Mnemonic 公开
[search 0]
更多

Download the App!

show episodes
 
Loading …
show series
 
Internet of Things | Privacy miniseries Previously in this miniseries, we’ve discussed the challenges of online privacy with experts in that field. In many ways, what can be known about us through our online behaviour pales in comparison to what someone can find out about us by monitoring measurements of the real world, through ours and others’ Int…
 
2 stories about mom’s I took care of as a nurse. Nursing can be a life changing experience. The post Nursing Stories About Mom’s (Mother’s Day 2021) appeared first on NURSING.com.由Kati Kleber RN CCRN (Critical Care Nurse, Nursing Student Mentor, NCLEX educator, and Nursing Podcast Host)
 
In this episode, you’ll learn about the digital canaries; honeypots. Honeypots are passive monitoring systems that appear to be legitimate parts of an organisation’s core infrastructure, designed to alert you about someone trying to illegitimately enter your infrastructure, and help you get insight on the attacker’s tactics, techniques, and procedu…
 
The World of Open Source How do you know that the open source you are using is secure? This episode, Robby is joined by Daniel Wisenhoff to talk about open source management. Daniel is the CEO & Co-Founder of Debricked, a Swedish company aiming to help organisations use open source securely in their own software development. During their conversati…
 
The future of privacy | Privacy miniseries Is privacy a myth for anyone with a smart phone? Can we actually control what our devices are sharing about us? We’re continuing our miniseries about privacy with Edwin Doyle, Delegate & Constituent for the World Economic Forum Taskforce on Data Intermediaries, and Global Security Strategist at Check Point…
 
What's the worst that can happen with your email? For this episode, Robby has invited Korstiaan Stam, Digital Forensics & Incident Response Manager in PwC Netherlands, to pick his brain about Business Email Compromise (BEC). Korstiaan has a lot of experience working with email fraud, and throughout their conversation he shares many of his war stori…
 
We’re continuing our new miniseries about privacy with cyber security researcher Hanna Linderstål. Hanna is the Founder and CEO of Earhart Business Protection Agency, a company providing research for governments and organisations on disinformation and online threats. Robby has invited Hanna to discuss modern cyber espionage and lawful intercept; th…
 
Your phone is spying on you | Privacy miniseries Do you know what your favourite apps are doing with your data? And who exactly are these entities that are capitalising on selling this kind of information? We’re kicking off our new miniseries about privacy with investigative journalist Martin Gundersen. Martin works at NRK, the Norwegian public bro…
 
What are you doing to make the internet a safer and more private place? This episode, Robby welcomes John Todd, Executive Director of the non-profit organisation Quad9. Quad9 is a free, recursive DNS solution that partners with threat intelligence providers from all over the world to block websites that try to harm our computers (through things lik…
 
Nuclear cyber security | OT miniseries We’re continuing our Operational Technology (OT) miniseries where we look into the security challenges in the OT space. This time, Robby is joined by Nicholas Burnet and Guido Villacis from EDF Energy, Europe’s largest nuclear provider. EDF owns and operates eight (soon nine) nuclear power stations in the UK, …
 
We're kicking off 2021 with a timely conversation about software security, this time with two individuals that are more than qualified for the job - Dr. Daniela S. Cruzes and Espen Johansen. Dr. Cruzes is a Professor at the Norwegian University of Science and Technology (NTNU) and Senior Research Scientist at SINTEF, and has been working with Espen…
 
Technology isn't the problem | OT miniseries For our last episode in 2020, we’re continuing our Operational Technology (OT) miniseries where we look into the security challenges in the OT space. This episode, Robby is joined by Mitchell Impey, ICS Security Analyst at the Danish Energy and Telecommunications company Norlys. Mitchell explains how he …
 
SIEM is DEAD? Ready to time travel through the last 20 years of security monitoring? To guide us we have Dr. Anton Chuvakin, recognized security expert and the man behind the term EDR! Anton shares from his long experience in the field, among other as VP of Research and Distinguished Analyst at Gartner and working with security solution strategy at…
 
Are we secure enough? Are we exposed? What are our key cyber risks? Our podcast guest this week is a veteran in the IT space in the financial sector, and has extensive experience communicating security posture to stakeholders. Erik Blomberg, CISO in the Swedish Handelsbanken, chats with Robby about what management really is wondering about, and how…
 
Morten and Robby recorded this session as part of their virtual presentation at the CERT-IS conference in Iceland last month. The episode is also available in video: https://youtu.be/Izfb7-wA_0I For this episode, Robby welcomes Morten Weea from mnemonic’s Threat Intelligence team. Morten is a PhD candidate researching decision-making in incident re…
 
