The State of Enterprise IT Security

Brad Bussie

The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape. read less
TechnologyTechnology

Episodes

S1 EP. 21 Security Expertise Gap, U.S. Pumps $50mm into Better Healthcare Cyber Resilience, YouTube Latest Phishing Battleground
6d ago
S1 EP. 21 Security Expertise Gap, U.S. Pumps $50mm into Better Healthcare Cyber Resilience, YouTube Latest Phishing Battleground
In this episode, Brad Bussie discusses the critical gap in cybersecurity expertise, the U.S. government's $50 million investment to bolster healthcare cyber resilience, and the emerging threat of YouTube as the latest phishing battleground. Stay tuned to uncover the latest insights and expert analysis on these pressing issues in the world of IT security.Topics Covered:The widening cybersecurity expertise gap and its implications.U.S. investment in Better Healthcare cyber resilience.YouTube's rise as a phishing battleground.Key Takeaways:Expertise Gap: The shortage of skilled cybersecurity professionals is a growing concern, affecting the ability of organizations to defend against sophisticated threats.Healthcare Cyber Resilience: The U.S. government's $50 million investment aims to enhance the cybersecurity infrastructure of healthcare systems, critical in the wake of increasing cyberattacks.YouTube Phishing: Cybercriminals are increasingly targeting YouTube as a platform for phishing attacks, exploiting its vast user base.Mentions & References:U.S. government initiatives on healthcare cybersecurity.Recent studies and reports on the cybersecurity skills shortage.Examples of phishing attacks on YouTube.Time Stamps with Highlights:[00:00] Opening Remarks: Introduction and episode overview.[02:30] Expertise Gap: Discussing the lack of cybersecurity professionals and its impact.[05:00] U.S. Invests $50m in Better Healthcare Cyber Resilience: Details on the $50 million investment and its expected benefits.[08:15] YouTube Phishing Threats: How cybercriminals are exploiting YouTube for phishing scams.[12:45] Key Strategies: Recommendations for organizations to improve their cybersecurity posture.[15:30] Closing Thoughts: Final insights and a look ahead to future episodes.Follow Us:LinkedInFacebookX (Twitter)YouTubeAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us:www.e360.com (00:00) - Introduction to Cyber Threats and IT Security(00:49) - Exploring the Security Expertise Gap in Cloud Expansion(05:41) - Investing in Healthcare Cyber Resiliency(09:15) - YouTube: The New Frontier for Cyber Threats(13:51) - Conclusion and Call to Action
S1 EP. 20 Google's Multilayered Cloud Defense and SecOps Innovations
May 20 2024
S1 EP. 20 Google's Multilayered Cloud Defense and SecOps Innovations
Join Brad Bussie, Chief Information Security Officer at e360, as he explores Google's innovative approach to cloud security in today's episode. Focusing on how Google has revolutionized security operations with a multilayered defense strategy, Brad discusses the integration of AI and threat intelligence to enhance cybersecurity measures in the cloud era.Topics Covered:Google's Approach to Cloud Security: An overview of how Google tackles the complexities of cybersecurity with advanced technologies and strategies.The Role of AI and Automation in SecOps: Examining how Google utilizes artificial intelligence to streamline threat detection, investigation, and response.Integrating Threat Intelligence and Expertise: Insights into how Google’s acquisition of Mandiant and integration with VirusTotal enhance their security capabilities.Key Takeaways:Google Security Operations is designed to support not just Google Cloud but multi-cloud environments, providing a versatile and robust security solution.The use of AI in Google's security operations allows for more efficient data analysis and threat detection, significantly reducing the workload for security analysts.Google’s comprehensive security framework combines AI, machine learning, and human expertise from Mandiant to offer a proactive and informed cybersecurity defense system.Mentions & References:Insights from the Google Next Conference on the role of AI in securityGoogle's VirusTotal IntegrationTDIR Process in Google's Cloud SecurityMandiant’s ExpertiseTime Stamps with Highlights:[00:00:32] - Introduction to Google’s security operations and the challenges in cloud security[00:02:09] - Discussion on the shift from traditional security models to advanced, integrated systems[00:07:24] - The impact of AI and automation on security operations[00:11:27] - How Google's comprehensive threat intelligence network supports proactive defenseFollow Us:LinkedInFacebookX (Twitter)YouTubeAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
