Download the App!

show episodes
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
Loading …
show series
 
Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical Employee of the Year’, ‘Role Model of the Year’, ‘Rising Star’, and ‘Woman of the Year’ in the CRN W…
 
Dr. Magda Chelly is a keynote speaker, serial entrepreneur and a senior security expert. She is a strong activist for women in security, and founded Women on Cyber in Singapore, which is focused on supporting female professionals in the industry. She’s is also the founder of of Responsible Cyber, and a member of the Advisory Board for the Executive…
 
The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made. Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches.” She is a recognized expert in cybersecurit…
 
In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat. Timur Yunusov is a Security Expert in the area of payment security and application security, one of the organizers of Payment…
 
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's un…
 
Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it is reported that an attack hits once every 11 seconds, and as if that stat isn’t hard enough to fathom, it’…
 
Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Z…
 
Engines require three vital elements to generate power: AIR, SPARK, and FUEL. If any of these three elements aren’t present, the engine will struggle to function or even start. Fuel injectors are a vital part of a complex system that delivers the fuel to an engine, so it’s a critical component for ensuring successful ignition. In the startup world,…
 
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publi…
 
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publi…
 
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security.…
 
Jacob Horne is the Managing Director at DEFCERT where he specializes in DFARS and CMMC level three compliance for manufacturers in the Defense Industrial Base. As a former NSA intelligence analyst and U.S. Navy cryptologic technician, Jacob has over 14 years of experience in offensive and defensive cybersecurity operations. As a civilian he has led…
 
William Lin became an avid technology enthusiast after building his very first computer in elementary school and then began experimenting with the latest venture-backed consumer business models in his spare time. He is now Managing Director and a founding team member at ForgePoint Capital, a VC firm focused on cybersecurity startups. he has worked …
 
Dr. Matthew Canham is the CEO of Beyond Layer 7 (a cybersecurity consulting firm specializing in human security and data analytics), and a Research Professor of Cybersecurity at the Institute of Simulation and Training, University of Central Florida. Previously, as a federal investigator, Dr. Canham investigated cybercrimes, intellectual property t…
 
Re-running this great chat with Ron Gula from the early days! A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. He joins me at the bar to discuss the conception of Tena…
 
The quickly growing field of vendors in cybersecurity getting attention of security leaders is becoming more difficult by the day. The fatigue of the continuous vendor attempts to fill up their time is very real. Getting your solution seen and even getting a few minutes with these leaders requires a tactical and strategic approach and proving your …
 
Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in combat, chaos ensues although the fighters must stay laser focused. Just as one needs to apply the proper technique in BJJ, cybersecurity professionals must find ways to creatively apply their techni…
 
Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as it’s interconnected technology. Past investigations performed by hackers, researchers, and flight authorities have cast doubt on the industry’s perceived culture of safety. The need to address the nove…
 
Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of industries. A proven cybersecurity leader and innovator, Paul founded “Security Weekly” – a podcast network providing free knowledge for the entire security community to benefit from. As former Product Evan…
 
John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and their dream of starting a family. Six successful years, a $2M business and two precious daughters later, he lost it all to cybercrime. Because the cybercriminal, a company insider, masked the crimes using …
 
Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more prominent industries. From an attacker's viewpoint, it's very lucrative. Not only are game developers at risk for attack, so are the gamers themselves. Access to one's XBOX LIVE account, or game profi…
 
"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly elevated alert levels, although Ransomware remains an industry plague. With seemingly no end in sight, the attacks continue to cripple businesses while making its perpetrators millionaires. Aviv Grafi is C…
 
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's un…
 
In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy requires time, effort, and patience. There is also no universal strategy, and every move a player makes is crucial. In this episode, the iconic Security Blogger and co-host of the popular Smashing Secur…
 
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. At one point in time, the Social Security number was described as the skeleton key needed to unlock theft of your assets, your identity, and…
 
A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site and flows amongst the others in different directions until it appears above water again. Rohan Light is an expert on governance, strategy and risk capability throughout the data, evidence and decisio…
 
Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Hacker”, Jenny Radcliffe has spent a lifetime learning how to use the human element to gain access to the buildings, data and information, and the things we would wish to keep private. Her main objective …
 
Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing the invisible is not impossible. Equipped with true XRAY Vision, Nato joins me at the bar to discuss DevSecOps beyond the SDLC, Security Maturity, his homegrown "Olympiad" SIEM, Man VS Machines, and th…
 
The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that number is projected to grow to nearly 1.4 billion by 2024. Most of the consumers of these products don’t realize is that once a smart devices goes online, it poses serious security risks. Tony Reinert ma…
 
The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the SDLC. Jim Manico is the founder of MANICODE Security where he trains software developers on secure coding and security engineering. He stops by BarCode to help us define “DevSecOps”, building an Effect…
 
Overseeing security and privacy challenges in COVID era is an extremely difficult task—and it’s even more complicated if you’re a Healthcare CISO. You must monitor the vital signs of your security program while keeping the pulse on threat vectors and adversaries. Anahi Santiago meets with me at the bar to discuss being a CISO during the pandemic, m…
 
The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. This powerful theory is further explained by cybersecurity leader and mentor, Naomi Buckwalter during her stop at Barcode. We also get into topics such as cybersecurity mentoring, privacy post-pandemic, c…
 
Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike that could cripple them with one shot. I catch up with Purandar Das, Founder and CEO of Sotero, to discuss his data protection strategy. Purandar started Sotero with the conviction that today’s data protection …
 
Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling global data privacy, cyber data breach response, and complex cross-functional data-driven projects. She's also an internationally published author, highly sought-after speaker, and top media presence for glob…
 
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security.…
 
An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential dangers when flying is a vital part their profession. Flying through clouds is just like driving through fog – little visibility can represent extreme danger for those unaware of the circumstance. To h…
 
Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely cru…
 
To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Security Right", which is an Amazon BEST SELLER in 9 Categories. He is also Executive Partner at Independent Security Evaluators (ISE), the security organization famous for hacking everything from cars t…
 
A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the field of cybersecurity is preceded by his career as a powerlifter and pro wrestler for the WCW. He has since taken full control in the industry as an offensive security professional. He is an establish…
 
Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligence. He joins me at the bar to discuss new and emerging threats, securing our homes during the COVID era, IoT security and cybersecurity trends we should expect to develop in 2021 and beyond. Deepfake …
 
Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on building cyber intelligence programs that capitalize on disparate data and information to create and deliver tactical, operational, and strategic intelligence to protect personnel, facilities, data, a…
 
Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine Cold Chain Attacks, CISA, and Net Neutrality. I'm also joined by special guest co-host Alex, and Tony the Bartender explains his theorem for a "Blitzen". Support the show (https://www.patreon.com/barc…
 
Open source intelligence (OSINT) describe the techniques used to gather information online from publicly available sources. This methodology can be used to target specific individuals for nefarious purposes, or alternatively, provide direct evidence against perpetrators and bring them to justice. Stephen Adams, Intelligence specialist with a focus …
 
I have the privilege of speaking with an AI trailblazer and a member of Forbes 30 Under 30, Przemek Chojecki. We discuss "Contentyze", a platform he created that aims to fix the inefficiencies in journalism with automated content generation. We also talk Machine Learning, Deepfake Technology, and also where the intersection of AI and Cybersecurity …
 
It's a BarCode NCSAM/ HALLOWEEN special, where I speak with established author and iconic security professional who is no stranger to disguises, deception and duplicity - Ira Winkler! We discuss security awareness, his time in the NSA, Secure Mentem, his new book "You CAN Stop Stupid", and some of his insane espionage expeditions that make James Bo…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login