13.2K
Downloads
60
Episodes
Welcome to ”The Security Podcast of Silicon Valley,” a https://YSecurity.io production that now features a compelling blend of our traditional cybersecurity insights and the innovative new sub-series, ”The Founder’s Guide to Compliance.” Hosted by Jon McLachlan and Sasha Sinkevich, this podcast dives deeper into the human element of cybersecurity, bridging the gap between technical challenges and the human stories behind them. ”The Security Podcast of Silicon Valley” has always been your gateway to the heart of innovation and resilience in the cybersecurity world. Our discussions unveil the trailblazers in security—entrepreneurs, engineers, and leaders who navigate not just the technical landscapes but also the human challenges that define today’s security industry. We create a shame-free zone for open, candid conversations about the real issues, triumphs, and the sometimes daunting journey through the world of cybersecurity. With the addition of ”The Founder’s Guide to Compliance,” we expand our horizon to focus on the critical aspect of compliance in the startup ecosystem. This new sub-series aims to demystify compliance standards like SOC, NIST, HITRUST, and others, making them accessible and actionable for founders, startups, and anyone vested in the intersection of technology, security, and regulation. Jon and Sasha bring their expertise and personal experiences to the forefront, offering insights into overcoming the hurdles of compliance while fostering innovation and resilience. Each episode, approximately 45 minutes long, is a journey into the minds and stories of those who dare to think differently and act boldly. From the dilemmas of real entrepreneurs to the strategies of seasoned operators and engineers, our podcast brings to light the cutting-edge technologies and techniques that offer tangible solutions to pressing security concerns. ”The Security Podcast of Silicon Valley” with ”The Founder’s Guide to Compliance” is more than a podcast; it’s an essential resource for professionals in the field and anyone intrigued by the critical role of humanity in shaping the future of security. Whether you’re a founder navigating the complex landscape of compliance or a seasoned professional looking for insights into the latest in cybersecurity, our podcast promises a wealth of knowledge, stories, and inspiration that pave the way to a safer tomorrow. Join us on this expanded journey as we continue to explore the intersection of humanity and cybersecurity, offering listeners a comprehensive view of how to thrive amidst the challenges of the modern cybersecurity landscape. Tune in, discover, learn, and be inspired. Visit us at https://YSecurity.io to start listening today. We’d love to hear from you, too. Drop us a note at contact@ysecurity.io
Episodes
Monday Nov 15, 2021
Monday Nov 15, 2021
In this compelling episode of a YSecurity.io production, Michael Malone, the visionary Founder and CEO of SmallStep, takes us on a deep dive into the critical realms of Identity, Certificates, X.509, and Authentication. Michael unfolds the journey of SmallStep, from its initial focus on Authorization to its strategic pivot towards Authentication, highlighting the evolutionary path of the company and its contribution to enhancing digital security.
Michael recounts the origins of SmallStep, sharing the story of its humble beginnings and the pivotal moments that led to its reorientation towards Authentication. This shift underscores the dynamic nature of the cybersecurity landscape and SmallStep's agile response to emerging needs and challenges.
Beyond the technicalities of digital security, Michael delves into his underlying philosophy of hiring, work ethics, and business development. He emphasizes the importance of assembling a team that not only possesses the requisite technical skills but also shares a common vision and commitment to advancing cybersecurity solutions. Michael's pragmatic approach to building a business is rooted in a clear understanding of the market, customer needs, and the continuous pursuit of innovation.
Listeners will gain insights into the complexities of managing digital identities and the critical role of certificates and authentication mechanisms in securing online interactions. Michael's expertise sheds light on the significance of robust authentication processes and the ways in which SmallStep is contributing to a more secure digital future, one small step at a time.
Join us for an engaging and enlightening conversation with Michael Malone. Whether you're a cybersecurity professional, a technology enthusiast, or someone interested in the intricacies of digital identity management, this episode offers a comprehensive look into the challenges and solutions at the forefront of securing the digital landscape.
Tune in to explore how SmallStep is navigating the cybersecurity ecosystem, the philosophical and practical considerations behind building a tech company, and the steps being taken toward realizing a more secure future for digital identities and transactions.
Tuesday Sep 07, 2021
Tuesday Sep 07, 2021
In this thought-provoking episode of a YSecurity.io production, we're joined by Dylan Ayrey, the Founder and CEO of Truffle Secure, for a deep dive into the transformative power of open-source projects in cybersecurity. Dylan, the brain behind the renowned open-source tool Truffle Hog, shares insights on leveraging open-source projects to forge a more secure, resilient, and transparent digital future.
Dylan begins by addressing the critical task of uncovering secrets hidden within GitHub repositories, including the Git history, and the role of tools like Truffle Hog in mitigating potential security risks. This conversation not only highlights the practical aspects of security in software development but also underscores the broader implications of sensitive data exposure.
Skeptics of open-source projects often question their viability for building real companies or securing software. Dylan challenges this skepticism by illustrating the tangible benefits and successes achieved through open-source initiatives. He delves into the distinction between Community and Open Source, elucidating why these concepts, while overlapping, cater to different aspects of the software development ecosystem.
