Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Security Stories

Security Stories

Cisco Secure

Security Stories shares the tales of people within the security industry and the wider world. As technology becomes more powerful, and our digital lives expand to new reaches, security continues to remain as a fundamental framework of our society. Storytelling is how we get these powerful messages across. Keeping security at the center, we interview leaders in and out of the security industry and share their insights that shine new light to how we think and plan around risk and manage the challenges of today and tomorrow. Hosted by Tedx speaker, Cyber Security Specialist and Communications expert, Tazin Khan. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html

profile image

2 Listeners

bookmark
Share icon

All episodes

Best episodes

Top 10 Security Stories Episodes

Goodpods has curated a list of the 10 best Security Stories episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Security Stories for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Security Stories episode by adding your comments to the episode page.

This episode of Security Stories is a little different from usual, but for good reason! With the help of some very special guests, we take a comprehensive look back at the Not Petya cyber attack, the Sandworm hackers, and the context behind this act of cyber warfare.

First to join us is Noureen Njoroge, a senior cybersecurity engineer and threat intelligence analyst at Cisco. Noureen is a passionate advocate for women and minorities in the IT industry, and is the founder of Cisco's global mentoring program, as well as the president of North Carolina Women in Cybersecurity (WiCyS) Affiliate chapter. We learn about Noureen's passion for mentoring, as well as her thoughts on the threat landscape.

Then we're joined by Andy Greenberg, senior cybersecurity investigative journalist for Wired Magazine, and author of the book "Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers". The book tells the true story of the desperate hunt to identify and track an elite team of Russian agents who are bent on digital sabotage. It starts out as a detective story but it soon turns into a disaster story as the truth starts to come to the fore.

Andy also talks to Hazel about how he spent time in Russia and Ukraine, gathering sources, and learning about this new emergence and type of cyber criminal. And he has a fascinating take on how the hacker culture has evolved in recent years.

Finally, we're joined by senior threat analysts from the Cisco Talos team, including Craig Williams, Matt Olny and Mitch Neff. We chat to them about what happened on the day of the attack (June 27th 2017), the process the investigative team used to find out what was really happening, and what impact the attack has left on the threat landscape and the world at large.

This really is a fascinating episode with some incredible guests, who each share their insights, experience and advice for the benefit of the wider cybersecurity community.

profile image

2 Listeners

bookmark
plus icon
share episode

Trigger warning - {child abuse} content filtration is a sensitive topic that covers some of the harsh realities of our world that folks on trust and security teams have to deal with on a daily basis.
In this episode, Taz speaks with Yasmin Abdi, CEO and Founder of NoHack and Security engineering manager at Snap. They cover a wide range of topics from Yasmin's career trajectory, her experience on a content filtration team and her transition into entrepreneurship as a new founder.
Yasmin Abdi is an experienced technical advisor on security, privacy, and data protection. She has over 5 years of experience as a software engineer and has built and managed in-house software and security solutions at Snap, Meta, and Google. Yasmin was also a founding member of Meemo, an AI-powered social finance app, which was recently acquired by Coinbase. The technologies she has built are currently being used by 100+ million daily active users worldwide.

Ms. Abdi has several years of experience leading organizations, providing thought leadership, and assisting private sector clients in the areas of software engineering, security infrastructure and best practices, IT solutions, and corporate strategy consulting. Given her unrelenting entrepreneurial spirit and keen interest for information security, Yasmin founded noHack, a government contracting company focused on cyber security services and solutions. As the CEO of noHack, Ms. Abdi takes a hands-on approach to delivering high-impact solutions. Her goal is to protect her clients by providing an extra layer of all-around protection.

Outside of tech, Ms. Abdi’s passion is to help bridge the gap between minority students and tech companies. Yasmin has mentored and helped over 50 students land jobs within tech.

Ms. Abdi also holds a Bachelor of Science in Computer Science with a focus in cyber security engineering from the University of Maryland.

Here’s Yasmin, hope you enjoy.
Links:

bookmark
plus icon
share episode

Today we welcome two guests to the Security Stories pod. Firstly Martin Lee from Talos drops by to give us an update on wiper malware, and how it’s been playing a part in cyber attacks on Ukrainian organizations and infrastructure.
We talk about the history of wiper malware, where it’s cropped up before, it’s role in the kill chain and possible threat actor motivations, as well as what organizations can be doing to prevent this type of attack.
Secondly, we welcome Jerry Gamblin, Director of Security Research at Kenna Security to join us for an in depth chat about his career. Jerry’s story is a really interesting one, from starting out on the IT helpdesk, to working on security networks at the Misouri House of Representatives, and onto his role at Kenna where he has built several tools to help people understand the different types of vulnerabilities and how to mitigate them.
We discuss Jerry’s approach – how he inspires his team to think differently, and how personally he’s driven a sense of thinking outside of the job description. We also discuss how organizations can deal with the ever growing list of new vulnerabilities, and how you can prirotise them.
Head here for Kenna's Prioritization to Prediction report
Head here for Jerry's vulnerability analysis and graphing CVE.ICU

