Gratis podcast
re:invent security
Podcast door Jeroen Prinse / Irfaan Santoe
re:invent security is a podcast where we, on a monthly basis, learn from industry leaders how they reinvented security and how you can turn their experiences into action. Join us as we chat with inspiring information security professionals, dissecting the field of information security and its developments. Because when an episode ends, the real question begins: 'What will you do differently tomorrow?' Let's reinvent our field, one strategy at a time.re:invent security is hosted by Jeroen Prinse and Irfaan Santoe. Hosted on Acast. See acast.com/privacy for more information.
Deze podcast is gratis te beluisteren op alle podcastspelers en de Podimo-app zonder abonnement.
Alle afleveringen
7 afleveringenSteve Hollands (BQCM): "The future of security is quantum-proof: Start preparing today!"
Join hosts Jeroen Prinse and Irfaan Santoe in this thought-provoking episode of Reinvent Security as they welcome quantum computing and security expert Steve Hollands, Chair of the Board at Blackhills Quantum Computing. Steve dives deep into the fascinating and complex world of quantum computing, discussing its far-reaching implications for the future of cybersecurity. From the looming threat of quantum computers breaking traditional encryption to the opportunities quantum key distribution offers, this episode covers the cutting-edge advancements that could revolutionize security as we know it. Discover how AI and quantum computing could drastically shorten the timeline for encryption vulnerabilities, why businesses need to start preparing today, and the importance of crypto agility in a post-quantum world. Whether you're an IT professional, a cybersecurity enthusiast, or just curious about the future of technology, this episode delivers expert insights and actionable advice to help you stay ahead of the curve in the quantum era.
Chapters:
00:00 Welcome to the podcast
00:35 Introduction of the episode and Steve Hollands
02:53 How is Steve contributing to Quantum proof security?
04:49 How does quantum computing differ from traditional silicon based computing?
08:53 How does quantum computing impact the field of information security?
12:16 What is the timeframe of quantum computing threats and opportunities?
15:26 What is quantum safe cryptography and what are researchers doing?
16:37 Crypto agility is a key security principle in any security strategy
18:27 Are actors using quantum capabilities everybody's problem?
20:54 How a Quantum Readiness Framework can help organizations towards a post quantum security strategy?
24:06 What steps should organizations be taking now to prepare for the future impact of quantum computing on their security infrastructure?
29:46 How to create a Quantum Secure Defense in Depth Strategy?
34:57 What other steps should organizations take to prepare for the future impact of quantum computing on their security infrastructure?
36:24 What are the regulatory and ethical considerations that come with the rise of quantum computing in information security?
37:09 Resources for your journey into quantum and security
38:26 Which board member is driving the change towards a post quantum organization?
41:38 Can we make quantum secure cryptography a service for the organization?
44:03 Wrap Up
Resources:
Forbes: https://www.forbes.com/sites/adrianbridgwater/2018/01/03/neuromorphic-computing-will-build-human-like-machine-brains/
Nature: https://www.nature.com/articles/s41928-021-00646-1
McKinsey, timeline for Q-Day: https://www.linkedin.com/posts/activity-7229084010952478720-9nku
Blackhills new website: https://www.blackhillsquantum.com
----------------------------------------
Hosted on Acast. See acast.com/privacy [https://acast.com/privacy] for more information.
29 aug 2024 - 50 min
Ashish Rajan (Kaizenteq): "Data Sovereignty Will Define the Future of Cloud Security and Compliance"
Join hosts Jeroen Prinse and Irfaan Santoe in this enlightening episode of Reinvent Security as they sit down with cloud security expert Ashish Rajan, founder of Kaizenteq and host of the Cloud Security Podcast. With 250+ cloud security podcasts to his name Ashish shares invaluable insights into the evolving landscape of cloud security, discussing key challenges, best practices, and future trends. Discover the importance of identity and access management, strategies to prevent misconfigurations, and how to balance data sovereignty with cloud service capabilities. Learn why incident response in the cloud needs more focus and how to strategically select the right tools for your cloud security needs. Whether you're a seasoned professional or new to cloud security, this episode offers actionable advice and deep expertise to help you navigate the complexities of securing your cloud environments.
Chapters:
0:35 introduction
4:11 How is Ashish contributing to Cloud Security and AI?
08:30 Primary Cloud Security Challenge
13:22 Cloud Security Best Practices
23:10 The latest exciting trends in Cloud Security
29:18 How is data sovereignty impacting Cloud Security strategies?
34:30 Emerging threats and opportunities
37:20 Top 3 things to focus on starting tomorrow
40:11 Resources for your Cloud Security journey
44:05 Wrap up
Resources:
- Cloud Security Podcast - www.cloudsecuritypodcast.tv
- Cloud Security Bootcamp - www.cloudsecuritybootcamp.com
- Cloud Security Newsletter - www.cloudsecuritynewsletter.com
----------------------------------------
Hosted on Acast. See acast.com/privacy [https://acast.com/privacy] for more information.
25 jul 2024 - 50 min
Paul Watts (ISF): “Here is what it takes to be a NextGen CISO!”
