Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
Redefining CyberSecurity - From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis
plus icon
bookmark

From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis

06/30/22 β€’ 48 min

Redefining CyberSecurity

We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.

*Threat intelligence*
*Development processes*
*Cyber security M&A market*
*Sales*
*Marketing messaging*
*Cyber law*
*Standards*

Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.

Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.

____________________________

Guest
Eward Driehuis
Founder at 3Eyes Security and Chairman at CSIRT.global
On LinkedIn | https://www.linkedin.com/in/ewarddriehuis/
On Twitter | https://twitter.com/e3huis
____________________________

This Episode’s Sponsors

HITRUST: πŸ‘‰ https://itspm.ag/itsphitweb

CrowdSec: πŸ‘‰ https://itspm.ag/crowdsec-b1vp

Blue Lava: πŸ‘‰ https://itspm.ag/blue-lava-w2qs

BlackCloak πŸ‘‰ https://itspm.ag/itspbcweb

AppViewX πŸ‘‰ https://itspm.ag/appviewx-cbye

Checkmarx πŸ‘‰ https://itspm.ag/checkmarx-i9o5

____________________________

Resources

LinkedIn post summing up the discussion points: https://www.linkedin.com/posts/ewarddriehuis_this-is-going-to-be-a-long-post-on-my-lessons-activity-6941702693895725056-H1YA

Learn more about RSA Conference 2022: https://itspm.ag/rsac-b8ef76

____________________________

For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage

Be sure to catch all of the conversations for the Black Hat and DEF CON conferences in Las Vegas: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverage

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity

Are you interested in sponsoring an ITSPmagazine Channel?
πŸ‘‰ https://www.itspmagazine.com/podcast-series-sponsorships

Are you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
πŸ‘‰ https://itspm.ag/bhdc22sp

plus icon
bookmark

We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.

*Threat intelligence*
*Development processes*
*Cyber security M&A market*
*Sales*
*Marketing messaging*
*Cyber law*
*Standards*

Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.

Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.

____________________________

Guest
Eward Driehuis
Founder at 3Eyes Security and Chairman at CSIRT.global
On LinkedIn | https://www.linkedin.com/in/ewarddriehuis/
On Twitter | https://twitter.com/e3huis
____________________________

This Episode’s Sponsors

HITRUST: πŸ‘‰ https://itspm.ag/itsphitweb

CrowdSec: πŸ‘‰ https://itspm.ag/crowdsec-b1vp

Blue Lava: πŸ‘‰ https://itspm.ag/blue-lava-w2qs

BlackCloak πŸ‘‰ https://itspm.ag/itspbcweb

AppViewX πŸ‘‰ https://itspm.ag/appviewx-cbye

Checkmarx πŸ‘‰ https://itspm.ag/checkmarx-i9o5

____________________________

Resources

LinkedIn post summing up the discussion points: https://www.linkedin.com/posts/ewarddriehuis_this-is-going-to-be-a-long-post-on-my-lessons-activity-6941702693895725056-H1YA

Learn more about RSA Conference 2022: https://itspm.ag/rsac-b8ef76

____________________________

For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage

Be sure to catch all of the conversations for the Black Hat and DEF CON conferences in Las Vegas: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverage

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity

Are you interested in sponsoring an ITSPmagazine Channel?
πŸ‘‰ https://www.itspmagazine.com/podcast-series-sponsorships

Are you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?
πŸ‘‰ https://itspm.ag/bhdc22sp

Previous Episode

undefined - The Real-World Value Of Telling Stories And The Role Of Visual Art In Ethical Hacking Videos | A Conversation With YouTuber SecAura | Redefining CyberSecurity Podcast With Sean Martin

The Real-World Value Of Telling Stories And The Role Of Visual Art In Ethical Hacking Videos | A Conversation With YouTuber SecAura | Redefining CyberSecurity Podcast With Sean Martin

SecAura is an amateur YouTuber whose post I came across caught my attention. SecAura creates free educational videos for ethical hacking and does so while going the extra mile to hand-craft many of the animations used in the videos. All of this is done outside of the 9-5 job SecAura has as a penetration tester. Realizing that the technical subjects needed diagrams and that these elements were a core part of the videos being created, SecAura decided to hand-craft the animations for each of the subjects being prepared, teaching himself all that was required to do so while constantly trying to improve with each video released.

SecAura aims to have every video released be at the top of its game in terms of teaching someone who knows very little about a subject and getting them to a great foundational and applicable position just from watching his videos. He also hopes to extend the community and help to create the next generation of cybersecurity professionals by providing them with real, practical skills, backed by the theory!

About SecAura [from Twitter]
By day I work as a pentester, and in the evening, I compete in CTFs/cyber things. I have always loved teaching, and wanted to give back to the cyber community the best I can, so I made my YouTube Channel.

It was a treat speaking with SecAura, learning about the creativity, passion, and production that goes into the making each of these videos, and how they can be used by those looking to enter the field of information security, preparing for a job interview, looking to grow their skills as they aspire to take on new roles or perhaps even get promoted at their job.

