Embedded Insiders

Threat Modeling and Intelligence While Working from Home


Listen Later

Send us a text

During a recorded presentation from  embedded world 2021, Rich and Brandon are joined by Technology Editor Curt Schwaderer, who doubles as Vice President of Engineering at intelligence and security provider Yaana Technologies. The three discuss how the tech industry in particular and connected organizations in general have transitioned from protecting devices from attacks to accepting they will be hacked and mitigating losses to modern threat intelligence and modeling strategies. They then look at this evolution through the lens of employees, who are handling and working with sensitive information and IP, working from home.

DON'T  FORGET  TO REGISTER  FOR A FREE EMBEDDED WORLD-IN-A-BOX! LESS THAN 100 REMAIN! GET YOURS TODAY: https://www.embeddedcomputing.com/pages/ew-in-a-box-reg

Later, Vincent Scott, Founder of Defense Cybersecurity Group, Chief Security Officer at STI-TEC, and former Navy cryptologist joins the Insiders to review the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) and what it will mean for companies delivering technology to the U.S. Armed Forces. In Scott's view, the CMMC presents obstacles – such as an assumption of on-premise infrastructure – that may make companies just starting out reconsider serving those markets and subsequently impact the nation's cyber readiness.

Finally, Brandon fills in for Perry in this week's Tech Market Madness. A recent report from Dragos indicates that threats to industrial control systems tripled in 2020,  while 90 percent of organizations  don't  have visibility into what's taking place beyond the IT/OT network boundary. Brandon investigates just what could be going on back there as he reviews how another industrial cybersecurity firm,  Claroty, uncovered vulnerabilities in  WIBU Systems' CodeMeter licensing software deployed on ICSs worldwide. Sharon Brizinov, a Claroty researcher, demonstrates just how easy it could have been to compromise systems running the software, both locally and remotely.


For more information, visit embeddedcomputing.com

...more
View all episodesView all episodes
Download on the App Store

Embedded InsidersBy Embedded Computing Design

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

11 ratings


More shows like Embedded Insiders

View all
Hanselminutes with Scott Hanselman by Scott Hanselman

Hanselminutes with Scott Hanselman

377 Listeners

Software Engineering Radio - the podcast for professional software developers by se-radio@computer.org

Software Engineering Radio - the podcast for professional software developers

273 Listeners

HBR IdeaCast by Harvard Business Review

HBR IdeaCast

1,849 Listeners

The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

285 Listeners

Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

31,896 Listeners

99% Invisible by Roman Mars

99% Invisible

26,136 Listeners

TED Radio Hour by NPR

TED Radio Hour

22,142 Listeners

Embedded by Logical Elegance

Embedded

190 Listeners

Philosophize This! by Stephen West

Philosophize This!

15,013 Listeners

Talk Python To Me by Michael Kennedy

Talk Python To Me

586 Listeners

The Diary Of A CEO with Steven Bartlett by DOAC

The Diary Of A CEO with Steven Bartlett

6,783 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,853 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

8,756 Listeners

The Agile Embedded Podcast by Luca Ingianni, Jeff Gable

The Agile Embedded Podcast

11 Listeners

Oxide and Friends by Oxide Computer Company

Oxide and Friends

47 Listeners