bookmark
plus icon
share episode

Since there’s been a lot of discussion and debate about Extended Detection and Response (XDR) at the moment, we thought we would bring on two experts to talk about it.
Enric Cuixeres is a Cisco Secure customer who has implemented an XDR strategy within his organization Leng D'Or. Our other expert is former US army CID special agent and computer forensic examiner Jessica Bair. Jessica is the Director of Technical Alliances at Cisco, who has been helping many of our customers with their XDR strategies.
We discuss the practical implications of implementing XDR, as told by people who have been there and done it – and also what benefits will it really bring, including how it can help overburdened security staff.
For more on this topic, take a look at our ebook "Extended Detection and Response for Dummies."
Learn more about the Cisco Gateway community as mentioned in the episode.
Before that, Lindsey O’Donnell Welch, executive editor of Decipher, is back with us for the second week in a row. Lindsey discusses the just-announced Cyber Safety Review Board and its role in assessing “significant cybersecurity events”. For more information about this check out Decipher's report.
And finally, you can view the on-demand broadcast "Defending Against Critical Threats" in which six experts from across Cisco Secure came together to analyze what's been happening in the realms of ransomware, supply chain attacks, vulnerabilities, log4J, Emotet and the rise in Mac OS malware.

bookmark
plus icon
share episode

On today's episode we’re heading into the murky waters of online manipulation campaigns, and particularly how they’re used to try and influence political elections.
To do that, we welcome back Theresa Payton, the first female CIO of the White House and author of 'Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth'. We also welcome for the first time, Nick Biasini. Nick is a threat researcher within Cisco Talos and recently published a paper called ‘The Building Blocks of political disinformation campaigns’, which is part of Talos’ hands on research into election security.
We chat about some of the things that shocked Theresa when she was doing her research into manipulation tactics, as well as the amplification methods that are being used to spread certain lies online. Plus, we talk about what can be done to curb these campaigns with only a few weeks to go until the United States general election.
This is a really fascinating discussion, and whilst it highlighted the huge challenges that we’re facing at the moment, Nick and Theresa shared a lot of great information on how we can overcome them.
Also in this episode, Ben Nahorney shares his latest research on current threat trends. This time we rank the Indicators of Compromise that organizations have encountered grouped by particular topics, including ransomware, credential stealing, and looking at the top operating system IoCs.
Link to Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth'
Link to ‘The Building Blocks of political disinformation campaigns’

bookmark
plus icon
share episode

Today's guest is Stuart Coulson, director at Hidden Text Ltd, where he uses the skill sets and knowledge borne of many years in the security industry to help others.
It's probably fair to say that Stuart's journey in cybersecurity hasn't been the most traditional He’s been in sales, recruitment, engineering, working on UK government cybersecurity contracts, to being a deputy CISO. He is now the cybersecurity director of an online gaming company, in addition to managing Hidden Text.
In addition to discussing Stuart's career path in cybersecurity, we chat about managing social media as an infosec professional, and how to deal with imposter syndrome (it's an interesting take - stay with it!). We also discuss how improv comedy relates to cybersecurity, and Stuart has some great advice for anyone who wants to get into mentoring.
In the studio, Ben and Hazel discuss the rise of proxyware abuse, and why organizations and individuals need to be aware of this growing threat. This is based on some excellent research conducted by our Talos team, which you can read more about on this blog.
Also take a look at our brand new ebook, "Creating safe spaces in cybersecurity". This focusses on the topic of mental health and cybersecurity burnout. We’ve captured the stories of 20 people (both leaders and practitioners) from across the cybersecurity industry, and hope that by sharing their experiences, we’ll inspire anyone who is struggling to know they are not alone.
Finally, check out a few of Stuart's Hidden Text articles which we found particularly interesting:
Imposter syndrome does not exist
Dear infosec hiring managers
Episode time stamps:

0.00 - 18.28: Intro and discussing the rise of proxyware abuse
18:29 - 68.45: Interview with Stuart Coulson
68.46 - 79.18: Closing thoughts and outro

bookmark
plus icon
share episode
Security Stories - 40: Building trust, with Brad Arkin
play