S1 EP. 19: New CISA Guidelines, Kaiser Data Leak, Okta Credential Stuffing Attacks
May 13 2024
S1 EP. 19: New CISA Guidelines, Kaiser Data Leak, Okta Credential Stuffing Attacks
In Episode 19 of The State of Enterprise IT Security, Brad Bussie tackles critical issues affecting the cybersecurity landscape. From new CISA guidelines aimed at protecting critical U.S. infrastructure to major data leaks impacting millions, this episode dives deep into the challenges and strategies for securing our digital world.Topics Covered:CISA Guidelines for AI in Critical Infrastructure: Discussion on new measures to enhance the security of U.S. critical infrastructure against AI-related threats.Kaiser Data Leak: Examination of a significant data breach affecting 13.4 million Kaiser members, including the inadvertent sharing of data with advertisers.Okta Credential Stuffing Attacks: Analysis of the recent spike in credential stuffing attacks against Okta accounts, exacerbated by the use of residential proxy services.Key Takeaways:CISA is intensifying efforts to safeguard critical infrastructure by focusing on AI risks, proposing a comprehensive plan for risk management.Kaiser's data leak highlights the ongoing challenges in protecting personal health information and the risks associated with third-party data sharing.Okta's experience with credential stuffing attacks illustrates the evolving tactics of cybercriminals and the importance of robust cybersecurity measures, including enhanced authentication processes.Mentions & References:CISA (Cybersecurity and Infrastructure Security Agency)Kaiser PermanenteOktaTechniques like residential proxy services that facilitate anonymity in cyber attacks.Time Stamps with Highlights:[00:00:33] Introduction to Episode 19 Topics[00:01:24] CISA's New AI Security Guidelines[00:06:33] Data Leak Impacting Kaiser Insurance Members[00:11:02] Rise in Okta Credential Stuffing AttacksFollow Us:LinkedInFacebookX (Twitter)YouTubeAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com
S1 EP. 18 Building a Cyber Resilience Vault with Zerto, Discssions with Zerto Global Field CTO Shariq Aqil
Apr 29 2024
S1 EP. 18 Building a Cyber Resilience Vault with Zerto, Discssions with Zerto Global Field CTO Shariq Aqil
In this episode, Brad Bussie, Chief Information Security Officer at e360, is joined by Shariq Aqil, Field CTO from Zerto, an HPE company. They delve into the critical topic of building a cyber resilience vault, providing valuable insights into creating robust defenses against cyber threats.Topics Covered:Introduction to Cyber Resiliency:Definition and importance of cyber resiliency in modern business environments.Strategies for achieving cyber resilience, including proactive and reactive measures.Exploring the Cyber Resiliency Vault Concept:Detailed explanation of what a Cyber Resiliency Vault is and the problems it addresses.Discussion on how Zerto’s technologies enhance cyber resilience through their innovative vault solutions.Building a Cyber Resiliency Vault with Zerto:The technical and strategic approach to using Zerto for creating a cyber resiliency vault.Benefits of integrating Zerto’s solutions into cybersecurity frameworks.Key Takeaways:Importance of a comprehensive strategy encompassing prevention, detection, response, and recovery.Insights into Zerto’s approach to continuous data protection and its impact on minimizing data loss and recovery times.The role of cyber resiliency vaults in enhancing organizational ability to withstand and recover from cyber incidents.Mentions & References:Zerto and e360 partnershipCyber resilience strategies and technologies discussed in the episode are pivotal for organizations seeking to enhance their security posture.Time Stamps with Highlights:[00:02:00-00:04:00] Shariq Aqil’s Background:Shariq provides an overview of his professional background and his role at Zerto, detailing his experiences at Dell, EMC, and IBM before joining Zerto.[00:04:00-00:06:00] What is Cyber Resiliency:Brad elaborates on the concept of cyber resiliency, explaining it as an organization’s ability to maintain critical operations effectively amidst cyber threats.[00:06:00-00:08:00] The Role of Cyber Resiliency Vaults:The discussion shifts to the specific function of cyber resiliency vaults, describing how they protect critical data and support quick recovery from cyber incidents.[00:08:00-00:10:00] Technical Details of Zerto’s Solutions:Shariq dives into the technical aspects of Zerto’s solutions, focusing on continuous data protection and its advantages over traditional backup solutions.