100 episodes

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Exploring Information Security - Exploring Information Security Timothy De Block

    • Technology
    • 4.7 • 43 Ratings

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

    How to Automate Information Security with Python

    How to Automate Information Security with Python

    In this automatic episode of Exploring Information Security, Timothy De Block talks with Mark Baggett about automating information security tasks using Python. They delve into the SANS SEC573 and SEC673 courses, which cover Python basics, advanced automation techniques, and real-world applications. Mark shares insights on using AI for coding, highlights his YouTube series "Infosec Tool Shed," and discusses upcoming workshops and conferences. The conversation also touches on the importance of Python in information security and practical experiences in automating security tasks.

    • 59 min
    HallwayCon from the floor of ShowMeCon 2024

    HallwayCon from the floor of ShowMeCon 2024

    In this off-the-cuff episode, Timothy De Block brings a mic to the floor of ShowMeCon for the first-ever HallwayCon podcast episode. He walks around with a mic and recorder, engaging in spontaneous conversations with random attendees. Timothy highlights the immense value of attending security conferences, emphasizing that these real, impromptu conversations with professionals are crucial for expanding knowledge and building relationships within the industry. This unique approach captures some just some of the many conversations going on at security conferences.

    • 37 min
    What is Rapid Threat Model Prototyping

    What is Rapid Threat Model Prototyping

    In this episode, we sit down with Geoff Hill from Tutamantic_Sec to explore the innovative approach of Rapid Threat Model Prototyping (RTMP). Geoff shares his journey from being a C++ developer to becoming a threat modeling expert, highlighting the challenges and successes he encountered along the way. This episode dives deep into how RTMP can help streamline threat modeling processes, making them more efficient and scalable.

    • 46 min
    What is the Ransomware Defense Initiative

    What is the Ransomware Defense Initiative

    In this episode, Timothy De Block sits down with Ed Rojas to discuss the origins and development of the Ransomware Defense Initiative (RDI). They explore Ed’s motivation behind creating RDI, its evolution, and how it aids organizations in proactively combating ransomware threats.

    • 56 min
    What's Happening at ShowMeCon 2024

    What's Happening at ShowMeCon 2024

    Summary:

    In this dynamic episode, host Timothy De Block engages in a lively conversation with Joey Smith, Tim McLaren, and Ben Miller live from the floor of Show Me Con 2024. They discuss various topics including the importance of trust in vendor relationships, the evolution of security roles, and the innovative approaches being adopted in the food industry.

    Episode Highlights:

    Conversations with Industry Experts:

    Spontaneous discussions about the importance of genuine interactions at conferences.

    Joey's perspective on the value of treating vendors with respect and professionalism.

    Insights from Tim McLaren:

    Tim shares his experience transitioning from a vendor-specific role to a broader consultancy position.

    Discussion on the importance of having diverse solutions and the role of trust in customer relationships.

    Ben Miller's Take:

    Ben emphasizes the need for critical thinking and continuous learning in security roles.

    Reflections on how past experiences shape current practices in cybersecurity.

    Vendor Relationships and Trust:

    The group discusses the significance of building long-term, trust-based relationships with vendors.

    Examples of how trust influences decision-making and security practices.

    Innovations in Security:

    Conversations on how emerging technologies and innovative solutions are reshaping the cybersecurity landscape.

    Joey's insights on the latest advancements and their implications for the industry.

    Key Quotes:

    "Trust is between two people. I don't trust the business or a line of questioning; I trust the individuals behind it." - Joey Smith

    "Critical thinking and adaptability are essential in the ever-evolving field of cybersecurity." - Ben Miller

    • 53 min
    What is FAIR (Factor Analysis of Information Risk)?

    What is FAIR (Factor Analysis of Information Risk)?

    Summary:

    In this insightful episode, Timothy De Block sits down with Jack Jones, the creator of the Factor Analysis of Information Risk (FAIR) model. Jack shares his journey and the challenges he faced that led to the creation of FAIR, a groundbreaking framework for understanding and quantifying information risk.

    Episode Highlights:

    Introduction to FAIR:

    FAIR stands for Factor Analysis of Information Risk.

    It is a logical decomposition of the factors that drive how much loss exposure a scenario represents.

    Jack's Catalyst for Creating FAIR:

    The need for a quantifiable measurement of risk during his tenure as a CISO at Nationwide Insurance.

    The pivotal moment when an executive asked him to quantify the organization's risk exposure.

    Understanding Quantitative vs. Qualitative Risk:

    Quantitative risk involves using units of measurement like percentages and dollar amounts.

    Qualitative risk is ordinal and involves categories like high, medium, and low without precise measurement units.

    Applying FAIR in Organizations:

    The process of using FAIR starts with understanding the decision you need to support, scoping the scenario, identifying assets, threats, and controls, and using ranges to estimate frequency and impact.

    FAIR helps in prioritizing risks and determining the ROI on security investments.

    Challenges and Solutions in Using FAIR:

    Common challenges include the perception that perfect data is needed, the skills gap, and the complexity of scaling quantitative analysis.

    Leveraging community resources, training, and new automated solutions from vendors can help overcome these challenges.

    Resources and Training:

    The FAIR Institute offers free membership and extensive resources.

    The Open Group provides professional certification and training materials.

    The book "Measuring and Managing Information Risk: A FAIR Approach" is a recommended read.

    Key Quotes:

    "FAIR is about critically thinking about risk. The quantitative measurement is a bonus, but it's really a framework for thinking more clearly about the scenarios we need to manage against." - Jack Jones

    "Protecting applications from session hijacking involves understanding the application's handling of temporary credentials and implementing robust security measures." - Jack Jones

    • 47 min

Customer Reviews

4.7 out of 5
43 Ratings

43 Ratings

Kgoode517 ,

Excellent Cybersecurity Security Podcast

I’ve stumbled upon Tim’s podcast after listening to his presentation at my local Bsides. Just like I feel that his talk was the best of the presentations that day his podcast stands out as one of my favorite security podcasts for staying up to date in the industry.

Smiley_112 ,

Welcome back!!!!!!!

It was really great to hear you guys again. I am glad that you have decided to start producing content again. I am looking forward to the next release. The diverse inputs were really wonderful.

Since you are meeting in person for December for the Christmas party maybe you could let everyone record their favorite IT security jokes and post them.

MsLaulei ,

I just found this and it’s great!

I am saddened and yet thrilled to finish listening to the other podcasts. I just founds this and it’s great!!!! It says FIN but you never know I can always hope! Ms Laulei De La ROsa on FB

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
The Vergecast
The Verge
TED Radio Hour
NPR

You Might Also Like

Risky Business
Patrick Gray
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
CyberWire Daily
N2K Networks
Smashing Security
Graham Cluley & Carole Theriault
Hacking Humans
N2K Networks
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat