
121 episodes

Security Confidential Dark Rhino Security
-
- News
-
-
5.0 • 10 Ratings
-
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
-
SC S10 E5 Hack-Back: What does Biden want to do?
Shea has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more.
00:00 Introduction
01:07 Our Guest
02:39 The policy question that made me pause my vacation
05:16 Diversity in Cyber
06:22 Echelon Risk
07:05 Has the Executive Mindset changed?
12:52 Hack-Back and the Biden administration
18:50 News from Shea
----------------------------------------------------------------------
2023 Central Ohio InfoSec Summit (https://www.infosecsummit.com/website/44575/home/) – it’s titled “Beyond Checking the Box: Putting Compliance at the Forefront of Decision-Making” being presented by Amelia Fisher
https://echeloncyber.com/
Hack-Back
https://www.techdirt.com/2023/01/27/biden-administration-declares-war-on-the-internet-clears-path-for-offensive-hacking-efforts-by-federal-agencies/https://www.securityweek.com/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations/https://www.darkreading.com/ics-ot/bidens-cybersecurity-strategy-calls-for-software-liability-tighter-critical-infastructure-securityhttps://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.htmlhttps://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-backhttps://techbeacon.com/security/why-hack-back-still-worst-idea-cybersecurity
---------------------------------------------------------------------
To learn more about Shea visit https://www.linkedin.com/in/sheanangle/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA:
Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security -
SC S10 E4 Why is the U.S Banning Tiktok?
Continuing our Conversation with Navy SEAL, Mike Rice
00:00 Introduction
00:18 Our Guest
00:30 The Future of War
05:06 Is China our biggest threat?
09:13 TikTok and other Chinese Apps
11:40 Spy Balloons? Weather balloons? What was it?
16:13 Where do you see the war in Ukraine headed?
17:58 Who is the Wagner group?
18:41 Russia -
SC S10 E3 How Smartwatches lead Iran to US Troops
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation.
00:00 Introduction
00:18 Our Guest
00:33 The Navy SEAL Team
04:05 What made you shift to SEAL Team?
08:16 What was the atmosphere like in BUD/S?
11:09 How was the SEAL Team Technology after 9/11?
13:21 Leveraging Technology
17:39 Where do you see technology affect you the most?
21:40 Stories with Mike -
SC S10 E2 The Secrets of Linkedin's Algorithm
David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.
00:00 Introduction
00:17 Our Guest
01:12 Using LinkedIn to break into Cybersecurity
07:30 Fake Profiles on Linkedin
08:30 Having a complete profile
10:19 the LinkedIn Algorithm
14:20 Useful Certifications and Resources
26:39 Davids Book about Women in Cyber
32:28 SOC fatigue
36:27 What role does Automation has?
37:46 Will Automation replace a SOC Analyst?
39:30 How can Clients improve their Cybersecurity?
42:35 Risk Assessments: Who should be leading?
45:20 Connecting with David
----------------------------------------------------------------------
To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/
To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
https://securityplus.training/ -
SC S10 E1 Helping Pave the way for Women in Cyber
#SecurityConfidential #DarkRhinoSecurity
Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.
00:00 Introduction
00:16 Our Guest
01:52 Being in the Special Forces as a Woman
04:30 Cultural Support Team Program
07:47 Jaxs’ Current Mission
09:29 What is an Entry-Level Job?
11:49 How Jax began her journey into Cybersecurity
16:07 Data Breaches: What’s broken?
18:07 Company Policies and Bringing Awareness
19:38 Compliance isn’t security
23:17 NIST vs CMMC vs ISO
27:03 Who uses CMMC?
30:56 Resources for CMMC
32:12 What should the Federal Government be adopting?
36:45 HackBack
41:58 Connect with Jax
----------------------------------------------------------------------
To learn more about Jax visit https://www.linkedin.com/in/iamjax/
https://twitter.com/outpostgray
https://iamjax.me/
To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com
----------------------------------------------------------------------
SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!
Instagram: @securityconfidential and @OfficialDarkRhinoSecurity
Facebook: @Dark-Rhino-Security-Inc
Twitter: @darkrhinosec
LinkedIn: @dark-rhino-security
Youtube: @Dark Rhino Security
----------------------------------------------------------------------
Articles and Resources Mentioned in this Video:
Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1
Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html
NICE and NIST Frameworks:
https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/
https://www.cisa.gov/nice-cybersecurity-workforce-framework
https://www.securityprogram.io/a-guide-to-common-security-standards/
Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms
JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/
HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/
Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.
Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039 -
SC S9 E10 Biological Viruses vs Computer Viruses
Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization's global DevSecOps transformation initiative. Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.
00:00 Introduction
00:21 Our Guest
01:40 Transitioning from Medical Genetics to Cyber
04:50 The importance of having people from different fields
07:41 Comparisons between Biological Virus and Breach
12:09 Low Earth Orbit Constellation
18:18 Hackers are Collaborative
22:01 100% Security
26:30 Understanding the Risk
30:40 Building a Culture of Awareness
35:35 DevSecOps
38:50 Controlling that 3rd party risk
43:15 Connecting with Wendy
VkzkH79NmeR5yCZidDzz