450 episodes

A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.

BrakeSec Education Podcast Bryan Brake, Amanda Berlin, and Brian Boettcher

    • News
    • 4.7 • 98 Ratings

A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!

    Show Topic Summary:
    Ms. Berlin proposes a question of how to gather more headcount with metrics, we discuss the BLUFFS bluetooth vulnerability, and “Ranty Claus” talks about CISA’s remarks of putting the onus on device product makers to remove choice for customers and implement secure defaults.
    #youtube VOD: https://www.youtube.com/watch?v=emcAzTx9z0c 
    Questions and topics:
    https://cyberscoop.com/cisa-goldstein-secure-by-design/
    https://hackaday.com/2023/12/02/update-on-the-bluffs-bluetooth-vulnerability/
    Additional information / pertinent LInks (Would you like to know more?):
    https://cyberscoop.com/jen-easterly-secure-by-design/


    https://www.cisa.gov/resources-tools/resources/stop-passing-buck-cybersecurity 
    Examples of companies forcing changes https://www.bleepingcomputer.com/news/microsoft/microsoft-will-roll-out-mfa-enforcing-policies-for-admin-portal-access/  
    https://github.com/aya-rs/aya - eBPF implementation in Rust
    https://ossfortress.io/  
    https://www.darkreading.com/endpoint-security/critical-logofail-bugs-secure-boot-bypass-millions-pcs 



    Show points of Contact:
    Amanda Berlin: @infosystir @hackershealth 
    Brian Boettcher: @boettcherpwned
    Bryan Brake: @bryanbrake on Mastodon.social, https://linkedin.com/in/brakeb 
    Brakesec Website: https://www.brakeingsecurity.com
    Twitter: @brakesec 
    Youtube channel: https://youtube.com/c/BDSPodcast
    Twitch Channel: https://twitch.tv/brakesec

    • 1 hr 19 min
    25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people

    25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people

    Subscribe on Twitch using Amazon Prime and watch us live: https://twitch.tv/brakesec
    Check out our VODs on Youtube: https://www.youtube.com/@BrakeSecEd 

    Join the BrakeSecEd discord: https://discord.gg/brakesec 
     
    News:
    https://www.darkreading.com/remote-workforce/1password-latest-victim-okta-customer-service-breach
    https://www.documentcloud.org/documents/24075435-bhi-notice
    https://www.bleepingcomputer.com/news/security/us-energy-firm-shares-how-akira-ransomware-hacked-its-systems/
    https://www.bleepingcomputer.com/news/security/ransomware-isnt-going-away-the-problem-is-only-getting-worse/
    https://www.shacknews.com/article/137505/ransomware-group-capcom-2020-arrested
    https://www.bleepingcomputer.com/news/security/flipper-zero-can-now-spam-android-windows-users-with-bluetooth-alerts/
    https://www.nasdaq.com/articles/three-cybersecurity-sectors-that-resist-economic-downturns
     

    • 45 min
    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.
     
    Guest Bio: Nicole is the Chief Product Officer at Axio. Nicole has spent her career building awareness around the benefits of usable security and human-centered security as a way to increase company revenue and create a seamless user experience.
     Youtube VOD Link: https://youtube.com/live/tFaAB9an47g
     Questions and topics: Usable security: is it an oxymoron?
    What determines if the security is ‘usable’ or no? We sacrifice security for a better UX, what can be done to alleviate that? Or is it some sort of sliding scale in “poor UX, amazing security or awesome UX, poor security” Examples of poor UX for ‘people’: MFA, and password managers.
    SEC updates and ‘material events’ and how that would affect security, IR, and other company reporting functions. 
     
