Episode 109 - Honest Security with Jason Meller

Episode 109 - Honest Security with Jason Meller

In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jason Meller, Founder, and CEO of Kolide. Jason has over 10 years of experience in managing and leading security organizations. Jason’s interest in technology and cybersecurity began in the 1990s when he began programming in Visual Basic and building AOL Instant Messenger bots. Building offensive tools accelerated Jason’s interest in defending networks and helped him learn how much honesty plays part in building security solutions.

Jason mentions that the security monitoring software at most organizations have the same functionality as spyware or surveillance tools. In addition, these tools are designed to scrutinize all the actions that occur on a device. COVID-19 has increased the rate of organizations going through a digital transformation; as a result, users at an organization are not in a cubicle but at their home. This could mean that security teams have an extremely elevated level of access to devices without transparency as to what is being monitored to protect an organization. This is why Honest Security was created - to create a transparent relationship between security teams and end-users.

Jason has collaborated with Jesse Kriss from Netflix who is actively working towards incorporating user-focused security. Jason describes that organizations should build a culture based on trusting users, treating them like adults, giving them the tools that they need to do their job, and not treating them as suspects from day one. Instead, organizations and security teams should seek teachable moments by giving recommendations and educating users.

Throughout the episode, Jason describes situations that involve users and security team members maneuvering around security tooling obstacles to get their job done. Since working at home, traditional tools have created friction in the user experience. For instance, not having the ability to use USB ports on work devices, disabling corporate VPN to watch a YouTube video, and having to create a ticket to install software to help them with their job. When this friction is created, users will resort to using their personal devices for work activities and miss the opportunity to benefit from security. In some cases, there are “evil” applications found on a device created by a user - but often bad applications installed by users are Chrome extensions or helper utilities that are sending browsing history to a marketing firm.

In the Honest Security manifesto, there’s a section on empathetic intelligence, Jason describes this concept as thinking of the daily life users, thinking of what challenges are users attempting to solve in their workflow, and what part of that workflow could pose a risk to the organization. An example of this would be a security team member trying to empathize with someone who is a developer- and thinking of their daily workflow. When empathizing the security team may realize that the developer is attempting to fix issues on a production application. While fixing the production application, the developer may try to bring a copy of the application database to their local device. Creating a local copy of the database could pose a security risk the copy of the database is not deleted in a reasonable time or the user has their device auto-backup folders to their corporate or personal cloud storage solution (ie. Google Drive). Creating education for avoiding this mistake is a prime example of empathic intelligence when practicing Honest Security.

As the episode progresses, Jason goes into depth and explains more tenants of Honest Security - The goal is not to give unlimited power to the user or security team but to enable everyone to be in the position to make the right decisions and give appropriate recommendations. When consequences are articulated, users can understand that when maneuvering around security tools can pose a risk to their device and organization. Ie) disconnecting from the corporate VPN. When coaching and education are put as a priority when practicing security, James describes it as empowering the user to be successful and more transparent.

0:00 - Intro

2:28 - This episode features Jason Meller, Founder, and CEO of Kolide!

2:54 - Jason shares his background and his path into cybersecurity.

4:07 - What is Honest Security?

5:22 - Jason’s examples of dishonest security

8:08 - Collaboration with Netflix and User-Focused Security

16:00 - Jason describes Empathetic Security

19:17 - Tenants of Honest Security

35:32 - Wrap Up and Resources for Honest Security

Links:

Learn more about Jason Meller and connect with him on LinkedIn.

Learn more about Honest Security and read the manifesto.

Learn more about Jason’s company Kolide

Learn more about Hacker Valley Studio.

Support Hacker Valley Studio on Patreon.

Follow Hacker Valley Studio on Twitter.

Follow hosts Ron Eddings and Chris Cochran on Twitter.

Learn more about our sponsor ByteChek.

Jaksot(391)

How Can I Best Proactively Secure My SaaS?

