[AISWorld] Episode 42 -- Useful Technology Should Be Attack Agnostic

Dave Chatterjee dchatte at gmail.com
Wed Jan 4 06:12:49 EST 2023


Dear Colleagues:

Greetings and Happy New Year!

In this episode, Patricia Muoio, Ph.D., Partner at SineWave Ventures and
Former Chief of Trusted Systems Research Group, National Security Agency
<https://www.linkedin.com/in/patricia-muoio-10037775/>, sheds light on the
cybersecurity technology landscape and emphasizes the need to develop
technologies that are attack agnostic. Some of the questions driving the
discussion include: a) what progress has been made in the development and
use of cybersecurity technologies? b) what does it mean to be attack
agnostic? c) when developing cybersecurity technologies, how near or far
are we from taking the burden off people trying to protect themselves from
different cyber attacks? and d) the ideal government and industry
partnership model to develop innovative solutions.

I hope you enjoy this episode of *The Cybersecurity Readiness Podcast
Series*.

*Short clip from Episode 42: *https://youtu.be/N8aEGSqwWMc

*Full Episode 42:*https://www.dchatte.com/podcast/

*Prior Episodes: *https://the-cybersecurity-readi.captivate.fm/episodes

#41 -- Do you see what attackers see? Threat modeling done right
<https://the-cybersecurity-readi.captivate.fm/episode/do-you-see-what-attackers-see-threat-modeling-done-right>
-- *Guest:* Marcos Lira, Lead Solutions Engineer at Halo Security

#40 -- Implementing Phishing Resistant Multi Factor Authentication
<https://the-cybersecurity-readi.captivate.fm/episode/implementing-phishing-resistant-multifactor-authentication>
 -- *Guest:* George Gerchow, Chief Security Officer and Senior Vice
President of IT, Sumo Logic

#39 -- How do SMBs protect themselves from ransomware attacks?
<https://the-cybersecurity-readi.captivate.fm/episode/how-do-smbs-protect-themselves-from-ransomware-attacks>
 --* Guest:* Grayson Milbourne, Security Intelligence Director at OpenText
Security Solutions

#38 -- Cybersecurity As A Strategic Opportunity
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-as-a-strategic-opportunity>
--* Guest:* Kal Sambhangi, Senior Vice President, Cybersecurity Strategy
and Architecture at Truist

#37 -- Comprehensive Asset Discovery
<https://the-cybersecurity-readi.captivate.fm/episode/comprehensive-asset-discovery>
 -- *Guest: * Huxley Barbee, Security Evangelist at runZero and former
Cybersecurity Practice Lead at Cisco

#36 -- Is Cybersecurity A Moving Target at Academic Institutions?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cybersecurity-a-moving-target-at-academic-institutions>
 -- *Guest:* Tej Patel, Vice President, and CIO at Stevens Institute of
Technology

#35 -- Securely Migrating to the Cloud
<https://the-cybersecurity-readi.captivate.fm/episode/securely-migrating-to-the-cloud-insights-from-the-american-cancer-society-experience>
 -- *Guest:* Keith Weller, former Vice President, Enterprise Technology
Services, American Cancer Society (ACS)

#34 -- Detecting Malicious Insider Threats by Monitoring User Journeys
<https://the-cybersecurity-readi.captivate.fm/episode/detecting-malicious-insider-threats-by-monitoring-user-journeys>
 -- *Guest*: Doron Hendler, CEO, and Co-Founder at RevealSecurity

#33 -- Skilling Up for Security Operations Center Roles
<https://the-cybersecurity-readi.captivate.fm/episode/skilling-up-for-security-operations-center-roles>
 -- *Guest*: James Risler, Senior Manager, Cisco Learning and Certifications

#32 -- Bridging the Gap Between Intentions and Practicality in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/bridging-the-gap-between-intentions-and-practicality-in-cybersecurity>
 -- *Guest:* Daniela Almeida Lourenco, Chief Information Security Officer
(CISO) at Tinka

#31 -- Preparing for the Future of Device Management
<https://the-cybersecurity-readi.captivate.fm/episode/preparing-for-the-future-of-device-management>
 -- *Guest:* Mike McNeill, CEO, Fleet Device Management

