Artwork

เนื้อหาจัดทำโดย Eric Sorensen เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Eric Sorensen หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal
Player FM - แอป Podcast
ออฟไลน์ด้วยแอป Player FM !

'There's No Bulletproof Vest' in Cybersecurity

51:29
 
แบ่งปัน
 

Manage episode 433187938 series 3352216
เนื้อหาจัดทำโดย Eric Sorensen เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Eric Sorensen หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

118 ตอน

Artwork
iconแบ่งปัน
 
Manage episode 433187938 series 3352216
เนื้อหาจัดทำโดย Eric Sorensen เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Eric Sorensen หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal

An ethical cyber researcher breaks down the 'tsunami of exposed data' he continues to uncover.
When it comes to solving industrial cybersecurity's biggest challenges, I think we have to continue to ask questions that simultaneously tackle basic blocking and tackling concerns, as well as those that lead to bad news. Both prevent us from putting our heads in the sand in trying to ignore the shortcomings of our current strategies, and I’d argue that a great deal of positive outcomes couldn’t be realized without repeatedly asking questions and not being afraid of the potential findings.

I also think our guest for this episode would agree. It’s our pleasure to welcome Jeremiah Fowler to Security Breach. He’s a leading cybersecurity researcher who has a wealth of knowledge on the industrial threat landscape, and recently uncovered a data vulnerability exposing 769 million personal records and 380,000 email addresses. Left unaddressed, this could have had highly damaging impacts on a global scale.

Watch/listen as Jeremiah shares his thoughts on:

  • The need to educate the C-Suite on risk, the real-world costs of cybersecurity shortcomings, and how you can't measure the loss of trust.
  • Why the human factor will always be the weakest link.
  • How nearly every issue in cybersecurity comes back to visibility.
  • The new challenges AI will continue to create.
  • The increasing threat stemming from new credential harvesting schemes that clone login pages.
  • The unintentional backdoor vulnerabilities created by legacy systems.
  • Why he misses the Golden Age of Bug Bounties.
  • The value of placing time limits on access to sensitive data.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click
here.

  continue reading

118 ตอน

ทุกตอน

×
 
Loading …

ขอต้อนรับสู่ Player FM!

Player FM กำลังหาเว็บ

 

คู่มืออ้างอิงด่วน