Their Story | Silverfort | A Conversation With Dana Tamir

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Dana Tamir

During RSA Conference 2020, we had a chance to connect with Dana Tamir from Silverfort to get the updated Silverfort story. During our chat, Dana points out that enabling secure authentication and zero trust policies without requiring an agent or proxies or software changes should be the primary goal for organizations looking to keep bad actors out while ensuring secure access to those that have been granted authorized access to the business resources.

Dana provides several use cases and workflows to help demonstrate the scenarios discussed during our chat. How many of these scenarios does your organization deal with? Have a listen to learn more.

Their Story | Juniper Labs | A Conversation With Mounir Hahad

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Mounir Hahad

During RSA Conference 2020, Juniper Networks announced its ability to analyze encrypted traffic, bringing visibility and context to the network where threats and attacks continue to move toward a world of darkness. From the release: It permits organizations greater visibility and policy control over encrypted traffic, without requiring resource-intensive SSL Decryption.

We were able to speak with Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks, to learn more about these new capabilities and the impact it can have on an information security program as organizations try to maintain visibility and control over their networks, systems, and data.

Have a listen as Mounir shares his thoughts on today’s state of cybersecurity, comparing it to the era of industrialization.

Vulnerability Stats Report 2020 Review | Their Story | Edgescan | A Conversation With Eoin Keary and Rahim Jina

A Their Story conversation with Sean Martin and Marco Ciappelli

Guests: Eoin Keary and Rahim Jina

For five years running, Edgescan has conducted an annual survey to analyze the state of vulnerability assessment programs within organizations across the globe. With new data points in hand, giving their team the ability to evaluate year-over-year changes, this year’s results raise the obvious question: “Have we learned anything to help make our businesses more secure?”

Some technologies aren’t the silver bullet, and the human element is still critical as they bring the risk assessment to the table. With this point in mind, assuming you are human, you may want to listen to this chat and also read their report to get a view into how you can work with your peers—and the technology—to reduce risk through full-stack vulnerability management.

The Importance Of CyberSecurity Storytelling | Their Story | RSA Security | A Conversation With Rohit Ghai

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Rohit Ghai, CEO, RSA Security

The InfoSec industry has done a lot of work to raise awareness around the risks we face in business and society, thereby increasing the appreciation for the need to protect our companies and ourselves from cybercrime, fraud, and other dangerous activity associated with being connected to the Internet. Unfortunately, the stories that have been told—and the stories that the media pick up and amplify—are often those that paint a picture of doom, and gloom, and failure.

Ultimately, it may be that we aren't defining the ending to our stories in a way that we want them to end. To this end, do we know what does it mean to win? For which side? Do we know what it means to lose? For which side? And, most importantly, does winning on one side equal losing on the other? In both directions?

Answering these questions can help us change the way we want our stories to be heard; it can help us improve the way we tell our story — can help us change the way we live our story.

Are you ready to change the narrative for a better story, a better outcome? Have a listen to this story, and then start telling yours.

Their Story | CyberSaint | A Conversation With Alison Furneaux and Padraic O’Reilly

A Their Story conversation with Sean Martin and Marco Ciappelli

Guests: Alison Furneaux and Padraic O’Reilly

The concept of governance, risk, and compliance (GRC) has been around since the mid-2000s. GRC continues to change, as do business models, the technologies that run the business, and the cyber threats that threaten to bring it to a screeching halt.

Of course, the role of the CISO has also changed, but has it kept up with the times?

Listen to the CyberSaint story to hear how they identified this problem and have been working diligently to help CISOs overcome the challenges they face.

Their Story | Lucy Security | A Conversation With Colin Bastable

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Colin Bastable

Organizations are defined by their culture—and the culture is determined by the collection of individuals that make up the organization. Organizations that take information security seriously and work with their employees to understand and embrace their role in protecting themselves and the business are the organizations that stand a better chance of thwarting off an attack.

According to today’s guest, Colin Bastable, 97% of all of the threats originate with some form of social engineering. So, organizations must work on having an understanding of the human angle as it relates to these threats—both the employees as humans and the cybercriminals as humans. Organizations must understand the human motivation—both to attack and to protect themselves. People are people on all sides of the equation—it’s just how it is; it’s just how they are.

Once you have this understanding, coupled with how the protection technologies work, you can begin to identify the gaps between what the technology can offer and what the humans can do for themselves. It’s this gap that needs to be closed.

Are you interested in understanding how to identify and close this gap? Have a listen to this chat with Colin—he’s seen this in action all around the world in many different industries.

Their Story | Accedian | A Conversation With Michael Rezek

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Michael Rezek

For years, organizations have been monitoring network traffic to squeeze every ounce of performance out of their systems and applications. The data collected and analyzed gives organizations tremendous insights into what changes need to be made to keep things up and running at top speed. This data is gold.

