The Southern Fried Security Podcast
Join Andy Willingham, Martin Fisher,Steve Ragan, Yvette Johnson, and Joseph Sokoly as they discuss information security, news, and interview interesting people. Get in the discussion at www.southernfriedsecurity.com.

Andy and Martin close out 2016 with a quick run through of the major stories of the year and look forward to what's to come in 2017.

Thanks to everyone who came to BSides Atlanta!

Direct download: SFS_Podcast_-_Episode_188.mp3
Category:general -- posted at: 11:10am EDT

Martin, Steve, and Yvette discuss the recent DDoS of the DNS provider Dyn and what information security people should be considering in a world where terabit DDoS is a reality.

Direct download: SFS_Podcast_-_Episode_187.mp3
Category:general -- posted at: 8:10pm EDT

Martin, Steve, and Yvette talk about recent events at Yahoo and the moral compass questions information security professionals and leaders may be forced to face when their employer appears to be doing something they shouldn't...

Direct download: SFS_Podcast_-_Episode_186.mp3
Category:general -- posted at: 8:15pm EDT

For the first time we can think of it's just Yvette and Martin on this episode.  The two of them talk about what to think about and what you might do if you run into some extra budget at the end of the year.  Do you invest in shiny? What about services? Some training might be nice?  Or so you score points with the team down the hall?

Direct download: SFS_Podcast_-_Episode_185.mp3
Category:general -- posted at: 6:46am EDT

We interview Nick Selby (@nselby) about a recent blog post where he had a less than optimal experience with a managed security service provider.

 

https://nselby.github.io/When-Security-Monitoring-Provides-Neither-Security-Nor-Monitoring/

 

 

Direct download: SFS_Podcast_-_Episode_184.mp3
Category:general -- posted at: 8:29pm EDT

Martin, Andy, and Steve talk about third party risk programs in light of breaches at Target, Banner Health, and other unfortunate souls.

Direct download: SFS_Podcast_-_Episode_183.mp3
Category:general -- posted at: 7:19am EDT

Joseph is on sabbatical but the rest of the crew talks about how infosec professionals should focus on their problems and how to effectively interact with "the business".

 

 

Direct download: SFS_Podcast_-_Ep182.mp3
Category:general -- posted at: 9:28am EDT

Guillaume’s last visit to the show: Episode 167
Last year’s WWDC episode

WWDC 2016 Security Rumors and Wishes
Possible Touch ID changes
Touch ID for the Mac?

Wishlist
Encrypted iCloud Backups
Permissions and Pairing
Granular Location Access
Better Public Wi-Fi, VPN And SSL/TLS Handling

Reduced Annoyances and Increased Security on iOS

Find us on Twitter:
@gepeto42
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter. And if you’ve found our Facebook page, we’re sorry. We’re going to fix that up.

 

Direct download: SFS_Podcast_Ep_-_181.mp3
Category:podcasts -- posted at: 10:35pm EDT

This evening, Martin sat down with Patrick Heim from Dropbox. Enjoy the interview, and the gang will be back next episode.

Direct download: SFS_Podcast_Ep_-_180.mp3
Category:podcasts -- posted at: 9:00pm EDT

The 2016 DBIR
OSVDB Thoughts on the DBIR
Analyzing the 2016 Verizon Data Breach Investigations Report » Digital Shadows
The DBIR’s ‘Forest’ of Exploit Signatures – Trail of Bits Blog
Response to Kenna Security’s Explanation of the DBIR Vulnerability Mess | OSVDB

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter.

 

Direct download: SFS_Podcast_Ep_-_179.mp3
Category:podcasts -- posted at: 8:36pm EDT

This evening, Martin, Steve, and Joseph talk about overhyped vulnerabilities, and how that affects communication with the business.

Badlock’s Site
Sadlock
Hyping vulnerabilities is no longer helping application security awareness | TechCrunch

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter. And if you’ve found our Facebook page, we’re sorry. We’re going to fix that up.

Direct download: SFS_Podcast_Ep_-_178.mp3
Category:podcasts -- posted at: 8:45pm EDT

Tonight, Martin and Joseph sit down and talk about communicating cautionary tales without turning them into FUD.

