Épisodes

  • Resilient Cyber w/ Ed Merrett - AI Vendor Transparency: Understanding Models, Data and Customer Impact
    Feb 13 2025

    In this episode of Resilient Cyber, Ed Merrett, Director of Security & TechOps at Harmonic Security, will dive into AI Vendor Transparency.

    We discussed the nuances of understanding models and data and the potential for customer impact related to AI security risks.

    Ed and I dove into a lot of interesting GenAI Security topics, including:

    • Harmonic’s recent report on GenAI data leakage shows that nearly 10% of all organizational user prompts include sensitive data such as customer information, intellectual property, source code, and access keys.
    • Guardrails and measures to prevent data leakage to external GenAI services and platforms
    • The intersection of SaaS Governance and Security and GenAI and how GenAI is exacerbating longstanding SaaS security challenges
    • Supply chain risk management considerations with GenAI vendors and services, and key questions and risks organizations should be considering
    • Some of the nuances between self-hosted GenAI/LLM’s and external GenAI SaaS providers
    • The role of compliance around GenAI and the different approaches we see between examples such as the EU with the EU AI Act, NIS2, DORA, and more, versus the U.S.-based approach
    Voir plus Voir moins
    24 min
  • Resilient Cyber w/ Sounil Yu - The Intersection of AI and Need-to-Know
    Feb 3 2025

    In this episode, we sit down with Sounil Yu, Co-Founder and CTO at Knostic, a security company focusing on need-to-know-based access controls for LLM-based Enterprise AI.

    Sounil is a recognized industry security leader and the author of the widely popular Cyber Defense Matrix.

    Sounil and I dug into a lot of interesting topics, such as:

    • The latest news with DeepSeek and some of its implications regarding broader AI, cybersecurity, and the AI arms race, most notably between China and the U.S.
    • The different approaches to AI security and safety we’re seeing unfold between the U.S. and EU, with the former being more best-practice and guidance-driven and the latter being more rigorous and including hard requirements.
    • The age-old concept of need-to-know access control, the role it plays, and potentially new challenges implementing it when it comes to LLM’s
    • Organizations rolling out and adopting LLMs and how they can go about implementing least-permissive access control and need-to-know
    • Some of the different security considerations between
    • Some of the work Knostic is doing around LLM enterprise readiness assessments, focusing on visibility, policy enforcement, and remediation of data exposure risks

    ----------------

    Interested in sponsoring an issue of Resilient Cyber?

    This includes reaching over 16,000 subscribers, ranging from Developers, Engineers, Architects, CISO’s/Security Leaders and Business Executives

    Reach out below!

    -> Contact Us!

    ----------------

    Voir plus Voir moins
    27 min
  • Resilient Cyber w/ Grant Oviatt - Transforming SecOps with AI SOC Analysts
    Jan 27 2025

    SecOps continues to be one of the most challenging areas of cybersecurity. It involves addressing alert fatigue, minimizing dwell time and meantime-to-respond (MTTR), automating repetitive tasks, integrating with existing tools, and leading to ROI.

    In this episode, we sit with Grant Oviatt, Head of SecOps at Prophet Security and an experienced SecOps leader, to discuss how AI SOC Analysts are reshaping SecOps by addressing systemic security operations challenges and driving down organizational risks.

    Grant and I dug into a lot of great topics, such as:

    • Systemic issues impacting the SecOps space include alert fatigue, triage, burnout, staffing shortages, and inability to keep up with threats.
    • What makes SecOps such a compelling niche for Agentic AI, and what key ways can AI help with these systemic challenges?
    • How Agentic AI and platforms such as Prophet Security can aid with key metrics such as SLOs or meantime-to-remediation (MTTR) to drive down organizational risks.
    • Addressing the skepticism around AI, including its use in production operational environments and how the human-in-the-loop still plays a critical role for many organizations.
    • Many organizations are using Managed Detection and Response (MDR) providers as well, and how Agentic AI may augment or replace these existing offerings depending on the organization's maturity, complexity, and risk tolerance.
    • How Prophet Security differs from vendor-native offerings such as Microsoft Co-Pilot and the role of cloud-agnostic offerings for Agentic AI.
    Voir plus Voir moins
    19 min
  • Resilient Cyber w/ Rajan Kapoor - Native Cloud Workspace Gaps and Risks
    Jan 21 2025

    In this episode, we sit down with Rajan Kapoor, Field CISO of Material Security, to discuss the security risks and shortcomings of native cloud workspace security offerings and the role of modern platforms for email security, data governance, and posture management.

    Email and Cloud Collaboration Workspace Security continues to be one of the most pervasive and challenging security environments, and Rajan provided a TON of excellent insights. We covered:

    • Why email and cloud workspaces are some of the most highly targeted environments by cyber criminals, what they can do once they do compromise the email environment, and the broad implications.
    • The lack of security features and capabilities of native cloud workspaces such as M365 and Google Workspaces and the technical and resource constraints that drive teams to seek out innovative products such as Material Security.
    • The tug of war between security and productivity and how Material Security helps address challenges of the native workspaces that often make it hard for people to do their work and lead to security being sidestepped.
    • Particularly industries that are targeted and impacted the most, such as healthcare, where there is highly sensitive data, regulatory challenges, and more.
    • Common patterns among threats, attacks, and vulnerabilities and how organizations can work to bolster the security of their cloud workspace environments.

    This is a fascinating area of security. We often hear “identity is the new perimeter” and see identity play a key role in trends such as zero trust. But, so often, that identity starts with your email, and it can lead to lateral movement, capturing MFA codes, accessing sensitive data, impacting business partners, phishing others in the organization, and more, all of which can have massive consequences for the organizations impacted.

