A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading

1
steam distributes malware in game form, RDP open from DOGE servers, hacking a supply chain for 50K
1:01:47
1:01:47
Play later
Play later
Lists
Like
Liked
1:01:47Youtube VOD: https://www.youtube.com/watch?v=zu_smyQGvG4 https://lcamtuf.substack.com/p/how-security-teams-fail https://cyberintel.substack.com/p/doge-exposes-once-secret-government https://x.com/SteamDB/status/1889610974484705314 – supply chain issues can crop up anywhere… are you blocking people from steam and popular software downloads online? h…
…
continue reading

1
Tanya Janca Talks secure coding, Semgrep Academy, and community building, and more!
1:27:18
1:27:18
Play later
Play later
Lists
Like
Liked
1:27:18Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec Join the Discord! https://discord.gg/brakesec #youtube VOD (in 1440p): https://www.youtube.com/watch?v=axQWGyd79NM Questions and topics: Bsides Vancouver discussion Semgrep Community and Academy Building communities What are ‘secure guardrails’ Reducing barriers between security and deve…
…
continue reading

1
Josh Grossman - building Appsec programs, bridging security and developer gaps
1:16:22
1:16:22
Play later
Play later
Lists
Like
Liked
1:16:22Youtube VOD: https://youtu.be/G3PxZFmDyj4 #appsec, #owasp, #ASVS, #joshGrossman, #informationsecurity, #SBOM, #supplychain, #podcast, #twitch, #brakesec, #securecoding, #Codeanalysis Questions and topics: 1. The background to the topic, why is it something that interests you? How do you convince developers to take your course? 2. What do you think …
…
continue reading

1
Managing messaging with management, becoming a CISO with Mary Gardner from Goldiknox
1:22:56
1:22:56
Play later
Play later
Lists
Like
Liked
1:22:56Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time based on new information and experiences and do not represent views of past, present, or future employers. Recorded: 08 …
…
continue reading

1
p2-accidentalCISO, building trust in new places
1:13:51
1:13:51
Play later
Play later
Lists
Like
Liked
1:13:51Full Youtube VOD: https://www.youtube.com/watch?v=uX7odQTBkyQ Questions and topics: Let’s talk about Mindful Business Podcast What’s the topics you cover? Topic #1: discuss your experiences when you were a new leader. What worked? What didn't? What would you have done differently? Do you emulate your manager's style? What have been your go-to manag…
…
continue reading

1
AccidentalCISO on BrakeSecEd, talking Leadership, SaaS development, and Appsec
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time based on new information, and do not represent views of past, present, or future employers. Recorded: 28 Jan 2024 Youtub…
…
continue reading

1
1st show of 2024! Our 10th Anniversary...
59:35
59:35
Play later
Play later
Lists
Like
Liked
59:35It's our 10th anniversary and the first show of our 2024 season! Amanda was on "7 minute security" https://7minsec.com/projects/podcast Check out the complete VOD at https://youtu.be/vbmEtkxhAMg Explicit language warning www.brakeingsecurity.com https://twitch.tv/brakesec https://bit.ly/brakesecytBy Brian Boettcher, Bryan Brake, and Amanda Berlin
…
continue reading
Youtube Video: https://youtu.be/IUDPlQaQg8M https://forms.gle/rf145MoN7cskwMjf8 is the link to the survey. Your information (should you choose to identify yourself) will not be shared outside of the BrakeSec Team. Thank all of you for listening and for your input. RSS feed for the audio podcast is at https://www.brakeingsecurity.com/rss website: ht…
…
continue reading

1
How to get more headcount, BLUFFs Vulnerability, and Ranty Clause debuts!
1:19:11
1:19:11
Play later
Play later
Lists
Like
Liked
1:19:11Show Topic Summary: Ms. Berlin proposes a question of how to gather more headcount with metrics, we discuss the BLUFFS bluetooth vulnerability, and “Ranty Claus” talks about CISA’s remarks of putting the onus on device product makers to remove choice for customers and implement secure defaults. #youtube VOD: https://www.youtube.com/watch?v=emcAzTx9…
…
continue reading

1
25Oct - okta breached (again), Energy company hit by supply chain attack, and you can help hire the best people
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53Subscribe on Twitch using Amazon Prime and watch us live: https://twitch.tv/brakesec Check out our VODs on Youtube: https://www.youtube.com/@BrakeSecEd Join the BrakeSecEd discord: https://discord.gg/brakesec News: https://www.darkreading.com/remote-workforce/1password-latest-victim-okta-customer-service-breach https://www.documentcloud.org/documen…
…
continue reading

