121 episodes

Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.

Security Confidential Dark Rhino Security

    • News
    • 5.0 • 10 Ratings

Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.

    SC S10 E5 Hack-Back: What does Biden want to do?

    SC S10 E5 Hack-Back: What does Biden want to do?

    Shea has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more.

    00:00 Introduction
    01:07 Our Guest
    02:39 The policy question that made me pause my vacation
    05:16 Diversity in Cyber
    06:22 Echelon Risk
    07:05 Has the Executive Mindset changed?
    12:52 Hack-Back and the Biden administration
    18:50 News from Shea

    ----------------------------------------------------------------------
    2023 Central Ohio InfoSec Summit (https://www.infosecsummit.com/website/44575/home/) – it’s titled “Beyond Checking the Box: Putting Compliance at the Forefront of Decision-Making” being presented by Amelia Fisher

    https://echeloncyber.com/

    Hack-Back
    https://www.techdirt.com/2023/01/27/biden-administration-declares-war-on-the-internet-clears-path-for-offensive-hacking-efforts-by-federal-agencies/https://www.securityweek.com/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations/https://www.darkreading.com/ics-ot/bidens-cybersecurity-strategy-calls-for-software-liability-tighter-critical-infastructure-securityhttps://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.htmlhttps://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-backhttps://techbeacon.com/security/why-hack-back-still-worst-idea-cybersecurity

    ---------------------------------------------------------------------
    To learn more about Shea visit https://www.linkedin.com/in/sheanangle/

    To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
    ----------------------------------------------------------------------

    SOCIAL MEDIA:
    Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!

    Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
    Facebook: @Dark-Rhino-Security-Inc
    Twitter: @darkrhinosec
    LinkedIn: @dark-rhino-security
    Youtube: @Dark Rhino Security ​

    • 20 min
    SC S10 E4 Why is the U.S Banning Tiktok?

    SC S10 E4 Why is the U.S Banning Tiktok?

    Continuing our Conversation with Navy SEAL, Mike Rice  



    00:00 Introduction 

    00:18 Our Guest 

    00:30 The Future of War 

    05:06 Is China our biggest threat?

     09:13 TikTok and other Chinese Apps 

    11:40 Spy Balloons? Weather balloons? What was it? 

    16:13 Where do you see the war in Ukraine headed?

     17:58 Who is the Wagner group? 

    18:41 Russia

    • 23 min
    SC S10 E3 How Smartwatches lead Iran to US Troops

    SC S10 E3 How Smartwatches lead Iran to US Troops

    Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation.



    00:00 Introduction

    00:18 Our Guest

    00:33 The Navy SEAL Team

    04:05 What made you shift to SEAL Team?

    08:16 What was the atmosphere like in BUD/S?

    11:09 How was the SEAL Team Technology after 9/11?

    13:21 Leveraging Technology

    17:39 Where do you see technology affect you the most?

    21:40 Stories with Mike

    • 25 min
    SC S10 E2 The Secrets of Linkedin's Algorithm

    SC S10 E2 The Secrets of Linkedin's Algorithm

    David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.  



    00:00 Introduction 

    00:17 Our Guest  

    01:12 Using LinkedIn to break into Cybersecurity 

    07:30 Fake Profiles on Linkedin 

    08:30 Having a complete profile 

    10:19 the LinkedIn Algorithm  

    14:20 Useful Certifications and Resources 

    26:39 Davids Book about Women in Cyber 

    32:28 SOC fatigue

     36:27 What role does Automation has? 

    37:46 Will Automation replace a SOC Analyst? 

    39:30 How can Clients improve their Cybersecurity? 

    42:35 Risk Assessments: Who should be leading? 

    45:20 Connecting with David



    ---------------------------------------------------------------------- 

    To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/ 

    To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com

    ----------------------------------------------------------------------  

    SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

    Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

    Facebook: @Dark-Rhino-Security-Inc

     Twitter: @darkrhinosec 

    LinkedIn: @dark-rhino-security 

    Youtube:  @Dark Rhino Security ​ 

    ----------------------------------------------------------------------

      https://securityplus.training/

    • 49 min
    SC S10 E1 Helping Pave the way for Women in Cyber

    SC S10 E1 Helping Pave the way for Women in Cyber

    #SecurityConfidential #DarkRhinoSecurity 

    Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.   



    00:00 Introduction 

    00:16 Our Guest 

    01:52 Being in the Special Forces as a Woman 

    04:30 Cultural Support Team Program 

    07:47 Jaxs’ Current Mission 

    09:29 What is an Entry-Level Job? 

    11:49 How Jax began her journey into Cybersecurity 

    16:07 Data Breaches: What’s broken? 

    18:07 Company Policies and Bringing Awareness 

    19:38 Compliance isn’t security 

    23:17 NIST vs CMMC vs ISO 

    27:03 Who uses CMMC? 

    30:56 Resources for CMMC  

    32:12 What should the Federal Government be adopting? 

    36:45 HackBack 

    41:58 Connect with Jax

     ---------------------------------------------------------------------- 

     To learn more about Jax visit https://www.linkedin.com/in/iamjax/ 

    https://twitter.com/outpostgray 

    https://iamjax.me/ 

    To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

    ----------------------------------------------------------------------  

    SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

    Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

    Facebook: @Dark-Rhino-Security-Inc 

    Twitter: @darkrhinosec 

    LinkedIn: @dark-rhino-security 

    Youtube:  @Dark Rhino Security ​ 

    ---------------------------------------------------------------------- 

    Articles and Resources Mentioned in this Video:  

    Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1 



    Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html 



    NICE and NIST Frameworks: 

    https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/ 

    https://www.cisa.gov/nice-cybersecurity-workforce-framework 

    https://www.securityprogram.io/a-guide-to-common-security-standards/ 



    Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms 

    JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/ 



    HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/ 

    Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.  



    Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039

    • 43 min
    SC S9 E10 Biological Viruses vs Computer Viruses

    SC S9 E10 Biological Viruses vs Computer Viruses

    Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization's global DevSecOps transformation initiative.  Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.  

    00:00 Introduction 

    00:21 Our Guest 

    01:40 Transitioning from Medical Genetics to Cyber 

    04:50 The importance of having people from different fields 

    07:41 Comparisons between Biological Virus and Breach 

    12:09 Low Earth Orbit Constellation 

    18:18 Hackers are Collaborative  

    22:01 100% Security 

    26:30 Understanding the Risk

     30:40 Building a Culture of Awareness  

    35:35 DevSecOps 

    38:50 Controlling that 3rd party risk 

    43:15 Connecting with Wendy



    VkzkH79NmeR5yCZidDzz

    • 46 min

Customer Reviews

5.0 out of 5
10 Ratings

10 Ratings

Top Podcasts In News

The New York Times
NPR
The Daily Wire
CNN
The Daily Wire
Crooked Media