ESW #298 – Ron Reiter, Ryan Pullen
Full Audio
View Show IndexSegments
1. Being an Investor & Entrepreneur in Data Security – Ron Reiter – ESW #298
Despite certain economic indicators warning that a recession is on the horizon, investment remains healthy within the security market amid thirst for cloud security, in particular. One such emerging field is data security posture management (DSPM), which aims to bridge the gap between business goals and a comprehensive security mechanism that leaves no data behind as organizations scale in the cloud.
Announcements
Security Weekly listeners, we need to hear your voices! Leave us your feedback on Apple podcasts & submit a screenshot to our giveaway form for a chance to win a $100 gift card from Hacker Warehouse! This giveaway will be open until the end of the year. We appreciate your honest feedback so we can continue to make great content for our audience! Visit securityweekly.com/giveaway to enter!
Guest
Ron Reiter is a Co-Founder & CTO at Sentra, a cloud data security company. He is an experienced entrepreneur who sold his company to Oracle in 2016 and went on to invest in over a dozen new startups. After serving in Unit 8200, Ron spent 15 years in various managing positions in data engineering, cybersecurity, and cloud infrastructure.
Hosts
2. Building the Right Business Culture to Manage Human Error – Ryan Pullen – ESW #298
A deep-rooted cyber security culture is crucial, and it goes as far back as the hiring process…
10 years ago, a typical hiring process consisted of working your way through a checklist, hiring individuals based solely on a CV. Today, the ‘Simon Sinek’ culture is gaining more prevalence, with employers realizing that hiring the right person, rather than the CV, can have immeasurable benefits for business. Ryan will talk about why this is particularly true within the cyber security sphere, and why business leaders should follow this particular ‘Simon Sinek’ strategy to build a successful security operation, and secure business, starting directly with the human’s that run it.
At Stripe OLT, Ryan’s Security Operations team has been built upon diverse collective experiences, from military personnel and laborer’s to teachers and university graduates. Through focusing on direct experiences and personal encounters, this presentation will place emphasis on the importance of a CIA Triad hiring structure and demonstrate how fostering a culture of internal trust is integral in defending against cyber-threats and protecting all businesses.
You will walk away from this session knowing why it is important to employ the right individual rather than the CV, and how adopting this approach can drastically improve how a business responds to and manages security threats, company wide.
Segment Resources: Github: https://github.com/stripesoc
TEDx Talk, How clicking a link can cost millions: https://www.youtube.com/watch?v=OI9n2tLf0Tg&list=PLcR8SW0W6hdAQvxYI9XJUEe50zFln6QMY&index=1
Announcements
We're always looking for great guests for all of the Security Weekly shows! Submit your suggestions by visiting https://securityweekly.com/guests and completing the form!
Guest
Ryan Pullen is Head of Cyber Security for multi-award-winning IT and cyber security provider Stripe OLT, based in the UK. Holding a wide range of certifications, Ryan’s expertise spans multiple disciplines, including incident response, offensive security, open-source intelligence and cyber consultancy.
A nominee for Entrepreneur of the Year 2022 at the Go:Tech Awards, Ryan is a leader within the security space and advocate for all things cyber security. A recent TEDx speaker and regular presenter at cyber security events, Ryan aims to reinforce the importance cyber security in an evolving digital world, with a mission to foster a culture of trust, to effectively defend against cyber threats.
Through insightful discussions, Ryan will recount his direct experiences and personal encounters to help his listeners understand evolving digital risks and how they can be presented in very different ways.
Hosts
3. AI Bedtime Stories, IBM Cloud, Docker Hub, & EU CyberSec Legislation – ESW #298
In the enterprise security news, Funding announcements take a bit of a break, We explore a few new vendors and organizations that have come to our attention recently, Wiz researchers annoy yet another cloud service by pointing out ridiculous vulnerabilities - IBM Cloud, this time, Docker Hub has tons of shady stuffs going on, EU strengthens cybersecurity with new legislation, The US Department of Defense releases Zero Trust strategy (no more Five Eyes?), Microsoft 365… outlawed in the EU?, Ransomware makes up the majority of all UK government crisis management meetings, AI can now tell kids bedtime stories, what could go wrong?
Announcements
Stay up-to-date with us on X (formerly known as Twitter) for the latest show clips and updates! Find us @SecWeekly and stay connected with our cybersecurity community.