1
Nicole Sundin - CPO at Axio - SEC compliance, usable security, setting up risk mgmt programs
1:06:08
1:06:08
Play later
Play later
Lists
Like
Liked
1:06:08Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers. Guest Bio: Nicole is the Chief Product Officer at Axi…
…
continue reading

1
John Aron, letters of marque, what does a "junior" job look like with AI?
1:25:21
1:25:21
Play later
Play later
Lists
Like
Liked
1:25:21Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers. Guest Bio: John is the CEO of Aronetics. An avid clim…
…
continue reading

1
Megan Roddie - co-author of "Practical Threat Detecion Engineering"
1:46:53
1:46:53
Play later
Play later
Lists
Like
Liked
1:46:53Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers. Buy here: https://subscription.packtpub.com/book/secu…
…
continue reading

1
meeting new people, walking on your keyboard causes issues, even google gets phone numbers wrong.
1:20:11
1:20:11
Play later
Play later
Lists
Like
Liked
1:20:11Check out our sponsor (BLUMIRA) at https://blumira.com/brake youtube channel link: https://youtube.com/c/BDSPodcast Full video on our youtube Channel! https://www.youtube.com/watch?v=BkBeLuM_urk https://www.rapid7.com/blog/post/2023/07/11/cve-2023-29298-adobe-coldfusion-access-control-bypass/ https://www.darkreading.com/remote-workforce/hacker-infe…
…
continue reading

1
Bsides Seattle and Austin, SecureBoot patch, and more
1:12:36
1:12:36
Play later
Play later
Lists
Like
Liked
1:12:36BrakeSec Show Outline – No Guest Show Topic Summary (less than 300 words) Bsides Seattle and Bsides Austin Youtube VOD: https://youtube.com/live/UGRaRSYj7kc Questions and potential sub-topics (5 minimum): Bsides Seattle update and Bsides Austin Patching the unpatchable https://en.wikipedia.org/wiki/Parkerian_Hexad Power and influence (is power bad?…
…
continue reading

1
lynsey wolf, conducting insider threat investigations, CASB and UEBA utlization to good use.
1:34:09
1:34:09
Play later
Play later
Lists
Like
Liked
1:34:09Show Topic Summary (less than 300 words) Insider threat still exists, Lynsey Wolf talks with us about HR’s role in insider threat, how prevalent investigations are in the post-pandemic work from home environment. Questions and potential sub-topics (5 minimum): What is the difference between insider threat and insider risk? Motivators of insider thr…
…
continue reading

1
3CX supply chain attack, Mark Russinovich and Sysinternals, CISA ransomware notifications, and emotional intelligence
1:24:50
1:24:50
Play later
Play later
Lists
Like
Liked
1:24:50Show Topic Summary (less than 300 words) 3CX supply chain attack, Mark Russinovich and Sysinternals, ransomware notifications from CISA, and emotional intelligence Youtube VOD: https://www.youtube.com/watch?v=afZHiBUr-2g Questions and potential topics (5 minimum): https://www.straitstimes.com/tech/downloading-a-cracked-version-of-fifa-23-or-hogwart…
…
continue reading

1
Dish Network is still busted, John Deere avoiding OSS requests, Is DAST dead?
1:29:37
1:29:37
Play later
Play later
Lists
Like
Liked
1:29:37Show Topic Summary (less than 300 words) Dish Network is still busted due to ransomware, your Pixel phone baseband RCE, Nothing runs like a Deere (away from OSS requests, anyway), and “Are we past DAST?” Questions and potential sub-topics (5 minimum): https://techcrunch.com/2023/03/15/dish-customers-kept-in-the-dark-as-ransomware-fallout-continues/…
…
continue reading

1
Nickolas Means talks about Security, Devops velocity, blameless orgs, and conferences infosec should attend
1:14:50
1:14:50
Play later
Play later
Lists
Like
Liked
1:14:50Guest info Name and Title: Nickolas Means, VP of Engineering at SYM Email/Social Media Contact: @nmeans on Twitter, @[email protected] on Mastodon Time Zone (if other than Pacific): Central (Austin, TX) Show Topic Summary / Intro We welcome Nickolas Means to the stream. Nick is the VP of Engineering at Sym, the adaptive access tool built for devel…
…
continue reading

