Sign in

Technology
News
Razorthorn Security
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on the strength and depth of your own knowledge and experience. Your host James Rees is an information security veteran with over 25 years of industry experience and is the founder of Razorthorn Security, delivering expert security consultancy and testing services on a day to day basis to some of the largest and most influential organisations in the world, including many in the Fortune 500. The Razorwire podcast is for cyber security professionals looking for new ideas and the drive to improve their response to cyber security events. Through collaboration, we can strengthen our defences. For more information about us or if you have any questions you would like us to discuss on the podcast email [email protected] or head to www.razorthorn.com This podcast uses the following third-party services for analysis: OP3 - https://op3.dev/privacy
Total 59 episodes
1
2
Go to
Mental Health, Organisational Culture & The Human Side of Cybersecurity

Mental Health, Organisational Culture & The Human Side of Cybersecurity

Are layoffs increasing your cybersecurity risk and driving your team to burnout? This episode looks into the psychological underpinnings of infosec to navigate turbulent times at work.Welcome to Razorwire, the podcast that cuts through the complexities of information security with sharp insights and expert discussions. In this episode, I’m joined by Lisa Ventura (MBE), founder of Cybersecurity Unity, and Bec McKeown, a psychologist specialising in high-risk environments. Together, we explore the hidden psychological factors that shape cybersecurity practices and discuss essential strategies to safeguard your organisation.Join us as we discuss the impact of economic layoffs on cybersecurity, the efficacy and ethical concerns surrounding psychological profiling, and the sophisticated tactics employed by malicious actors in today's digital arena. Lisa, Bec, and I also unpack the importance of organisational culture in mitigating human error, the role of mental health in cybersecurity, and how to implement targeted security measures without overwhelming your team. This episode is a must-listen for professionals seeking to understand the human dynamics behind infosec challenges and cultivate a supportive, resilient security culture.3 Key Takeaways:Protect Your Organisation Without Crossing Privacy Lines. Want to strengthen your security approach without relying on controversial psychological profiling? Discover practical, ethical alternatives as Bec McKeown walks you through smarter ways to assess and mitigate insider risks whilst preserving employee trust and privacy.Prevent Data Theft During Company Transitions. Is your organisation facing changes? Learn how to protect your critical assets during turbulent times. Lisa Ventura reveals proven strategies to identify and secure your most valuable data, particularly when your company is experiencing workforce changes or economic pressure.Build a Stronger, More Resilient Security Team. Ready to boost both your security effectiveness AND team morale? Get hands-on techniques from Bec McKeown to create an environment where your security professionals thrive. Walk away with practical steps to reduce burnout, increase psychological safety and build a high-performing team that stays sharp and engaged.Tune in to Razorwire for actionable advice and expert perspectives to fortify your cybersecurity strategy amid challenging times.On Psychological Safety & Blame Culture:"If people are constantly told off for not doing things in the right way, whether that's cybersecurity training or otherwise, they're never gonna fess up to it... if you haven't got that psychological safety within the culture, then these things are probably more likely to happen because it's not in the person's best interest to hold their hand up."Bec McKeown Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Understanding Layoff Security Risks: Explore why workforce changes increase data theft risks and why organisations need heightened awareness during these transitions.Beyond Psychological Profiling: Learn more effective and ethical ways to assess security risks without compromising employee privacy - practical alternatives you can implement today.High-Value Target Protection: Understanding why certain roles face increased targeting and need additional security...
40:3213/11/2024
Insider Threats & Third Party Risk: How to Manage Security Threats