    Also, additional documentation (Regulation S-K Item 106) https://www.linkedin.com/posts/nicole-sundin-5225a1149_sec-adopts-rules-on-cybersecurity-risk-management-activity-7090065804083290112-ISD8
    Are companies ready to talk about their cybersecurity? Can the SEC say “you’re not doing enough?”
     What is ‘enough’?
    Are we heading toward yet another audit needed for public companies, similar to SOX?
    When does an 8-K get publicly disclosed?
    Materiality is based on a “reasonable investor”?
    So, you don’t need to announce that until you’re certain, and it’s based on what you can collect? Cyber Risk Management and some good examples of how to set up a proper cyber risk organization
    Additional Links:
    https://csrc.nist.gov/CSRC/media/Projects/usable-cybersecurity/images-media/Is%20Usable%20Security%20an%20Oxymoron.pdf
    http://web.mit.edu/Saltzer/www/publications/protection/Basic.html
    https://www.sec.gov/news/press-release/2023-139
    https://www.sec.gov/news/statement/munter-statement-assessing-materiality-030922
    https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/sec-final-cybersecurity-disclosure-rules.html
    https://www.nasa.gov/centers/ames/research/technology-onepagers/hc-computing.html
     https://securityscorecard.com/blog/what-is-cyber-security-performance-management/
     

    • 1 hr 6 min
    John Aron, letters of marque, what does a "junior" job look like with AI?

    John Aron, letters of marque, what does a "junior" job look like with AI?

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.
     
    Guest Bio: John is the CEO of Aronetics. An avid climber and runner, John has spoken at many conferences about topics like ZeroTrust, BIOS/UEFI security, communication security, and malware. Aronetics is a technology-enabled service provider. 
     
    Youtube VOD: https://youtube.com/live/5dIVTwVZLAU
    Linkedin VOD: https://www.linkedin.com/video/live/urn:li:ugcPost:7101738254823030784



    Show Topic Summary:
     
    John joins us to discuss “letters of Marque” in an effort for hackers to ‘hack back’... the overreliance on automation, and communication siloes. We also talk about what a ‘junior position’ in infosec looks like with AI doing all the “Level 1 SOC Analyst” type roles normally given to someone fresh to the security industry.
     
    Questions and topics:
    Is infosec over reliant on automation? Automation comes with its own challenges.
    Documentation woes
    Automation is usually found in userland
     
    Aronetics’ Thor provides defense and counter-offense tamper-proof technology digitally tied to 
     
    Letter of Marque - good idea, or geopolitical disaster waiting to happen?

    Siloes and communication -best ways to overcome those in an org and outside?
    How do we overcome siloing?
     
    Overcoming security challenges?Identity management - 2FA is everywhere, there’s already ways around 2FA, so what now? 3FA? Biometrics? Make everyone carry around physical tokens that we can lose?
     
    Blog post: https://www.aronetics.com/post-quantum-cryptography/
    What do we need to protect against? Nation states with quantum computers? Rubber hose cryptography?
     
    Crime thrives in areas of low visibility. https://www.aronetics.com/unknown/ 
     
    https://www.aronetics.com/inside-the-breach/ (threat detection - the crime thrives in low vis areas)
     
    Show points of Contact:
    Brakesec Website: https://www.brakeingsecurity.com
    Youtube channel: https://youtube.com/c/BDSPodcast
    Twitch Channel: https://twitch.tv/brakesec
    Amanda Berlin: @infosystir@infosec.exchange (Mastodon) @hackershealth 
    Brian Boettcher: @boettcherpwned
    Bryan Brake: @bryanbrake on Mastodon.social

    • 1 hr 25 min
    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Megan Roddie - co-author of "Practical Threat Detecion Engineering"

    Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers.
    Buy here: https://subscription.packtpub.com/book/security/9781801076715
    Amazon Link: https://packt.link/megan
    Youtube VOD: https://www.youtube.com/watch?v=p1_jQa9OQ2w
     
    Show Topic Summary:
    Megan Roddie is currently working as a Senior Security Engineer at IBM. Along with her work at IBM, she works with the SANS Institute as a co-author of FOR509, presents regularly at security conferences, and serves as CFO of Mental Health Hackers. Megan has two Master's degrees, one in Digital Forensics and the other in Information Security Engineering, along with many industry certifications in a wide range of specialties. When Megan is not fighting cybercrime, she is an active competitor in Muay Thai/Kickboxing. She is a co-author of “Practical Threat Detection Engineering” from Packt publishing, on sale now in print and e-book. Buy here: https://subscription.packtpub.com/book/security/9781801076715
     
    https://packt.link/megan ← Amazon redirect link that publisher uses if you want something easier on the notes
     
