エピソード
-
In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions.
The evolution of Google SecOps and the role of Chronicle and SiemplifyWhat is SecOps? A Simplified ExplanationThe Broken promise of SIEM and how SecOps is evolvingBest practices for implementing effective SecOps in modern enterprisesThe Future of SecOps: AI and Cloud-Native Solutions
Topics Covered:Key Takeaways:
Google SecOps integrates advanced threat intel and automation to improve security efficiency.SIEM tools have evolved, but many organizations still struggle with data hygiene and correlating meaningful alerts.The future of SecOps lies in risk-based, cloud-native solutions, combining AI with human oversight for smarter, faster decision-making.Mentions & References:
Google Chronicle and Siemplify (now part of Google SecOps)Threat Intel through the Mandiant acquisitionVirusTotal integration for enhanced threat detectionTime Stamps with Highlights:
00:00 - Introduction to Enterprise IT Security01:04 - Meet the experts: Brad Bussie and Svetla Yankova02:00 - Exploring the evolving landscape of SecOps03:40 - The journey of Google SecOps: From secret moonshot project to powerful tool05:44 - Understanding SecOps: A simplified explanation07:17 - The rise of automation and AI in security operations10:24 - The evolution of SecOps technology and Google’s role15:18 - The broken promise of SIEM: Why many systems fall short20:00 - How SIEM is evolving with automation, SOAR, and AI26:30 - Best practices for effective SecOps implementation30:45 - The future of SecOps: AI, automation, and risk-aware solutionsFollow Us:
LinkedIn: https://www.linkedin.com/company/e360solutionsFacebook: https://www.facebook.com/e360solutionX (Twitter): https://twitter.com/e360_solutionsYouTube: https://www.youtube.com/@e360solutionsAbout the Show: The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity trends.
About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises.
Visit us: www.e360.com
(00:00) - Introduction to Enterprise IT Security(01:04) - Meet the Experts: Brad Bussie and Svetla Yankova(01:36) - Exploring the Evolving Landscape of SecOps(02:58) - The Google SecOps Journey(05:44) - Understanding SecOps: A Simplified Explanation(08:22) - The Evolution of SecOps Technology(15:18) - The Broken Promise of SIEM(26:30) - Best Practices for Effective SecOps Implementation(29:56) - The Future of SecOps: AI and Cloud-Native Solutions(34:45) - Conclusion and Final Thoughts -
In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this wild west environment, protect their organizations from unseen threats, and ensure that AI innovations don't outpace security measures. Tune in to learn practical strategies for balancing AI adoption with robust security practices.
Topics Covered:
The rapid adoption of AI in businesses and its implications for security.What Shadow AI is and why it’s a growing concern.How security teams can keep up with the fast-paced AI environment.Practical tips for implementing AI governance and controls.The changing dynamic between business users and security leaders.Key Takeaways:
AI adoption is accelerating across industries, making it crucial for security teams to adapt.Shadow AI poses significant risks if not managed properly.Security leaders must be proactive in implementing tools and strategies to protect their organizations.Collaboration between business users and security teams is more important than ever.Time Stamps:
[00:00] Introduction and overview[01:18] The current state of AI adoption in businesses[10:34] The risks of Shadow AI and how to manage it[16:44] How security teams can stay ahead in the AI era[31:15] Real-world examples of AI transforming business practices[32:44] The future of AI in business and the role of security teamsFollow Us:
LinkedIn: https://www.linkedin.com/company/e360solutionsFacebook: https://www.facebook.com/e360solutionX (Twitter): https://twitter.com/e360_solutionsYouTube: https://www.youtube.com/@e360solutionsAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
(00:00) - Introduction and Potential Risks of GenAI(01:54) - Black Hat Insights and Shadow AI(06:32) - AI Security Implementation Challenges(17:58) - Live Demo: GenAI in Marketing(24:43) - Security Considerations for AI(40:25) - Future of AI and Closing -
エピソードを見逃しましたか?
-
Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue
In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader cybersecurity themes.