The discussion then turns to the importance of open-source projects for engineers, particularly those at the onset of their careers. Dylan advocates for the engagement with open-source as a means of skill development, networking, and contributing to the greater good of the tech community. He shares strategies for engineers and advocates within large organizations to champion the development and adoption of open-source projects, highlighting the business and security value these initiatives can bring.
Listeners will be treated to a rich exploration of how open-source projects like Truffle Hog are instrumental in advancing security practices and fostering a culture of collaboration and transparency in the tech industry. Whether you're an engineer, a cybersecurity professional, or simply interested in the impact of open-source on the future of technology, this episode offers compelling reasons to engage with and support open-source initiatives.
Join us for an enlightening conversation with Dylan Ayrey on the pivotal role of open-source in shaping a more secure digital landscape. Tune in to understand the nuances of discovering hidden risks in code, the symbiotic relationship between open-source and community, and how early career engagement with open-source projects can propel both personal growth and industry-wide advancements.
Tuesday Aug 24, 2021
Tuesday Aug 24, 2021
In this deeply insightful episode of a YSecurity.io production, we are honored to have Fredrick Lee ("Flee"), the Chief Security Officer at Gusto, share his experiences and the profound impact of diversity on building engineering and security teams. Flee's journey from his childhood, through his formative years at a boarding school in the deep south, to his role as a leading figure in cybersecurity, is not only inspiring but also illuminates the critical role diversity plays in fostering innovation and resilience.
Flee recounts his early fascination with computers and his discovery of the hacker magazine 2600, which opened a new world of security challenges and opportunities. Inspired by pioneers like John Lee (John Threat), Flee's narrative is a testament to the power of representation and the importance of diverse role models in the tech space. His journey is a reflection of how a community of diverse outcasts, connected by their passion for computing, can shape one's path in cybersecurity.
The conversation then shifts to the core of diversity's value in engineering and security teams. Flee articulates why building diverse teams is not just a social imperative but a technical necessity. He explains how diversity brings a multitude of perspectives that enhance problem-solving and innovation, leading to more resilient teams and products. Flee argues that the varied experiences and backgrounds of a diverse team contribute to a richer understanding of security challenges and more creative solutions.
Collaboration and open-source are highlighted as vital components of the security community, promoting a culture of sharing and collective growth. Flee shares how these practices have been instrumental in his work and the broader cybersecurity landscape, enhancing the community's ability to respond to threats and vulnerabilities effectively.
One of the most poignant moments of the interview comes when Flee describes his best days as the CSO at Gusto, particularly in the wake of George Floyd's murder. He reflects on the significance of empathy, leadership, and the responsibility of organizations to not only acknowledge societal issues but to actively contribute to positive change.
Join us for an unforgettable conversation with Fredrick Lee on the indispensable role of diversity in building effective, resilient, and innovative security teams. Whether you're in the cybersecurity field, passionate about diversity and inclusion, or interested in the intersection of social justice and technology, this episode offers invaluable insights into the power of diversity as both a moral and technical imperative for the future of tech.
Tuesday Aug 10, 2021
Michael Brooks, vCISO and Director of Cyber Risk Services at Trava
Tuesday Aug 10, 2021
Tuesday Aug 10, 2021
In this thought-provoking episode of a YSecurity.io production, we welcome Michael Brooks, the Chief Information Security Officer at Trava, to dissect the complex world of cyber risk, ransomware attacks, business preparedness, and risk management strategies. Michael brings a wealth of knowledge and experience, offering deep insights into the foundational challenges and strategic imperatives of cybersecurity.
At the heart of our discussion is the critical importance of data security. Michael prompts us to consider the intrinsic value of our data, urging businesses to reflect on whether they can operate without certain datasets. This perspective shifts the conversation from theoretical security measures to practical, business-critical imperatives. It's not just about protecting data for the sake of compliance or fear of breaches, but recognizing data as the lifeblood of modern business operations.
Michael delves into the anatomy of ransomware attacks, shedding light on the tactics used by attackers and the vulnerabilities they exploit. He emphasizes the need for businesses to not only fortify their defenses but also to cultivate a deep understanding of their risk profile. This involves identifying which data sets are vital for business continuity and ensuring they are adequately protected against potential threats.
The conversation also explores the broader landscape of cyber risk management, highlighting the importance of preparedness and resilience. Michael shares strategies for businesses to assess their vulnerabilities, implement robust security protocols, and develop incident response plans. He stresses that risk management is not a one-size-fits-all solution but requires a tailored approach that aligns with the unique needs and risk tolerance of each organization.
Listeners will gain practical advice on enhancing their cybersecurity posture, from the technicalities of safeguarding against ransomware to the nuances of cyber risk management. Michael's insights underscore the significance of understanding the value of data and the critical role it plays in determining security priorities.
Join us for an engaging and enlightening conversation with Michael Brooks on navigating the complexities of cyber risk and the pivotal steps businesses can take to ensure their data—and by extension, their operations—are secure. Whether you're a cybersecurity professional, a business leader, or simply interested in the dynamics of digital security, this episode offers valuable perspectives on protecting what matters most in the digital age.