#30 -- The State of Attack Surface Management
<https://the-cybersecurity-readi.captivate.fm/episode/the-state-of-attack-surface-management>
 -- *Guest:* David Monnier, Team Cymru Fellow

#29 -- Global Security and Post Breach Management Best Practices
<https://the-cybersecurity-readi.captivate.fm/episode/global-security-and-post-breach-management-best-practices>
 -- *Guest:* Tim Callahan, Senior Vice President and Global Chief
Information Security Officer, Aflac

#28 -- How to Tackle Burnout in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/how-to-tackle-burnout-in-cybersecurity>
 -- *Guest:* Thomas Kinsella, Co-Founder & Chief Operating Officer at Tines

#27 -- Actionable Threat Intelligence and the Dark Web
<https://the-cybersecurity-readi.captivate.fm/episode/threat-intelligence-and-the-dark-web>
 -- *Guest:* Victoria Kivilevich, Director of Threat Research at KELA Group

#26 -- Reducing the Disconnect Between Security and Development Teams
<https://the-cybersecurity-readi.captivate.fm/episode/reducing-the-disconnect-between-security-and-development-teams>
 -- *Guest*:  Harshil Parikh, CEO and Co-Founder Tromzo

#25 -- Perspectives of a Global Chief Information Security Officer
<https://the-cybersecurity-readi.captivate.fm/episode/perspectives-of-a-global-ciso>
 -- *Guest*: Vishal Salvi, CISO & Head of Cyber Practice at Infosys

#24 -- Thinking Like A Hacker
<https://the-cybersecurity-readi.captivate.fm/episode/thinking-like-a-hacker>
 -- *Guest*: Ted Harrington, Executive Partner at
Independent Security Evaluators

#23 -- Is Cybersecurity Regulatory Compliance Good Enough?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cybersecurity-regulatory-compliance-good-enough>
 -- *Guest*: Dixon Wright, Vice President, Vice President, Compliance
Management and Automation Platform, Coalfire

#22 -- Is Cyber Insurance Necessary?
<https://the-cybersecurity-readi.captivate.fm/episode/is-cyber-insurance-necessary>
 -- *Guest*: Erica Davis, Erica Davis, Global Co-Head of Cyber, Guy
Carpenter & Co

#21 -- Dealing with Cyber Trauma
<https://the-cybersecurity-readi.captivate.fm/episode/dealing-with-cyber-trauma>
 -- *Guest*: Patrick Wheeler, a Luxembourg-based cybersecurity practitioner
and Director of the Cyber Wayfinder Program

#20 -- A Deep Dive into Ransomware Attacks and Negotiations
<https://the-cybersecurity-readi.captivate.fm/episode/a-deep-dive-into-ransomware-attacks-and-negotiations>
-- *Guest*: Art Ehuan, Vice President, Palo Alto Networks, and Former FBI
Special Agent

#19 -- Making Cybersecurity Communication Effective
<https://the-cybersecurity-readi.captivate.fm/episode/making-cybersecurity-communication-effective>
 -- *Guest*: Marcin Ganclerz, Cybersecurity Awareness & Training Expert

#18 -- Securing the Smart Supply Chain
<https://the-cybersecurity-readi.captivate.fm/episode/securing-the-smart-supply-chain>
 -- *Guest*: Alan Mihalic, President IoT Security Institute

#17 -- Reducing the Carbon Footprint
<https://the-cybersecurity-readi.captivate.fm/episode/reducing-the-carbon-footprint>
 -- *Guest*: Andy Bates, Chief Development and Strategic Partnership
Officer, Global Cyber Alliance

#16 -- Role of Emotional Intelligence in Creating a Healthy
Information Security Culture
<https://the-cybersecurity-readi.captivate.fm/episode/role-of-emotional-intelligence-in-creating-a-healthy-information-security-culture>
 -- *Guest*: Nadja El Fertasi, Human Readiness and Resilience Expert and
former NATO senior executive

#15 -- Significance of the Human Element in Cybersecurity
<https://the-cybersecurity-readi.captivate.fm/episode/significance-of-the-human-element-in-cybersecurity>
 -- *Guest:* Prof. Missy Cummings, Pratt School of Engineering, Duke
University