[00:10:00-00:12:00] Importance of Quick Recovery:The conversation emphasizes the importance of rapid recovery capabilities in cyber resiliency solutions, highlighting how Zerto’s technology minimizes data loss and recovery times.[00:12:00-00:14:00] Implementing Zerto’s Cyber Vaults:Brad and Shariq discuss the implementation of Zerto’s cyber vaults, explaining the process of data replication, scanning for anomalies, and ensuring data immutability.[00:14:00-00:16:00] Broader Implications of Cyber Attacks:They discuss the broader impact of cyber attacks on business operations, stressing the need for comprehensive cyber resilience strategies that go beyond immediate recovery.[00:16:00-00:18:00] Discussion on Cyber Resilience Strategies:The discussion turns to strategies for enhancing cyber resilience, including the need for a multi-faceted approach that encompasses technology, policies, and people.Follow Us:LinkedInFacebookX (Twitter)YouTubeAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.Visit us: www.e360.com (00:00) - Welcome to the State of Enterprise IT Security Edition(01:05) - Introducing Shariq Aqil from Zerto(02:53) - Understanding Cyber Resiliency(05:26) - Exploring the Cyber Resiliency Vault Concept(15:05) - Building a Cyber Resiliency Vault with Zerto(19:49) - The Importance of Testing and Recovery Planning(26:05) - Expert Tips on Cyber Resiliency and Vaulting(30:15) - Action Steps for Organizations
S1 EP. 17: United Healthcare Post-Attack Update, Cloud Security Investments, Brad's Thoughts on AI tools Hume & HeyGen.
Apr 25 2024
S1 EP. 17: United Healthcare Post-Attack Update, Cloud Security Investments, Brad's Thoughts on AI tools Hume & HeyGen.
Brad Bussie, Chief Information Security Officer at e360, hosts the State of Enterprise IT Security Edition podcast, where he delves into three main topics aimed at making IT security more approachable for technology leaders. The first segment reflects on the aftermath of a ransomware attack on United Health and Change Healthcare, highlighting the sobering realization that paying ransoms does not guarantee the safety of stolen data, as evidenced by Change Healthcare's loss of sensitive patient information despite a $22 million ransom payment. The second segment discusses cloud security, questioning the substantial investment in cloud technology and exploring the utility and limitations of security tools such as SIEM, EDR, and ITDR based on a survey of 150 security professionals from large companies. The implications of automation and AI in enhancing security operations, despite staffing challenges within the IT security domain, are also examined. The third segment probes the ethical and privacy concerns surrounding AI technologies capable of emotional intelligence and voice synthesis, spotlighting Hume's empathic AI and HeyGen's AI-driven content creation platform. Bussie underscores the need for robust security measures to protect user data and prevent misuse of AI in emotional manipulation and content generation, advocating for user vigilance and informed engagement with emerging AI technologies.00:00 Introduction to Enterprise IT Security Insights01:20 Deep Dive into United Health's Cybersecurity Incident07:02 Exploring Cloud Security Investments and Challenges17:12 The Future of AI: Emotional Intelligence and Avatars24:13 Innovative AI Technologies: HeyGen and AI Avatars31:30 Conclusion and Final Thoughtse360 website: www.e360.comShow page: e360.com/state-of-enterprise-it-security-podcastFollow on LinkedIn: https://www.linkedin.com/company/e360solutionsAbout the Show:The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forwardAbout e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise. (00:00) - Introduction to Enterprise IT Security Insights(01:20) - Deep Dive into United Health's Cybersecurity Incident(07:02) - Exploring Cloud Security Investments and Challenges(17:12) - The Future of AI: Emotional Intelligence and Avatars(24:13) - Innovative AI Technologies: HeyGen and AI Avatars(31:30) - Conclusion and Final Thoughts
EP. 01: GenAI turns security landscape on its head, risks of unused identities, and ransomware attacks surge
Apr 18 2024
EP. 01: GenAI turns security landscape on its head, risks of unused identities, and ransomware attacks surge