    Questions and topics:
    Of the 3 models, which do you find you use more and why? (PoP, ATT&CK, kill chain)
    What kind of orgs have ‘detection engineering’ teams? What roles are involved here, and can other teams (like IR) be involved or share a reverse role there?
    Lab setup requires an agent… any agent for ingestion or something specific? 
    How does Fleet or data ingestion work for Iot/Embedded device testing? Anything you suggest?
    How important is it to normalize your log output for ingestion? (app, web, server all tell the story)
    Additional information / pertinent LInks (Would you like to know more?):
    Unified Kill Chain: https://www.unifiedkillchain.com/
    ATT&CK: https://attack.mitre.org/ 
    D3FEND matrix BrakeSec show from 2021: https://brakeingsecurity.com/2021-023-d3fend-framework-dll-injection-types-more-solarwinds-infections 
    Pyramid of Pain: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
    https://www.securitymagazine.com/articles/98486-435-million-the-average-cost-of-a-data-breach 
    https://medium.com/@gary.j.katz (per Megan, ‘it’s basically Chapter 11 of the book’)




    Show points of Contact:
    Amanda Berlin: @infosystir @hackershealth 
    Brian Boettcher: @boettcherpwned
    Bryan Brake: @bryanbrake on Mastodon.social, Twitter, bluesky
    Brakesec Website: https://www.brakeingsecurity.com
    Twitter: @brakesec 
    Youtube channel: https://youtube.com/c/BDSPodcast
    Twitch Channel: https://twitch.tv/brakesec

    • 1 hr 46 min
    meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.

    meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.

    Check out our sponsor (BLUMIRA) at https://blumira.com/brake
    youtube channel link: https://youtube.com/c/BDSPodcast
    Full video on our youtube Channel! https://www.youtube.com/watch?v=BkBeLuM_urk
    https://www.rapid7.com/blog/post/2023/07/11/cve-2023-29298-adobe-coldfusion-access-control-bypass/

    https://www.darkreading.com/remote-workforce/hacker-infected-foiled-by-own-infostealer
    https://therecord.media/cisa-warnings-adobe-microsoft-citrix-vulnerabilities
    https://www.itsecurityguru.org/2023/07/18/millions-of-keyboard-walk-patterns-found-in-compromised-passwords/
    https://therecord.media/airline-customer-support-phone-number-fraud-google
    https://twitter.com/Shmuli/status/1680669938468499458
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884
    https://www.jdsupra.com/legalnews/tabletop-exercises-as-risk-mitigation-5278057/
    https://www.darkreading.com/vulnerabilities-threats/linux-ransomware-poses-significant-threat-to-critical-infrastructure
    https://bevyengine.org/  - Rust game engine
    https://godotengine.org/ - a more mature Rust game engine
    https://flappybird.io/ - which I suck at, BTW
    Intro/outro music:
    "Flex" by Jeremy Blake
    Courtesy of YouTube Music Library (used with proper permissions)
     

    • 1 hr 20 min

Customer Reviews

4.7 out of 5
98 Ratings

98 Ratings

obacker19 ,

Empowering, insightful and actionable! 🙌

Whether you’re well established as an innovator in infosec, or just getting started in the industry - this is a must-listen podcast for you! Bryan and the BDS team do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of navigating the shifting landscape of data security - with leaders who’ve actually experienced success themselves. Highly recommend listening and subscribing!

The name iz already taken ,

Spelling

Braking*

bb7151 ,

Good team!

Topics are practical and varied. I also appreciate the fact that they are all involved in the security community which adds weight to their discussions.

Top Podcasts In News

The New York Times
NPR
The Daily Wire
BBC World Service
Scott Becker
SiriusXM

You Might Also Like

Johannes B. Ullrich
Graham Cluley & Carole Theriault
N2K Networks
N2K Networks
Malicious Life
TWiT