For this episode, we’re happy to have Sebastian Takle from the DNB Financial Cyber Crime Center (FC3) with us to share how one of the largest banks in the Nordics works with Threat Intelligence. Sebastian is Subject Lead for Threat Intelligence at FC3, and in his conversation with Robby he explains their threat actor centric approach to TI. We also…
 
Why is it so difficult for security people to speak to developers? And the other way around… For this episode, Robby has invited a veteran to the software security game, Nick Murison, Security Practice Lead at Miles. Nick started off as a penetration tester, and has been passionate about software security and training developers to think about secu…
 
Forensic Readiness | OT miniseries We’re continuing our Operational Technology (OT) miniseries where we look into the security challenges in the OT space. This time around, Robby’s invited a fellow security podcaster and former head of forensics at Volvo, Rikard Bodforss. Rikard has been working with security in the Industrial Control Systems (ICS)…
 
How do we go from data to information, and from information to intelligence in the cyber world? Who better to try to explain this than the former Director of the national communications and security agency in the Netherlands, Job Kuijpers, and his colleague and trusted advisor for Threat Intelligence, Piet Kerkhofs. After more than 15 years in the …
 
This time, Robby has invited his most recent online friendship and the uncrowned king of open source, Simon Simonsen, to the podcast. Simon also happens to have a lot of experience developing and utilising security architecture defense strategies, or as he calls it; utilising your home court advantage. Simon has over a decade of experience in secur…
 
How can we prove cybersecurity effectiveness? With USD 124 billion being spent worldwide on IT security last year alone, it's no wonder this is a question many would like the answer to. However, finding a quantitative metric to evaluate security investments, outside of positive effects like diminishing risks and reducing the amount of bad things ha…
 
For this Norwegian episode of the mnemonic security podcast, Robby and co-host for the day Manager of Governance, Risk & Compliance at mnemonic, Gjermund Vidhammer, are joined by two major actors in the Norwegian cyber landscape: Robin Bakke, Specialist Director for Cyber Security at the Ministry of Justice & Public Security, and Bente Hoff, Direct…
 
How can we best apply data science techniques to gain security visibility? What data you collect obviously affects your detection capabilities, but as many have painfully experienced; there can be too much of a good thing! In this episode, Robby is joined by Jeff Barto. He is the Chief Security Officer at a large hedge fund in the US, has worked in…
 
How effective is the use of Key Performance Indicators (KPIs) in security? Are they even relevant, and if so, do KPIs work differently for security teams than others? In this episode, Robby chats with someone that’s had a lot to do with KPIs, both in his position as the former Head of the government CERT in Denmark (GovCERT), as well as a SOC Analy…
 
Who better to continue our Operational Technology (OT) miniseries with than KraftCERT, the Norwegian Energy and Control System CERT! KraftCERT helps industrial control system (ICS) related industries establish incident response teams, build digital security processes, and get a better understanding of the threat landscape. With us for this episode,…
 
For this episode, Robby has invited two experts that see privileged access management (PAM) from two different viewpoints. From the customer side he has Thor Milde, SVP and Head of IT Security Services in Norway's largest bank DNB, share his PAM journey - and from the consultant side Michele Paci, IAM Executive Architect in IBM, explains what he's …
 
In this episode, we continue our Operational Technology (OT) miniseries where we look into the security challenges in the OT space. This time, Robby chats with PhD Andrea Carcano on the importance of visibility in OT environments. Andrea is passionate about the security of industrial control systems (ICS), and the Co-Founder of Nozomi Networks, a U…
 
In this episode, Robby chats with Erlend Gjære, Co-founder and CEO of Secure Practice, on how to turn an organisation’s users into its last line of defense against email threats. Erlend has spent most of his career studying people and their email habits. At Secure Practice he combines scientific research and employee behavior to find out how to bes…
 
The CISO role in Operational Technology (OT) means securing environments where digital and physical worlds meet, and where a service disruption in the digital space can have a direct and immediate impact on our physical world. In this episode, Robby wants to know how a CISO handles the challenge of securing both IT and OT environments. To kick off …
 
In this episode, Robby chats with two experts from mnemonic that are highly passionate about microservices; security researcher Andreas Claesson and Head of Development of our Argus security platform, Joakim von Brandis. Andreas explains how he works with microservices with customers, and what the dark side of microservices are regarding security. …
 
How to best avoid being stuck in Groundhog Day? In the second part of our mini series about SOAR, Robby chats with a gentleman that was referred to as The Godfather of SOAR in the first episode of the series. Rob Gresham, SANS Instructor specialising in automation for Security Operation Centers and a Security Solutions Architect at Splunk, takes us…
 
Do it smart, so you won't have to do it again. In this episode, we chat with Tibor Földesi, Security Automation Analyst in Norlys, one of the largest Telco & Energy companies in Denmark. At Norlys, his main motivation is to get more time to enjoy his coffee, which directly correlates with his ability to automate what can be automated. Tibor and Rob…
 
