Reimagining Cyber - real world perspectives on cybersecurity

Reimagining Cyber

Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber security, computer security essentials, managing cybersecurity budgets, and the implications of SEC rulings.

Engage with industry experts and CISOs who share their perspectives on what matters most in the cybersecurity landscape. Hosted by Rob Aragao a seasoned security strategist with CyberRes, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.

read less
TechnologyTechnology
NewsNews
BusinessBusiness
Tech NewsTech News

Episodes

Cyber Threats in ICS and OT – Are We Ready for the Next Big Attack? - Ep 123
Nov 13 2024
Cyber Threats in ICS and OT – Are We Ready for the Next Big Attack? - Ep 123
In Episode 123 of Reimagining Cyber, Rob and the team dives into the complex world of cybersecurity for Industrial Control Systems (ICS) and Operational Technology (OT). Reflecting on insights from recent conversations with industry experts like Eric O'Neill and Tiffany Snyder, the show explores the evolving risks, vulnerabilities, and essential security measures in these critical infrastructure environments. They discuss the role of threat intelligence, the growing need for tailored incident response plans, and the challenges of securing legacy systems against modern cyber threats. Rob also unpacks findings from the latest SANS ICS/OT Cybersecurity Survey, shedding light on current trends such as cloud adoption, AI integration, and the ongoing struggle to bridge IT and OT security gaps. With potential threats looming, this episode underscores the urgent need to strengthen defenses across critical industries.SANS ICS/OT Cybersecurity Survey:https://www.sans.org/white-papers/sans-2024-state-ics-ot-cybersecurity/Previous episodes mention in this edition:From Espionage to Cybersecurity: Lessons from an FBI Legend - Ep 120 with Eric O'Neill Critical Infrastructure Under Siege: Cyber Threats and Counterintelligence - Ep 121 with Eric O' NeillCybersecurity in Orbit: NASA's Digital Defense - Ep 117 with Tiffany SnyderNew Perspectives in Cyber - Ep 23 with Brett HarrisEnergizing Cybersecurity - Ep 60 with Virginia 'Ginger' WrightFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
2024 Cybersecurity Landscape Report: Threat Hunter Insights - Ep 122
Nov 6 2024
2024 Cybersecurity Landscape Report: Threat Hunter Insights - Ep 122
In this episode of Reimagining Cyber, host Rob Aragao is joined by Tyler Moffitt, Senior Security Analyst at OpenText, to dive into key findings from the 2024 Threat Hunters Perspective report. Tyler, a veteran in malware analysis, shares insights on the latest adversary tactics, cybercrime trends, and the methodology behind their research. They discuss the complex interplay of nation-state actors like Russia and China, who are leveraging cybercrime gangs to bolster their offensive campaigns, and explore the alarming regularity of DDoS attacks on critical infrastructure in response to geopolitical events.The conversation also covers intriguing case studies, including real-time attacks on Western railway networks after public support for Ukraine, coordinated cyber disruptions during election cycles, and incidents where threat actors demonstrated insider intelligence on military shipments. Tyler offers predictions for the future, warning of an intensifying cyber arms race and the growing impact of generative AI on social engineering, deepfakes, and misinformation.The episode wraps up with practical advice for improving cybersecurity hygiene, emphasizing the importance of patch management, multi-factor authentication, and understanding supply chain vulnerabilities. A compelling listen for anyone interested in staying informed and prepared in the evolving cybersecurity landscape.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
From Espionage to Cybersecurity: Lessons from an FBI Legend - Ep 120
Oct 22 2024
From Espionage to Cybersecurity: Lessons from an FBI Legend - Ep 120
In this episode of Reimagining Cyber, Rob Aragao sits down with Eric O'Neill, former undercover FBI operative, national security attorney, and bestselling author. Eric shares his gripping experience as the key operative in bringing down Robert Hanssen, the most damaging spy in U.S. history. Hanssen’s betrayal spanned over two decades, during which he sold highly classified information to the Soviet Union and Russia, affecting national security on an unprecedented scale.Eric recounts how his undercover mission within FBI headquarters helped uncover Hanssen's espionage, an operation that also highlighted the emergence of cyber espionage. Hanssen was a pioneer in cyber spying, meticulously stealing sensitive data through compromised systems, and his actions ultimately set