Insider Threats & Third Party Risk: How to Manage Security Threats

Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire!Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers like AWS and Azure to detecting and dealing with insider threats, our conversation covers it all. My esteemed guests, Razorwire favourites Iain Pye and Chris Dawson, share their perspectives on the right to audit third parties and how shifts in business models and changing workplace culture impact our security postures. We also break down a case study involving indemnity and insurance settlements following a breach incident, providing you with practical takeaways for enhancing your own security protocols.Key takeaways:Strengthen Your Third Party Risk ManagementImplement contractual audit rights early in vendor relationshipsDevelop resilience plans for vendor service failuresUnderstand the risks of supply chain dependencies (third parties of third parties)Plan for scenarios where key service providers might fail or be compromisedUnderstand and Mitigate Insider ThreatsIdentify different types of insider threats (accidental, disgruntled employees, corporate espionage)Monitor for behavioural changes and suspicious activity patternsImplement ongoing background checks and security clearance reviewsBalance monitoring with employee privacy and company culture considerationsAddress Modern Security ChallengesEvaluate the cost-benefit trade-offs between in-house and outsourced servicesImplement monitoring solutions that correlate data from multiple sourcesDevelop security strategies that account for both human and technical factorsCreate comprehensive risk assessments that include both internal and external threatsJoin us on Razorwire as we untangle the complexities of third party risk and insider threats, providing you with actionable insights to fortify your organisation's cyber defences.On the inevitability and scale of third-party breaches: "It's inevitable. You're gonna have a third party breach. There's about, what, 10 a day... You could do all the due diligence in the world and all the security checks about this. You could have a very robust vendor risk management, whatever you wanna call it. At the end of the day, it's gonna take one little, maybe insider threat on the third party side, and that will cause a breach." Iain PyeListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we discuss:● Implementing Third Party Audit Rights: Secure your organisation by establishing robust audit rights in vendor contracts before engagement begins.● Evaluating Cloud Provider Stability: Assess and mitigate risks when selecting cloud providers by verifying their financial stability and data migration capabilities.● Preventing Insider Security Breaches: Distinguish and protect against both intentional and accidental internal security threats through targeted controls.● Building a Strong Security Culture: Foster an environment where employees actively report and respond to security warnings rather than normalising them.● Managing Employee-Related Risks: Develop strategies to...
44:5830/10/2024
How to Optimise Your GRC Tools

How to Optimise Your GRC Tools

How to Optimise Your GRC Tools Improving Value, Efficiency & True Risk ManagementAre your GRC tools really managing risk, or just creating noise?Welcome to the latest episode of Razorwire, where we cut through the complexities of the cybersecurity world to deliver actionable insights. I'm your host, Jim, and in this episode, we're discussing the multifaceted challenges and opportunities surrounding Governance, Risk and Compliance (GRC) tools with none other than Jack Jones, creator of the FAIR risk model and a seasoned security professional with nearly 40 years’ experience.In our conversation, Jack and I explore the intricate landscape of GRC tools, questioning their effectiveness in truly managing risk. We talk about the difference between controlling efficiencies and understanding genuine risks, shedding light on the often misleading contents of risk registers. In this episode, you'll learn invaluable insights that could transform how you approach risk management and compliance. From navigating price range vs efficiency, to the idea of developing a more effective and affordable GRC solution, this episode offers a treasure trove of useful takeaways for anyone in the cybersecurity field. Key takeawaysThe Real Cost of GRC Tools: Jack and I discuss the hidden expenses and renewal price hikes associated with existing GRC tools. If you're feeling the financial strain of your current GRC solutions, this segment is a must-listen to understand the true cost and value proposition of these tools.Redefining Risk Management: We talk about the importance of differentiating between real risks and mere efficiencies and how many organisations can get this wrong. Learn how to avoid the ‘noise’ in your risk register to focus on genuine risk scenarios that matter to your business.The Path to Better GRC Solutions: Tune in to hear our thoughts on the pressing need for innovation in GRC tool design. If you're looking for practical, cost effective solutions tailored to meet your risk management needs, you'll want to hear our insights and future plans.Don't miss this conversation that could reshape your perspective on GRC tools and risk management."If I thought the [GRC tool] technology is actually provided anywhere near the value of their potential… if the GRC products and their implementations were actually doing the job they're intended to do, they should cost a lot of money because they would be providing a ton of value." - Jack JonesListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Cybersecurity Responsibilities Debate: We debate whether cybersecurity should fall under IT or infosec departments.Penetration Testing Management: How penetration testing could be subject to a conflict of interest depending on which department manages it.GRC Tool Costs: Maximising GRC Tool ROI: Gain insights on how to assess and optimise your GRC tool's value proposition through regular utilisation and cost reviews.Identifying GRC Tool Shortcomings: Understand the common pitfalls of popular GRC tools in addressing real world risks, enabling better tool selection and implementation.Proper Risk Register Management: Learn to distinguish between genuine risks and audit deficiencies for more accurate and useful risk registers.Third-Party Risk Management: Learn strategies for effectively managing the challenges posed by third party risks in modern business environments.Effective Risk Communication: Master...
43:3616/10/2024
Navigating Mental Health, Narcissism & Burnout in Cybersecurity with Lisa Ventura MBE

Navigating Mental Health, Narcissism & Burnout in Cybersecurity with Lisa Ventura MBE

