Episode 82 - What is Old is New Again with Brian Romansky

Episode 82 - What is Old is New Again with Brian Romansky

Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio features Brian Romansky, the Chief Innovation Officer at Owl Cyber Defense. You will hear about his ideas, inventions, and how hardware is helping us in cybersecurity today.

The episode begins with Brian sharing his background, and journey into the cybersecurity space. He always knew he wanted to do something with technology and thought he may go into robotics. The transition into the cyber world was a natural one when he was working on a team that was moving mechanical postage metering to happen electronically. These machines were often trying to be hacked, and the team also began working on e-commerce and shipping platforms. From then, he continued to work on cybersecurity, data, and cryptography.

Today, at Owl Cyber Defense Brian works on cross domain solutions for the US Department of Defense, and other government organizations, as well as commercial customers. It gets him up in the morning because it combines many of the electrical and cryptography space that interests him, with hardware. His hope for the future, is that there is a paradigm shift in cybersecurity, making it less of a cat and mouse game by using hardware enforced mechanisms.

He doesn’t have a lot of free time, but as the episode wraps up, you will also hear about what Brian is interested in, and working on outside of work.

:29 CIO of Owl Cyber Defense, Brian Romansky is introduced to the show.

4:33 Brian shares his journey from electrical engineering to cybersecurity.

6:25 Brian explains the work he does today.

14:16 Brian hypothosizes on the future of cybersecurity

16:58 Brian answers the question “Is there an unhackable system?”

19:55 Advice for organizations relying more on technology during work from home.

27:48 What does Brian do outside of work?

Links:

Learn more about Owl Cyber Defense

Learn more about Brian Romansky

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Avsnitt(390)

Episode 6 - MITRE ATT&CK™ Matrix Overview

Episode 6 - MITRE ATT&CK™ Matrix Overview

In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.

7 Juli 201921min

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics

7 Juli 201917min

Episode 4 - Layer 8 Fitness, Diet, Focus

Episode 4 - Layer 8 Fitness, Diet, Focus

In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.

22 Juni 201942min

Episode 3 - All Things Threat Intelligence

Episode 3 - All Things Threat Intelligence

In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!

22 Juni 201927min

Episode 2 - Layer 8 Level Up Career, Life, and Self

Episode 2 - Layer 8 Level Up Career, Life, and Self

In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.

22 Juni 201916min

Episode 1 - Cybersecurity Alchemy

Episode 1 - Cybersecurity Alchemy

Alchemy - "A seemingly magical process of transformation, creation, or combination" In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows. Link to blog: https://secdevops.ai

19 Juni 201915min

Populärt inom Utbildning

bygga-at-idioter
historiepodden-se
det-skaver
rss-bara-en-till-om-missbruk-medberoende-2
alska-oss
nu-blir-det-historia
harrisons-dramatiska-historia
svd-ledarredaktionen
allt-du-velat-veta
johannes-hansen-podcast
not-fanny-anymore
rikatillsammans-om-privatekonomi-rikedom-i-livet
roda-vita-rosen
rss-max-tant-med-max-villman
sa-in-i-sjalen
sektledare
i-vantan-pa-katastrofen
rss-sjalsligt-avkladd
rss-npf-podden
jagaren