Supply Chain Security & Zero Trust Tech with Ashish Rajan & Shilpi Bhattacharjee

Supply Chain Security & Zero Trust Tech with Ashish Rajan & Shilpi Bhattacharjee

Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, Cloud Security Podcast’s Ashish Rajan and Shilpi Bhattacharjee speak with the Hacker Valley team at AISA CyberCon in Melbourne, Australia. Ashish and Shilpi discuss their respective talks on supply chain security and zero trust technology, SBOMs, and keynote speakers at this year’s Cybercon worth noting for the audience at home.

Timecoded Guide:

[00:00] Connecting & conversing at a cyber conference post-COVID

[06:50] Breaking down Shilpi’s presentation on supply chain threats & attacks

[11:45] Understanding the paradoxes & limitations of zero trust with Ashish’s talk

[26:13] Defining & explaining SBOM, or Software Bill of Materials

[33:16] Noticing key conversations & trends for those who didn’t attend AISA Cybercon

Sponsor Links:

Thank you to our sponsor Axonius for bringing this episode to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

Shilpi, can you talk about the idea behind the talk you had at CyberCon?

The inspiration behind Shilpi’s conference talk was supply chain issues. Titling her talk, “Who’s Protecting Your Software in Supply Chain,” Shilpi hoped to further educate and advocate for security in the supply chain process. An estimated one in two companies will experience a supply chain attack in the coming years. Instead of fearing such a statistic, Shilpi hopes her talk inspired further security action to protect our supply chains.

“One staggering fact that I read is that one in every two companies is going to have some sort of a supply chain attack in the next three years. So, who's going to look after the supply chain? Is it going to be the organization? Is it going to be your third-party vendors?” —Shilpi

Ashish, what about your talk at Cybercon?

In contrast, Ashish’s talk was about the triple paradox of zero trust. When talking about and implementing zero trust, Ashish realized many companies don’t implement the cultural changes needed for zero trust and/or only talk about zero trust as a technology process. Zero trust has numerous layers beyond technology, and requires time and major changes in culture and technology to implement in most companies.

“I feel bad for bashing on finance, marketing, and HR teams. They're all smart people, but if you're going to add four or five layers of security for them, they almost always say, ‘I just want to do my job. I don't really care about this. It's your job to do security.’” —Ashish

Where would you recommend starting when it comes to trying to implement the ideas in your respective talks?

When push comes to shove about where cyber companies can start first with supply chain and zero trust, Ashish and Shilpi agree that companies have to discuss business priorities. When company leaders can take the opportunity to look at and understand their cyber hygiene, the next steps might look very different from another company’s tactics. Knowing what a business has is the foundational piece that impacts any new process in cyber.

“If I were to go back to the first principle of what we do with cybersecurity professionals, one of the biggest assets that we're all trying to protect is data. You can't protect what you can't see, that's the foundational piece.” —Ashish

For anyone that wasn't able to make the conference, what is one thing that you would want to share with the audience at home?

There were a lot of conversations taking place at Cybercon this year. Ashish wants the audience at home to know that cloud native, zero trust, supply chain, and leadership positions like CISOs were the main themes in many talks, panels, and conversations. Shilpi wants those who couldn’t attend to watch out for more talks and conversations about cyber from those outside of the industry to understand that the issues impacting cyber influence the world.

“I think there's that interest about cybersecurity being more than just a cybersecurity problem. Cybersecurity is not just a technical problem, it's a societal problem, a cultural problem. I very much agree, because a lot of the things that we're dealing with impacts everyone.” —Shilpi

---------------

Links:

Keep up with our guest Ashish Rajan on LinkedIn

Keep up with our guest Shilpi Bhattacharjee on LinkedIn

Listen to Ashish and Shilpi’s Cloud Security Podcast

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase a HVS t-shirt at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Jaksot(406)

