
28 episodes

Left to Our Own Devices Cybellum Technologies LTD
-
- Technology
-
-
5.0 • 3 Ratings
-
Introducing Left to Our Own Devices - the podcast dedicated to everything product security.
Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle.
From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros.
Left to Our Own Devices is brought to you by Cybellum. To learn more, visit Cybellum.com
-
Adam Boulton: From Food to Embedded Devices
Adam Boulton, VP of Security Technologies at Cybellum, is one of the most experienced software security pros on the planet, with over 15 years of experience in security engineering. Among other things, he has more than 100 cybersecurity patents under his belt and is one of the leading experts in reverse engineering of device binaries in particular and product security in general. In this episode, he shares his experience and his tips on building a product security strategy and provides security lessons from the food and building industries.
-
Mirel Sehic: Simplifying Product Security
The Global VP and GM of Cybersecurity at Honeywell shares his thoughts on the link between IT, OT, and Product Security, and shares how simplifying cybersecurity is key. Mirel spent over a decade embedded across varying domains, with global experience leading engineering, operations, marketing, and sales teams. He is an advisor and board member in multiple cybersecurity organizations and non-profits and is one of the trailblazers in the world of IT and OT cybersecurity.
-
Faye Francy: The Power of Community
We sat down with the Executive Director of Automotive-ISAC to discuss the power of community in the Automotive cybersecurity world and beyond. Faye has over 30 years of diverse experience in government and industry specializing in forensic chemistry, aviation, security, and networked systems. She’s a key figure in today's Automotive cybersecurity world,
-
Adam Shostack: Threat Modeling, Star Wars, and Games
Adam is one the biggest threat modeling experts in the world, he is an advisor, a lecturer, a game designer, and the author of multiple books, including "Threat Modeling: Designing for Security".
His latest book “Threats: What Every Engineer Should Learn From Star Wars” is available now: https://www.amazon.com/Threats-Every-Engineer-Should-Learn/dp/1119895162#:~:text=In%20Threats%3A%20What%20Every%20Engineer,how%20to%20develop%20secure%20systems.
During our conversation, Adam mentioned a book by Csikszenmihality, which can be found here:
https://www.amazon.com/Finding-Flow-Psychology-Engagement-Everyday-ebook/dp/B086SVQ1MJ/ref=sr_1_1?crid=132R6QL2KYRZU&keywords=finding+flow&qid=1675723854&sprefix=finding+flow%2Caps%2C166&sr=8-1
He also mentioned a book called "Don't Bother Me Mom", which can be found here: https://www.amazon.com/Dont-Bother-Me-Mom-Im-Learning/dp/1557788588 -
Phil Englert: The Way Forward for Med Device Cybersecurity
Phil Englert is the Director of Medical Device Security at Health ISAC. Phil is an experienced professional well versed in building and sustaining Medical Device Cybersecurity programs in healthcare. He has held key positions at MedSec, Deloitte, and Catholic Health Initiatives. We sat down with him to discuss the challenges, trends, and outlooks in today's medical device cybersecurity world.
-
Thomas LaRock: SolarWinds' Cybersecurity Strategy
Thomas is the Head Geek at SolarWinds. He has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He came to our show to talk about lessons learned from SUNBURST, as well as SolarWinds' initiatives and strategy going forward.
Customer Reviews
Perfect themed discussion
Looking forward to understanding thought leadership from different industries and how they are responding to both regulations as well as position leadership in the area of product security.