Episodes
Monday Feb 21, 2022
NCF-288 New Techniques in Network Security
Monday Feb 21, 2022
Monday Feb 21, 2022
Our guest talks about micro-segmentation, the implementation of firewall protection divided into tiny segments of your network; this is done by minimizing your firewall rulesets to one or a minimal set of computers. He describes why he is excited about security working for large banking institutions. Micro-segmentation supports zero-trust security models, which is also a subject on today's show. This show will pique the interest of technical network administrators out there. We hope you enjoy this episode of New Cyber Frontier.
Visit our sponsors:
Monday Feb 14, 2022
NCF-287 New Defined Future with Blockchain
Monday Feb 14, 2022
Monday Feb 14, 2022
Our host, Tim Montgomery, had the opportunity to speak with a guest, an Assistant Chair at the Leads School of Business at the University of Colorado. Our show looks at Blockchain Technologies from the business point of view. Dr. Lacek has spent a lot of time and written his Dissertation on the “Definition of Blockchain.” This very relevant and timely topic is something that many people wonder about as we hear different definitions from almost every article or researcher. The case studies show that the eco-systems and how blockchain is applied are more consistent than any single set of reports. Our guest explains that the use cases are driving full speed ahead; however, definitions and attempts at standards are lagging and inefficient. It is interesting to hear his explanation on where is the industry is going and that we have changed the nature of the conversation while considering the abilities of blockchain technology. Now that the conversation has changed, we cannot go back but must find a way to proceed through the new defined future.
Visit our sponsors:
Monday Feb 07, 2022
NCF-286 Building ”We” and ”Us” Cyber Teams
Monday Feb 07, 2022
Monday Feb 07, 2022
Today's guest has a unique team-building method by finding out whether the team member's personality meets the organization's needs. He explains that the people will always be the challenge, as you can continually update technology and processes, but people are the determining factor. The discussion is on how finding the "We" and "Us" type team member makes a better performing team than the "I" and "Me" type team members. A CISO needs to be more of a team leader than a manager. Individualized approaches identify the strengths and weaknesses of staff and then design the direction for each to propel them to be the best version. Look at team inefficiencies in dollars and cents; if you pay for a fantastic team but don't seem to have it, this show will be good for you. Finally, we hear some good advice on identifying changes to a few members to make your team effective.
Visit our sponsors:
Monday Jan 31, 2022
NCF-IEEE1 The Emerging Participatory Grid
Monday Jan 31, 2022
Monday Jan 31, 2022
This next episode of IEEE Blockchain for Transactive Energy defines and explains the participatory grid. Our guest, Dr. Farrokh Rahimi, Executive Vice President with Open Access Technology International, goes through an exciting insider history for energy trading. Will we ever get to the point where each person trades energy for themselves? It could be the case, as we open up for transactive power between distributed energy providers, anyone with an electric car or renewable battery banks can participate. Listen for answers to questions such as Who are the players? How does the future look? Where are we at now? And the important one for this series: How does blockchain fit into this discussion? I think you will be pleasantly surprised by the revelations on this show.
Visit our sponsors:
Monday Jan 24, 2022
NCF-285 Hardening to limit Overexposure from Business Services
Monday Jan 24, 2022
Monday Jan 24, 2022
Today's show is about overexposure on the internet; as companies provide more business, those services offered make them easier to find and exploit. As a result, malicious agents can scrape the internet and companies' networks to learn more about them than they would often like to be known. Combatting overexposure is a massive undertaking, and companies always find higher priorities; thus, the picture worsens. Our host says that business growth through M&A is a significant culprit leading to unknown configurations and massive infrastructure risks. The Guest uses an example of 22,000 open CCTVs found in a network scan to drive his point home. Next, hear some unique suggestions about resolving the problems from the ground up. Finally, they discuss the potential to start making a better future by first leaving past weaknesses and focusing on new products. Though this seems rather neglectful, it may lead to a better future.
Visit our sponsors:
Monday Jan 17, 2022
NCF-284 Assessing to Predict Career Success
Monday Jan 17, 2022
Monday Jan 17, 2022
Today we hear from Doug Britton at Haystack, who has come up with a great approach that tells us whether a candidate will be successful in a cybersecurity career. The CATA (Cyber Aptitude and Talent Assessment) relates to cognitive skills in various cybersecurity practices and jobs. This is excellent for job seekers and hiring managers alike. Doug brings student Maria Marquez, who explains her experience and how results were successful. We also demonstrate correlations between NICE (National Initiative for Cybersecurity Education) training and job classifications. If you are a hiring manager or a job seeker, you will not want to miss this episode and check out testing services at HaystackSolutions.com.
Visit our sponsors:
Monday Jan 10, 2022
NCF-283 Hacking to make Secure Software
Monday Jan 10, 2022
Monday Jan 10, 2022
Today’s show is about the secure development of software, known as DevSecOpps, as our guest calls it. We look at how to secure software from the perspective of someone trying to break it. Our Guest Ted Harrington has a background as a “Hacker” but has now turned from the dark side of the force to use his skills to help develop secure software. Ted has published a book called “Hackable.” After having the same conversation for years, Ted says the same ten categories kept coming to the top, and in his view, people were handling it the wrong way. We have a heated discussion on the divide between what our guest describes as “The way it has always been” and what he calls “The best approach.” Finally, he addresses the classic challenge of how security by design practices fit into a business. I think you will enjoy this new look at secure software development, where hackers and developers support each other by working together.
Visit our sponsors:
Monday Jan 03, 2022
NCF-SR17 Looking Forward - Cybersecurity Trends in 2022
Monday Jan 03, 2022
Monday Jan 03, 2022
Today, we have an exciting episode, the second part of our "Year in Review," where we look forward to what to expect in 2022. We bring back our panel from the first show, representing our user listener engagement selected panel. All four of our hosts join to discuss with our forum and provide some insights of their own. You may be surprised to hear the common themes our guest brings up for 2022, but you will not be able to deny that they will impact us in the coming year. As post-pandemic uncertainty grips us, each guest gives their perspective for its impact as we move into the coming year. We hope you have gained a lot of value from New Cyber Frontier over the last year and invite you to reach out to us to be a guest or sponsor a show.
Visit our sponsors:
Wednesday Dec 29, 2021
NCF-SR16 2021 Year in Review – Securing Critical Infrastructure
Wednesday Dec 29, 2021
Wednesday Dec 29, 2021
Today's special "Year in Review" episode brings back our guests from the top-performing shows of 2021 in a roundtable format. This is the first of two parts to this series, where we recap the highlights of what was the most impactful for the year 2021. All four of our hosts join to discuss with our panel and provide some insights of their own. The overwhelming theme that has emerged is the transition to focus on security for critical infrastructure; our guests selected by listener engagement seem to be converging on very similar points. We wish everyone a great holiday season as we recap the highlights of 2021. Standby for next week as we will have the second part of this panel where they discuss what to expect moving into 2022.
Visit our sponsors:
Monday Dec 13, 2021
NCF-282 Cybersecurity Communication and Leadership
Monday Dec 13, 2021
Monday Dec 13, 2021
In this segment of the NCF, Dr. Murray discusses with Bob Zinga. The latter is the Director of Information Security at Directly and an Information Warfare Officer for the United States Navy Reserve in San Francisco. Bob and Shawn discuss the similarities and differences related to the security culture between both roles. In addition, Bob explains how a security leader needs to communicate to multiple audiences on the commercial side and how that can impact how security is perceived. To be successful, you need to speak the language of business and influence a culture of security.
Visit our sponsors: