Security Weekly Podcast Network (Audio)

Adversary Emulation w/ Carlos Perez - PSW #789

Jun 29, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Paul Asadorian on Darth Vader
01:43 • 1min
3
Cryptocurrencies and the Ukraine
03:12 • 2min
4
How I Got Into Information Security
05:33 • 2min
5
Trusted Sec's Journey
07:45 • 2min
6
C2: A Public Profile
09:57 • 2min
7
Microsoft's Early Years in Detecting Social Media Attacks
11:36 • 1min
8
The Advantages of Internal Frameworks for EDR
13:04 • 2min
9
The Internal Joke at the Company
14:41 • 2min
10
The Importance of Blending In
16:26 • 2min
11
The Importance of C2 in Pentesting
17:59 • 2min
12
The Importance of Internal Frameworks in Defensive Operations
19:45 • 3min
13
The Future of Networking Devices
22:31 • 2min
14
The Future of Trust the Sex
24:02 • 2min
15
The Difference Between the Private Sector and the Government Sector
26:31 • 2min
16
Sysmon for Linux: How to Track Network Connections and Processes
28:40 • 2min
17
The Importance of Open Source Software
30:44 • 2min
18
The Importance of Having a SOC Team on Twitter
32:51 • 2min
19
The Importance of Pen Tests
34:39 • 3min
20
How to Define a Trusted Set for Your Salespeople
37:14 • 3min
21
The Nuanced Differences Between Physical and Physical Pen Tests
40:15 • 2min
22
The Importance of Physical Security
41:54 • 2min
23
TSMC's IP-Sensitive Design
43:33 • 2min
24
The Different Types of Pen Testing
45:19 • 2min
25
How to Get More Organizations to Be Proactive About PCI Compliance
47:12 • 2min
26
How to Establish a Good Relationship With Management
48:47 • 2min
27
The North Koreans and the Crypto Industry
50:25 • 2min
28
The Importance of DC Sync in Decision Country
52:12 • 2min
29
How to Double My Operational Activity
53:44 • 2min
30
How to Configure an Event Log in MSDN
55:45 • 2min
31
How to Protect Yourself From Operator Errors
57:22 • 2min
32
How to Disable WMI Event Logs
59:14 • 2min
33
How to Find Gaps in Event Logs
01:01:03 • 2min
34
The Importance of Copyright Protection
01:02:57 • 2min
35
How to Detect Registry Changes Inside of WMI Event Channels
01:04:28 • 2min
36
Security Weekly: A Call-Out Seat for You
01:06:03 • 2min
37
How to Trust a Vulnerability Scanner
01:08:13 • 2min
38
PCI 4.0 and the Need for Credentialed Scans
01:10:11 • 2min
39
The Impact of Local Checks on Nessus
01:12:04 • 2min
40
The Road Map to PCI Compliance
01:13:51 • 3min
41
The FDA's S Bomb Mandate Changed the Game for Open Source Software Security
01:16:37 • 2min
42
The Unintended Consequences of the EU AI Act
01:18:15 • 2min
43
The Limits of Medical Devices
01:20:00 • 1min
44
The Difference Between a Rock and Hardware That Has No Firmware
01:21:30 • 2min
45
The FDA's Role in Cyber Security
01:23:20 • 2min
46
The Seed Bill of Materials for Open Source Software
01:25:06 • 1min
47
How to Use Chat GPT to Summarize YouTube Videos
01:26:36 • 2min
48
S-Bomb: A Process Problem
01:28:29 • 2min
49
How to Build an Open Source Process That Is Ready for Production
01:30:00 • 2min
50
The Importance of Code Review
01:31:38 • 2min
51
How AI Maps Software
01:33:27 • 3min
52
The Future of Two Factor Authentication
01:36:30 • 2min
53
The Benefits of Duo
01:38:23 • 2min
54
The Importance of Two Factor Authentication
01:39:54 • 2min
55
The Importance of Biometrics in Authentication
01:41:37 • 2min
56
The Difference Between Authentication and Authorization
01:43:25 • 2min
57
The Difference Between Identity Access Management and Authentication
01:45:00 • 2min
58
The Problem With Proof of Record of Humans
01:46:36 • 2min
59
The Importance of Security Numbers
01:48:13 • 2min
60
The Cost of Biometrics
01:50:20 • 2min
61
The SISA Directive and the FTP and Telnet Mandate
01:52:04 • 2min
62
The Role of Telnet in Tax Surface Monitoring
01:54:06 • 2min
63
The Problems With CMMC's Telnet Standards
01:56:09 • 2min
64
The Importance of Self-Assessment
01:57:40 • 2min
65
The Joker Spy Back Door
01:59:22 • 2min
66
The Problem With the Japanese Cryptocurrency Exchange
02:01:44 • 2min
67
The Importance of Cryptocurrency in the Workplace
02:03:25 • 2min
68
Cryptocurrency and Money
02:05:12 • 2min
69
The Future of Cryptocurrency
02:06:47 • 2min
70
The Advantages of Cryptocurrency
02:08:19 • 2min
71
How to Use Cryptocurrency to Transfer Value From Business to Business
02:10:07 • 2min
72
The NSA's Black Lotus Mitigation Guides
02:11:44 • 4min
73
How to Remove a Certificate From the Operating System
02:15:32 • 2min
74
The Impacts of Key Leaks on the Intel Boot Process
02:17:12 • 2min
75
The TPM and the Key Leak
02:18:44 • 3min
76
The Unimpressive Bug in EDK2
02:21:35 • 2min
77
The SEC's Wells Notice to Solar Winds
02:23:22 • 2min
78
SZA's Response to the 2020 Attack on the Company's Infrastructure
02:24:53 • 2min
79
The Vulnerability of SolarWinds
02:26:44 • 2min
80
The SolarWinds Supply Chain Breach
02:28:17 • 2min
81
The Impact of Insider Trading on CISOs
02:29:59 • 2min
82
The Importance of Initial Disclosure
02:32:17 • 2min
83
The Importance of Process in Security Investigations
02:34:08 • 2min
84
The Crossover Between PCI and the Card Industry
02:35:55 • 3min
85
The Differences Between Electra and Smart Thermostats
02:38:37 • 3min
86
MQTT: The Standard for IoT Messaging
02:41:32 • 2min
87
The Role of HTTP in IoT Devices
02:43:13 • 2min
88
Telnet and FTP: A Human Supply Chain
02:44:56 • 2min
89
The Importance of Wi-Fi in a Two Zone System
02:46:38 • 2min
90
The Importance of Usability in Device Security
02:48:12 • 3min