Welcome to Razorwire, the podcast where I, James Rees, cover the cybersecurity topics that matter with expert guests from across the industry. We aim to help cybersecurity professionals enhance their skills, improve their work performance, and boost their overall quality of life in this demanding field.The illustrious Lisa Ventura, MBE, award winning cyber security specialist and the founder of Cyber Security Unity, joins me in this episode. We talk about the pressing issues that cybersecurity professionals face on a daily basis, from mental health struggles to dealing with industry narcissists.Lisa shares her insights on current industry developments and uses her personal experiences to offer practical advice and knowledge for cybersecurity professionals at all career stages.Join us as we talk about:1. Burnout and Mental Health in Cybersecurity: We talk about the root causes of burnout and mental health issues among cybersecurity professionals, and share practical strategies to protect your wellbeing in a high stress environment.2. Navigating Industry Narcissism: Gain insights on how to identify and handle narcissistic behaviours in the workplace, and work towards a healthier and more supportive professional atmosphere.3. Cyber Skills Gap and Industry Trends: Lisa's shares her thoughts on the role of AI and VC money, and the ongoing challenge of closing the cyber skills gap, especially in smaller organisations.Tune in to Razorwire and empower yourself with the knowledge and resilience essential for thriving in the cybersecurity arena.Lisa on handling narcissists in the workplace: "If it gets too much, I have only one bit of advice. And it's not a good bit of advice to say, and that is to find something new as soon as you possibly can and leave because those individuals will never change."Lisa Ventura, MBEListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Burnout and Mental Health: Discover strategies for managing burnout and maintaining mental health in cybersecurity.Cyber Skills Gap: Learn about the factors contributing to the cyber skills gap and how this can be addressed.Responsibility and Fear: Understand the psychological impact of responsibility and blame in security roles.Budget Reductions and Layoffs: Find out how budget cuts and layoffs are affecting the industry post-pandemic.Handling Narcissistic Individuals: Get practical advice on dealing with narcissistic individuals in the workplace.Infosec Industry Trends: Explore current and future trends in information security, including AI misuse.Legislation and C-Suite Attention: Learn how new legislation is increasing executive-level focus on cybersecurity.Experiences in Infosec: Hear firsthand accounts of dealing with negative behaviours in the industry.Targeting and Narcissism Among Women: Uncover insights on targeting and hypocrisy, even among diversity advocates.Challenges for Young Professionals: Find out how mentorship can help newcomers overcome challenges and impostor syndrome.Resources MentionedCyber Sentinels...
40:5202/10/2024
ChatGPT vs Cyber Threats: The REAL Role of AI in Cybersecurity

ChatGPT vs Cyber Threats: The REAL Role of AI in Cybersecurity

Unlock the truth about using Large Language Models (LLMs) in cybersecurity - are they the next big thing or just another trend?In this episode of Razorwire, your host, James Rees, brings together cybersecurity expert Richard Cassidy and data scientist Josh Neil to talk about the use of AI and large language models (LLMs) in cybersecurity and their role in threat detection and security. Join us for a discussion on the capabilities and limitations of these technologies, sparked by a controversial LinkedIn post. We bring you expert insights into AI in security applications and a frank discussion on always being open to learning and correcting misconceptions. Hear about real world examples and practical advice on how to integrate AI tools effectively without falling into common traps. This episode delivers a balanced, in depth look at an often misunderstood but crucial topic in modern cybersecurity.3 Key Takeaways:Anomaly Detection Challenges: We break down why traditional time series models are still king when it comes to anomaly detection, highlighting the limitations of LLMs. Learn why these models are better suited for identifying real threats without drowning in false positives.Role of Critical Thinking in Cybersecurity: Richard Cassidy emphasises the irreplaceable value of human expertise in threat detection. Discover why relying too heavily on AI could stifle critical thinking and skill development, especially for junior analysts, potentially weakening your security team in the long run.Practical Applications and Misconceptions: Hear a candid conversation about the real strengths and weaknesses of LLMs in cybersecurity. Both guests share practical advice on how LLMs can augment, but not replace, human-driven methods to ensure stronger, more reliable security measures.Tune in to Razorwire for an episode that cuts through the hype and delivers actionable insights for cybersecurity professionals navigating the evolving landscape of AI in security.The Downside of AI in the Workplace: "My concern with AI assistants or co-pilots with quick and easy answers, the junior analysts aren't learning the critical thinking required to become senior analysts, and therefore we're losing our bench. And we're going to end up with unskilled senior analysts that don't know when the LLM doesn't know what to do. Neither does the human."Josh NeilListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:●      Anomaly Detection Challenges: Find out how experts approach the complex task of identifying unusual patterns in cybersecurity data.●      LLMs vs. Traditional Methods: We explore different approaches to anomaly detection, comparing cutting-edge AI with established statistical techniques.●      Organisational Understanding: Listen to insights on the importance of deep knowledge about critical systems for effective threat detection.●      Surgical vs. Brute Force Approaches: Discover the debate surrounding different methodologies in cybersecurity, and the role of human expertise.●      Training and Critical Thinking: We examine how the increasing use of AI tools might impact skill development in the cybersecurity workforce.●      Evolution of Threat Detection:...
56:5618/09/2024
DORA & NIS2: The Cybersecurity Regulation Revolution

