Know Where You’re Putting Your Tool – Paul’s Security Weekly #587

This week, we welcome Vaughn Adams, Enterprise Sales Engineer at LogRhythm! Vaughn will be talking about using freely available tools and logs you are already collecting to detect attacker behavior! In our second segment, we have a Round Table discussion entitled "What the Heck Are Security Basics?", to talk about what should organizations be doing to meet the basic security requirements, and much more! In our final segment, we air a pre-recorded interview with Mandy Logan on "Hacking the Brainstem", her trip through recovery, and how she came to love Information Security!   Full Show Notes: https://wiki.securityweekly.com/Episode587 Visit https://www.securityweekly.com/psw for all the latest episodes! To get involved with LogRhythm, go to: www.securityweekly.com/logrhythm Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke   Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter! Follow us on Twitter:

View Show Index

Full Audio

Segments

1. Detecting Attacker Behavior, LogRhythm –

Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques!

To get involved with LogRhythm, go to: securityweekly.com/logrhythm

Full Show Notes: https://wiki.securityweekly.com/Episode587

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

2. What The Heck Are “Security Basics”? –

The question comes up quite often, what should organizations be doing to meet the basic security requirements? We often hear the terms "Security Basics", "Minimum Security Standards" or dear lord "Security Hygiene". But what does all this mean? Is it the same for everyone? People will point to different resources that attempt to define the security basics, but do they really work? Does compliance play into this picture?

Full Show Notes: https://wiki.securityweekly.com/Episode587

Hosts

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly
Doug White
Doug White
Professor at Roger Williams University
Jack Daniel
Jack Daniel
Security Wizard at Co-Founder of Security BSides
Jason Wood
Jason Wood
Founder; Primary Consultant at Paladin Security
Jeff Man
Jeff Man
#HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Joff Thyer
Joff Thyer
Security Analyst at Black Hills Information Security
Keith Hoodlet
Keith Hoodlet
Application Security Manager at Thermo Fisher Scientific
Larry Pesce
Larry Pesce
Principal Managing Consultant and Director of Research & Development at InGuardians
Lee Neely
Lee Neely
Information Assurance APL at Lawrence Livermore National Laboratory
Matt Alderman
Matt Alderman
Executive Director at CyberRisk Alliance

3. Hacking the Brainstem, Mandy Logan –

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is.

Full Show Notes: https://wiki.securityweekly.com/Episode587

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

4. Hacking the Brainstem, Mandy Logan – Paul’s Security Weekly #587

Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is. Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

5. What The Heck Are “Security Basics”? – Paul’s Security Weekly #587

The question comes up quite often, what should organizations be doing to meet the basic security requirements? We often hear the terms "Security Basics", "Minimum Security Standards" or dear lord "Security Hygiene". But what does all this mean? Is it the same for everyone? People will point to different resources that attempt to define the security basics, but do they really work? Does compliance play into this picture? Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly

6. Detecting Attacker Behavior, LogRhythm – Paul’s Security Weekly #587

Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques! To get involved with LogRhythm, go to: https://www.securityweekly.com/logrhythm Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly

Host

Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly
prestitial ad