1
SPECIAL INTERVIEW: John Aron and Jerod Brennen
1:21:10
1:21:10
Play later
Play later
Lists
Like
Liked
1:21:10BrakeSec Show Outline (all links valid as of 27 Jan 2023, subject to change) Is it scheduled? Yes || No|| Completed Date: 2023/01/26 Guest info Name and Title: John Aron, Founder/CEO of Aronetics Email: [email protected] Time Zone (if other than Pacific): Eastern Standard Guest info Name and Title: Jerod Brennen Email: [email protected] …
…
continue reading

1
Layoff discussions, another TMO breach, OneNote Malware, and more!
1:23:04
1:23:04
Play later
Play later
Lists
Like
Liked
1:23:04Lots of Layoffs (meta, Microsoft, Amazon, Sophos, Alphabet, Google) talk about the future effects of that, did it affect security? Attack surface management is risk management, Breaches and the TSA no-fly list leaked, and more! Full youtube video: https://www.youtube.com/watch?v=1Dgq8FpnWPw Questions and/or potential sub-topics (5 minimum): Layoffs…
…
continue reading

1
GPS car hacks, Google Threat report, notable topics of 2020, satellite threat modelling, twitter breach(?)
1:25:08
1:25:08
Play later
Play later
Lists
Like
Liked
1:25:08topics What were the biggest stories of 2022? Any notable trends that you saw https://acut3.github.io/bug-bounty/2023/01/03/fetch-diversion.html (fetch Diversion) I got 5 million steps in 2022! Looking to jog/run 350 miles https://medium.com/@jdowde2/the-security-threat-of-and-in-file-path-strings-d75ee695eb3a (danger of , and .. in file paths Goog…
…
continue reading

1
Josh-Whalen-risk-management-data_visualization-tools, value-creating activities -p2
1:07:48
1:07:48
Play later
Play later
Lists
Like
Liked
1:07:48Full stream video on Youtube: https://youtu.be/i1xpAfNFCvY John's Youtube channel, to find more training/contact information: https://www.youtube.com/channel/UC3ctyx980M8jLa_cEiQveLQ https://en.wikipedia.org/wiki/Capability_Maturity_Model_Integration ADKAR model: https://www.prosci.com/methodology/adkar CCE framework: https://inl.gov/cce/ Dashboard…
…
continue reading

1
John Whalen, data visualization tools, risk management, handling org risk-p1
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45Full stream video on Youtube: https://youtu.be/i1xpAfNFCvY John's Youtube channel, to find more training/contact information: https://www.youtube.com/channel/UC3ctyx980M8jLa_cEiQveLQ https://en.wikipedia.org/wiki/Capability_Maturity_Model_Integration ADKAR model: https://www.prosci.com/methodology/adkar CCE framework: https://inl.gov/cce/ Dashboard…
…
continue reading

1
Interview with Infrared - one of the Seattle Community Network organizers
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28https://youtu.be/iW39Mugj4OM -Full stream video (interview starts at 28m22s) Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/brakesec Seattle Community Network - https://seattlecommunitynetwork.org/ https://medium.com/seattle-community-network/ Check Bryan out on Mastodon! MastodonBy Bryan Brake
…
continue reading

1
JAMBOREE - an Android App testing platform from @operat0r -part2
1:04:15
1:04:15
Play later
Play later
Lists
Like
Liked
1:04:15introducing @operat0r talked a bit about mobile device hacking and rooting/jailbreaking phones for testing Grab the powershell script here: https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy Check out the Youtube videos, including demo! Part2 is here: https://www.youtube.com/watch?v=RXgwUWpRuYA…
…
continue reading

1
JAMBOREE - an Android App testing platform from @operat0r
56:35
56:35
Play later
Play later
Lists
Like
Liked
56:35introducing @operat0r talked a bit about mobile device hacking and rooting/jailbreaking phones for testing Grab the powershell script here: https://github.com/freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy Check out the Youtube videos, including demo! Part 2 will be available soon! Part 1: https://youtu.be/U5SFav9h1L4…
…
continue reading
https://www.bnbchain.org/en/blog/bnb-chain-ecosystem-update/ https://medium.com/@johnblatt23/uber-hack-reveals-weakness-in-the-human-firewall-8b44a87d43b4 https://securityintelligence.com/articles/what-to-know-honda-key-fob-vulnerability/ https://www.theregister.com/2022/10/07/binance_hack_566m/ https://www.bnbchain.org/en/blog/bnb-chain-ecosystem-…
…
continue reading

