
From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis
06/30/22 β’ 48 min
We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.
*Threat intelligence*
*Development processes*
*Cyber security M&A market*
*Sales*
*Marketing messaging*
*Cyber law*
*Standards*
Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.
Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.
____________________________
Guest
Eward Driehuis
Founder at 3Eyes Security and Chairman at CSIRT.global
On LinkedIn | https://www.linkedin.com/in/ewarddriehuis/
On Twitter | https://twitter.com/e3huis
____________________________
This Episodeβs Sponsors
HITRUST: π https://itspm.ag/itsphitweb
CrowdSec: π https://itspm.ag/crowdsec-b1vp
Blue Lava: π https://itspm.ag/blue-lava-w2qs
BlackCloak π https://itspm.ag/itspbcweb
AppViewX π https://itspm.ag/appviewx-cbye
Checkmarx π https://itspm.ag/checkmarx-i9o5
____________________________
Resources
LinkedIn post summing up the discussion points: https://www.linkedin.com/posts/ewarddriehuis_this-is-going-to-be-a-long-post-on-my-lessons-activity-6941702693895725056-H1YA
Learn more about RSA Conference 2022: https://itspm.ag/rsac-b8ef76
____________________________
For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage
Be sure to catch all of the conversations for the Black Hat and DEF CON conferences in Las Vegas: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverage
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity
Are you interested in sponsoring an ITSPmagazine Channel?
π https://www.itspmagazine.com/podcast-series-sponsorships
Are you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
π https://itspm.ag/bhdc22sp
We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.
*Threat intelligence*
*Development processes*
*Cyber security M&A market*
*Sales*
*Marketing messaging*
*Cyber law*
*Standards*
Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.
Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.
____________________________
Guest
Eward Driehuis
Founder at 3Eyes Security and Chairman at CSIRT.global
On LinkedIn | https://www.linkedin.com/in/ewarddriehuis/
On Twitter | https://twitter.com/e3huis
____________________________
This Episodeβs Sponsors
HITRUST: π https://itspm.ag/itsphitweb
CrowdSec: π https://itspm.ag/crowdsec-b1vp
Blue Lava: π https://itspm.ag/blue-lava-w2qs
BlackCloak π https://itspm.ag/itspbcweb
AppViewX π https://itspm.ag/appviewx-cbye
Checkmarx π https://itspm.ag/checkmarx-i9o5
____________________________
Resources
LinkedIn post summing up the discussion points: https://www.linkedin.com/posts/ewarddriehuis_this-is-going-to-be-a-long-post-on-my-lessons-activity-6941702693895725056-H1YA
Learn more about RSA Conference 2022: https://itspm.ag/rsac-b8ef76
____________________________
For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage
Be sure to catch all of the conversations for the Black Hat and DEF CON conferences in Las Vegas: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverage
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity
Are you interested in sponsoring an ITSPmagazine Channel?
π https://www.itspmagazine.com/podcast-series-sponsorships
Are you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
π https://itspm.ag/bhdc22sp
Previous Episode

The Real-World Value Of Telling Stories And The Role Of Visual Art In Ethical Hacking Videos | A Conversation With YouTuber SecAura | Redefining CyberSecurity Podcast With Sean Martin
SecAura is an amateur YouTuber whose post I came across caught my attention. SecAura creates free educational videos for ethical hacking and does so while going the extra mile to hand-craft many of the animations used in the videos. All of this is done outside of the 9-5 job SecAura has as a penetration tester. Realizing that the technical subjects needed diagrams and that these elements were a core part of the videos being created, SecAura decided to hand-craft the animations for each of the subjects being prepared, teaching himself all that was required to do so while constantly trying to improve with each video released.
SecAura aims to have every video released be at the top of its game in terms of teaching someone who knows very little about a subject and getting them to a great foundational and applicable position just from watching his videos. He also hopes to extend the community and help to create the next generation of cybersecurity professionals by providing them with real, practical skills, backed by the theory!
About SecAura [from Twitter]
By day I work as a pentester, and in the evening, I compete in CTFs/cyber things. I have always loved teaching, and wanted to give back to the cyber community the best I can, so I made my YouTube Channel.
It was a treat speaking with SecAura, learning about the creativity, passion, and production that goes into the making each of these videos, and how they can be used by those looking to enter the field of information security, preparing for a job interview, looking to grow their skills as they aspire to take on new roles or perhaps even get promoted at their job.
So many uses cases β lots of great content β all from a super cool human.