the stage for modern cybersecurity challenges.The discussion evolves to focus on today’s cyber threats, particularly the intersection of espionage and cybercrime. Eric details how tactics used in traditional espionage have now infiltrated the digital world, with cybercriminals and state-sponsored espionage groups employing sophisticated techniques, including spear phishing and ransomware. The conversation also delves into notable cyberattacks like the SolarWinds and Kaseya incidents, highlighting the shared strategies between espionage and organized cybercrime.With his extensive background in counterintelligence and cybersecurity, Eric offers a unique perspective on the current landscape of cyber threats, stressing the critical importance of understanding the attackers' mindset to effectively safeguard digital infrastructures.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
The Human Factor: Outsmarting Cyber Threats with Awareness - Ep 118
Oct 9 2024
The Human Factor: Outsmarting Cyber Threats with Awareness - Ep 118
In this episode, we are joined by Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance (NCA),  to discuss the NCA’s mission, current initiatives, and the importance of cybersecurity education. They highlight key programs, their collaboration with CISA on cybersecurity campaigns, and their efforts to simplify cybersecurity for the public and businesses. The conversation touches on challenges in public awareness, the role of AI in cybersecurity, and special initiatives for small businesses and historically Black colleges and universities (HBCUs). Tune in to learn how cybersecurity affects everyone from teens to seniors, and what you can do to stay safe online.Key Takeaways:The NCA’s Mission: The NCA focuses on educating people of all ages, especially those entering or leaving the workforce, on simple yet impactful cybersecurity practices.“Our mission is really around public education… those not yet in the workforce—maybe in their teens or 20s—and folks no longer in the workforce.”Collaboration with CISA: The NCA values its partnership with CISA, which has amplified cybersecurity messaging through larger campaigns and public service announcements (PSAs).“They’ve put more budget behind things like PSAs and developing the campaign.”Simplifying Cybersecurity for the Public: The NCA's focus is on encouraging a few basic, effective security behaviors, such as enabling multi-factor authentication (MFA).“If we could get large portions of the public to make a couple of simple changes, what would make the biggest dent in global cybercrime?”Cybersecurity and Small Businesses: The NCA’s Cyber Secure My Business program helps small business owners treat cybersecurity as a business risk and improve conversations with their IT service providers. “Teaching them how to manage security as a business risk and have a quality conversation with their MSP or IT provider.”Educating First-Generation College Students at HBCUs: NCA has launched programs to help first-gen students at HBCUs discover cybersecurity career opportunities.“We focus on all the different cybersecurity roles to help them find something they’ll be happy doing.”AI and Cybersecurity Concerns: The podcast explores public trust in AI and generational differences in perception, with older individuals being more skeptical of AI technologies.“[Unsurprisingly] it turns out older folks don’t trust it as much as younger folks!”Supporting Aging Adults Against Cybercrime: Lisa and Rob talk about the challenges older adults face with cybercrime and how the NCA is working to educate seniors and their caregivers. “The data on cybercrime losses with aging adults is just gutting…”The Kubicle campaign: A humorous yet educational series showing how hackers work like regular employees, aimed at making cybersecurity relatable to a broader audience. “The campaign had over 8 million views… showing people that hackers are sitting in cubicles like the rest of us.”Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
U.S. Disrupts China-Linked Botnet: What's Going On? - Ep 116
Sep 25 2024
U.S. Disrupts China-Linked Botnet: What's Going On? - Ep 116