Topics Covered:
The CrowdStrike incident and its impact on organizationsBroader implications for other cybersecurity platformsStrategies for ensuring cyber resiliencyKey Takeaways:
Understand the details and scale of the CrowdStrike incident and how it affected organizations globally.Learn about the broader implications for other cybersecurity platforms and the importance of cyber resiliency.Gain insights into strategies for ensuring business continuity and preventing future widespread disruptions.Mentions & References:
CrowdStrike incidentMicrosoft updates and blue screen issuesStrategies for IT resilience and redundancyTime Stamps with Highlights:
00:00 - Introduction: Brad Bussie and Erin Carpenter discuss the episode's agenda01:37 - The CrowdStrike incident: Overview and impact04:00 - Broader implications for other cybersecurity platforms09:00 - Ensuring cyber resiliency: Lessons learned12:25 - Strategies for IT resilience and redundancy18:00 - Potential legal implications and GDPR considerations23:00 - Communicating with the board and stakeholders29:00 - Final thoughts and recommendationsFollow Us:
LinkedIn https://www.linkedin.com/company/e360solutionsFacebook https://www.facebook.com/e360solutionX (Twitter) https://twitter.com/e360_solutionsYouTube https://www.youtube.com/@e360solutionsAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
-
In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape.
Topics Covered:
Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public safety. Brad explores the importance of protecting personal data, particularly in public services, and offers measures to prevent such breaches.Cybersecurity in the Automotive Industry: A new study finds cybersecurity as the top concern among automotive manufacturers. With the rise of connected cars and autonomous driving, Brad delves into the vulnerabilities these technologies introduce and the steps manufacturers are taking to safeguard vehicles.Untrained Users Weaken Cyber Defense: Untrained users are often the greatest weakness in a cyber defense plan. Brad explains how human error leads to significant security breaches and the importance of comprehensive cybersecurity training to mitigate these risks.Key Takeaways:
Robust data protection measures are essential for public services handling sensitive information.The automotive industry's integration of digital technologies requires stringent cybersecurity practices.Investing in cybersecurity training and fostering a security-aware culture can significantly reduce human error-related breaches.Mentions & References:
Baltimore City's 311 services data breachHigh-profile automotive cybersecurity incidents (Jeep Cherokee and Tesla's autopilot system)2016 Democratic National Committee hackEquifax data breachTime Stamps with Highlights:
[00:00] Introduction and Overview[00:45] Data Breach in Baltimore: A Case Study[05:44] Cybersecurity in the Automotive Industry[11:08] Untrained Users Weaken Cyber Defense[16:42] Conclusion and Final ThoughtsFollow Us:
LinkedIn: https://www.linkedin.com/company/e360solutionsFacebook: https://www.facebook.com/e360solutionX (Twitter): https://twitter.com/e360_solutionsYouTube: https://www.youtube.com/@e360solutionsAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
(00:00) - Introduction and Overview(01:05) - Data Breach in Baltimore: A Case Study(06:04) - Cybersecurity in the Automotive Industry(11:28) - The Human Factor in Cybersecurity(17:02) - Conclusion and Final Thoughts -
In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security.
Topics Covered:
Risks involved with being a Chief Information Security OfficerReasons behind the failure of AI initiatives and next stepsBenefits of tuning threat intelligence to your business verticalKey Takeaways:
CISO Challenges: The immense responsibilities and pressures CISOs face, including legal, regulatory, and reputational risks.AI Initiative Failures: Common pitfalls in AI projects such as poor data governance, inadequate security measures, and integration challenges with legacy systems.Tailored Threat Intelligence: How tuning threat intelligence to specific business verticals can significantly enhance cybersecurity posture and proactive threat management.Mentions & References:
NIST AI FrameworkOWASP Top 10 for LLMTime Stamps with Highlights:
[00:00:00] Introduction and Overview: High accountability and stress for CISOs.[00:01:30] Risks of Being a CISO: High stakes, accountability, and evolving threat landscape.[00:07:44] Challenges in AI Initiatives: Reasons AI initiatives fail and what steps to take next.[00:13:31] Tuning Threat Intelligence: Benefits of tailored threat intelligence for different business verticals.[00:22:01] Conclusion and Final Thoughts: Summarizing the importance of proactive security measures.Follow Us:
LinkedIn: https://www.linkedin.com/company/e360solutionsFacebook: https://www.facebook.com/e360solutionX (Twitter): https://twitter.com/e360_solutionsYouTube: https://www.youtube.com/@e360solutionsAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
Visit us: www.e360.com
(00:00) - Introduction and Overview(01:30) - Risks of Being a CISO(07:44) - Challenges in AI Initiatives(13:31) - Tuning Threat Intelligence to Your Business(22:01) - Conclusion and Final Thoughts -
In this FAQ-style episode of the State of Enterprise IT Security Podcast, Brad Bussie answers key questions in healthcare - securing patient data, the pros and cons of AI-based cybersecurity tools versus traditional methods, and how to tackle the complex challenges of securing IoT devices in patient care. Tune in to gain valuable insights that can help safeguard sensitive healthcare information.