This episode of re:invent security shares what it takes to be the next generation (NextGen) CISO. Our guest Paul Watts, a multiple times CISOs at companies like Kantar, Domino’s Pizza UK & Ireland, Network Rail, clarifies what it takes to be the NextGen CISO. Key questions discussed are: “What are the expectations from Business/IT leaders hiring these NextGen CISOs?”, “What transformation should CISOs explicitly consider staying relevant as CISO?”, “What is most important AND challenging for the NextGen CISOs to fulfill these expectations and how can they go about it?”. Dive into the conversation with Paul, someone that has been there, done that, now sharing this!
Resources:
Paper 1 - Unlocking the business value of security - Leadership Insights: Unlocking the business value of security - Information Security Forum [https://www.securityforum.org/solutions-and-insights/leadership-insights-unlocking-the-business-value-of-security/]
Paper 2 - Exploring the role of the BISO - Leadership Insights: Exploring the role of the Business Information Security Officer (BISO) - Information Security Forum [https://www.securityforum.org/solutions-and-insights/leadership-insights-exploring-the-role-of-the-business-information-security-officer-biso/]
Paper 3 - Looking to the future - is yet to be published publicly (link will be added later).
Paper 4 - Modelling the security leader - to be published to ISF Members on July 1st. Synopsis ...
The definition of a security leader continues to suffer from ambiguity, with misaligned expectations between business and incumbent a principal cause of stress and – somewhat inevitably – short tenures and disappointment for both employee and employer. We describe how the role could be better modelled, qualifying its fundamental criteria and providing some guidance on what qualities to look for, and what to not over-rely upon.
Paper 5 - Nominet CISO Stress Report: businesses get £23k ($30k) ‘free’ CISO time while impact of stress on mental health doubles in 2020 - Nominet [https://www.nominet.uk/nominet-ciso-stress-report-one-year-on/]
Other interview with Paul: The New Security Leader: Less Techie, More Business Savvy (inforisktoday.com) [https://www.inforisktoday.com/new-security-leader-less-techy-more-business-savvy-a-25534?utm_source=LinkedIn&utm_medium=ISMGSM&utm_campaign=Editorial]
----------------------------------------
Hosted on Acast. See acast.com/privacy [https://acast.com/privacy] for more information.
27 jun 2024 - 1 h 1 min
Toon Segers (Roseman Labs): "Multi-Party Computation for Secure, Private Data Collaboration"
Join hosts Jeroen Prinse and Irfaan Santoe as they dive into the world of multi-party computation with expert Toon Segers. In this episode, they explore how multi-party computation keeps data secure when collaborating, sharing and analyzing the data with partners, without exposing sensitive information. Toon Segers, co-founder of Roseman Labs and PhD candidate in mathematics and cryptography, explains the revolutionary changes this technology brings to data security and privacy of individuals, offering a promising solution to prevent data breaches and maintain confidentiality and privacy. Discover the future of data security and privacy and learn how multi-party computation is re:inventing the landscape of information security.
Resources
Multi Party Computation Wikipedia page: https://en.wikipedia.org/wiki/Secure_multi-party_computation
MPyC framework from TU Eindhoven: https://github.com/lschoe/mpyc
The Whitehouse on advancing Privacy-Enhancing Technologies: https://www.whitehouse.gov/ostp/news-updates/2022/06/28/advancing-a-vision-for-privacy-enhancing-technologies/
Roseman Labs website: https://rosemanlabs.com/en/
Collaborative Computing Slack community : https://collabcomputing.slack.com/
A correction: at 31:55 Toon states that the large Intel server has 192 CPUs, which should instead be 192 cores.
----------------------------------------
Hosted on Acast. See acast.com/privacy [https://acast.com/privacy] for more information.
30 mei 2024 - 53 min
Sunette Runhaar (Uber): "Why managing Insider Threat is so challenging, and how to start"
Insider Threat deals with the fact that every employee in the organization is a potential threat. How does one identify the actual threats and how to act and respond to them? What are the good practices to scale mitigation of the Insider Threat? What are the differences in Insider Threat Programs across different regions like the US and EU? All these questions are addressed by Sunette Runhaar from Uber.
Resources:
* 'Never split the difference: Negotiating as if your life depended on it [https://a.co/d/iFOUuds]' - Chriss Voss and Tahl Raz. This is essential reading to help manage tricky stakeholder relationships, but really helps understand the mindset of what motivates people in daily life.
* 'The Culture Map: Breaking the Through the Invisible Boundaries of Global Business [https://a.co/d/c6ykcE3]' - Erin Meyer. Great reading to understand how different business cultures affect perceptions in the workplace and interpersonal relationships.
----------------------------------------
Hosted on Acast. See acast.com/privacy [https://acast.com/privacy] for more information.
25 apr 2024 - 53 min
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Makkelijk in gebruik!
App ziet er mooi uit, navigatie is even wennen maar overzichtelijk.
Overal beschikbaar
Luister naar Podimo op je telefoon, tablet, computer of auto!
Een universum van audio-entertainment
Duizenden luisterboeken en exclusieve podcasts
Geen advertenties
Verspil geen tijd met het luisteren naar reclameblokken wanneer je luistert naar de exclusieve shows van Podimo.
Jouw aanbieding
Ongelimiteerd toegang tot exclusieve podcasts
Geen advertenties
20 uur aan luisterboeken / maand
Alleen na proefperiode € 6,99 / maand. Geen verplichtingen.