In this episode, Rob Aragao talks about a recent joint cybersecurity advisory highlighting People's Republic of China-linked actors compromising routers and IoT devices for botnet operations. The advisory points to over 260,000 IoT devices, impacted by a botnet called Raptor Train.It’s being alleged that Integrity Technology Group (Integrity Tech) are behind the incident. The report says “[Integrity Technology Group is a] company based in the PRC with links to the PRC government. Integrity Tech has used China Unicom Beijing Province Network IP addresses to control and manage the botnet described in this advisory. In addition to managing the botnet, these same China Unicom Beijing Province Network IP addresses were used to access other operational infrastructure employed in computer intrusion activities against U.S. victims. FBI has engaged with multiple U.S. victims of these computer intrusions and found activity consistent with the tactics, techniques, and infrastructure associated with the cyber threat group known publicly as Flax Typhoon, RedJuliett, and Ethereal Panda.”Detected by Lumen’s Black Lotus Labs, the advisory was issued by the FBI, NSA, and Cyber National Mission Force.Rob explains that the botnet leverages code from the notorious Mirai malware, designed to exploit IoT devices running Linux-based systems, which has been in circulation for nearly a decade. He breaks down the architecture of the botnet, including its three-tier structure, and the role of compromised IoT devices, command-and-control servers, and management layers.Additionally, the discussion explores China's growing focus on cybersecurity talent recruitment, including the Matrix Cup, a hacking competition co-sponsored by Integrity Technology Group. The episode also offers recommendations for mitigating IoT device vulnerabilities, such as strong password management, patch updates, and network segmentation.Don't forget to rate, review, and subscribe to stay updated on future episodes!Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Cyber Resilience: Are Your Strategies Fit For Purpose? Ep 115
Sep 18 2024
Cyber Resilience: Are Your Strategies Fit For Purpose? Ep 115
In the latest episode of Reimagining Cyber, Rob interviews Bindu Sundaresan, Director of Cybersecurity Solutions at Level Blue, about the evolution and significance of cyber resilience. Bindu, with over 20 years in cybersecurity, discusses how the field has shifted from a focus solely on prevention to a broader approach that includes resilience and recovery.Key points from the conversation:1.    Historical Focus: Traditionally, cybersecurity strategies concentrated on preventing attacks. However, the current threat landscape necessitates a shift towards resilience, acknowledging that breaches are inevitable.2.    Modern Approach: Organizations are now integrating business continuity planning and disaster recovery with cybersecurity efforts. This holistic approach ensures that operations can continue and recover swiftly after an attack.3.    Business Alignment: Bindu emphasizes that cybersecurity should be seen not just as a technical issue but as a business problem affecting overall operations. This shift in perspective helps align cybersecurity efforts with business outcomes and improves the strategic value of cybersecurity roles.4.    CISO's Role: For Chief Information Security Officers (CISOs), successfully integrating resilience into their programs involves understanding and prioritizing risks based on business impact. This requires effective communication with other business units and aligning cybersecurity investments with broader business goals.5.    Evolution of Cybersecurity: The conversation highlights the shift from compliance-driven approaches to risk-driven and resilience-focused strategies. This evolution is crucial for achieving digital resilience and 6.    Identifying Sensitive Data: Organizations must first identify what constitutes sensitive data for their specific context, considering regulatory requirements, business use, and industry standards. Without this understanding, investments in data protection might be misallocated.7.    Data Classification and Flow: It is crucial to classify sensitive data and map how it flows within and outside the organization. This helps in applying appropriate security controls and prevents unnecessary complexity and expense.8.    Continuous Review: Data classification and protection are not one-time tasks. Organizations need to regularly update their data inventory and classification as their data environment evolves9.    Incident Response and Resilience: Organizations should develop tiered recovery plans that prioritize critical business functions during incidents. Regularly updated tabletop exercises should simulate realistic and current scenarios to test response plans effectively.10.Cross-Functional Involvement: Effective incident response involves cross-functional teams, including IT, legal, PR, and executive leadership. Establishing what constitutes minimum viable operations helps prioritize recovery efforts and resource allocation during an incident.11.Evolving Practices: The goal is to continuously refine incident response and recovery practices to improve resilience over time. Embracing a lifecycle approach to security and resilience can turn digital resilience into a competitive advantage.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