Topics Covered:
Best practices for securing patient data in healthcare settingsAdvantages and disadvantages of AI-based cybersecurity tools versus traditional toolsChallenges and strategies for securing IoT devices used in patient careKey Takeaways:
Securing Patient Data: Implement encryption, establish access controls, conduct regular security training, and develop incident response plans.AI vs. Traditional Cybersecurity Tools: AI tools offer real-time threat detection and adaptive learning but can be costly and prone to false positives. Traditional tools are more predictable but may struggle with new, sophisticated threats.Securing IoT Devices: Use strong encryption, regularly update software, employ unique passwords, leverage multi-factor authentication, and segment networks to protect sensitive data.
AES 256 EncryptionHIPAA complianceIntrusion detection/prevention systems
Mentions & References:
[00:00] Introduction and overview of topics[00:19] Brad Bussie introduces the episode and outlines the main topics[01:16] Best practices for securing patient data[07:06] AI-based cybersecurity tools vs. traditional tools[13:36] Securing IoT devices in healthcare[18:51] Closing remarks
Time Stamps with Highlights:
LinkedIn: linkedin.com/company/e360solutionsFacebook: facebook.com/e360solutionX (Twitter): twitter.com/e360_solutionsYouTube: youtube.com/@e360solutions
Follow Us:
About the Show:
The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
-
Healthcare organizations face a unique set of cybersecurity challenges, from protecting patient privacy under regulations like HIPAA to managing the hidden costs of upgrading legacy systems. In this episode, Brad Bussie dives into these critical issues and offers actionable insights for healthcare providers.
Topics Covered:
Hidden Costs of Upgrading Legacy SystemsHighly Rated Cybersecurity Solutions for Healthcare OrganizationsCommon Cybersecurity Challenges in Healthcare
Key Takeaways:Hidden Costs of Upgrading Legacy Systems:
Compatibility issues between new security solutions and older software.Potential downtime and learning curves impacting day-to-day operations.Integration challenges and risks of data loss during migration.Financial costs including new software licenses, hardware, and ongoing maintenance.Risks of vendor lock-in and hidden security vulnerabilities in legacy data.Highly Rated Cybersecurity Solutions for Healthcare:
Endpoint security for devices including medical equipment.Threat and vulnerability management through regular scans and updates.Network security using firewalls, intrusion detection/prevention systems, and secure VPNs.Incident management and response through drills and tabletop exercises.Data encryption at rest and in transit to protect patient information.Identity and Access Management (IAM) to control access and prevent insider threats.Regular security awareness training to mitigate human error.Compliance management to adhere to regulations like HIPAA.Common Cybersecurity Challenges in Healthcare:
Protecting patient privacy and maintaining HIPAA compliance.Dealing with outdated legacy systems that are vulnerable to cyber attacks.The growing threat of ransomware and malware attacks.Shortage of skilled cybersecurity professionals in the healthcare sector.Security issues with Internet of Medical Things (IoMT) devices.Financial constraints limiting investments in cybersecurity.Managing third-party risks from numerous vendors.
[00:00:00] Introduction: Overview of healthcare cybersecurity challenges and importance of protecting patient privacy under HIPAA.[00:01:17] Hidden Costs of Upgrading Legacy Systems: Discussing compatibility issues, potential downtime, and financial costs.[00:06:00] Top Cybersecurity Solutions for Healthcare: Importance of endpoint security, threat management, network security, and incident response.[00:10:23] Common Cybersecurity Challenges: Issues with legacy systems, ransomware threats, and shortage of skilled professionals.[00:13:26] IoMT Device Security and Financial Constraints: New vulnerabilities from IoT devices and financial limitations post-pandemic.[00:14:25] Third-Party Risks and Compliance Management: Managing risks from third-party vendors and maintaining regulatory compliance.[00:15:15] Conclusion: Importance of a comprehensive approach to addressing cybersecurity challenges in healthcare.