1
Uber Breach, MFA fatigue, who can help communicate biz risk?
1:09:10
1:09:10
Play later
Play later
Lists
Like
Liked
1:09:10https://www.theverge.com/2022/9/16/23356213/uber-hack-teen-slack-google-cloud-credentials-powershell https://www.zdnet.com/article/uber-security-breach-looks-bad-potentially-compromising-all-systems/ https://twitter.com/RachelTobac/status/1571542949606957057 Twitter: @boettcherpwned @infosystir @brakeSec @bryanbrake www.brakeingsecurity.com Twitch:…
…
continue reading

1
Manual Code reviews/analysis, post-infosec Campout discussion
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01checkout our website: https://www.brakeingsecurity.com Follow and subscribe with your Amazon Prime account to our Twitch stream: https://twitch.tv/brakesec Twitter: @infosystir @boettcherpwned @bryanbrake @brakesec Find us on all your favorite podcast platforms! Please leave us a 5 star review to help us grow!…
…
continue reading
Part 2 of our discussion this week with Amanda, Brian, and Bryan on sysmon, We discuss use cases from her talk, and best ways to get sysmon integrated into your environment. BrakeSec is: Amanda Berlin @infosystir Brian Boettcher @boettcherpwned Bryan Brake @bryanbrake https://www.brakeingsecurity.com Our #twitch stream can be found at: Https://twit…
…
continue reading
This week Amanda, Brian, and Bryan discuss sysmon, how it works to detect IOCs in your org, and how it extends beyond regular Windows event monitoring. oh... and it's available for Linux too! BrakeSec is: Amanda Berlin @infosystir Brian Boettcher @boettcherpwned Bryan Brake @bryanbrake https://www.brakeingsecurity.com Our #twitch stream can be foun…
…
continue reading

1
Tanya Janca, Securing APIs, finding Security Champions, and accepting Risk
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37Tanya Janca, also known as @SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countl…
…
continue reading

1
Tanya Janca on secure coding practices, Swagger docs, and why documentation matters
39:53
39:53
Play later
Play later
Lists
Like
Liked
39:53Tanya Janca, also known as @SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countl…
…
continue reading

1
PYPI enables 2FA, some devs have a problem with this
56:22
56:22
Play later
Play later
Lists
Like
Liked
56:22Full #twitch VOD here (prime sub or paid sub required): https://www.twitch.tv/videos/1528342722 https://github.com/untitaker/python-atomicwrites https://thehackernews.com/2022/07/pypi-repository-makes-2af-security.html Twitch streams (175+ hours of content!): Https://twitch.tv/brakesec www.brakeingsecurity.com Twitter: @infosystir @boettcherpwned @…
…
continue reading

1
JW Goerlich on Training, phishing exercises, security metrics,getting the most from user training
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08JW Goerlich - “Wolfgang is a cyber security strategist and an active part of the Michigan security community. He co-founded the OWASP Detroit chapter and organizes the annual Converge and BSides Detroit conferences. Wolfgang has held roles such as the Vice President of Consulting, Security Officer, and Vice President of Technology Services. He regu…
…
continue reading

1
RSA conference, Zero Trust, SSO, 2FA, and multi-cloud tenancy with J Goerlich
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:08
…
continue reading

1
jon-dimaggio-part2-threat intel-hacking back-analyzing malware
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare) Topics: discusses his book, threat intel as a service, why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more …
…
continue reading

1
Jon DiMaggio_Art-of-cyberwarfare_hacking_back-insider-threat-messaging_P1
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare) Topics: discusses his book, threat intel as a service, why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more …
…
continue reading

1
news, infosystir's talk at RSA, conti has an 'image' problem
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42https://www.reuters.com/technology/tesla-cars-bluetooth-locks-vulnerable-hackers-researchers-2022-05-17/ https://portswigger.net/daily-swig/us-revises-policy-regarding-computer-fraud-and-abuse-act-will-not-prosecute-good-faith-research https://www.securityweek.com/conti-ransomware-operation-shut-down-after-brand-becomes-toxic https://portswigger.ne…
…
continue reading