DORA & NIS2: The Cybersecurity Regulation Revolution

Are you ready for DORA and NIS2? Discover how these regulations could transform your security strategy!Welcome back to another episode of Razorwire! Today we unpack the DORA and NIS2 regulations with esteemed cybersecurity expert Richard Cassidy. I’m your host, Jim Rees, and I’ll be guiding the conversation for anyone navigating the evolving landscape of digital security in the financial sector.In this information-packed episode:Discover why organisations are dangerously behind in DORA and NIS2 preparationLearn how these EU regulations could impact global operations, including US companiesExplore the potential for hefty fines and personal liability for executivesUnderstand the critical role of third party providers in complianceGet practical advice on assessing your organisation's readinessUncover the challenges of implementing cross border information sharingGain insights on budget planning and vendor alignment for complianceWhether you're a CISO, IT professional or business leader, this episode offers crucial information to help you stay ahead of regulatory changes. Don't miss Richard's expert analysis and insider tips on preparing effectively for compliance. This episode is packed with invaluable insights you won't want to miss." Don't be looking at this, head in your hands and worry that you haven't got the stack. You most likely do have the capabilities. Now you've just got to understand how you go about aligning to DORA."&nbsp;Richard CassidyListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Regulatory Gap Analysis: Why organisations should start by analysing gaps between current performance and DORA and NIS2 regulations.Vendor Involvement: Why it’s essential to involve vendors and ensure they align with new regulations.Global Impact: Learn how DORA and NIS2 will impact organisations worldwide, especially those within the EU financial industry.Budget Implications: Advice on beginning regulatory analysis before budget renewal, for better allocation of resources.Contract Renegotiation: How to navigate the lengthy process and challenges of renegotiating contracts for compliance with new regulations.Third Party Security: Why we need to include audit rights and fine clauses in contracts with third party service providers.C-suite Accountability: Learn about the personal responsibility of the c-suite under DORA, including potential legal consequences.CISO Role Evolution: Find out how the CISO role is likely to gain more prominence and may replace the CIO in the future.Information Sharing Challenges: We discuss the difficulties organisations might face in sharing cybersecurity information.Implementation Recommendations: How to implement a simplified approach to aligning with DORA by assessing maturity and targeting domain-level improvements.Resources MentionedDORA (Digital Operational Resilience Act)NIS2 (Network and Information Systems 2)<a href="https://www.bankofengland.co.uk/prudential-regulation"...
50:4304/09/2024
Contextual Security and Beyond: The Future of Cybersecurity