Navigating Emerging Threats and Innovations in IT SecurityIn this episode of the State of Enterprise IT Security Edition, host Brad Bussie discusses three main topics relevant to technology leaders today. Firstly, he addresses the growing adoption of Multi-Factor Authentication (MFA) and its vulnerabilities, including MFA fatigue, SIM swapping, and session cookie theft, providing strategies to mitigate these risks. Next, Bussie talks about a recent emergency directive from the U.S. Cybersecurity Agency (CISA) in response to a Russian APT's infiltration of Microsoft's network and theft of sensitive correspondence, emphasizing the importance of federal agencies hunting for signs of the breach, analyzing exfiltrated emails, and securing authentication tools. Lastly, insights from the Google Next conference are shared, highlighting advancements in AI-driven security solutions and features, including Gemini for cloud and cybersecurity, AI hypercomputers, and enhanced data privacy measures. The episode aims to make IT security approachable and actionable for its audience.00:00 Breaking News: Russian Hackers Target Microsoft00:00 Introduction00:48 Welcome to the State of Enterprise IT Security Edition01:52 Growing Challenges with Multi-Factor Authentication (MFA)09:11 U.S. Government on High Alert: Russian Hackers Steal Sensitive Data16:24 Innovations and Security Insights from Google Next Conference23:24 Closing Thoughts on Enterprise IT Security
S1 EP. 15: Hotel Check-In Kiosk Exposes Room Access Codes, Microsoft Introduces Red Team Augmentation, AT&T Breach
Apr 8 2024
S1 EP. 15: Hotel Check-In Kiosk Exposes Room Access Codes, Microsoft Introduces Red Team Augmentation, AT&T Breach
In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape. The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the massive AT&T breach impacting 70 million users. Bussie emphasizes the importance of secure coding practices, the potential of AI in cybersecurity, and actionable steps for individuals and organizations to protect against breaches.Timestamps:[00:01:00] Hotel Self Check-In Kiosk Vulnerability:- A security flaw in a budget hotel's self check-in kiosks exposed room access codes, affecting potentially 600 hotels in 20 countries.- The vulnerability underscores the critical need for rigorous secure code practices and thorough application architecture understanding.[00:06:30] Microsoft’s Red Team Augmentation via AI:- Partnership with OpenAI to introduce a Python Risk Identification Toolkit (PYRIT) aiming at exposing vulnerabilities through AI.- This development highlights the evolving role of AI in cybersecurity, moving towards augmenting human capabilities rather than replacing them.[00:14:00] AT&T Breach Impacting 70 Million Users:- Sensitive information including social security numbers and passcodes were compromised and found on the dark web.- The breach illustrates the ongoing risks of data theft and the importance of protective measures such as credit freezes and vigilant password management.About the Show:The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.
S1 EP. 14 CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege
Apr 1 2024
S1 EP. 14 CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege
In the 14th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over CISA Alert on SharePoint Server Attacks, Chinese Hacking Plot Exposed, Ray AI Framework Under Siege and more.Timestamps:[00:01:10] CISA warns that hackers are actively attacking a SharePoint server vulnerability[00:03:30] Millions of Americans caught up in a Chinese hacking plot[00:14:00] Thousands of servers hacked in an ongoing attack targeting Ray AI frameworkEpisode Summary: In the latest installment of "The State of Enterprise IT Security Edition," host Brad Bussie, CISO at e360, offers a deep dive into current cybersecurity threats and practical defense strategies. This episode covers three critical topics:CISA's SharePoint Server Vulnerability: Brad discusses a serious vulnerability in Microsoft SharePoint Server that is being actively exploited, emphasizing the critical nature of applying patches that have been available since May 2023 to prevent such attacks.Chinese Hacking Campaign: The episode moves on to a sinister hacking campaign orchestrated by Chinese nationals, which has been targeting American officials, businesses, and critics over 14 years. Bussie explores the campaign’s breadth and the U.S. government's response, including a reward for information leading to the identification of the perpetrators.Ray AI Framework Attacks: Thousands of servers have been compromised in an ongoing campaign targeting the Ray AI framework, used by companies like OpenAI, Uber, and Amazon. Brad outlines the campaign's impact on AI models and network credentials and provides advice on securing systems against such insidious attacks.Listeners will come away with a greater understanding of the current cybersecurity landscape and how to implement effective security measures within their organizations.About the Show:The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.