Time Stamps with Highlights:
LinkedIn: e360 Solutions https://www.linkedin.com/company/e360solutionsFacebook: e360 Solutions https://www.facebook.com/e360solutionX (Twitter): e360 Solutions https://twitter.com/e360_solutionsYouTube: e360 Solutions https://www.youtube.com/@e360solutions
Follow Us:
About the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
Visit us: www.e360.com -
In this episode, Brad Bussie covers three crucial topics in the realm of cybersecurity. Zoom is gearing up for a quantum future with post-quantum encryption, Rockwell advises disconnecting internet-facing industrial control systems due to rising cyber threats, and the Library of Congress successfully thwarts a cyberattack using multi-factor authentication (MFA). Join us as we delve into these significant developments and their implications for IT security leaders.
Zoom's implementation of post-quantum encryption to secure digital communications.Rockwell Automation's advisory to disconnect vulnerable ICS devices amid cyber threats.How multi-factor authentication helped the Library of Congress prevent a cyberattack.
Topics Covered:
Zoom is the first unified communications company to offer post-quantum encryption, safeguarding against future quantum threats.Rockwell Automation emphasizes the critical need to disconnect ICS devices from the public internet to minimize cyber risks.The Library of Congress effectively used MFA to prevent a potential cyberattack, highlighting the importance of robust security measures.
Key Takeaways:
Zoom's post-quantum encryption using Kyber 768 algorithm.Rockwell's advisory and the role of US CISA in reinforcing security measures.The thwarted cyberattack on the Library of Congress and its implications for cybersecurity practices.
Mentions & References:
[00:00] Introduction: Overview of the episode's topics.[00:41] Zoom Prepares for Quantum World: Details on Zoom’s post-quantum encryption and its significance.[04:26] Rockwell's Advisory: Importance of disconnecting ICS devices and securing critical infrastructure.[08:40] Library of Congress Cyberattack: How MFA prevented a breach and lessons learned.
Time Stamps with Highlights:
LinkedIn: https://www.linkedin.com/company/e360solutionsFacebook: https://www.facebook.com/e360solutionX (Twitter): https://twitter.com/e360_solutionsYouTube: https://www.youtube.com/@e360solutions
Follow Us:
About the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: http://www.e360.com
Links to Articles:
Zoom - Zoom Prepares for Quantum World with Post-Quantum Encryption: https://www.e360.com/blog/zoom-post-quantum-encryption-rockwell-ics-cyber-threats-library-of-congress-cyberattackRockwell - Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats: https://www.e360.com/blog/zoom-post-quantum-encryption-rockwell-ics-cyber-threats-library-of-congress-cyberattackLibrary of Congress - Thwarted Cyberattack Targeted Library of Congress: https://www.nextgov.com/cybersecurity/2024/05/thwarted-cyberattack-targeted-library-congress-tandem-/
View Article of this Podcast: https://www.e360.com/blog/zoom-post-quantum-encryption-rockwell-ics-cyber-threats-library-of-congress-cyberattack -
In this episode, Brad Bussie discusses the critical gap in cybersecurity expertise, the U.S. government's $50 million investment to bolster healthcare cyber resilience, and the emerging threat of YouTube as the latest phishing battleground. Stay tuned to uncover the latest insights and expert analysis on these pressing issues in the world of IT security.
The widening cybersecurity expertise gap and its implications.U.S. investment in Better Healthcare cyber resilience.YouTube's rise as a phishing battleground.
Topics Covered:Key Takeaways:
Expertise Gap: The shortage of skilled cybersecurity professionals is a growing concern, affecting the ability of organizations to defend against sophisticated threats.Healthcare Cyber Resilience: The U.S. government's $50 million investment aims to enhance the cybersecurity infrastructure of healthcare systems, critical in the wake of increasing cyberattacks.YouTube Phishing: Cybercriminals are increasingly targeting YouTube as a platform for phishing attacks, exploiting its vast user base.Mentions & References:
U.S. government initiatives on healthcare cybersecurity.Recent studies and reports on the cybersecurity skills shortage.Examples of phishing attacks on YouTube.