#14 -- Enhancing Organizational Readiness by Simulating Cyber Attacks
<https://the-cybersecurity-readi.captivate.fm/episode/enhancing-organizational-readiness-by-simulating-cyber-attacks>
 -- *Guest:* Prof. Robert Austin, Ivey Business School, London, Ontario,
Canada

#13 -- Cybersecurity is Patient Safety
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-is-patient-safety>
 -- *Guest:* Stoddard Mannikin, Chief Information Security Officer,
Children's Healthcare of Atlanta

#12 -- Ignorance is not bliss: A Whole-of-Enterprise Approach to Threat
Management
<https://the-cybersecurity-readi.captivate.fm/episode/ignorance-is-not-bliss-a-whole-of-enterprise-approach-to-threat-management>
 -- *Guest*: Anne Leslie, Threat Management Consultant, IBM Security

#11 -- Fly the Plane: A CIO's Approach to Cybersecurity Readiness
<https://the-cybersecurity-readi.captivate.fm/episode/fly-the-plane-a-cios-approach-to-cybersecurity-readiness>
 -- *Guest*: Dr. Timothy Chester, Vice President of Information Technology,
The University of Georgia

#10 -- Passwordless Authentication: Myths and Realities
<https://the-cybersecurity-readi.captivate.fm/episode/passwordless-authentication-myths-and-realities>
 -- *Guest*: Ori Eisen, Founder, and CEO of Trusona

#9 -- Cybersecurity Risk Reduction Tips for Small and Medium-Sized
Enterprises (SMEs)
<https://the-cybersecurity-readi.captivate.fm/episode/cybersecurity-risk-reduction-tips-for-small-and-medium-enterprises>
 -- *Guest*: Mike Benz, Partner | Fractional CIO at Fortium Partners

#8 -- What Does Good Cyber Governance Look Like? A Legal Perspective
<https://the-cybersecurity-readi.captivate.fm/episode/what-does-good-cyber-governance-look-like-a-legal-perspective>
 -- *Guest*: Rois Ni Thuama, Ph.D. (Doctor of Law), Head
of Cyber Governance, Red Sift

#7 -- Multidisciplinary and Integrative Approach to Cybersecurity Education
<https://the-cybersecurity-readi.captivate.fm/episode/multidisciplinary-and-integrative-approach-to-cybersecurity-education>
 -- *Guest:* Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and
Master of Engineering in Cybersecurity at Duke University's Pratt School of
Engineering

#6 -- Holistic Approach to Cybersecurity Readiness
<https://the-cybersecurity-readi.captivate.fm/episode/holistic-approach-to-cybersecurity-readiness>
 -- *Guest:* Ram R. Kumar, Executive Director, AT&T Business

#5 -- Being An Effective Chief Information Security Officer (CISO)
<https://the-cybersecurity-readi.captivate.fm/episode/being-an-effective-chief-information-security-officer-ciso>
 -- *Guest:* Richard Biever, Chief Information Security Officer, Duke
University

#4 -- The Human Vulnerability Factor
<https://the-cybersecurity-readi.captivate.fm/episode/the-human-vulnerability-factor>
-- *Guest:* Jenny Radcliffe, also known as “The People Hacker,” a
world-renowned Social Engineer

#3 -- Going Above and Beyond the Mandated Checklist
<https://the-cybersecurity-readi.captivate.fm/episode/going-above-and-beyond-the-mandated-checklist>
 -- *Guest:* Tushar Sachdev, Executive Vice President, and Chief Technology
Officer, KORE Wireless

#2 -- Protecting Academic Institutions from Ransomware and Other Forms of
Attacks
<https://the-cybersecurity-readi.captivate.fm/episode/protecting-academic-institutions-from-ransomware-and-other-forms-of-cyber-attacks>
 -- *Guest:* Garry Scobie, Deputy Chief Information Security Officer, The
University of Edinburgh

#1 -- Role of Top Management in Cybersecurity Governance
<https://the-cybersecurity-readi.captivate.fm/episode/role-of-top-management-in-cybersecurity-governance>
 -- *Guest:* Rohit Verma, CEO of Crawford and Company


More information about the AISWorld mailing list