Episode 22 - Road To The DevGuild Conference with Ody Lupescu

Episode 22 - Road To The DevGuild Conference with Ody Lupescu

In this episode, Ody Lupescu joins Chris and Ron to discus building Security Programs and Onboarding Third Party Vendors Looking for more content and interaction from industry experts? Join Hacker Valley Studio at the DevGuild Conference Nov 14 with promo code hackervalley15

12 Marras 201938min

Episode 21 - Changing the AppSec Game with Tanya Janca

Episode 21 - Changing the AppSec Game with Tanya Janca

Notice something new? What better to way unveil the new podcast name Hacker Valley Studio with an amazing guest - Tanya Janca. Tanya has made a huge impact to Application Security and to many other infosec domains. I'd highly recommend staying in touch with Tanya and following her work.   Tanya Janca: https://twitter.com/shehackspurple https://dev.to/shehackspurple https://medium.com/@shehackspurple    https://www.youtube.com/shehackspurple    https://www.twitch.tv/shehackspurple https://www.linkedin.com/in/tanya-janca   Security Sidekick: https://securitysidekick.dev https://twitter.com/SecSidekick https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A   WoSEC (Women of Security) https://twitter.com/WoSECtweets  #SecurityWin  https://twitter.com/shehackspurple/status/1183483366592503808

22 Loka 201951min

Episode 20 - Embracing the grind with Will Rankin

Episode 20 - Embracing the grind with Will Rankin

Episode 20 Is Here 🚨In this special episode Chris and Ron are joined by Security Imagineer Will Rankin. The group discusses personal strategies for embracing the grind and move towards the next level. SecDevOps.AI Would like to give a special thanks to Will for his appearance on this episode and all of his support promoting the platform.

3 Loka 201929min

Episode 19 - Dressed for Success in Cyber with Ashley Tolbert

Episode 19 - Dressed for Success in Cyber with Ashley Tolbert

In this episode Ashley Tolbert joins Chris and Ron to discuss fashion in Cybersecurity. Fashion tribes, Attire, and Style Preferences are all points to consider when making an impression.

24 Syys 201924min

Episode18 - Math for Security and Red Teaming with KMAP

Episode18 - Math for Security and Red Teaming with KMAP

From Security Architect to Principal Red Team Engineer, KMAP joins Chris and Ron to discuss his diverse background and how he plans to use Discrete Math and BloodHound to advanced the capabilities of red teams.

5 Syys 201925min

Episode 17 - Undercover in the Criminal Underground with Charity Wright

Episode 17 - Undercover in the Criminal Underground with Charity Wright

New Episode Alert 🚨In this episode, Chris and Ron are joined by Charity Wright - An exceptional Threat Intelligence Analyst focusing on criminal activity on the deep and dark web. Charity also shares insight on how she began her career in intelligence and infosec.

28 Elo 201919min

Episode16 - Reading, Seeding, and Leading with Jonathan Wood

Episode16 - Reading, Seeding, and Leading with Jonathan Wood

In this powerful episode, Jonathan Wood joins Chris and Ron and shares insight on growth - personal, professional, and sales. Jonathan has a diverse background in cybersecurity startups and is currently leading his 4th startup, TruStar Technologies, to success.

24 Elo 201949min

Episode 15 - Thrill of the Hunt: Finding your Path

Episode 15 - Thrill of the Hunt: Finding your Path

In this episode, Chris and Ron learn about the impressive background of Kris Harms. Kris has a decorated career and extensive experience in Intrusion Detection, Incident Response, and Threat Hunting. He's been an early member at both Mandiant and Cylance which resulted in successful acquisitions.

21 Elo 201930min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-duodecim-lehti
aloita-meditaatio
rss-psykalab
jari-sarasvuo-podcast
rss-narsisti
rss-vapaudu-voimaasi
psykologia
adhd-podi
kesken
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-koira-haudattuna
rss-niinku-asia-on
aamukahvilla
rss-liian-kuuma-peruna
rss-metropolia-ammattikorkeakoulu
rss-anteeks-etukateen
aamupore