1
Mieng Lim, Ransomware actions, using insurance to offset risk, good IR/PR comms
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17Full VOD here (must subscribe to Twitch): https://www.twitch.tv/videos/1478955254 Mieng Lim, VP of Product at Digital Defense by HelpSystems Topic she will discuss: Outsmarting RaaS: Strategies to Implement Before, During, and After a Ransomware Attack Webinar: https://www.digitaldefense.com/resources/videos/webinar-outsmarting-raas-strategies-agai…
…
continue reading
Mieng Lim, VP of Product at Digital Defense by HelpSystems Topic she will discuss: Outsmarting RaaS: Strategies to Implement Before, During, and After a Ransomware Attack Webinar: https://www.digitaldefense.com/resources/videos/webinar-outsmarting-raas-strategies-against-ransomware-attacks/ https://www.digitaldefense.com/blog/infographic-the-latest…
…
continue reading

1
Mick Douglas on threat intel, customer worries about being hacked, and more
1:06:45
1:06:45
Play later
Play later
Lists
Like
Liked
1:06:45@bettersafetynet @infosystir @boettcherpwned @bryanbrake @brakeSec Discord Invite! "please click OK to accept the Code of Conduct in the 'Rules-and-info' channel" https://discord.gg/jhzm4bK9 #AmazonMusic: https://brakesec.com/amazonmusic #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://brakesec.com/pandora #RSS: https://brakesec.com/Brak…
…
continue reading

1
news, farmers affected by ransomware, protestware for the 3rd time, trusting opensource
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40https://www.cyberscoop.com/dhs-bug-bounty-122-vulnerabilities-27-critical-hackers/ https://securityaffairs.co/wordpress/130564/hacking/atlassian-jira-authentication-bypass-issue.html https://confluence.atlassian.com/jira/jira-security-advisory-2022-04-20-1115127899.html https://www.coalfire.com/the-coalfire-blog/research-reveals-cyber-risk-is-the-b…
…
continue reading

1
Mick Douglas discusses What2Log, and guidance in light of Okta incident
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41https://what2log.com/ https://twitch.tv/brakesec https://www.brakeingsecurity.com @bettersafetynet @infosystir @boettcherpwned @bryanbrake @brakeSecBy Brian Boettcher, Mick Douglas, and Bryan Brake
…
continue reading

1
logging analysis, log correlation, and threat analysis dicussion continues - p2
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34https://twitch.tv/brakesec www.brakeingsecurity.com @infosystir on Twitter @bryanbrake @boettcherpwnedBy Amanda Berlin and Bryan Brake
…
continue reading

1
Amanda and Bryan discusses log analysis, finding, IOCs, and what to do about them.
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37https://twitch.tv/brakesec www.brakeingsecurity.com @infosystir on Twitter @bryanbrake @boettcherpwnedBy Amanda Berlin and Bryan Brake
…
continue reading

1
Shannon Noonan and Stacey Cameron - process automation -p2
1:15:34
1:15:34
Play later
Play later
Lists
Like
Liked
1:15:34Shannon Noonan and Stacey Cameron - QoS Consulting https://www.bizagi.com/en/blog/digital-process-automation/4-ways-to-deliver-change-management-for-process-automation https://www.forrester.com/blogs/the-new-change-management-automated-and-decentralized/ https://www.tibco.com/reference-center/what-is-process-automation https://kissflow.com/workflow…
…
continue reading

1
Shannon Noonan and Stacey Cameron - process automation
59:24
59:24
Play later
Play later
Lists
Like
Liked
59:24https://www.twitch.tv/brakesec Youtube video (full version): https://www.youtube.com/watch?v=eRwYB22XMNw Shannon Noonan and Stacey Cameron - QoS Consulting https://www.bizagi.com/en/blog/digital-process-automation/4-ways-to-deliver-change-management-for-process-automation https://www.forrester.com/blogs/the-new-change-management-automated-and-decen…
…
continue reading

1
K12SIX-project-Doug_Levin-Eric_Lankford-threat_intel-edusec-p2
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09For context, we at the K12 Security Information Exchange (K12 SIX) are a relatively new K12-specific ISAC – launched to help protect the US K12 sector from emerging cybersecurity risk. One of our signature accomplishments in our first year was the development and release of our ‘essential protections’ series – an effort to establish baseline cybers…
…
continue reading