S1 EP. 12: House Votes to Ban TikTok, AI Regulated by EU, Cars Tracking and Reporting Driving Habits and more
Mar 18 2024
S1 EP. 12: House Votes to Ban TikTok, AI Regulated by EU, Cars Tracking and Reporting Driving Habits and more
In the 12th episode of the State of Enterprise IT Security, Brad Bussie, Chief Information Security Officer at e360, goes over the House voting to ban TikTok, The EU regulating AI, and modern cars tracking and reporting driving habits and more.Timestamps:[00:01:00] The House Bans TikTok - A bill passed by the U.S. House could lead to a TikTok ban, prompted by security concerns and a controversial pop-up notification strategy.[00:04:30] EU Regulating AI - Details on the European Parliament's overwhelming approval of the Artificial Intelligence Act, setting forth strict AI regulations.[00:10:28] Data Sharing in Modern Cars - An exploration of how modern cars collect and share data with insurance companies, raising significant privacy concerns.Don't miss out on this insightful episode filled with actionable advice and cutting-edge information. Stay ahead in the ever-evolving world of IT security!📲 Follow Us:LinkedInFacebookX (Twitter)About the Show:The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.
S1 EP. 10: Chinese Hacking Documents, Vending Machine Face Image Database, NIST Releases Version 2.0
Mar 4 2024
S1 EP. 10: Chinese Hacking Documents, Vending Machine Face Image Database, NIST Releases Version 2.0
In this episode of "State of Enterprise IT Security Edition," host Brad Bussey, Chief Information Security Officer at e360, discusses key issues in cybersecurity, focusing on recent developments that provide insight into state surveillance, privacy concerns, and updates to cybersecurity frameworks.Episode Highlights:[00:00-05:12] An insider leak from a company suspected of conducting cyber espionage for the Chinese government offers a rare glimpse into state surveillance and hacking activities.[05:12-09:18] A vending machine error at the University of Waterloo revealed a secret database of facial images, raising privacy concerns.[09:18-17:39] NIST has updated its cybersecurity framework to version 2.0, introducing the "govern function" which adds a strategic layer to cybersecurity management.Key Takeaways:1. Insider Leak of Chinese Hacking Documents: A significant leak from a company suspected of conducting cyber espionage for Chinese security services revealed extensive state surveillance activities, including hacking tools used to spy both domestically and internationally. The leak highlights the vast scope of surveillance and espionage conducted by China, involving various government and security departments.2. Vending Machine Facial Analysis Controversy: An error in a smart vending machine at the University of Waterloo exposed a facial analysis system, sparking debate over privacy and the necessity of such technology in consumer devices. Despite claims of GDPR compliance and limited data usage for marketing effectiveness, the incident raised concerns about sensitive data collection without explicit consent.3. NIST Releases Version 2.0 of Its Cybersecurity Framework: The updated framework introduces a "govern" function focusing on leadership and strategic risk management, enhancing guidance on cybersecurity supply chain risk management, and emphasizing integrated risk management. This represents a comprehensive update to address evolving threats and improve usability across organizations.Follow Us:LinkedIn: e360 SolutionsFacebook: e360 SolutionsX (Twitter): @e360 SolutionsYouTube: e360 SolutionsAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.Visit us: www.e360.comCatch the full episode for a deeper dive into these topics and to arm yourself with the knowledge you need to steer your organization towards a more secure future.