Many organizations stop mining and analyzing their data once they see that there’s gold there—effectively letting the platinum in their data to wash downstream. The platinum—at least in this story anyway—is security data.

Fortunately, Michael Rezek knows a bit about network data analysis, network performance, and network security—and recognizes the value of both the gold and the platinum sitting in the network data they monitor.

Have a listen to Michael as he shares the Accedian story, describing the journey they’ve taken as a company—and the journey they are helping others take as they continue down the path of their digital transformation.

Their Story | Cequence Security | A Conversation With Jason Kent

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Jason Kent

Since we are humans, we seem to be repeating all of these same mistakes in a different part of the application world—the API layer. We're forgetting that the API layer is really meant for computer to computer communications, changing the game for how we approach authentication, access control, communications, instructions, behaviors, and more. As one example, things like rate limiting can really become a problem if not addressed.

To help us understand this world better, have a listen to Jason Kent, Hacker in Residence at Cequence Security, as he shares with us some of the fun ways he hacks on applications—namely through APIs.

Their Story | BlackCloak | A Conversation With Christopher Pierson

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Christopher Pierson

Sometimes it takes some creative thinking when it comes to gaining an understanding of how information security and cybersecurity work—and why they matter, not only during work hours but after hours as well.

To help you with this thinking process, have a listen to this chat with Chris Pierson, founder, and CEO of BlackCloak, as he tells us (you) his story about the creation of BlackCloak and its cyber protection services for executives and high net worth individuals.

Who knows, you might even get a glimpse into what a BlackCloak is.

Enjoy!

Their Story | WeSecureApp | A Conversation With Venu Rao

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Venu Rao

The team at WeSecureApp have been embracing that recognition, the positive feedback they receive from their clients, and the constructive feedback from the RSA Conference Launch Pad judges (in Singapore) to continue to expand their team, their presence around the world, and their product line — all with a focus on meeting customer need and market fit.

With an expansion into the US (with a Dallas, Texas office) and a key member added to their advisory board, WeSecureApp has found themselves benefiting from several accelerator programs that are setting them up for long-term growth and success.

Listen in as Venu tells us more about these activities and what the future holds for WeSecureApp.

Their Story | ReversingLabs | A Conversation With Mario Vuksan and Tyson Whitten

A Their Story conversation with Sean Martin and Marco Ciappelli

Guests: Mario Vuksan, CEO & Co-Founder, ReversingLabs | Tyson Whitten, VP, Global Marketing, ReversingLabs

CHAPTER 2: Does the black box of machine learning and artificial intelligence give you a headache? If so, it’s like the lack of visibility into how new (dare we say, “next-gen”) information technologies work. This is beginning to give pause to many organizations looking to leverage such technologies to help them succeed with their IT security management programs. Without a view into how the data is analyzed paired with a lack of visibility for how the results can be connected back to the operations—and the business—means that organizations are forced to blindly trust that their vendors are doing the best things, the right thing.

So, how come we can’t get this visibility? What’s holding us back? Have a listen to Mario’s and Tyson’s view to hear how they see these headaches being treated in the not-so-distant future.

Their Story | Virsec | A Conversation With Willy Leichter

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Willy Leichter

Our guest today, Willy Leichter, points out that the National Vulnerability Database has been tracking between 5,000 to 7,000 vulnerabilities every year; a figure that went up to about 20,000 a couple years ago, and where we're now seeing 10,000 to 15,000 per month. Trying to keep up with this trend from a patch management perspective as the sole means to eliminate vulnerabilities and mitigate risk to the business isn't scalable; it isn't feasible.

Still, business marches on—technology marches on—security is always going to have to run fast to keep up. Most organizations accept that. But it can be daunting at times. Have a listen to this chat with Willy to get a different perspective on this problem. With any luck, you'll have a fighting chance to make it through tomorrow, and the next day, and the day after that without a serious problem with your apps.

Their Story | DataLocker | A Conversation With Jay Kim

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Jay Kim

How do organizations ensure that those devices (and related ports) don’t get misused and abused — especially when there are 10s of thousands of users, each potentially with multiple external devices?

That’s where centralized management comes into play, giving IT leaders and business owners the ability to define and enforce acceptable use policies aligned with their business needs and their risk appetite. Listen to today’s story by Jay Kim as he shares some detailed use cases.

Their Story | SIRP | A Conversation With Faiz Shuja

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Faiz Shuja

We’ve arrived at a time in business where we can no longer rely on manually fighting the status quo as a means to protect the organization from compromise. We’ve reached a point where organizations must prepare for the inevitable and take aim at defining and implementing the best possible breach response capabilities—driven by intelligence and orchestrated with automation. Listen to today’s episode as Faiz Shuja shares the SIRP story with us, giving us a view into what the future holds for the security orchestration and automated response market.