    Raja brought his expertise as a Field CISO and longtime security practitioner to drop a ton of gems in this one, so be sure to check it out!

    Voir plus Voir moins
    30 min
  • Resilient Cyber w/ Mick Leach - 5 Email Threats to Watch For in 2025
    Jan 21 2025

    While cybercriminals can (and do) infiltrate organizations by exploiting software vulnerabilities and launching brute force attacks, the most direct—and often the most effective—route is via the inbox. As the front door of an enterprise and the gateway upon which employees rely to do their jobs, the inbox represents an ideal access point for attackers.

    And it seems that, unfortunately, cybercriminals aren’t lacking when it comes to identifying new ways to sneak in. Abnormal Security’s Field CISO, Mick Leach, will discuss some of the sophisticated threats we anticipate escalating in the coming year—including cryptocurrency fraud, AI-generated business email compromise, and more.

    Mick and I dove into a lot of great topics, including:

    • The evolution of email based attacks and why traditional tooling may fall short
    • How attackers are leveraging GenAI and LLM’s to make more compelling email-based attacks
    • How defenders can utilize AI to improve their defensive capabilities
    • The role of tooling such as Secure Email Gateways and more, and how they still play a role but fail to meet the latest threat landscape
    • How Abnormal is tacking email-based attacks and the outcomes they are helping customers achieve with streamlined integration and use
    Voir plus Voir moins
    32 min
  • Resilient Cyber w/ Greg Martin - Agentic AI and AppSec
    Jan 10 2025

    We’ve heard a ton of excitement about AI Agents, Agentic AI, and its potential for Cybersecurity. This ranges in areas such as GRC, SecOps, and Application Security (AppSec).

    That is why I was excited to sit down with Ghost Security Co-Founder/CEO Greg Martin.

    In this episode, we sit down with Ghost Security CEO and Co-Founder Greg Martin to chat about Agentic AI and AppSec. Agentic AI is one of the hottest trends going into 2025, and we will discuss what it is, its role in AppSec, and what system industry challenges it may help tackle.

    Greg and I chatted about a lot of great topics, including:

    • The hype around Agentic AI and what makes AppSec, in particular, such a promising area and use case for AI to tackle longstanding AppSec challenges such as vulnerabilities, insecure code, backlogs, and workforce constraints.
    • Greg’s experience as a multi-time founder, including going through acquisitions, but what continues to draw him back to being a builder and operational founder.
    • The challenges of historical AppSec tooling and why the time for innovation, new ways of thinking, and leveraging AI is due.
    • Whether we think AI will end up helping or hurting more in terms of defenders and attackers and their mutual use of this promising technology.

    And much more, so be sure to tune in and check it out, as well as check out his team at Ghost Security and what they’re up to!

    Voir plus Voir moins
    27 min
  • Resilient Cyber w/ Filip Stojkovski & Dylan Williams - Agentic AI & SecOps
    Dec 11 2024

    In this episode, we will be sitting down with Filip Stojkovski and Dylan Williams to dive into AI, Agentic AI, and the intersection with cybersecurity, specifically Security Operations (SecOps).

    I’ve been following Filip and Dylan for a bit via LinkedIn and really impressed with their perspective on AI and its intersection with Cyber, especially SecOps. We dove into that in this episode including:

    • What exactly Agentic AI and AI Agents are, and how they work
    • What a Blueprint for AI Agents in Cybersecurity may look like, using their example in their blog with the same title
    • The role of multi-agentic architectures, potential patterns, and examples such as Triage Agents, Threat Hunting Agents, and Response Agents and how they may work in unison
    • The potential threats to AI Agents and Agentic AI architectures, including longstanding challenges such as Identity and Access Management (IAM), Least-Permissive Access Control, Exploitation, and Lateral Movement
    • The current state of adoption across enterprises and the startup landscape and key considerations for CISO’s and security leaders looking to potentially leverage Agentic SecOps products and offerings
    Voir plus Voir moins
    23 min
  • Resilient Cyber w/ Walter Haydock - Implementing AI Governance
    Nov 22 2024

    In this episode, we sit down with StackAware Founder and AI Governance Expert Walter Haydock. Walter specializes in helping companies navigate AI governance and security certifications, frameworks, and risks. We will dive into key frameworks, risks, lessons learned from working directly with organizations on AI Governance, and more.

    • We discussed Walter’s pivot with his company StackAware from AppSec and Supply Chain to a focus on AI Governance and from a product-based approach to a services-oriented offering and what that entails.
    • Walter has been actively helping organizations with AI Governance, including helping them meet emerging and newly formed standards such as ISO 42001. Walter provides field notes, lessons learned and some of the most commonly encountered pain points organizations have around AI Governance.
    • Organizations have a ton of AI Governance and Security resources to rally around, from OWASP, Cloud Security Alliance, NIST, and more. Walter discusses how he recommends organizations get started and where.
    • The U.S. and EU have taken drastically different approaches to AI and Cybersecurity, from the EU AI Act, U.S. Cyber EO, Product Liability, and more. We discuss some of the pros and cons of each and why the U.S.’s more relaxed approach may contribute to economic growth, while the EU’s approach to being a regulatory superpower may impede their economic growth.
    • Walter lays our key credentials practitioners can explore to demonstrate expertise in AI security, including the IAPP AI Governance credential, which he recently took himself.

    You can find our more about Walter Haydock by following him on LinkedIn where he shares a lot of great AI Governance and Security insights, as well as his company website www.stackaware.com

    Voir plus Voir moins
    29 min