INTERPOL and the Fight Against Global Cyber Crime  - Ep 113
Sep 4 2024
INTERPOL and the Fight Against Global Cyber Crime - Ep 113
In this episode of "Reimagining Cyber," host Rob Aragao interviews Craig Jones, the former Director of the Global Cyber Crimes Directorate at Interpol. Jones provides a comprehensive overview of Interpol's role in combating cybercrime, emphasizing its unique position as a non-executive body that facilitates international law enforcement collaboration among 196 member countries.Jones discusses the structure and function of Interpol, noting how it connects various national police forces to coordinate cybercrime operations, despite being unable to directly run investigations. He explains how Interpol's cybercrime efforts are organized around prevention, detection, investigation, and disruption, aiming to reduce the global impact of cybercrime and protect communities worldwide.The conversation also delves into the challenges of dealing with borderless cybercrime, such as ransomware, business email compromise, and data theft. Jones highlights the complexities of international cooperation, especially when cybercriminals operate across different jurisdictions. He also touches on the recruitment process for Interpol's cybercrime division, stressing the importance of diverse backgrounds and expertise.Finally, the discussion explores the evolving landscape of cybercrime, the rise of the cybercrime economy, and the critical role of cyber resilience in protecting organizations. Jones and Aragao underscore the importance of involving board-level executives in cybersecurity decisions and the need for a comprehensive approach to cyber resilience, emphasizing the long-term benefits of such strategies in the face of ongoing cyber threats.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Mastercard’s Take on Cyber Defense Innovation and Collaboration - Ep 109
Aug 7 2024
Mastercard’s Take on Cyber Defense Innovation and Collaboration - Ep 109
In this episode, we dive deep into the world of cybersecurity with Jon Brickey, Senior Vice President at Mastercard. With extensive experience across military, government, and corporate sectors, Jon offers unique insights into the evolving landscape of cyber threats and defenses.Jon shares how Mastercard is at the forefront of fostering a culture of collaboration and partnership in cybersecurity. He highlights the company's commitment to collective defense, emphasizing the need for global consistency and innovation in building a future-ready cyber workforce. Learn about Mastercard’s pivotal role in organizing the tri-sector cyber defense exercise, which unites the energy, telecom, and finance sectors with government agencies. This initiative aims to enhance cyber resilience through strategic collaboration and shared best practices.Throughout the conversation, Jon underscores the importance of agile industry responses to cyber threats and the critical synergy between government and industry in addressing these challenges. He delves into the ways Mastercard  is preparing for future cyber threats, from developing cutting-edge technologies to implementing robust training programs for their teams.Listeners will gain valuable insights into the strategic initiatives that are shaping the future of cybersecurity. Jon's perspective on the importance of public-private partnerships, the role of innovation in cyber defense, and the need for a proactive approach to cybersecurity provides a comprehensive understanding of the current and future state of the industry.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
AI and Deepfakes: New Challenges in Cybersecurity -  Ep 108
Jul 31 2024
AI and Deepfakes: New Challenges in Cybersecurity - Ep 108
In this riveting episode of "Reimagining Cyber," host Rob Aragao continues his deep dive into the shadowy world of cyber threats with Ashley Jess, Senior Intelligence Analyst at Intel 471. As a follow-up to their previous discussion, Ashley delves into the alarming rise of deepfakes and disinformation.Ashley sheds light on the evolving tactics of cybercriminals, from sophisticated "Know Your Customer" (KYC) bypass methods to the increasing use of AI in creating convincing deepfake videos and misinformation campaigns. She discusses the implications of these threats for both private and governmental organizations, emphasizing the importance of vigilance and proactive defense measures.Listeners will learn about the significant risks posed by AI-generated content, the psychological impact of pervasive deepfakes, and the crucial role of basic cybersecurity hygiene in countering these advanced threats. Ashley also offers a glimpse into the future of cyber threats and the ongoing battle between cybercriminals and defenders.Don't miss this insightful episode, and be sure to catch the first part of this conversation for a comprehensive understanding of the current cyber threat landscape.Key Topics:Deepfakes and their impact on the Summer OlympicsEvolution of AI-enabled KYC bypass methodsDisinformation campaigns targeting elections globallyThe psychological and practical challenges of detecting AI-generated contentEffective cybersecurity practices to defend against emerging threatsFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Telecom Data Risks: Government's Role in the Fight - Ep 106