[00:00] Opening Remarks: Introduction and episode overview.[02:30] Expertise Gap: Discussing the lack of cybersecurity professionals and its impact.[05:00] U.S. Invests $50m in Better Healthcare Cyber Resilience: Details on the $50 million investment and its expected benefits.[08:15] YouTube Phishing Threats: How cybercriminals are exploiting YouTube for phishing scams.[12:45] Key Strategies: Recommendations for organizations to improve their cybersecurity posture.[15:30] Closing Thoughts: Final insights and a look ahead to future episodes.
Time Stamps with Highlights:Follow Us:
LinkedInFacebookX (Twitter)YouTubeAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
Visit us:www.e360.com
(00:00) - Introduction to Cyber Threats and IT Security(00:49) - Exploring the Security Expertise Gap in Cloud Expansion(05:41) - Investing in Healthcare Cyber Resiliency(09:15) - YouTube: The New Frontier for Cyber Threats(13:51) - Conclusion and Call to Action -
Join Brad Bussie, Chief Information Security Officer at e360, as he explores Google's innovative approach to cloud security in today's episode. Focusing on how Google has revolutionized security operations with a multilayered defense strategy, Brad discusses the integration of AI and threat intelligence to enhance cybersecurity measures in the cloud era.
Google's Approach to Cloud Security: An overview of how Google tackles the complexities of cybersecurity with advanced technologies and strategies.The Role of AI and Automation in SecOps: Examining how Google utilizes artificial intelligence to streamline threat detection, investigation, and response.Integrating Threat Intelligence and Expertise: Insights into how Google’s acquisition of Mandiant and integration with VirusTotal enhance their security capabilities.
Topics Covered:
Google Security Operations is designed to support not just Google Cloud but multi-cloud environments, providing a versatile and robust security solution.The use of AI in Google's security operations allows for more efficient data analysis and threat detection, significantly reducing the workload for security analysts.Google’s comprehensive security framework combines AI, machine learning, and human expertise from Mandiant to offer a proactive and informed cybersecurity defense system.
Key Takeaways:
Insights from the Google Next Conference on the role of AI in securityGoogle's VirusTotal IntegrationTDIR Process in Google's Cloud SecurityMandiant’s Expertise
Mentions & References:Time Stamps with Highlights:
[00:00:32] - Introduction to Google’s security operations and the challenges in cloud security[00:02:09] - Discussion on the shift from traditional security models to advanced, integrated systems[00:07:24] - The impact of AI and automation on security operations[00:11:27] - How Google's comprehensive threat intelligence network supports proactive defenseFollow Us:
LinkedInFacebookX (Twitter)YouTube
About the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
Visit us: www.e360.com -
In Episode 19 of The State of Enterprise IT Security, Brad Bussie tackles critical issues affecting the cybersecurity landscape. From new CISA guidelines aimed at protecting critical U.S. infrastructure to major data leaks impacting millions, this episode dives deep into the challenges and strategies for securing our digital world.
Topics Covered:
CISA Guidelines for AI in Critical Infrastructure: Discussion on new measures to enhance the security of U.S. critical infrastructure against AI-related threats.Kaiser Data Leak: Examination of a significant data breach affecting 13.4 million Kaiser members, including the inadvertent sharing of data with advertisers.Okta Credential Stuffing Attacks: Analysis of the recent spike in credential stuffing attacks against Okta accounts, exacerbated by the use of residential proxy services.
CISA is intensifying efforts to safeguard critical infrastructure by focusing on AI risks, proposing a comprehensive plan for risk management.Kaiser's data leak highlights the ongoing challenges in protecting personal health information and the risks associated with third-party data sharing.Okta's experience with credential stuffing attacks illustrates the evolving tactics of cybercriminals and the importance of robust cybersecurity measures, including enhanced authentication processes.