S1 EP. 09: International Hackers Using OpenAI, Audio Deepfake Detection Tool, Biden Administration's AI Executive Order
Feb 26 2024
S1 EP. 09: International Hackers Using OpenAI, Audio Deepfake Detection Tool, Biden Administration's AI Executive Order
In episode nine of the State of Enterprise IT Security podcast, host Brad Bussie, Chief Information Security Officer at E360, covers the utilization of open AI systems by hackers from nations like China and Russia for cyberattacks, the introduction of Pindrop's real-time audio deep fake detection tool named Pindrop Pulse, and the potential implications of the Biden administration's new executive order on AI for cybersecurity.Episode Highlights:[00:03.116] In episode nine of the State of Enterprise IT Security podcast, host Brad Bussie, Chief Information Security Officer at E360, delves into the use of open AI systems by hackers from nations like China and Russia for cyberattacks, emphasizing the practical rather than exotic application of AI in these activities.[02:29.518] The episode discusses the introduction of Pindrop's real-time audio deep fake detection tool, Pindrop Pulse, and its capabilities in identifying synthetic audio, showcasing a significant advancement in combating phone-based fraud and deep fake technologies.[07:17.87] Bussie unpacks the Biden administration's new executive order on AI, focusing on its implications for cybersecurity. The discussion highlights the executive order's directives towards AI development, critical infrastructure protection, and the establishment of guidelines for AI usage across various sectors, albeit with challenges in enforceability and the need for updates in the legal framework.Key Takeaways:1. Hackers' Use of AI: Hackers from various countries are exploiting open AI systems for cyberattacks, using them for tasks like email drafting and document translation to increase productivity.2. Pindrop Pulse: A new tool that can detect audio deep fakes in real-time, helping to combat phone-based fraud and potentially aiding political campaigns and call centers in ensuring communication security.3. Biden Administration's Executive Order on AI: Outlines initiatives for AI development, critical infrastructure protection, and the establishment of guidelines for AI usage, with enforceability dependent on agency action and legal framework updates.Follow Us:LinkedIn: e360 SolutionsFacebook: e360 SolutionsX (Twitter): @e360 SolutionsYouTube: e360 SolutionsAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.Visit us: www.e360.comCatch the full episode for a deeper dive into these topics and to arm yourself with the knowledge you need to steer your organization towards a more secure future.
S1 EP. 08: Google Fosters AI in Cybersecurity, AI-Generated Election Trickery, and Shadow AI
Feb 20 2024
S1 EP. 08: Google Fosters AI in Cybersecurity, AI-Generated Election Trickery, and Shadow AI
In this episode of the State of Enterprise IT Security podcast, Brad Bussie  gets into the rapidly evolving landscape of artificial intelligence (AI) within the realm of cybersecurity. The episode covers three critical topics: Google's initiatives to incorporate AI in cybersecurity, the collective efforts of tech giants to mitigate AI-generated election interference, and the challenges posed by Shadow AI in corporate environments.Episode Highlights:[00:00 - 02:49] The Role and Challenges of AI in Cybersecurity: Discussion on Google's proactive approach to fostering AI in cybersecurity, aiming to leverage AI for improved threat detection and response. Despite these advancements, there's an acknowledgment of the overwhelming challenge defenders face against AI-generated attacks, stressing the need for a collaborative effort to secure AI technologies from the ground up.[05:03 - 07:01] The Response to AI-generated Election Trickery and the Importance of Collaboration: Highlight on tech companies, including major names like Adobe, Amazon, and Google, signing an accord to combat AI-generated election trickery, focusing on the deliberate efforts to deceive voters and a critique of the tech companies' cautious approach to AI governance in the context of protecting democratic elections. [09:24 - 16:10] Shadow AI: Risks and Strategies for Mitigation: The segment transitions into discussing the prevalence of shadow AI within organizations and its implications for data security.Key Takeaways:AI can greatly enhance threat detection and response in cybersecurity.Tech companies are taking steps to combat AI-generated election trickery, but more needs to be done.Shadow AI poses risks to organizations and requires comprehensive technical controls and user education to mitigate.Public and private organizations should work together to secure AI from the ground up.Follow Us:LinkedIn: e360 SolutionsFacebook: e360 SolutionsX (Twitter): @e360 SolutionsYouTube: e360 SolutionsAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.Visit us: www.e360.comCatch the full episode for a deeper dive into these topics and to arm yourself with the knowledge you need to steer your organization towards a more secure future.
