CISO Perspectives (public)

SolarWinds through a first principle lens: around the Hash Table.


Listen Later

Two members of the CyberWire’s Hash Table of experts, Gary McAlum, USAA CSO and Don Welch, Penn State CIO, join Rick Howard to discuss the SolarWinds attack.

Resources:

  • S1E6: 11 MAY: Cybersecurity first principles.
  • S1E7: 18 MAY: Cybersecurity first principles: zero trust.
  • S1E8: 26 MAY: Cybersecurity first principles: intrusion kill chains.
  • S1E9: 01 JUN: Cybersecurity first principles: resilience.
  • S1E11: 15 JUN: Cybersecurity first principles: risk assessment.
  • S2E7: 31 AUG: Identity Management: a first principle idea.
  • S2E8: 07 SEP: Identity Management: around the Hash Table.

    • Cybersecurity Canon,” by Ohio State University.
    • Do I Need a Third-Party Security Audit?” By Rachel Phillips, Bleeping Computer, 2 March 2018. 
    • SolarWinds hack officially blamed on Russia: What you need to know,” by Laura Hautala, Cnet, 5 January 2021.
    • Sunburst backdoor – code overlaps with Kazuar,” by SecureList, Kaspersky, 11 January 2021.
    • Learn more about your ad choices. Visit megaphone.fm/adchoices

      ...more
      View all episodesView all episodes
      Download on the App Store

      CISO Perspectives (public)By N2K Networks

      • 5
      • 5
      • 5
      • 5
      • 5

      5

      13 ratings


      More shows like CISO Perspectives (public)

      View all
      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,011 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      7,861 Listeners

      The Indicator from Planet Money by NPR

      The Indicator from Planet Money

      9,513 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      168 Listeners

      Hacking Humans by N2K Networks

      Hacking Humans

      312 Listeners

      Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

      Defense in Depth

      77 Listeners