In this episode, we chat with the people in charge of the healthcare and sensitive data collected in what is amongst the world's largest COVID-19 studies to date. The study known as the Corona Study, is lead by the Oslo University Hospital and aims to examine how the coronavirus spreads in Norway. At the time this episode was recorded the study had…
 
Who should own Identity and Access Management in an organisation? In this episode, Robby speaks to Espen Skjøld from Sailpoint about the evolution of Identity and Access Management - and he also found some interesting people to discuss this with from Equinor and UCPH on the floor of the Nordic Cyber Series in Copenhagen. Technical Difficulty: 1/5 S…
 
NCSBN & PeasonVue just announced some significant changes to the NCLEX as a result of COVID-19. Here is what we are doing about it . . . MUST WATCH. Learn more about SIMCLEX at https://www.nursing.com Speaker 1: What’s up guys. I’m Jon Haws RN in founder of nursing.com and I’m here with Speaker 2: Marie Clark. Oh yeah, me. So I’ve already Clark and…
 
In this episode, we speak with a security expert that is actually willing to pay money to "hackers" - the Product Security Director in Visma, Espen Johansen. As you can imagine, eliminating software vulnerabilities in a company with 5,000 developers is no easy task. Mr. Johansen and his developers always aim to improve the security of their softwar…
 
In this episode, we chat with the former Head of the SOC at the Norwegian National CERT, and current member of mnemonic’s Threat Intelligence team. She also happens to have a personal interest in the "Internet of Things" and medical devices. In 2011, Marie Moe received a pacemaker to help her heart maintain a consistent beat. As a security research…
 
In this episode, we chat with the CISO of consumer goods conglomerate Orkla - Antonio Martiradonna. In 2017, he accepted the task of building up a security organisation to secure 300 brands, helping us to keep food in our fridges and beauty products in our bathrooms. In our conversation, we discuss the following: · How it has been to build a securi…
 
In this episode we pick the brain of a Senior Vice President and CISO for a multinational insurance enterprise – Bjørn Watne of Storebrand. In our discussions with Mr. Watne, we touch upon the topics of: - 3rd party risk management, - “Selling” IT-security to the business, and - Security awareness training & programs Technical level: 1/5 Host: Robb…
 
In this episode we chat with two of the main contributors to the #OutofControl report, Finn Myrstad, Digital Policy Director for the Norwegian Consumer Council and Tor Bjørstad, Application Security Lead in mnemonic. The report uncovers how every time we use apps, hundreds of shadowy entities are receiving personal data about our interests, habits,…
 
In this episode we chat with a cyber insurance underwriter for one of the largest insurance enterprises in the Nordics - Erlend Hjelle from Gjensidige. We discuss the development of the market, and which types of organizations have been early adapters. Erlend also shares some insight into the types of discussions he has with his clients, and the im…
 
In this episode we chat with a hacker for hire aka pentester for mnemonic - Harrison Sand. We start out with an update on how it is to work as a pentester these days, where Mr. Sand explains how he works with his customers and what his typical engagements entail. We then move into the concept of crowdsourcing security testing, and Harrison shares h…
 
In this episode we interview one of the founding fathers of the Argus platform - Joakim von Brandis. He tells us about the background of the platform, why it was created, what it does, and how it is used by security analysts working within mnemonic and its customers. He also touches on the differences between Argus and other security solutions, suc…
 
In this episode we chat with Angel Alonso, a CISO for hire and team lead for the Governance, Risk and Compliance department in mnemonic. He shares his experience and opinions around the topic of "cloud security," and provides insight into what organizations should be doing to avoid the front pages due to a misconfiguration. Technical level: 1/5 Hos…
 
In this interview we interview the boss of the SOC - Stig Nordby in mnemonic. Stig has worked with dozens of large organizations to build out their cyber defense strategies, and is today a 3rd line security analyst and senior consultant for companies working to build a detection and response capabilities. In this episode, we pick his brain on the f…
 
In this episode we chat with PhD candidate, and former CISO for mnemonic - Siri Bromander. She’s been dedicating her time the past years on improving threat intelligence, specifically the way we can use automation to enrich security incidents and share analysis without losing context. In our discussion we take a closer look at the ACT (Semi Automat…
 
A fetal acceleration is an abrupt increase in fetal heart rate above the established baseline. A fetal deceleration is a decrease in fetal heart rate below the established fetal heart rate. The VEAL CHOP nursing mnemonic can be used to help remember how to interpret fetal heart rate during labor. For example, early decelerations in FHR (fetal heart…
 
Loading …

快速参考指南

Google login Twitter login Classic login