Embedded Insiders

Threat Modeling and Intelligence While Working from Home


Listen Later

Send us a text

During a recorded presentation from  embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.

DON'T  FORGET  TO REGISTER  FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg

Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.

Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020,  while 90 percent of organizations  don't  have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm,  Claroty, uncovered vulnerabilities in  WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.


For more information, visit embeddedcomputing.com

...more
View all episodesView all episodes
Download on the App Store

Embedded InsidersBy Embedded Computing Design

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

11 ratings


More shows like Embedded Insiders

View all
Planet Money by NPR

Planet Money

30,839 Listeners

Motley Fool Money by The Motley Fool

Motley Fool Money

3,195 Listeners

Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,260 Listeners

The Amp Hour Electronics Podcast by The Amp Hour (Chris Gammell and David L Jones)

The Amp Hour Electronics Podcast

228 Listeners

99% Invisible by Roman Mars

99% Invisible

26,156 Listeners

The Vergecast by The Verge

The Vergecast

3,672 Listeners

Embedded by Logical Elegance

Embedded

188 Listeners

a16z Podcast by Andreessen Horowitz

a16z Podcast

1,034 Listeners

Politics Politics Politics by Justin Robert Young

Politics Politics Politics

884 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

154 Listeners

The Daily by The New York Times

The Daily

111,864 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

The Political Orphanage by Andrew Heaton

The Political Orphanage

963 Listeners

Embedded Executive Podcast by Rich Nass, Embedded Computing Design

Embedded Executive Podcast

1 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,170 Listeners