Securing Bridges with Alyssa Miller

Archive for the ‘Podcasts’ Category

Securing Bridges with Alyssa Miller

Posted by

Alyssa Miller invited me to join her on the Securing Bridges podcast. We talked about board conversations, building roadmaps, the power of storytelling, and the use of metrics. Somehow, security geese and free phish, wizards and alchemy, cottage core and goblin mode also came up. Somehow. But hey? What else would you expect when I’m on a coffee-fueled rant?

To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

In Scope podcast: The Department of No

Posted by

I was a guest recently on the In Scope podcast: Security doesn’t have to be the department of no.

“In this episode, Mike welcomes Wolfgang Goerlich aka “Wolf” Advisory CISO at Cisco. Join us they discuss the tendency within security to disregard the human element leading to a lack of adhering to security protocols and working around those protocols. When this happens, we see a correlation to a human need not being met. If that is understood and considered, the result is the development of much better security products all around.”

In Scope Podcast: J Wolfgang Goerlich

Have a listen here: https://scopesecurity.com/a-conversation-with-wolfgang-goerlich-security-doesnt-have-to-be-the-department-of-no/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Always On Podcast: Secure and Trusted Access at Scale

Posted by

I was a guest recently on the Always On Podcast.

“The past year has brought about an enormous shift in how we work which has led to security issues on a much broader scale. On this episode of Always On, Wolfgang Goerlich from Duo joins me to discuss how organizations are handling secure access and deploying trusted access at scale. You won’t want to miss our review of a secure outcome study, so press play to listen.”

You will want to hear this episode if you are interested in…

  • Trusted access [1:22]
  • The challenges that customers are seeing with the remote workforce [4:18]
  • Learning what Duo can do for an organization [9:45]
  • Improving the user experience [18:50]
  • Intangibles that customers are getting from Duo [25:04]
  • The outcomes of a secure outcome study [30:18]

Have a listen here: https://nwncarousel.com/podcast/secure-and-trusted-access-at-scale/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

 

Detection at Scale podcast: Rebuilding Trust in Security Tools

Posted by

I was recently a guest on the Detection at Scale podcast: Rebuilding Trust in Security Tools.

“Why is SIEM an area of unease for so many security officers? To make detection and response successful, we need tools capable of upscaling the practitioners as well as equipping them to be successful. We need tools we can rely on.

In today‘s episode, we had an inspiring conversation with J Wolfgang Goerlich, Advisory CISO at Cisco Secure. We discussed how trust is a determinant factor in building the security tools of the future, why so many CISOs lost trust over SIEMs and what we can do to rebuild it.”

Have a listen here: https://podcasts.apple.com/us/podcast/ep-11-cisco-secure-s-j-wolfgang-goerlich-rebuilding/id1582584270?i=1000545619648


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Backup Central’s Restore it All podcast: Information Security Expert Says it Must Evolve

Posted by

I was recently a guest on Backup Central’s Restore it All podcast: Information Security Expert Says it Must Evolve.

“Wolfgang Goerlich, Advisory CISO, explains the current state of information security, and why he thinks many environments are focusing on the wrong things. We speak about ransomware, extortionware, and phishing, even giving examples where we know we have personally been phished! He explains how this illustrates his point that we need more emphasis in different areas of information security.”

Have a listen here: https://castbox.fm/episode/Information-Security-Expert-Says-it-Must-Evolve-id4299067-id405986591

Backup Central's Restore it All


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Hacker History Podcast Guest

Posted by

I was a guest recently on the Hacker History podcast.

“Hacker History sits down with Wolfgang Goerlich. We learn about the importance of having root and admin when becoming a hacker and how truly important it is that we have patience and empathy for one another. We also learn that skateboarding in a datacenter doesn’t actually work.”

Have a listen here: https://hackerhistory.com/podcast/the-history-of-wolfgang-goerlich/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

CyberWire Daily podcast: Increasing trust in passwordless authentication

Posted by

I was recently a guest on the CyberWire Daily podcast: Street Cred — Increasing trust in passwordless authentication.

In this episode of CyberWire-X, guests will discuss a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication. Nikk Gilbert of CISO of Cherokee Nation Businesses and retired CSO Gary McAlum share their insights with Rick Howard, and Advisory CISO of Duo Security at Cisco Wolfgang Goerlich from sponsor Duo Security offers his thoughts with Dave Bittner.”

Have a listen here: https://www.globalplayer.com/podcasts/episodes/7Drcjdk/


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

ChannelPro Podcast and SMB Security

Posted by

I was a guest on the ChannelPro Podcast:

“Hips don’t lie, folks. Neither do Matt, Rich, or their guest host this week, MSP extraordinaire and former IT Glue exec Luis Giraldo of Ook Enterprises. Listen in as they discuss Tin Can, Luis’s interesting new cooperative services venture, plus Dell’s latest commercial laptops, stats about ransomware, and ChannelPro’s 2020 Vendors on the Vanguard list. Then keep listening for a timely and insightful conversation with Cisco advisory CISO Wolfgang Goerlich about SMB security and its surprising parallels with enterprise security. We’d be lying if we said Shakira shows up too, but then again she has that effect on people.”

Have a listen here: https://www.youtube.com/watch?v=5CIngrz_FgE&t=4244s


To see listen to other podcast interviews, click to view the Podcasts page or the Podcasts category.

Find a Hacker Mentor and be a Hacker Mentee

Posted by

Want to find a mentor? Want to know how to be a mentee? Well, check out Timothy De Block’s episodes of the Exploring Information Security podcast. I was on along with Javvad Malik (@J4vv4d), Johnny Xmas (@J0hnnyXm4s), and Amanda Berlin (@InfoSystir). If you’re wondering where to start, here is your answer.

First, how to find a mentor? Decide what you want to learn and where you want to strengthen. Keep an eye on the people you already know. Be curious, be humble, and seek advice. Offer something in return, even something as simple as sharing your story.

Finally, how to be a good mentee? Be specific in your requests and keep your commitments. Expect to put in the work. We need to realize that mentors are guides, not teachers, and that we are there to dig and hunt and learn. Show up and follow through.

In the end, its about applying the hacker mindset to mentoring. So take a listen.

Edit 2017-01/14: Once you’re done listening, check out the relaunch of the InfoSec Mentors Project. Headed up by Jimmy Vo (@JimmyVo) and Keith Hoodlet (@andMYhacks), The InfoSec Mentors Project provides a platform for finding and connecting mentors and mentees.

Encode/Decode Episode 1

Posted by

I have launched new podcast: Encode/Decode — Hacker Defense Against the Dark Arts. We are going to highlight the defense with stories from the trenches. Kicking us off is Christian Kopacsi, Michigan’s CISO, who will discuss the Cyber Civilian Corp and the state’s incident response programs.