4 episodes

re:invent security is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.
re:invent security is hosted by Jeroen Prinse and Irfaan Santoe.

Hosted on Acast. See acast.com/privacy for more information.

re:invent security Jeroen Prinse / Irfaan Santoe

    • Technology

re:invent security is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.
re:invent security is hosted by Jeroen Prinse and Irfaan Santoe.

Hosted on Acast. See acast.com/privacy for more information.

    Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"

    Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"

    Join hosts Jeroen Prinse and Irfaan Santoe as they dive into the world of multi-party computation with expert Toon Segers. In this episode, they explore how multi-party computation keeps data secure when collaborating, sharing and analyzing the data with partners, without exposing sensitive information. Toon Segers, co-founder of Roseman Labs and PhD candidate in mathematics and cryptography, explains the revolutionary changes this technology brings to data security and privacy of individuals, offering a promising solution to prevent data breaches and maintain confidentiality and privacy. Discover the future of data security and privacy and learn how multi-party computation is re:inventing the landscape of information security.
    Resources
    Multi Party Computation Wikipedia page: https://en.wikipedia.org/wiki/Secure_multi-party_computation
    MPyC framework from TU Eindhoven: https://github.com/lschoe/mpyc
    The Whitehouse on advancing Privacy-Enhancing Technologies: https://www.whitehouse.gov/ostp/news-updates/2022/06/28/advancing-a-vision-for-privacy-enhancing-technologies/
    Roseman Labs website: https://rosemanlabs.com/en/
    Collaborative Computing Slack community : https://collabcomputing.slack.com/
    A correction: at 31:55 Toon states that the large Intel server has 192 CPUs, which should instead be 192 cores.

    Hosted on Acast. See acast.com/privacy for more information.

    • 53 min
    Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"

    Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"

    Insider Threat deals with the fact that every employee in the organization is a potential threat. How does one identify the actual threats and how to act and respond to them? What are the good practices to scale mitigation of the Insider Threat? What are the differences in Insider Threat Programs across different regions like the US and EU? All these questions are addressed by Sunette Runhaar from Uber.
    Resources:

    'Never split the difference: Negotiating as if your life depended on it' - Chriss Voss and Tahl Raz. This is essential reading to help manage tricky stakeholder relationships, but really helps understand the mindset of what motivates people in daily life. 'The Culture Map: Breaking the Through the Invisible Boundaries of Global Business' - Erin Meyer. Great reading to understand how different business cultures affect perceptions in the workplace and interpersonal relationships. 
    Hosted on Acast. See acast.com/privacy for more information.

    • 53 min
    Rob van der Veer: "Treat Artificial Intelligence as Software Initiatives"

    Rob van der Veer: "Treat Artificial Intelligence as Software Initiatives"

    What is the relationship between AI and Security? Learn from world industry expert Rob van der Veer what to consider when securing AI. This episode goes into detail about the security risks of developing AI and sheds light on how to start tomorrow with securing AI. We also discuss the upward risk of AI, what benefits will AI have and is having on doing security better!
    Resources:
    OpenCREOpenCRE chatOWASP AI Exchange5338 blogIEC on 5338SAMM Agile guidanceAI software quality gap researchDiary of CEO podcast met Mo GawdatMo Gawdat - Scary Smart
    Hosted on Acast. See acast.com/privacy for more information.

    • 51 min
    Welcome to re:invent security

    Welcome to re:invent security

    Welcome to re:invent security, the podcast where we look at ways to reinvent information security together with industry leaders.
    Hosted on Acast. See acast.com/privacy for more information.

    • 1 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Catalyst with Shayle Kann
Latitude Media
Hard Fork
The New York Times
TED Radio Hour
NPR