Monday Jul 26, 2021
Monday Jul 26, 2021
In this episode of a YSecurity.io production, we sit down with Prakash Darji, General Manager of the Digital Experience Business Unit at Pure Storage, for an insightful conversation about the evolving landscape of storage and security. Prakash brings a wealth of knowledge and experience to the table, offering a glimpse into the future of these critical technology sectors as envisioned by one of the industry's leaders.
The discussion kicks off with an exploration of Pure Storage's strategic acquisition of Portworx, a move that underscores the company's commitment to leading in the storage and security domains. Prakash elaborates on how this acquisition enhances Pure Storage's offerings, particularly in addressing the complex needs of containerized applications and cloud-native technologies, which are at the forefront of digital transformation efforts across industries.
Prakash then delves into the pressing issue of ransomware, sharing valuable insights into how businesses can bolster their defenses and recover quickly from such attacks. He emphasizes the importance of resilience and preparedness, highlighting innovative solutions and best practices that Pure Storage offers to help organizations mitigate risks and minimize the impact of security breaches.
Listeners will be treated to Prakash's forward-looking perspectives on the future of storage and security. He discusses emerging trends, the increasing integration of AI and machine learning technologies, and the critical role of advanced storage solutions in securing and managing the exponentially growing volumes of data generated by modern digital activities.
This conversation is not just about understanding the current state of storage and security; it's an invitation to think about the future possibilities and the strategic moves companies like Pure Storage are making to address the challenges and opportunities ahead.
Join us for a lively and informative discussion with Prakash Darji on the future of storage and security. Whether you're a tech enthusiast, a professional in the IT sector, or someone keen on understanding the directions in which these essential technology pillars are heading, this episode offers a comprehensive overview of what lies on the horizon.
Thursday Jul 01, 2021
Thursday Jul 01, 2021
Join me for an interview with Leigh Honeywell. As founder and CEO of Tall Poppy, she's building tools and services to help companies protect their employees from online harassment and abuse.
Together, we share many vulnerable and authentic moments as we explore online harassment, abuse, and how Tall Poppy helps humans navigate difficult situations while still building a thriving business that makes the web better for all of us.
Thursday Jun 17, 2021
Thursday Jun 17, 2021
An interview with Wesley Belleman, Cyber Warfare Operator at the California Air National Guard and System Engineer at Palo Alto Networks, and his journey through Security Operations in the United Space Space Force.
In this episode, we dive into what a SOC is, how new technology changes our ability to respond to threats, and what the open problems are still open. We explore the cultural differences between civilian and military security operations and discuss various open-source projects such as Security Onion or MITRE Att&ck that can be used to build your own SOC.
So what will the future of SOC's look like? Wes echo's Anton Chuvakin predictions that SOC's will be entirely automated, likely within our lifetimes, but not soon.
Thursday Jun 03, 2021
Thursday Jun 03, 2021
An interview with Daniel Feldman, Cloud Security Architect at HPE (formerly Scytale.io), as we discuss his journey through service authentication with the open standard SPIFFE and the implementation SPIRE.
In this episode, Daniel tells the story of how he came across this problem of authentication at Veritas Technologies, why he joined a small startup Scytale.io to continue focusing on his security journey, and touch on what it's like at Hewlett Packard Enterprise. We end on a forward-looking note on what the future of cloud security might look like, with many challenging and open cloud security problems out there.
Daniel is happy to meet others with similar interests and experiences, so in that spirit, he is open to connecting and sharing stories and ideas. He can be reached on LinkedIn or Twitter as d_feldman.
Monday May 17, 2021
Andrew Gontarczyk, CISO of Pure Storage: Building a Security Team
Monday May 17, 2021
Monday May 17, 2021
An interview with Andrew Gontarczyk, Chief Information Security Officer at Pure Storage, on the challenges of building a security team.
When is the right time for a company to build a security team? What types of Security Teams are there (Product Security, Infrastructure Security, DevSecOps, Red Team, Blue Team, Purple Teams), and what do they do? As a security leader, how do you influence the rest of a company towards a more secure posture? What are your favorite interview questions, and why? What role does diversity play in your team building? What's your leadership style? Even with a security team in place, what still keeps you up at night?
Thursday May 06, 2021
Thursday May 06, 2021
Join me for an interview with Anand Ganesh, Founding Software Architect at Hammerspace, to discuss how storageless data solves traditional B2B storage security problems.
What is storageless data? How does Hammerspace encrypt data at rest? How do disaster recovery, backup, and snapshot data protection mechanisms work in Hammerspace? Why does data-as-a-service eliminate the need for fail-overs (passive-to-active transitions)? How do permissions work? How does intelligent data classification work in Hammerspace? How does Hammerspace help a customer recover from a ransomware attack? Do we have to trust our storage vendors such as AWS, Google, Azure, or even on-prem data centers? How do you securely delete data in a globally distributed system, like Hammerspace?