US-CERT advisory on ransomware

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter. And if you’ve found our Facebook page, we’re sorry. We’re going to fix that up.

Direct download: SFS_Podcast_Ep_-_177.mp3
Category:podcasts -- posted at: 8:40pm EDT

InfoSec programs without money are like cereal but no milk, peanut butter but no jelly, Milli but no Vanilli… (Get over it, I’m old - Martin)

Martin is doing a talk on “The ABCs of Getting Your InfoSec Program Funded” and we’re going to discuss how this works in the real world at all of the different levels.

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter. And if you’ve found our Facebook page, we’re sorry. We’re going to fix that up.

Direct download: SFS_Podcast_Ep_-_176.mp3
Category:podcasts -- posted at: 10:06pm EDT

Episode 175 - RSAC Wrapup and More...

Congrats to Risky Business for winning this year’s podcast of the year!

RSA:
Let’s get an update from our reporter on the scene: Mr. Steve Ragan.

Fear and loathing at RSA: Hacking, security and the limits of protection | TechCrunch

Hack the Planet! I mean the Pentagon: U.S. military invites vetted experts to "Hack the Pentagon" | Fortune

Spear Phishing:
Three more firms hit by targeted Phishing attacks seeking W2 data | CSO Online

What Happens When You Dare Expert Hackers to Hack You

Backdoors:
Linux Mint hacked: Compromised data up for sale, ISO downloads backdoored | CSO Online

Transmission Infected with KeRanger Ransomware – MacStories

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter.

Direct download: SFS_Podcast_Ep_-_175.mp3
Category:podcasts -- posted at: 9:07pm EDT

We’ve been nominated for the 2016 Security Blogger Awards!

Topic: Threat Intel

Norse Corp disappears shortly after CEO is asked to step down

Digital Shadows announces 14 million series B fund raising

PDF WARNING - Threat Intelligence Maturity Model (tl;dr - Intel programs are hard and take years to get right)

Forrester - Maximizing your investment in cyber threat intelligence providers (tl;dr - be careful spending big bucks and make sure you are gathering your own intel first)

Mind Over Matter: The Importance of Intelligence in Your Threat Program - “When it comes down to it, you can’t outsource your business risk management strategy.”

Threat Intelligence Indicators are not Signatures // InfoSec Zanshin

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter.

Direct download: SFS_Podcast_Ep_-_174.mp3
Category:podcasts -- posted at: 9:17pm EDT

We’ve been nominated for the 2016 Security Blogger Awards!

Topic: Vendor Relationships 

Trend Micro AV gave any website command-line access to Windows PCs

Google security researcher excoriates TrendMicro for critical AV defects

Trustwave lawsuit

Norse story

Demos:
Pro Tip: Kicking off your demo with "I hope you'll understand these concepts" sets a pretty sad tone. - Martin

Pro Tip: Presuming you know our business processes during your demo means you aren't showing us what we are looking for. Ask first. - Martin

Pro Tip: If you don't prepare to demo the requested features please just cancel and move along. - Martin

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter.

Direct download: SFS_Podcast_Ep_-_173.mp3
Category:podcasts -- posted at: 9:38pm EDT

Topic: Security Awareness

Some people think it's a waste of time:

Why you shouldn’t train employees for security awareness
Schneier on Security Awareness Training
Does security awareness training even work?

But, that said, it's a requirement for government agencies and regulated industries:

HHS Security Awareness and Training Requirements

Privacy and Security Training requirements for multiple regulations

DISCUSSION & OPINION: Is Security Awareness worth the time?

If you have to do it, make it better:
Ten Recommendations for Security Awareness Programs

Find us on Twitter:
@SFSPodcast
@armorguy
@jsokoly
@andywillingham
@SteveD3
@jetsetyvette

And if you have any feedback, questions, or comments, drop us a comment or find us at @SFSPodcast on Twitter.

Direct download: SFS_Podcast_-_Ep_172.mp3
Category:podcasts -- posted at: 8:51pm EDT