Contextual Security and Beyond: The Future of Cybersecurity

Welcome back to Razorwire! I'm Jim, your host, and joining me today are cybersecurity experts Richard Cassidy and Oliver Rochford.&nbsp;&nbsp;Following on from our last episode of Razorwire, where Oliver and I discussed the key issues that cyber professionals need to focus on in 2024, this episode centres on key takeaways from recent security conferences, particularly RSA and Infosecurity Europe, and explores the shift towards contextual security as highlighted in Byron Acohido's recent report.&nbsp;The conversation covers several critical topics:&nbsp;The potential transformation of long term cybersecurity planning&nbsp;Emerging trends in integration and standardisation among security solutions&nbsp;Fresh perspectives on supply chain risk management&nbsp;The debate over vendor accountability for security vulnerabilities&nbsp;Innovative approaches to security budgeting and prioritisation&nbsp;We discuss the necessity of proactive security approaches, the value of contextual information in threat detection and response, and the importance of considering customer impact when assessing security risks. They also touch on the potential implications of AI advancements for cybersecurity strategies.&nbsp;We give you an overview of current industry trends, challenges and potential future directions. We challenge conventional ways of thinking and offer insights that may help reshape how listeners approach cybersecurity strategies so you come away with actionable insights and strategies.&nbsp;The Overwhelming Complexity of Choice at Tech Events&nbsp;"It's just unbelievable that at every stand you go to [the vendor says] “we're the best in application security.” “We are the best in UEBA.” And I try to put the customer hat on when I go to these events and go, oh my goodness, how does anybody make a decision in the midst of all of this complexity?"&nbsp;&nbsp;Richard Cassidy&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listen&nbsp;&nbsp;In this episode, we covered the following topics:&nbsp;Data Growth Management: Addressing the growing need for truly effective data management to secure the projected increase in data volume in the coming years.&nbsp;Communication Challenges: The difficulties in communicating long term infosec plans to the C-suite, who focus on shorter term financial goals.&nbsp;Cultural Shift: How the infosec industry has been impacted by post-lockdown advancements in technology as well as cultural changes.&nbsp;Cybercrime Costs: The predicted increase in the financial cost of cyber attacks is likely to be a more significant financial threat than physical crimes by 2025.&nbsp;Financial Challenges: Current investments in cybersecurity are not keeping pace with the evolving threat landscape.&nbsp;New Strategies: Why we need to move from rules-based to contextual-based security.&nbsp;Integration: How interoperability and synergy between vendors can help address evolving threats.&nbsp;Cyber Senescence: Why we need a longer-term approach to cybersecurity planning.&nbsp;C-Suite Communication: Why infosec professionals need to communicate risk and the importance of security investment to the c-suite effectively.&nbsp;Vendor Relations: The challenges of vendor lock-in, tool...
47:4521/08/2024
Top Cybersecurity Priorities for 2024

Top Cybersecurity Priorities for 2024

Welcome to Razorwire, the podcast that cuts through the noise of the information security industry. I'm your host, Jim, and today we're talking a look at the state of the infosec industry so far in 2024 with our guest, Oliver Rochford. If you're a cybersecurity professional taking on the evolving threats and challenges of our field, you won't want to miss this discussion.From the rapid consolidation within the tech sector to the challenges of supply chain security and the limitations of today's infosec tools, we leave no stone unturned. We also discuss the role of AI in simplifying complex security solutions and whether current market trends are truly addressing the core needs of security teams.Key Talking Points&nbsp;1. Tech Industry Consolidation: Discover how the acquisition spree by cybersecurity giants like CrowdStrike and Palo Alto is reshaping the industry landscape and what it means for smaller, niche security companies.2. Supply Chain Security: Hear about the latest risks posed by third party involvement and how to ensure robust security tracking and management using various tools and solutions.3. AI and Security Solutions: Oliver tells us how we can make use of AI to streamline and simplify the overly complex and jargon-filled security tools market, offering a fresh perspective on future developments.Tune in to this thought-provoking episode of Razorwire for valuable insights that every cybersecurity professional needs to stay ahead in 2024.The Future of Cybersecurity:&nbsp;"I expect there to be diversification under the formation of multiple markets with individual giants within these markets, because you can't be good at everything."Oliver RochfordListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Tech Industry Consolidation: Discussion on the recent acquisition of smaller tech companies by larger firms and the impact of this on the industry.- Growth and Specialisation Limits: Prognosis on large portfolio providers and the constraints imposed by specialisation and market share retention.- Cyber Attack Speed and Aggressiveness: Examination of the increasing speed and aggressiveness of cyber attacks and how to prepare for the challenges they present.- Supply Chain Security: How we can secure the supply chain and the inconsistencies in infosec vendor messaging.- Complex Security Solutions: How to make use of AI to critique the complexity and confusing terminology in security solutions.- AI and Core Security Issues: Exploration of the risks tied to AI, budget constraints and the persistent core security challenges.- Affordability and Effectiveness: Highlighting the need for organisations to thoroughly investigate the most effective tools to make the most of tight budgets.- Data Privacy and Encryption: Examination of growing encryption usage and questions over control and management of encryption keys.- Disconnect in the Cybersecurity Market: Addressing the disconnect between user needs and market offerings, focusing on AI and the latest technologies.- Economic and Regulatory Concerns: How financial and regulatory challenges are impacting security investments and implementations.Resources MentionedEvents:Infosec conferenceRSA
48:5207/08/2024
DORA is Coming: Is Your Financial Institution Ready for the Digital Resilience Revolution?

DORA is Coming: Is Your Financial Institution Ready for the Digital Resilience Revolution?

