick Jenssen, VP of Global Operations for Plixer, who shares his experience into building robust security at scale. Rick recommends some best practices to address the common challenges in delivering resilient security in large environments and talks about ways to address the flood of alarms SOC teams face on a daily basis. He suggests a nice, six-step, iterative approach to continually improving your security position.

    Finally, Rick reinforces how important the mantra of “practice, practice, practice” is when it comes to preparing your security teams - and the wider organization. Practicing how to investigate, remediate, and respond to potential security breaches makes sure you know what needs to happen in the event of a real crisis and uncovers areas you need to work on to be better prepared.

    • 20 min
    Episode 36: Neil Wilkins, Technical Director, EMEA, Garland Technology

    Episode 36: Neil Wilkins, Technical Director, EMEA, Garland Technology

    What does it mean to have security at scale?   For large infrastructures with rapid data growth have you maintained or improved your security posture as you have scaled?
    In this episode of the Endace Packet Forensic files Michael Morris talks with Neil Wilkins, Technical Director for EMEA at Garland Technology, who outlines some of the challenges he sees organizations facing when it comes to maintaining security at scale.  He shares some recommendations and best practices to get on the right path to improve security in large environments.

    Neil also shares his thoughts on Security Orchestration and Automation Response (SOAR) platforms and how they can help in environments with lots of tools and events and multiple teams trying to manage the cyber security infrastructure. He provides suggestions for rolling out SOAR solutions and highlights some things to avoid to ensure the platform delivers the returns and efficiencies hoped for.

    • 23 min

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
Jack Rhysider
Patrick Gray
The New York Times
The Cut & The Verge