____________________________
Guest
SecAura
Ethical Hacking Content Creator
On Twitter | https://twitter.com/secaura_
On LinkedIn | https://www.linkedin.com/in/sec-aura-57736422a/
On YouTube | https://www.youtube.com/channel/UCx89Lz24SEPZpExl6OfQ0Gg
____________________________
This Episodeβs Sponsors
Asgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vc
Imperva: https://itspm.ag/imperva277117988
____________________________
Resources
More information about SecAura: https://twitter.com/secaura_/status/1518241710412808192
The new SQLi video discussed during the conversation: UNLEASH THE POWER OF SQL INJECTION | A beginners guide: https://www.youtube.com/watch?v=_Y4MpvB6o7s
VIDEO: Web Fundamentals for Cyber Security | HTTP for Hackers | 0x01 (Animated): https://www.youtube.com/watch?v=ro-5AjgoPc4
____________________________
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity
Are you interested in sponsoring an ITSPmagazine Channel?
π https://www.itspmagazine.com/podcast-series-sponsorships
Next Episode

From Enrolling In College To Gambling, Traveling, And Shopping, Evasive Bad Bots Are A Major Source Of Online Fraud | The Bad Bot Report 2022 | Part 2 | An Imperva Brand Story With Ryan Windham
As we continue this 2nd part of the conversation, we immediately kick things off with Gremlins and quickly move into real-world scenarios where bad bots wreak havoc by enabling high-speed abuse, misuse, and attacks on websites, mobile apps, and APIs.
Businesses cannot overlook the impact of malicious bot activity as it is contributing to more account compromise, higher infrastructure and support costs, customer churn, skewed marketing analytics, and degraded online services.
The implications of account takeover (ATO) are also extensive, where successful attacks can lock customers out of their account, while fraudsters gain access to sensitive information that can be stolen and abused. For businesses, ATO contributes to revenue loss, risk of non-compliance with data privacy regulations, and tarnished reputations.
How can organizations β actually, the people in them that keep the business running β distinguish between real, authentic traffic versus something that's being driven by a bot? That's exactly what we talk about.
We hope you enjoy this Part 2 of 2 conversations as we explore and uncover the consequences of bad bots for our business and society.
About the 2022 Imperva Bad Bot Report
Leveraging data from its global network, Imperva Threat Research investigates the rising volume of automated attacks occurring daily, evading detection while wreaking havoc and committing online fraud. The 9th annual Imperva Bad Bot Report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked bad bot requests, anonymized over thousands of domains. The goal of this report is to provide meaningful information and guidance about the nature and impact of these automated threats.
Bot attacks are often the first indicator of fraudulent activity online, whether itβs validating stolen user credentials and credit card information to later be sold on the dark web, or scraping proprietary data to gain a competitive advantage. Often bots are used to surveil applications and APIs in an attempt to discover vulnerabilities or weak security. Online fraud from automated bot attacks is not only a threat to the business, but it is first and foremost a risk to customers. Bad bot attacks might cause customers to be unable to access their accounts or have sensitive information stolen from them due to successful account takeover fraud.
Bad bots mask themselves and attempt to interact with applications in the same way a legitimate user would, making them harder to detect and block. They enable high-speed abuse, misuse, and attacks on your websites, mobile apps, and APIs. They allow bot operators, attackers, unsavory competitors, and fraudsters to perform a wide array of malicious activities.
Such activities include web scraping, competitive data mining, personal and financial data harvesting, brute-force login, digital ad fraud, denial of service, denial of inventory, spam, transaction fraud, and more.
Note: This story contains promotional content. Learn more.
Guest
Ryan Windham
VP of Application Security at Imperva [@Imperva]
On Linkedin | https://www.linkedin.com/in/rwindham/
Resources
Learn more about Imperva and their offering: https://itspm.ag/imperva277117988
Imperva Bad Bot Report 2022: https://itspm.ag/impervwurd
Want the Bad Bot 101 Story? Check out the Imperva 2021 Bad Bot Report Podcast Series here: https://www.itspmagazine.com/their-stories/the-good-the-bad-and-the-ugly-the-bad-bot-report-2021-an-imperva-story
Be sure to listen to Part 2 of this conversation here: https://itspmagazine.com/their-stories/how-bots-fake-human-behavior-to-conduct-online-fraud-the-bad-bot-report-2022-part-1-an-imperva-story-with-ryan-windham
To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity-podcast<...
If you like this episode youβll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/redefining-cybersecurity-219447/from-technology-to-buzzwords-to-marketing-from-conversations-to-friend-24995498"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to from technology to buzzwords to marketing; from conversations to friendships to mergers and acquisitions | key learnings from rsa conference 2022 | redefining cybersecurity with eward driehuis on goodpods" style="width: 225px" /> </a>
Copy