How Can I Best Proactively Secure My SaaS?

In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder & CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution. Impactful Moments: 00:00 - Welcome 01:59 - Introducing guest, Yoni Shohet 03:25 - Founding A SaaS Security Company 06:30 - What is SSPM? 08:27 - From our Sponsor, Valence 09:30 - Before Clicking ‘Allow’ 11:54 - Users Want Their LLMs! 14:37 - Common Missteps 19:08 - Can You Manage SaaS w/o Technology? 24:15 - SaaS Breaches & MFA & APIs 32:42 - One Step Better…   Links: Connect with our guest, Yoni Shohet: https://www.linkedin.com/in/yonishohet/ Check out Valence Security: https://www.valencesecurity.com Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

17 Heinä 202434min

What We All Should Be Talking About When It Comes to AI and Security

What We All Should Be Talking About When It Comes to AI and Security

In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly. Anirban discusses the importance of organizational buy-in and well-defined policies, while James underscores the need for visibility and a cautious approach in integrating AI models. Be sure to tune in to the end to hear their unique advice at being more productive. Impactful Moments: 00:00 - Welcome 01:20 - Introducing guests Anirban & James 04:15 - The State of AI through Cyber 08:25 - Is AI a New Technology? 10:31 - AI Lets You Ship A Product 16:44 - Pros/Cons of AI & DLP 23:57 - What SHOULD We Be Talking About? 27:31 - Process First! 30:00 - One Step Better…   Links: Connect with our guests Anirban & James : https://www.linkedin.com/in/james-berthoty/ https://www.linkedin.com/in/anirbanbanerjeephd/ Check out Riscosity: https://www.riscosity.com/ Get a Free Data Governance Audit: https://www.riscosity.com/free-data-governance-audit Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

9 Heinä 202433min

Navigating AI as a CISO with Whitney Palacios

Navigating AI as a CISO with Whitney Palacios

In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offers sage insight into Security Operations Centers (SOCs), the need for diversity in tech leadership roles and closes out with helpful advice for rising CISOs.   Impactful Moments: 00:00 - Welcome 01:26 - Introducing guest, Whitney Palacios 04:03 - What Is A CISO? What Do You Do? 06:19 - SOC or No SOC? 08:40 - CISO Role & Risk/Accountability 11:12 - “One of A Few CISOs” 12:00 - Join Our Mastermind! 15:21 - AI: Allowing Innovation 18:27 - AI Use Cases 20:30 - One Step Better…   Links: Connect with our guest, Whitney Palacios : https://www.linkedin.com/in/whitneypalacios/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

2 Heinä 202422min

The Power of AppSec, Cyber Education, and Friendship with Tanya Janca

The Power of AppSec, Cyber Education, and Friendship with Tanya Janca

In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry. Impactful Moments: 00:00 - Welcome 01:20 - Introducing guest, Tanya Janca 03:09 - “IDK How to Make SemGrep Rules…” 0707 - Finding Shadow IT & Embezzlers 11:27 - Join Our Mastermind 12:09 - Becoming an AppSec Professional 15:22 - Elections CISO 18:00 - Speaking at Conferences 21:15 - Microsoft Calls Me One Day… 23:21 - Parting Ways; But Still Friends 24:30 - “Can You Train Our Devs?” 27:50 - Fairness Is Important 32:27 - Put Yourself Out There!   Links: Connect with our guest, Tanya Janca: https://www.linkedin.com/in/tanya-janca/ Check out SemGrep Academy: https://academy.semgrep.dev/ We Hack Purple Podcast: https://wehackpurple.buzzsprout.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