Hosts
- 1. FUNDING: SPHERE Receives $31 Million for Series B Funding from Edison Partners, Forgepoint Capital
$31M Series B led by Edison Partners. Sphere is 13 years old, woman-owned, and aims to make attacks like ransomware more difficult, through identity hygiene.
- 2. FUNDING: Pangea Raises Series B from GV, Decibel and Okta Ventures
$26M Series B led by GV, for SPaaS (Security Platform as a Service). I think I remember their Series A. Interesting concept - it's a suite of API-based security services, designed to be easy for developers to adopt in their applications. Pay-as-you-go consumption model, designed to be similar to cloud service providers.
- 3. FUNDING: Holm Security Raises €4M in Funding
€4M post-Series A venture round, led by Subvenio Invest. The 7-year old, Stockholm-based company focuses on vulnerability management and claims over 750 global customers. What kind of vulnerability scanning? Traditional internal/external network vulnerability scanning (credentialed and uncredentialed, policy-based, etc). Web application scanning (DAST), Cloud scanning, and Phishing/Awareness training ("human" vulnerabilities is the idea here, I suppose).
- 4. ACQUISITIONS: Palo Alto Networks is buying Cider Security for up to $300M
Classic round acquisition numbers from Palo Alto. They've been hunting for an acquisition target for a while, and this one is earmarked for the company's Prisma cloud security platform. Cider has a suite of tools that aim to discover security issues along the CI/CD path: dependencies, infrastructure as code, kubernetes, containers. It also appears to have lots of integrations: github, Jenkins, K8s, Jira, Slack, etc.
Cider refers to its product as an "AppSec Operating System", because sure, why not. How about ESW as an "Enterprise Security News and Interview Operating System"? We'll just lose the term podcast, because it's old, obsolete, and not at all cool anymore.
- 5. NEW COMPANIES: Building Cyber Collective
This is an interesting concept - the idea is to attract advisors, startups, and investors to play matchmaker. Advisors commit to providing 4 hours of free consultation for startups, and then the terms of any ongoing partnership are between the two parties. the Collective was started by Ross Haleliuk, who is also head of product at LimaCharlie.
- 6. NEW COMPANIES: Prelude – Hardening Cyberdefenses for Everyone
Prelude appears to be somewhat in the breach and attack simulation space, with a product called "Operator". The general idea is to test your controls to ensure they work. Prelude builds the tests included in Operator, which also integrates with external tests, which can be imported with a few clicks. There is a free community license, along with paid Professional and Enterprise tiers.
- 7. NEW COMPANIES: Revelstoke SOAR
Another entry in the SOARv2 space that looks like it will be going head-to-head with the likes of Tines.
- 8. NEW FEATURES: Wiz becomes the first CNAPP to deliver integrated Data Security Posture Management
We're going to continue to see many flavors of DSPM. This is possibly the first we've seen within an existing cloud security vendor.
- 9. SUPPLY CHAIN: Hell’s Keychain – Supply Chain Attack in IBM Cloud’s Databases for PostgreSQL
This just came off embargo this morning, but apparently, Wiz researchers were able to reach behind the IBM Cloud curtain, thanks to some plaintext credentials and vulnerabilities in PostgreSQL.
- 10. RESEARCH: Analysis on Docker Hub malicious images: Attacks through public container images – Sysdig
- 11. LEGISLATION: EU decides to strengthen cybersecurity and resilience across the Union: Council adopts new legislation
- 12. FEDS: Department of Defense Releases Zero Trust Strategy and Roadmap
- 13. REGULATIONS: After 2 years of negotiation, Germany states there is no lawful way to use M365 under GDPR
HUGE if true
- 14. TRENDS: Ransomware incidents now make up majority of British government’s crisis management ‘Cobra’ meetings
Ransomware not going anywhere anytime soon
- 15. EDUCATION: CISA expanding cybersecurity education program nationwide
- 16. SQUIRREL: Create Stories for Kids – StoriesForKids.ai
It totally makes sense that story-writing would be a new area for AI generators to explore (and ruin), but why include the Dalle-2 imagery? Dalle 2 doesn't understand faces yet and the result often seems more like something out of an adult horror novel, not something young kids should be exposed to at bedtime.
Should we use this to create a story about the security weekly hosts?
- 17. SQUIRREL: Cocaine Bear – Wikipedia
This was a rabbit hole I just couldn't turn myself away from, partly because Knoxville is featured in this story and a movie is dropping in a few months.