Have a listen to this story!

Their Story | BYOS | A Conversation With Matias Katz

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Matias Katz

Listen to today’s episode as Matias Katz tells us the BYOS story: the origins of the company, how Matias’ upbringing and education helped to shape the company, and how his passion and drive for knowledge and learning are helping him to take the company into the future—a future full of countless bad actors looking to compromise and exploit some of the billions of Internet-connected devices for their financial gain.

Their Story | Prevailion | A Conversation With Karim Hijazi and Adam Flatley

A Their Story conversation with Sean Martin and Marco Ciappelli

Guests: Karim Hijazi and Adam Flatley

The question for you as you listen to this conversation is: “are you zeroing in on what matters for your entire business ecosystem, or are you stuck in a world where updating patches, changing firewall rules, and running AV scans is still your top priority?”

Reinventing Privileged Access Management | A Dialogue With Martin Cannard, VP, STEALTHbits

A Their Story interview with Sean Martin

Today’s guest is Martin Cannard, Vice President, Product Strategy (Privileged Access Management) at STEALTHbits Technologies. Martin and I look at the past to explore how the world of access control and privileged access management (PAM) has changed, mainly driven mobile, cloud, and the Internet of Things.

Martin shares some stories about how organizations are changing the way they define and implement privileged access management solutions, turning the technology—and their operational infrastructure—on its side business to better support business requirements without opening up the gates too wide nor closing them down too much.

Ultimately, it’s about finding that “just right” access model that accounts for changes in risk, threat, context. This isn’t an easy task when faced with growing technical complexities, increasingly-demanding business processes, and the need to scale to meet both market and end-user demands.

After you listen to this story by STEALTHbits, check to see if your perception of privileged access management has changed—and, if so, how.

Their Story At Hacker Summer Camp | Las Vegas 2019 | Ronan Cremin, Afilias

A Their Story interview with Sean Martin & Marco Ciappelli
Guest: Ronan Cremin, CTO, Afilias

Marco and I are fortunate in that we get to hear a lot of stories. Of course, as one of our mantras spells out, we are always on the lookout for stories that are better than others.

This story is that and a bit more. It is made of the stuff that nightmares are made off; to the point that Marco has been inspired to write a Cybersecurity Halloween Short Story after hearing this one. We shall see if that is actually going to happen. 

in the meantime, it’s probably a good to take a deep breath before you listen (or watch a snippet of) our conversation with Ronan to the nightmare people may have gotten themselves into. Maybe it that new phone deal you got online wasn’t that good of a deal after all. Perchance it was just a nightmare. Perhaps it wasn’t.

Their Story At Hacker Summer Camp | Las Vegas 2019 | Yaron Kassner, Silverfort

A Their Story interview with Sean Martin & Marco Ciappelli
Guest: Yaron Kassner, Co-Founder and CTO | Silverfort

What if you could have your cake and eat it too? No matter how many times you hear this, it still sounds good. Conversely, however, we can’t even remember how many conversations we’ve had over the years, about passwords and how inconvenient and old-fashioned they are—both for today’s businesses and for personal lives operating in the digital age.

Unfortunately not much has changed and, for a while, it looked like the best way to deal with adding extra security to a password was to verify it with yet another password. It felt like we were trying to maximize protection while minimizing disruptions; seemingly, this was (and still is?) as impossible as tasting that sweet cake and still having it. Drats!

Well, times are changing, and technology is finally coming to the rescue. Here is a story about it.

With over a decade in the cybersecurity industry, today’s guest — Yaron Kassner, Co-Founder of and CTO at Silverfort — tells a story of a career path that takes him through the data science and machine learning halls of Microsoft and Cisco before co-founding the Isreali-based firm, Silverfort, in 2015.

It's a good story. Have a listen. Just input your password when prompted.

Their Story At Hacker Summer Camp | Las Vegas 2019 | Will Glazier and Matt Keil, Cequence Security

A Their Story interview with Sean Martin & Marco Ciappelli
Guests: Will Glazier, Head of CQ Crime Research and Matt Keil, Director of Product Marketing | Cequence Security

During Black Hat, we had the chance to meet two of these individuals from Cequence Security: one is a security research veteran that has been with the company for a long time and the other a new-hire but with a long and solid history of looking after product marketing for another very well-known security brand.

During our chat, we get to talk about a lot of things, including the birth and evolution of a start-up; the potential liability a company may incur if they have a massive infrastructure built of IoT devices that get compromised, and; bots and other automated devices that can be turned into a cyber army with evil plans and unpleasant consequences for the Internet and its users.

It was a wild ride; a conversation that we truly enjoyed. We invite you to join us as Will and Matt take us up and down the rollercoaster of InfoSec.