So many uses cases β€” lots of great content β€” all from a super cool human.

____________________________

Guest
SecAura
Ethical Hacking Content Creator
On Twitter | https://twitter.com/secaura_
On LinkedIn | https://www.linkedin.com/in/sec-aura-57736422a/
On YouTube | https://www.youtube.com/channel/UCx89Lz24SEPZpExl6OfQ0Gg

____________________________

This Episode’s Sponsors

Asgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vc

Imperva: https://itspm.ag/imperva277117988

____________________________

Resources

More information about SecAura: https://twitter.com/secaura_/status/1518241710412808192

The new SQLi video discussed during the conversation: UNLEASH THE POWER OF SQL INJECTION | A beginners guide: https://www.youtube.com/watch?v=_Y4MpvB6o7s

VIDEO: Web Fundamentals for Cyber Security | HTTP for Hackers | 0x01 (Animated): https://www.youtube.com/watch?v=ro-5AjgoPc4

____________________________

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity

Are you interested in sponsoring an ITSPmagazine Channel?
πŸ‘‰ https://www.itspmagazine.com/podcast-series-sponsorships

Next Episode

undefined - From Enrolling In College To Gambling, Traveling, And Shopping, Evasive Bad Bots Are A Major Source Of Online Fraud | The Bad Bot Report 2022 | Part 2 | An Imperva Brand Story With Ryan Windham

From Enrolling In College To Gambling, Traveling, And Shopping, Evasive Bad Bots Are A Major Source Of Online Fraud | The Bad Bot Report 2022 | Part 2 | An Imperva Brand Story With Ryan Windham

As we continue this 2nd part of the conversation, we immediately kick things off with Gremlins and quickly move into real-world scenarios where bad bots wreak havoc by enabling high-speed abuse, misuse, and attacks on websites, mobile apps, and APIs.

Businesses cannot overlook the impact of malicious bot activity as it is contributing to more account compromise, higher infrastructure and support costs, customer churn, skewed marketing analytics, and degraded online services.

The implications of account takeover (ATO) are also extensive, where successful attacks can lock customers out of their account, while fraudsters gain access to sensitive information that can be stolen and abused. For businesses, ATO contributes to revenue loss, risk of non-compliance with data privacy regulations, and tarnished reputations.

How can organizations β€” actually, the people in them that keep the business running β€” distinguish between real, authentic traffic versus something that's being driven by a bot? That's exactly what we talk about.

We hope you enjoy this Part 2 of 2 conversations as we explore and uncover the consequences of bad bots for our business and society.

About the 2022 Imperva Bad Bot Report
Leveraging data from its global network, Imperva Threat Research investigates the rising volume of automated attacks occurring daily, evading detection while wreaking havoc and committing online fraud. The 9th annual Imperva Bad Bot Report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked bad bot requests, anonymized over thousands of domains. The goal of this report is to provide meaningful information and guidance about the nature and impact of these automated threats.

Bot attacks are often the first indicator of fraudulent activity online, whether it’s validating stolen user credentials and credit card information to later be sold on the dark web, or scraping proprietary data to gain a competitive advantage. Often bots are used to surveil applications and APIs in an attempt to discover vulnerabilities or weak security. Online fraud from automated bot attacks is not only a threat to the business, but it is first and foremost a risk to customers. Bad bot attacks might cause customers to be unable to access their accounts or have sensitive information stolen from them due to successful account takeover fraud.

Bad bots mask themselves and attempt to interact with applications in the same way a legitimate user would, making them harder to detect and block. They enable high-speed abuse, misuse, and attacks on your websites, mobile apps, and APIs. They allow bot operators, attackers, unsavory competitors, and fraudsters to perform a wide array of malicious activities.

Such activities include web scraping, competitive data mining, personal and financial data harvesting, brute-force login, digital ad fraud, denial of service, denial of inventory, spam, transaction fraud, and more.

Note: This story contains promotional content. Learn more.

Guest
Ryan Windham
VP of Application Security at Imperva [@Imperva]
On Linkedin | https://www.linkedin.com/in/rwindham/

Resources
Learn more about Imperva and their offering: https://itspm.ag/imperva277117988

Imperva Bad Bot Report 2022: https://itspm.ag/impervwurd

Want the Bad Bot 101 Story? Check out the Imperva 2021 Bad Bot Report Podcast Series here: https://www.itspmagazine.com/their-stories/the-good-the-bad-and-the-ugly-the-bad-bot-report-2021-an-imperva-story

Be sure to listen to Part 2 of this conversation here: https://itspmagazine.com/their-stories/how-bots-fake-human-behavior-to-conduct-online-fraud-the-bad-bot-report-2022-part-1-an-imperva-story-with-ryan-windham

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity-podcast<...

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/redefining-cybersecurity-219447/from-technology-to-buzzwords-to-marketing-from-conversations-to-friend-24995498"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to from technology to buzzwords to marketing; from conversations to friendships to mergers and acquisitions | key learnings from rsa conference 2022 | redefining cybersecurity with eward driehuis on goodpods" style="width: 225px" /> </a>

Copy