26 Kesä 202435min

Networking 2.0: The Future of Decentralized Networking & Access Management

Networking 2.0: The Future of Decentralized Networking & Access Management

In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution. Impactful Moments: 00:00 - Welcome 02:17 - Introducing, Colin Constable 03:42 - The Problem with the Current Internet 08:02 - The Catalyst Behind atProtocol® 11:12 - Nexus of Networking, Identity & Privacy 14:19 - From our Sponsor, Atsign 15:23 - What’s Networking 2.0? 18:54 - Internet Anonymity & Accountability 24:31 - Unique Solutions using atProtocol®   Links: Connect with Colin Constable: https://www.linkedin.com/in/colinconstable/ Check out Atsign: https://atsign.com/ Read the atProtocol Whitepaper here: https://atsign.com/resources/white-papers/the-atprotocol/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

18 Kesä 202432min

How AI is the Key Turning Point in TPRM with Paul Valente

How AI is the Key Turning Point in TPRM with Paul Valente

In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to create the solution they had been wishing for. However, nothing could be more exciting than the ways AI has expanded the potential for TPRM to change security outcomes and allow the security sector to drop the ‘department of no’ branding for good. Tune in to hear the whole story!   Impactful Moments: 00:00 - Welcome 01:03 - Introducing guest, Paul Valente 04:49 - Core Pillars of Being a CISO 06:14 - Why Cyber Startup? 7:46 - AI: The Key Turning Point for TPRM 10:40 - Why Do Companies Need TPRM? 15:09 - From our Sponsor, VISO Trust 16:17 - Data & Controlling Risk 22:35 - No Security Questionnaires! 24:14 - One Step Better…   Links: Connect with our guest, Paul Valente: https://www.linkedin.com/in/pauldvalente/ Check out VISO Trust: https://visotrust.com/hackervalley Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

11 Kesä 202425min

A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini

A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini

In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ransomware attack in the City of Saint John. Impactful Moments: 00:00 - Welcome 05:15 - Introducing guest, Ricardo Nicolini 07:21 - Find & Prevent: FAST! 11:39 - Who MSSPs Support 13:48 - From our Sponsor, ContraForce 14:48 - City of Saint John & Ransomware 20:02 - Implications of Ransomware 25:16 - SOC Burnout is Real 29:21 - Improving the SOC with the Right Person 35:46 - Is Reducing Cognitive Load Possible?   Links: Connect with our guest Ricardo Nicolini : https://www.linkedin.com/in/rnicolini/ Check out ContraForce: https://www.contraforce.com/ Learn more about how Bulletproof helped the City of Saint John: https://content.bulletproofsi.com/read-cosj-case-study Check out our upcoming events: hackervalley.com/livestreams Continue the conversation by joining our Discord: https://hackervalley.com/discord Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

4 Kesä 202440min

Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell

Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell

In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breaches and discuss how Zero Trust can be implemented to better defend organizations.   Impactful Moments: 00:00 - Welcome 01:35 - Introducing guests, Ivan Fonseca and Nick Cottrell 04:39 - 3CX Breach & Supply Chain Attacks 08:10 - Ring Fencing Defense 11:16 - Living Off the Hacker Valley Land 13:06 - From our Sponsor, ThreatLocker 13:56 - Hacker Mindset in the Op 18:45 - Zero Trust, Default Deny 24:23 - Common Attack Vectors 30:09 - 7 Zip is a Russian Application? 32:49 - Learning How to Defend Better   Links: Connect with our guests, Ivan Fonseca and Nick Cottrell : https://www.linkedin.com/in/ivan-fonseca-64139222b/ https://www.linkedin.com/in/nicholas-cottrell-083564165/ Learn more about ThreatLocker: https://www.threatlocker.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

28 Touko 202439min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-vegaaneista-tykkaan
adhd-tyylilla
rss-narsisti
aamukahvilla
psykologia
rss-duodecim-lehti
rss-valo-minussa-2
rss-vapaudu-voimaasi
aloita-meditaatio
jari-sarasvuo-podcast
dear-ladies
rss-tripsteri
rss-koira-haudattuna
avara-mieli
rss-lasnaolon-hetkia-mindfulness-tutuksi
queen-talk
puhutaan-koiraa