The deadline for financial entities is looming – get actionable information and advice on DORA compliance with industry expert Paul Dwyer!Welcome to Razorwire, your go-to podcast for cutting edge insights and expert analysis in the world of information security. I'm your host, Jim, and in today's episode, we have the privilege of speaking with Paul Dwyer, returning Razorwire guest and veteran in cybersecurity risk and compliance, with over 30 years of experience and the head of the International Cyber Threat Task Force (ICTTF).&nbsp;In this episode, Paul and I discuss the operational resilience required by DORA legislation, touching upon substantial fines for compliance failures and the shift towards personal accountability at the business and boardroom levels. We cover the nuances of DORA and its intersections with NIS2, and talk about the importance of better communication within organisations and the growing responsibility of governing bodies and the c-suite.&nbsp;Paul shares invaluable insights on the risk-based approach that's overtaking traditional compliance methods, the business opportunities awaiting smaller players in the DORA compliance space, and the essential need for thorough and continuous training programmes.Key Takeaways1. Discover compelling real world examples of how compliance failures have led to significant fines for large organisations and why personal accountability at the boardroom level is becoming crucial.2. Learn how DORA and NIS2 regulations are evolving to include a risk based approach and are pushing for proportionality in implementing controls, shifting the focus from mere compliance to a truly risk-centric perspective.3. Find out about the new business opportunities that DORA presents for small and midsize players in the market, including offering compliance services and challenging large cloud providers.&nbsp;The Era of Accountability in Management:&nbsp;"Anybody can fill out a little compliance spreadsheet, oh, there we go tick, tick, tick, we're doing all that, it goes through. But those days are gone because you need to trust, verify everything, you need to get the evidence."&nbsp;Paul DwyerListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Operational Resilience: Find out about fines and individual accountability for compliance failures under DORA and NIS2.- Governance Focus: We talk about increased attention on cybersecurity from governing bodies and the c-suite.- Risk Based Approach: Why the regulations’ emphasis is on proportional, risk centric controls over mere compliance.- Business Opportunities: Identifying opportunities for small and midsize players in offering compliance services against large cloud providers.- Regulatory Adaptability: Why we need DORA regulations to be adaptable to various organisational risks.- Training and Awareness: Addressing the crucial need for thorough DORA awareness programmes for all levels of staff, especially non-tech leaders.- Compliance Tools: Introducing tools like CyberPrism and AI-based solutions for assisting organisations in DORA compliance.- Information Sharing: Discussing the importance of peer-to-peer intelligence sharing and distinguishing it from mere information sharing.- Leadership Evolution: Emphasising the need for CISOs and other leaders to possess hybrid skills tying cybersecurity with business strategy and legal...
55:5724/07/2024
Secrets of a Cyber CEO: The Truth About Running a Cybersecurity Business

Secrets of a Cyber CEO: The Truth About Running a Cybersecurity Business

Unlock the secrets to successfully navigating the cybersecurity business landscape with insights from industry legend Jane Frankland on this episode of Razorwire.Welcome to Razorwire, I'm your host, Jim and in today’s episode, we have the privilege of discussing the intricacies of running a successful cybersecurity business with none other than Jane Frankland. With over 26 years in the industry, Jane has built and sold businesses, influenced trends and mentored the next generation of cybersecurity professionals.&nbsp;In this episode, I chat with Jane Frankland about the challenges and most rewarding experiences of running a cybersecurity business. Jane tells us about her journey from the early days of cybersecurity in the 90s to becoming a prominent influencer and entrepreneur. We explore topics like managing growth, the shift towards freelance work and the importance of humility and mentorship in the industry.&nbsp;3 Key Talking Points:1. Managing Business Growth: Jane shares her strategies for managing growth through the use of associates and outsourcing non-core functions. Learn how to scale your business efficiently while keeping your core operations robust.2. Navigating Industry Trends: We talk about the increasing amount of freelance work in information security, the importance of a reliable pool of pentesters and the risks of crowdsourced pentesting companies. Gain insight on how to adapt your business model to include evolving industry practices.3. The Role of Mentorship and Humility: Jane and I discuss why mentorship for young professionals is so important and the significance of humility in leadership. Discover why ditching egos and maintaining an approachable demeanour is crucial for building a successful cybersecurity business.Don't miss out on these pearls of wisdom from one of cybersecurity's most respected voices.&nbsp;The Reality of Running a Business:&nbsp;"You are literally flying by the seats in your pants and navigating your company, at the helm, which is very, very stressful. Very stressful. And yet it is exciting and it is fun."&nbsp;Jane FranklandListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Business Growth Strategies: Discussing the challenges and careful expansion required to grow a cybersecurity business.- Outsourcing and Associates: Managing growth by outsourcing non-core functions like marketing and accountancy and using associates.- Pentesting Workforce: The shift towards freelance pentesters and the challenges of maintaining a reliable pool of talent.- Revenue Diversification: The importance of diversifying revenue streams and adapting business focus to market changes.- Industry Egos: Addressing the rise of egos in the information security industry and the importance of humility.- Emotional and Mental Challenges: Exploring the emotional rollercoaster and loneliness experienced by business owners.- Mentorship and Support: Highlighting the importance of mentors and coaches for guidance, especially during the early stages of business.- Client Acquisition and Recruitment: The complexities of recruiting staff, especially pentesters and salespeople and the challenges of client acquisition.- Financial Management: The critical importance of managing finances accurately and the common pitfalls at the tax level.- Encouraging Young Talent: The significance of mentoring young professionals and actively supporting their entrance and growth in the cybersecurity industry.Other episodes you'll...
49:4910/07/2024
Redefining Cyber Insurance to Meet Today’s Cybersecurity Challenges