Key Takeaways:Mentions & References:
CISA (Cybersecurity and Infrastructure Security Agency)Kaiser PermanenteOktaTechniques like residential proxy services that facilitate anonymity in cyber attacks.Time Stamps with Highlights:
[00:00:33] Introduction to Episode 19 Topics
[00:01:24] CISA's New AI Security Guidelines
[00:06:33] Data Leak Impacting Kaiser Insurance Members
[00:11:02] Rise in Okta Credential Stuffing AttacksFollow Us:
LinkedIn
Facebook
X (Twitter)
YouTubeAbout the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
-
In this episode, Brad Bussie, Chief Information Security Officer at e360, is joined by Shariq Aqil, Field CTO from Zerto, an HPE company. They delve into the critical topic of building a cyber resilience vault, providing valuable insights into creating robust defenses against cyber threats.
Introduction to Cyber Resiliency:Definition and importance of cyber resiliency in modern business environments.Strategies for achieving cyber resilience, including proactive and reactive measures.Exploring the Cyber Resiliency Vault Concept:Detailed explanation of what a Cyber Resiliency Vault is and the problems it addresses.Discussion on how Zerto’s technologies enhance cyber resilience through their innovative vault solutions.Building a Cyber Resiliency Vault with Zerto:The technical and strategic approach to using Zerto for creating a cyber resiliency vault.Benefits of integrating Zerto’s solutions into cybersecurity frameworks.
Topics Covered:
Importance of a comprehensive strategy encompassing prevention, detection, response, and recovery.Insights into Zerto’s approach to continuous data protection and its impact on minimizing data loss and recovery times.The role of cyber resiliency vaults in enhancing organizational ability to withstand and recover from cyber incidents.
Key Takeaways:
Zerto and e360 partnershipCyber resilience strategies and technologies discussed in the episode are pivotal for organizations seeking to enhance their security posture.
Mentions & References:
Time Stamps with Highlights:[00:02:00-00:04:00] Shariq Aqil’s Background:
Shariq provides an overview of his professional background and his role at Zerto, detailing his experiences at Dell, EMC, and IBM before joining Zerto.
[00:04:00-00:06:00] What is Cyber Resiliency:
Brad elaborates on the concept of cyber resiliency, explaining it as an organization’s ability to maintain critical operations effectively amidst cyber threats.
[00:06:00-00:08:00] The Role of Cyber Resiliency Vaults:
The discussion shifts to the specific function of cyber resiliency vaults, describing how they protect critical data and support quick recovery from cyber incidents.
[00:08:00-00:10:00] Technical Details of Zerto’s Solutions:
Shariq dives into the technical aspects of Zerto’s solutions, focusing on continuous data protection and its advantages over traditional backup solutions.
[00:10:00-00:12:00] Importance of Quick Recovery:
The conversation emphasizes the importance of rapid recovery capabilities in cyber resiliency solutions, highlighting how Zerto’s technology minimizes data loss and recovery times.
[00:12:00-00:14:00] Implementing Zerto’s Cyber Vaults:
Brad and Shariq discuss the implementation of Zerto’s cyber vaults, explaining the process of data replication, scanning for anomalies, and ensuring data immutability.
[00:14:00-00:16:00] Broader Implications of Cyber Attacks:
They discuss the broader impact of cyber attacks on business operations, stressing the need for comprehensive cyber resilience strategies that go beyond immediate recovery.
[00:16:00-00:18:00] Discussion on Cyber Resilience Strategies:
The discussion turns to strategies for enhancing cyber resilience, including the need for a multi-faceted approach that encompasses technology, policies, and people.
LinkedInFacebookX (Twitter)YouTube
Follow Us:
About the Show:
The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
(00:00) - Welcome to the State of Enterprise IT Security Edition(01:05) - Introducing Shariq Aqil from Zerto(02:53) - Understanding Cyber Resiliency(05:26) - Exploring the Cyber Resiliency Vault Concept(15:05) - Building a Cyber Resiliency Vault with Zerto(19:49) - The Importance of Testing and Recovery Planning(26:05) - Expert Tips on Cyber Resiliency and Vaulting(30:15) - Action Steps for Organizations
Visit us: www.e360.com -
Brad Bussie, Chief Information Security Officer at e360, hosts the State of Enterprise IT Security Edition podcast, where he delves into three main topics aimed at making IT security more approachable for technology leaders.
The first segment reflects on the aftermath of a ransomware attack on United Health and Change Healthcare, highlighting the sobering realization that paying ransoms does not guarantee the safety of stolen data, as evidenced by Change Healthcare's loss of sensitive patient information despite a $22 million ransom payment.