S1 EP. 07: MIT PhD Student Hacks Apple Vision Pro, Chlorox Cyberattack, CloudFlare Security Incident
Feb 12 2024
S1 EP. 07: MIT PhD Student Hacks Apple Vision Pro, Chlorox Cyberattack, CloudFlare Security Incident
In this episode of the State of Enterprise IT Security podcast, Brad Bussie dives into pressing cybersecurity topics that technology leaders can't afford to miss. With his expert insight, Brad unpacks a recent discovery by an MIT Ph.D. student of a critical vulnerability in the Apple Vision Pro, explores the aftermath and lessons learned from Clorox's costly cyberattack, and celebrates Cloudflare's successful handling of a security incident over Thanksgiving 2023.Episode Highlights:[00:55-01:15] MIT Ph.D. Student Uncovers Apple Vision Pro Vulnerability: Discover how days after its release, a significant security flaw was identified in the Apple Vision Pro, emphasizing the importance of vulnerability detection and the value of bug bounty programs.[01:16-02:08] Clorox Cyberattack—A Financial Blow: Learn about the cyberattack that left Clorox with a staggering $50 million in expenses, highlighting the need for robust cybersecurity insurance and comprehensive incident response strategies.[02:09-03:46] Cloudflare's Triumph Over Thanksgiving Security Threat: An in-depth look at how Cloudflare's proactive security measures and zero-trust architecture effectively neutralized a potential disaster, serving as a model for cybersecurity excellence.Key Takeaways:The critical role of early vulnerability detection and robust bug bounty programs in maintaining system security.The importance of cybersecurity insurance and well-drafted incident response plans to mitigate financial and operational impacts of cyberattacks.The effectiveness of proactive security strategies, including zero-trust architecture, in preventing and minimizing damage from cyber threats.Brad wraps up the episode by emphasizing the importance of proactive cybersecurity measures. By conducting regular risk assessments, establishing clear incident response plans, and implementing network segmentation, organizations can significantly enhance their defenses against the ever-evolving landscape of cyber threats.Follow Us:LinkedIn: e360 SolutionsFacebook: e360 SolutionsX (Twitter): @e360 SolutionsYouTube: e360 SolutionsAbout the Show: The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.Visit us: www.e360.com
S1 EP. 06: Ivanti Patches Zero-Days, Confirms New Exploit, China Threat Targets Critical Infrastructure, Congress Confronts Security with Hill’s AI use
Feb 5 2024
S1 EP. 06: Ivanti Patches Zero-Days, Confirms New Exploit, China Threat Targets Critical Infrastructure, Congress Confronts Security with Hill’s AI use
In this insightful episode of the State of Enterprise IT Security, host Brad Bussie, Chief Information Security Officer at e360, explores pressing cybersecurity issues affecting businesses and governments. Brad brings his expertise to the forefront, discussing significant topics ranging from Ivanti's latest patches for zero-day vulnerabilities to the evolving landscape of cyber threats between the US and China, and Congress's approach to AI security risks.Topics Covered:Ivanti’s response to zero-day vulnerabilities and new exploits.The US government's actions against Chinese cyber threats and the ongoing risks.The US Congress's cautious approach towards the integration of AI in legislative processes.Key Takeaways:The criticality of staying updated with cybersecurity patches in enterprise systems.Understanding the global dynamics of cybersecurity, especially concerning nation-state threats.The importance of balancing innovation and security risks when integrating AI into government systems.00:00 Introduction00:59 Avanti Patches Zero Days and Confirms New Exploits06:18 China Cyber Threat Targets Critical Infrastructure11:41 Congress Confronts Security Risks and Expands Use of AIMentions & References:Ivanti's zero-day vulnerabilities and new exploits: Security Week ArticleThe US government’s counteractions against Chinese cyber threats: Security Week ArticleThe US Congress and AI: Politico ArticleDigital forensics firm Volexity's involvement: VolexityFurther information about Ivanti: IvantiMandiant’s insights on cybersecurity: MandiantFollow Us:Stay updated with the latest in cybersecurity:LinkedInFacebookTwitterYouTubeAbout the Show:The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.About e360:e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.
S1 EP. 05: Facebook Monitoring Users, 26 Billion Record Data Leak, Microsoft Security Breac
Jan 29 2024
S1 EP. 05: Facebook Monitoring Users, 26 Billion Record Data Leak, Microsoft Security Breac
🔒 Are you safeguarding your digital identity? Tune in to Episode 5 of the State of Enterprise IT Security podcast where Brad Bussie, e360's Chief Information Security Officer, navigates the intricate web of digital security.📌 Topics CoveredFacebook's Data Monetization: Explore how Facebook monitors user activities, sharing data with thousands of companies, and the implications for personal privacy.Massive Data Breaches: Delve into the alarming reality of 26 billion records exposed, including sensitive information like email addresses and social security numbers, and the resultant social engineering threats.Microsoft's Network Security Breach: A deep dive into the breach of Microsoft's network by a Russian state hacker group through password spraying, emphasizing the need for robust cybersecurity hygiene.🔗 Mentions and ReferencesFacebookMicrosoftDropboxLinkedInXLiveRampFacebook Monitoring Users (Consumer Reports)Data Leak - 26 Billion Records (Forbes)Microsoft Security Breach (ARS Technica)⏰ Time Stamps with Highlights:[00:00:46] - Introduction by Brad Bussie, covering the episode's focus areas[00:01:07] - Discussion on Facebook's data sharing with companies[00:05:31] - Tips on preventing personal data from being shared by Facebook[00:09:36] - Insights into the 26 billion records leak[00:13:06] - Analysis of the Microsoft network security breach👥 Follow usLinkedInFacebookX (Twitter)📖 About the ShowThe State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity trends and challenges.🌐 About e360e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.📧 For more information, visit our website: e360
S1 EP. 03: Top AI Security Risks, 23andMe Data Breach, Antivirus Software Effectiveness
Jan 16 2024
S1 EP. 03: Top AI Security Risks, 23andMe Data Breach, Antivirus Software Effectiveness
🔍 Exploring AI security risks, dissecting the 23andMe data breach, and evaluating antivirus software - how effective is it truly?📝 Topics Covered:Current Top AI Security Risks23andMe Data Breach: A Case of User Negligence?The Real Effectiveness of Antivirus Software⏰ Time Stamps:[00:00] - Introduction to the episode's topics: AI Security Risks, 23andMe Data Breach, Antivirus Effectiveness.[02:04] - Discussion on top AI security risks and OWASP top 10 for LLM.[07:16] - Analysis of insecure output handling and other AI vulnerabilities.[12:14] - Deep dive into 23andMe data breach and user negligence.[17:32] - Examination of potential misuse of 23andMe data in social engineering attacks.[18:55] - Exploration of antivirus effectiveness and defense strategies.[22:00] - Final thoughts on practicing defense in depth and the value of antivirus software.🔗 Mentions and References:Infosecurity Magazine: 23andMe Blames User BreachReddit: Looking for evidence about Antivirus effectivenessOWASP Resource for Top Ten LLM Security RisksVirus Total👉 Follow Us:LinkedInFacebookTwitter📖 About the Show:The State of Enterprise IT Security focuses on delivering approachable and actionable insights for technology leaders. Brad Bussie, the Chief Information Security Officer at e360 walks through the latest security threats facing the enterprises and share’s his first-hand perspective of these topics based on daily work with CISOs and other enterprise technology leaders.🌐 About e360:e360, a premier IT solutions provider, is at the forefront of providing specialized technology solutions to global and national enterprises. Our expertise spans five key areas: Cloud Solutions, Cybersecurity Solutions, Digital Workplace, Modern Infrastructure, and Managed Services. Each domain is handled by our team of industry experts, including alumni from Big 4 consulting firms, ensuring unparalleled service and innovation.Our Cloud Solutions reshape how businesses engage with technology, offering comprehensive strategies and governance. In Cybersecurity, we safeguard digital assets against evolving threats. Our Digital Workplace initiatives enable seamless, productive remote work environments. We build and maintain Modern Infrastructure, ensuring agility and resilience. Additionally, our Managed Services provide ongoing, adaptive support tailored to each client's needs.Committed to excellence, e360 is more than a service provider; we're a strategic partner, empowering businesses to navigate and lead in a digitally-transformed world.