Redefining Cyber Insurance to Meet Today’s Cybersecurity Challenges

In a landscape where cyber attacks are constantly evolving, is your business insurance keeping pace?Welcome to another episode of Razorwire! I'm your host, Jim, and today we dive deep into the dynamic world of cyber insurance. Neil Hare-Brown and Matt Clark, two industry experts, are with us to share their wealth of knowledge and insights on how cyber insurance has changed to address today's security challenges.&nbsp;In this episode, we cover the critical role of cyber insurance in modern security strategies, from mitigating the financial impact of cyber incidents to navigating the details of underwriting and premium setting. We also discuss the increasing trend of third party attacks and why companies must prioritise reviewing their vendors and suppliers. By the end of this episode, you'll have a clearer understanding of why cyber insurance is no longer a luxury but a necessity, and how you can leverage it to bolster your organisation's cyber resilience.Key Talking Points:1. Rising Costs and Frequent Threats: Neil explains why cyber insurance is crucial for mitigating significant financial impact of cyber crime.2. Underwriting and Premiums: Matt tells us how insurers use data and tools like ransomware calculators to set premiums and how businesses can proactively improve their cybersecurity posture.3. Vetting Third Party Vendors: We discuss why we must thoroughly assess third party providers, with insights into new insurance services and facilities aimed at helping businesses manage and recover from cyber incidents more effectively.Tune in to discover how cyber insurance can be an integral part of your organisation's defence strategy and ensure you're prepared for whatever comes your way.Cyber Risk Management:&nbsp;"I think there is still quite a long way for businesses to go, for boards to appreciate that cyber risk management is not an operational problem."&nbsp;Neil Hare-BrownListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Impact of Cyber Incidents: How to accurately estimate the financial repercussions of cyber attacks.- Ransomware and Business Email Compromise: We discuss the current trend for ransomware and business email compromise, and how to protect your organisation from the increased frequency and severity of the attacks.&nbsp;- Double Extortion and Data Breaches: The evolution of cyber threats which includes tactics like double extortion and significant reputational harm.- Using Data to Inform Insurance: How data from insured cyber events helps give risk insights for setting premiums.- Proactive Cyber Risk Management: Why it’s essential to have a cyber champion on the board.- Third Party Risks and Cyber Insurance: Third party attacks can severely impact businesses, highlighting the need for comprehensive cyber insurance.- Evolving Insurance Facilities: New offerings such as breach response services are becoming more accessible and affordable.- Post-Incident Actions: Breach experiences often lead companies to enhance cybersecurity measures and seek appropriate insurance coverage.- SMEs and Cybersecurity: Smaller enterprises struggle with maintaining effective cybersecurity processes and benefit greatly from cyber insurance.- Continuous Learning in Cybersecurity: Why we must continue to learn and evolve for effective cybersecurity strategies.Resources Mentioned<a...
47:1726/06/2024
What Really Grinds My Gears In Infosec!

What Really Grinds My Gears In Infosec!

