Podchaser Logo
Home
ISC StormCast for Thursday, May 9th, 2024

ISC StormCast for Thursday, May 9th, 2024

Released Thursday, 9th May 2024
Good episode? Give it some love!
ISC StormCast for Thursday, May 9th, 2024

ISC StormCast for Thursday, May 9th, 2024

ISC StormCast for Thursday, May 9th, 2024

ISC StormCast for Thursday, May 9th, 2024

Thursday, 9th May 2024
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

Hello! And welcome good a Thursday,

0:02

May ninth, Two Thousand Twenty Four

0:04

edition of The Sentiment Stomp Summers

0:07

Storm cast My name is Johan

0:09

is already and frame recording from

0:11

San Diego, California. So.

0:13

Heated A posted a diary with

0:15

instructions to analyze disks from a

0:18

cinema. G Networks I support storage

0:20

system. The are a number of

0:22

reasons why you may want to

0:25

do so. For example, of course,

0:27

forensic investigation of a compromised device,

0:29

or you just try to recover

0:32

data from discs after other parts

0:34

of the device like the motherboard

0:36

for example, failed. This isn't all

0:39

that difficult if you have a

0:41

Linux machine to connect. the. Tribes

0:43

to some he walks you through

0:46

enabling the software raid and a

0:48

logical volumes to be able to

0:50

mounted device as well Linux system

0:53

know some of these instructions me

0:55

very well work for other manufacturers

0:57

Devices to they all kind of

1:00

a burke a similar. Some of

1:02

them may have slightly different or

1:05

a configuration so you may have

1:07

to experiment with Islam it. And

1:10

today of course we had our

1:13

annual panel at our As A

1:15

Now had a slightly different set

1:17

of speakers. At this time he

1:20

had of for the first time

1:22

Terrance Williams Turns Williams a talk

1:24

about some of the threats Ai

1:26

poses to election Security, in particular

1:29

to influencing the social media, us

1:31

and the like. So that's what

1:33

Parents A talked about. Stephen Sims

1:36

A talk about the, well, some

1:38

of the limitations, but also how.

1:40

He i may help packers right

1:42

exploit fast or he be banned.

1:44

Some of the claims that have

1:46

recently been made that while a

1:49

turn out not to be quite

1:51

torn also talk little bit about

1:53

how defenders and may be able

1:55

to use similar techniques are to

1:57

find more police faster and with

1:59

that also. The effects of them

2:01

a fast start. Heather Barnhart had

2:03

a. Pretty. Interesting but

2:06

also disturbing topic. and that's

2:08

sex. Thorson in particular targeting

2:10

teams a purist of that.

2:12

The. Boys. In the age

2:15

of ten to fourteen are

2:17

actually most vulnerable as would

2:19

use kind of attacks either

2:21

a real or fake a

2:23

nude pictures I've been used

2:25

to essentially black male of

2:27

these individuals and the then

2:29

the barracks either asked to

2:31

pay money or in some

2:33

cases also deliver compromising material

2:35

about their friends to essentially

2:37

it doesn't allow in these

2:39

attacks to snowball Very disturbing.

2:41

You're also that a many

2:43

of. The victims here are committing

2:45

suicide as a result of at

2:47

these extortionate times and and are

2:50

had some advice as to what

2:52

to do a met someone you

2:54

know own particular of chorus a

2:56

kids are being attacked that way

2:59

and they're also a bit about

3:01

how to talk to your kids

3:03

about these issues and I talked

3:05

of first about the want to

3:08

believe that are caused by technical

3:10

debt in particular as as this

3:12

applies to. Corporate. And

3:14

Enterprise Information Security as devices. This

3:17

of course something that you may

3:19

have noted in the last four

3:21

years for be have more and

3:24

more attacks against sort of these

3:26

firewalls, bpm, some other sort of

3:28

larger enterprise software packages a like

3:30

this and there will turns out

3:33

that the many off as these

3:35

products do have a long history

3:37

going back into like the early

3:40

two thousand and one example and

3:42

I thought even them. Back to

3:44

Nineteen Ninety Eight and of

3:46

course have been north on.

3:49

Always a successful in my

3:51

cravings of this as offer

3:53

them a to your version

3:55

said your platforms as become

3:57

available. This offers also often

3:59

written. In various programming languages

4:01

like for example Parole for some

4:04

with the older pieces than maybe

4:06

in Java and a more recently

4:08

a lot of a Python. The

4:11

second issue that talk about

4:13

was how do you establish

4:15

identity online in particular as

4:17

so many of our interactions

4:19

know happen remotely either in the

4:21

work environment with of work from

4:24

home but they are also in

4:26

a business transactions as you for

4:28

example set up. A bank account

4:31

without actually entering the about a

4:33

prank effects. again sort of a

4:35

one off as the mess it's

4:38

a been use your of by

4:40

attackers to impersonate Mitchell Slam I

4:42

discussed you're on the podcast. Some

4:44

famous cases were either own voice

4:47

impersonation or in some cases even

4:49

video impersonation was used to as

4:51

a hit with something that feels

4:53

a lot like business email a

4:56

compromise. The defense

4:58

is here. not so simple and

5:00

in the end you have to

5:02

find the right balance as to

5:04

how you mitigate this risk and

5:07

also how you're not be too

5:09

intrusive. A to euro a customer

5:11

in that is also important that

5:13

you sort of not gain the

5:15

trust of the customer to explain

5:18

to them why you may need

5:20

things like for example s video

5:22

call or a personal visit a

5:24

to an office or something like

5:26

this. In order to establish

5:29

as the. Person's. Identity.

5:32

I don't know what the exact

5:34

schedule is. Obe if our as

5:37

A will make this keynote the

5:39

publicly available right now I believe

5:41

it's only available at two individuals

5:43

who actually a registered of for

5:46

at a conference but in the

5:48

past is sometimes after few days

5:50

are some as after a few

5:52

months have made peace keynotes public

5:55

go on youtube. Alice

5:57

it for today Avi where the have

5:59

attacked and for it and dwell on

6:01

the other news. I'll catch up on

6:03

that a tomorrow so talk to you

6:06

again tomorrow By.

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features