The second segment discusses cloud security, questioning the substantial investment in cloud technology and exploring the utility and limitations of security tools such as SIEM, EDR, and ITDR based on a survey of 150 security professionals from large companies. The implications of automation and AI in enhancing security operations, despite staffing challenges within the IT security domain, are also examined.
The third segment probes the ethical and privacy concerns surrounding AI technologies capable of emotional intelligence and voice synthesis, spotlighting Hume's empathic AI and HeyGen's AI-driven content creation platform. Bussie underscores the need for robust security measures to protect user data and prevent misuse of AI in emotional manipulation and content generation, advocating for user vigilance and informed engagement with emerging AI technologies.
00:00 Introduction to Enterprise IT Security Insights
01:20 Deep Dive into United Health's Cybersecurity Incident
07:02 Exploring Cloud Security Investments and Challenges
17:12 The Future of AI: Emotional Intelligence and Avatars
24:13 Innovative AI Technologies: HeyGen and AI Avatars
31:30 Conclusion and Final Thoughts
e360 website: www.e360.com
Show page: e360.com/state-of-enterprise-it-security-podcast
Follow on LinkedIn: https://www.linkedin.com/company/e360solutions
About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.
(00:00) - Introduction to Enterprise IT Security Insights(01:20) - Deep Dive into United Health's Cybersecurity Incident(07:02) - Exploring Cloud Security Investments and Challenges(17:12) - The Future of AI: Emotional Intelligence and Avatars(24:13) - Innovative AI Technologies: HeyGen and AI Avatars(31:30) - Conclusion and Final Thoughts -
Navigating Emerging Threats and Innovations in IT Security
In this episode of the State of Enterprise IT Security Edition, host Brad Bussie discusses three main topics relevant to technology leaders today. Firstly, he addresses the growing adoption of Multi-Factor Authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, and session cookie theft, providing strategies to mitigate these risks. Next, Bussie talks about a recent emergency directive from the U.S. Cybersecurity Agency (CISA) in response to a Russian APT's infiltration of Microsoft's network and theft of sensitive correspondence, emphasizing the importance of federal agencies hunting for signs of the breach, analyzing exfiltrated emails, and securing authentication tools. Lastly, insights from the Google Next conference are shared, highlighting advancements in AI-driven security solutions and features, including Gemini for cloud and cybersecurity, AI hypercomputers, and enhanced data privacy measures. The episode aims to make IT security approachable and actionable for its audience.
00:00 Breaking News: Russian Hackers Target Microsoft
00:00 Introduction
00:48 Welcome to the State of Enterprise IT Security Edition
01:52 Growing Challenges with Multi-Factor Authentication (MFA)
09:11 U.S. Government on High Alert: Russian Hackers Steal Sensitive Data
16:24 Innovations and Security Insights from Google Next Conference
23:24 Closing Thoughts on Enterprise IT Security -
Navigating the Complex Landscape of IT Security: MFA, Russian Hackers, and Google's Innovation
This video explores the current state of enterprise IT security, emphasizing the widespread adoption of multi-factor authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, and session cookie theft. It discusses a recent emergency directive by CISA in response to Russian hackers stealing sensitive correspondence from Microsoft, underlining the importance of immediate action by federal agencies to secure their systems. Additionally, the video highlights announcements from the Google Next Conference, particularly focusing on the new AI-driven cybersecurity solutions like Gemini for cloud and cybersecurity, AI assistance in coding, and advancements in AI-powered threat defense, demonstrating Google's commitment to enhancing data privacy and security in the face of increasing cyber threats.
00:00 Breaking News: Russian Hackers Target Microsoft
00:00 Introduction
00:48 Welcome to the State of Enterprise IT Security Edition
01:52 Growing Challenges with Multi-Factor Authentication (MFA)
09:11 U.S. Government on High Alert: Russian Hackers Steal Sensitive Data
16:15 Innovations and Security Insights from Google Next Conference
23:16 Closing Thoughts on Enterprise IT Security -
In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape.
The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the massive AT&T breach impacting 70 million users. Bussie emphasizes the importance of secure coding practices, the potential of AI in cybersecurity, and actionable steps for individuals and organizations to protect against breaches.