10/29/21 • 80 min

On today's show our guest is Brad Arkin, Cisco’s Chief Security and Trust Officer.
Before joining Cisco (the very same day Cisco issued a work-from-home mandate in March 2020!), Brad was Adobe’s first Chief Security Officer. He grew the security function from just a few employees, to over 600 globally.
Early in Brad’s career, he co-founded the Software Security Group at Cigital and led the Application Security practice for AtStake. He was a pioneer in software security, helping code writers in commercial settings adopt a “built-in security” approach throughout the development process rather than treating security as an afterthought.
Since joining Cisco, he has led the company’s rapid global Zero Trust architecture deployment to over 100,000 users across 120,000 devices in just five months. He is focused on evolving the Cisco Secure Development Lifecycle and security governance models to help accelerate Cisco’s transition to software and services.
Also on today's show, we invite Mitch Neff from the Beers with Talos podcast to join us, to see if we can settle the score from our 'Would I lie to you?' episode which ended in a heart breaking tie.
As Ben tells his security career story, can Mitch win the title for his team? Or will he lose it all? Will anyone's dignity remain intact?
Plus, Ben has been visiting the database vaults and has some excellent research on the top threats encountered by Cisco Secure Firewall, and the Secure IPS component and Snort rules used to control and inspect the traffic on the network.
To see Ben's research in full, visit https://blogs.cisco.com/security/threat-trends-firewall

bookmark
plus icon
share episode

Welcome to a very special edition of Security Stories, as we go head to head with the Beers with Talos podcast team.
Using a live game show format based on the British show 'Would I lie to you?' we present "facts" about significant moments in our security careers—but can the teams work out who is telling the truth, and who is bluffing?
This episode features Mitch Neff, Joel Esler and Matt Olney on the BWT team. Joining Hazel on the Security Stories team are Dennis Fisher of Decipher, and Pam Lindemoen, CISO Advisor for Cisco Secure.
To learn if we can sort fact from fiction, don't miss this special edition: "Would I lie to you? Security Stories versus Beers with Talos."
To learn more about Talos careers, head to https://talosintelligence.com/careers

bookmark
plus icon
share episode

In a break from our usual format, today I wanted to bring you highlights of some of my favorite interviews with security leaders so far.
There's a definite theme to the clips I've chosen - it's all about what we can do to help each other. There are ideas here about some of the things that we can do to make sure the cybersecurity industry becomes more accessible in the future, in terms of attracting talent from more places. And there are important discussions on the role of an ally; those who can give up their privilege in order to give others a boost.
In the intro I mention a competition that we're running to give away free copies of Theresa Payton's book 'Manipulated: Inside the Cyber War to hijack elections and distort the truth'. Listen to the question, and send in your answers as a direct message to us on either of the below social networks, by the closing date of 31st August for a chance to win a free copy. Terms and conditions apply.
Link to Cisco Secure on Facebook
Link to Cisco Secure on Twitter

bookmark
plus icon
share episode

In today’s episode you’ll hear from Joe Toscano. Joe is an award winning designer, published author, and international keynote speaker who left his role consulting for Google because he felt the industry was misusing data and that the issues needed to be addressed through innovation rather than strict regulation. Since leaving, Joe has written a book, called Automating Humanity, and has started DataGrade, both focused on increasing technology literacy and purpose-driven innovation. You may have seen Joe featured in The Social Dilemma or his TEDx Talk, “Want to work for Google? You already do,”.

Joe and Taz have been running in the same data ethics advocacy circles for some time but officially met in 2021 during their joint keynote speech alongside Brittany Kaiser at Eurpol’s annual EDEN conference.
In our chat, you’ll hear about Joe’s origin story – mathmetician, turned psychology buff turned data scientist. Through his changing career one factor remained strong – data ethics. We cover his journey into data ethics advocacy, what he’s doing with his new start up DataGrade and most importantly – you’ll learn what resilience means to him. Here’s Joe – hope you enjoy.

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Security Stories have?

Security Stories currently has 75 episodes available.

What topics does Security Stories cover?

The podcast is about Security, Team, Management, Leadership, Podcasts, Technology, Business and Cybersecurity.

What is the most popular episode on Security Stories?

The episode title '8: Sandworm, Not Petya and the hunt for the most dangerous hackers, with Andy Greenberg, Noureen Njoroge, and Cisco Talos' is the most popular.

What is the average episode length on Security Stories?

The average episode length on Security Stories is 58 minutes.

How often are episodes of Security Stories released?

Episodes of Security Stories are typically released every 14 days, 4 hours.

When was the first episode of Security Stories?

The first episode of Security Stories was released on Mar 11, 2020.

Show more FAQ

Toggle view more icon

Comments