SC Media’s Senior Reporter Bradley Barth once again commutes to Fisherman’s Wharf with several top cybersecurity execs and for the first time a pair of undercover wireless research “workmen” come along for the ride.
Back by popular demand, SC Media proudly presents its second annual edition of Trolley Talk, a segment where we interview leading cybersecurity experts while riding the Powell-Hyde cable car line through the streets of San Francisco. Did reporter Bradley Barth complete all four guest interviews before reaching the end of the line? Watch to find out.
As a bonus, we also invited along two “undercover” wireless researchers from the RSA Wireless Village Sandbox to passively sniff out any wireless devices and communications they could detect along our route.
Follow us to Fisherman’s Wharf to learn what they uncovered.
First aboard the cable car is Max Heinemeyer, Director of Threat Hunting, Darktrace. Listen in as we shoot the breeze with Max about a surge in cloud-based threats, the malicious use of AI to create more powerful malware, and the strangest unauthorized device that was recently found on a customer’s network.
All aboard for Andy Ellis, CSO, Akamai. Andy takes on the recent spate of credential stuffing attacks, addresses the IoT botnet plague, and offers perspective on why humans are better at risk management than we might think.
Next stop, Keenan Skelly, VP of Global Partnerships and Security Evangelist, Circadence. Keenan explains how advances in AI, cloud technology and social media strategy are changing the ways businesses train their employees to stay secure. She also gives us the scuttlebutt on a Fortune 500 CFO who apparently just can’t stop falling for phishing scams.
A brief lay over at Fisherman’s Wharf with Rick Farina, Senior Product Manager, Aruba, a Hewlett Packard Company, (left) and Rick Mellendick, Chief Security Officer, PI Achievers, both on behalf of the RSA Wireless Village Sandbox. Our two undercover Ricks reveal their findings after capturing wireless data as they rode alongside us on the cable car. Here are their final stats:
· 50MB of data (all kinds, mostly web traffic)
· Two wireless keyboards/mouses seen. (“People assume sure things are very short range but they can be monitored from a surprising distance,” Farina tells SC Media.)
· 1515 total Wifi devices, including 676 APs and 536 unique clients.
· 243 Bluetooth devices including fitness trackers, smart watches, cell phones, headphones, and a security camera plus something called “Laser Eyes.”
The researchers also picked up…
· Over-the-air civil air patrol on VHF
· A few DMR radios from a hotel’s maintenance operations, on UHF (color code 10).
· Cable car communications
· The metro police
· BART (Bay Area Rapid Transport)
Heading back home with Christopher Elisan, Director of Threat Intelligence, Flashpoint. It’s a double dose of ransomware, as Christopher gives us a break down of both GandCrab and Ryuk. He also reveals one of the oddest cybercriminal conversations he’s ever come across while researching the dark web.