Jul 17 2024
Telecom Data Risks: Government's Role in the Fight - Ep 106
The latest episode of Reimagining Cyber  dives into the recent major data breaches that have rocked the telecom sector, focusing on the latest AT&T incident. It begins by reflecting on the historical context of cyberattacks in telecom, noting T-Mobile’s previous breach involving 85 million records and a hefty $500 million settlement.Host of the show Rob Aragoa details the chronology of AT&T's breaches, starting with a lesser-known incident from 2021, where the hacker “ShinyHunters” initially infiltrated AT&T's systems. Despite early warnings, AT&T dismissed the threat, leading to a subsequent data dump on the dark web in early 2023, exposing over 73 million records. Fast forward to the latest breach disclosed last week, impacting a staggering 110 million customers, with call and text message records from May to October 2022 being compromised.Rob explains the intricate balance between national security concerns and public transparency, highlighting the role of the Department of Justice in delaying the breach announcement.The discussion then shifts to the broader implications and accountability within the telecom industry. Rob references the FCC's recent update to their data breach notification rules, which were 16 years old, underscoring the urgent need for regulatory improvements.Rob concludes by examining the steps AT&T and its cloud data provider, Snowflake, are taking to prevent future breaches, such as implementing mandatory multi-factor authentication. They stress the importance of basic cybersecurity hygiene and the necessity for ongoing vigilance in protecting sensitive customer data.This episode offers a comprehensive look at the complexities and challenges in securing the telecom sector, leaving listeners with critical insights into how these breaches occur and the measures needed to prevent them. Tune in for an engaging and informative discussion on one of the most pressing issues in cybersecurity today.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Martin Roesch’s Insights: Multi-Cloud Network Security - Ep 105
Jul 10 2024
Martin Roesch’s Insights: Multi-Cloud Network Security - Ep 105
Join hosts Stan Wisseman and Rob Aragao as they engage with Martin Roesch, CEO of Netography and creator of Snort. With over 25 years in cybersecurity, Martin discusses network security evolution, especially in network observability. He explains the shift from traditional deep packet inspection (DPI) to leveraging metadata for network analysis due to the rise of encryption and dispersed networks. This metadata approach offers a broader view of network activities, overcoming DPI limitations.The conversation explores the complexities of maintaining security across different environments and the inefficiencies of disparate security tools for on-premises IT, AWS, Azure, and OT environments. Martin stresses the need for a unified security strategy adaptable to modern network architectures. He highlights metadata-based analysis for effectively detecting anomalies and reducing false positives, offering a clearer network activity picture.Martin also addresses the challenge of tracking lateral movement within and across cloud environments. Current security tools often fail to monitor these movements in real time, complicating threat response. Adopting a metadata-centric approach enhances understanding and mitigation of lateral movements, bolstering security posture.Rob Aragao further asks about emerging threats and key technologies in multi-cloud security. Martin emphasizes the promise of data security over identity as a perimeter and the need for unified, frictionless toolsets in multi-cloud environments to reduce operational friction. As enterprise networks expand, these low-friction architectures are vital for scalable, efficient security solutions, presenting opportunities for companies providing seamless multi-cloud capabilities.Tune in to gain deeper insights into the current and future state of network security from a leading expert.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com