Timestamps:
[00:01:00] Hotel Self Check-In Kiosk Vulnerability:
- A security flaw in a budget hotel's self check-in kiosks exposed room access codes, affecting potentially 600 hotels in 20 countries.
- The vulnerability underscores the critical need for rigorous secure code practices and thorough application architecture understanding.[00:06:30] Microsoft’s Red Team Augmentation via AI:
- Partnership with OpenAI to introduce a Python Risk Identification Toolkit (PYRIT) aiming at exposing vulnerabilities through AI.
- This development highlights the evolving role of AI in cybersecurity, moving towards augmenting human capabilities rather than replacing them.[00:14:00] AT&T Breach Impacting 70 Million Users:
- Sensitive information including social security numbers and passcodes were compromised and found on the dark web.
- The breach illustrates the ongoing risks of data theft and the importance of protective measures such as credit freezes and vigilant password management.
About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. -
In the 14th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege and more.
Timestamps:
[00:01:10] CISA warns that hackers are actively attacking a SharePoint server vulnerability
[00:03:30] Millions of Americans caught up in a Chinese hacking plot
[00:14:00] Thousands of servers hacked in an ongoing attack targeting Ray AI frameworkEpisode Summary:
In the latest installment of "The State of Enterprise IT Security Edition," host Brad Bussie, CISO at e360, offers a deep dive into current cybersecurity threats and practical defense strategies. This episode covers three critical topics:
CISA's SharePoint Server Vulnerability: Brad discusses a serious vulnerability in Microsoft SharePoint Server that is being actively exploited, emphasizing the critical nature of applying patches that have been available since May 2023 to prevent such attacks.Chinese Hacking Campaign: The episode moves on to a sinister hacking campaign orchestrated by Chinese nationals, which has been targeting American officials, businesses, and critics over 14 years. Bussie explores the campaign’s breadth and the U.S. government's response, including a reward for information leading to the identification of the perpetrators.Ray AI Framework Attacks: Thousands of servers have been compromised in an ongoing campaign targeting the Ray AI framework, used by companies like OpenAI, Uber, and Amazon. Brad outlines the campaign's impact on AI models and network credentials and provides advice on securing systems against such insidious attacks.Listeners will come away with a greater understanding of the current cybersecurity landscape and how to implement effective security measures within their organizations.
About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. -
In the 13th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over Credo AI's Risk Management, OT Cyberattack Impact, Atlassian's Critical Patch and more.
Timestamps:
[00:57.3] - Credo AI's Risk Management
[04:13.6] - OT Cyberattack Impact
[08:04.7] - Atlassian's Critical PatchDon't miss out on this insightful episode filled with actionable advice and cutting-edge information. Stay ahead in the ever-evolving world of IT security!
📲 Follow Us:
LinkedIn
Facebook
X (Twitter)About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. -
In the 12th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over the House voting to ban TikTok, The EU regulating AI, and modern cars tracking and reporting driving habits and more.
Timestamps:
[00:01:00] The House Bans TikTok - A bill passed by the U.S. House could lead to a TikTok ban, prompted by security concerns and a controversial pop-up notification strategy.
[00:04:30] EU Regulating AI - Details on the European Parliament's overwhelming approval of the Artificial Intelligence Act, setting forth strict AI regulations.
[00:10:28] Data Sharing in Modern Cars - An exploration of how modern cars collect and share data with insurance companies, raising significant privacy concerns.
Don't miss out on this insightful episode filled with actionable advice and cutting-edge information. Stay ahead in the ever-evolving world of IT security!📲 Follow Us:
LinkedIn
Facebook
X (Twitter)
About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. -
In the 11th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, the Change Healthcare ransomware attack, the importance of Apple’s latest iOS update, and how AI is revolutionizing cybersecurity tactics.
Timestamps:
[00:54] - [07:56] Change Healthcare Ransomware Attack:
[08:00] - [10:27] Apple Blunts Zero-Day Attacks with iOS 17.4 Update:
[10:27] - [17:42] Cybercriminals Leveling Up – CrowdStrike CEO's Insights:Don't miss out on this insightful episode filled with actionable advice and cutting-edge information. Stay ahead in the ever-evolving world of IT security!
📲 Follow Us:
LinkedIn
Facebook
X (Twitter)
About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.
About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. - もっと表示する