Unmask the reality of the information security world in this week's episode of Razorwire! Join me, Jim, and my guests, Chris Dawson and Iain Pye, as we talk about our daily frustrations working in infosec and the pressing issues facing cybersecurity professionals. We dissect the gripes, pet peeves and laughable clichés that saturate our industry.From the hype of award ceremonies to the absurdity of exaggerated credentials on LinkedIn, this conversation is packed with insights and anecdotes that will resonate with every cybersecurity professional. Stay tuned and subscribe for this candid look at the ups and downs of our industry.Key Talking Points:1. Real Talk on Compliance and Regulations: Discussing the hype around compliance requirements like GDPR and DORA, we break down the importance of understanding and managing these regulations without falling for marketing gimmicks.2. Vendor Exaggerations vs. Reality: Discussing the overblown claims around GDPR and DORA compliance and the serious implications for cybersecurity.3. Grandstanding Egos: The rise of self-proclaimed thought leaders and influencers and their role in fuelling fear, uncertainty and doubt within the infosec community.Tune in for a frank and entertaining discussion on the gritty realities of information security!The Struggles of Simplicity:&nbsp;"Your average user will go out their way to circumnavigate the controls that you've put in place."Iain PyeListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Annoying Infosec Practices: This satirical podcast dives into some of the most irritating practices in the infosec industry.- Auditor Issues: The frustrations of dealing with auditors. Enough said.- Integrity at Work: We talk about significance of acting professionally in workplace settings.- Infosec Vendor Marketing: The creative license taken by vendor marketing departments and how to stay wise to exaggerations.- Risk Management Complexity: We talk about the overwhelming abundance of acronyms, and the importance of clear communication and documentation.- Compliance and Regulations: We look into the implications of compliance requirements such as GDPR and the upcoming DORA.- Exaggerated Professional Profiles: We lament the trend of elaborate and often exaggerated LinkedIn profile titles and qualifications.Resources Mentioned- The Cyber Sentinel’s Handbook- GDPR (General Data Protection Regulation)- DORA (Digital Operational Resilience Act)- LinkedIn- Chat GPTOther episodes you'll enjoyPreventing Burnout in Cyber Security<a href="https://www.razorthorn.com/cyber-security-professionals-shortage-burnout-how-to-protect-against-it-razorwire-podcast/" rel="noopener noreferrer"...
53:3812/06/2024
The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

In this episode of Razorwire, I sit down with Rob Black, a dynamic figure in the world of cybersecurity with a unique background in military strategy and defence. From the realms of computer game design to the high stakes world of defusing IEDs, Robert brings unparalleled insight into how we can revolutionise cybersecurity by understanding and manipulating the psychology of our adversaries. This episode is packed with outside-the-box strategies that will transform your approach to defending your network.In our conversation, Robert and I explore the intersection of human psychology and cybersecurity, emphasising the impact of deception and misinformation on attackers. Robert shares parallels to military tactics and offers practical advice on psychological tools to gain an upper hand in infosec. We discuss real world studies and notable cyber incidents like Stuxnet to underscore the importance of strategic thinking beyond mere technological solutions. Tune in for an engaging discussion that could reshape your cybersecurity practices.Key Talking Points:1. Deception Tools and Strategy - Robert explains how to slow down attackers using deception technology, inspired by military tactics, causing them to mistrust their tools and make erratic decisions.2. Psychological Influence on Threat Actors - Learn how to improve the effectiveness of your network defence by understanding and engaging with the decision making processes of threat actors.3. Real World Case Studies - We discuss impactful examples, including the NSA's deception studies and the infamous Stuxnet attack, to illustrate how psychological and strategic insights can be applied to bolster cybersecurity efforts.Join us on Razorwire and arm yourself with revolutionary tactics to stay ahead in the constantly evolving landscape of cybersecurity.&nbsp;Deception 2.0: Envisioning the Future of Cybersecurity"So attackers believe the systems they're using because they've got no reason to believe the computer won't lie. So how do we make it, inside our manmade network, that they have to tread carefully because they don't know what to trust and what not to trust?" Robert BlackListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Psychological Defence in Cybersecurity: How we can use psychological tactics, such as inducing paranoia, in defending against cyber threats.- Effectiveness of Deception: We discuss an NSA study which demonstrates how knowledge of deception impacts penetration testers' speed and decision making.- Human Factors over Technology: We talk about the merits of using human behaviour analysis and psychology alongside technology for cybersecurity strategies.- Corporate Espionage and Misinformation: How to use misinformation and disrupt attackers’ expectations as part of your defence strategy.- A Multidisciplinary Approach to Cybersecurity: We discuss the merits of incorporating diverse perspectives, including arts and philosophy, into cybersecurity education and strategy.- Vendor and CISO Relationships: Why vendors must understand and address the real problems faced by CISOs.- Proactive Defence Strategies: Why we need to move beyond assurance to proactive measures in cybersecurity defence.- Shift in Cybersecurity Mindset: How to progress the growing recognition of cybersecurity as a critical business threat and the importance of improved risk assessments.- Influence of Deception Technology: How we can use fake networks and behavioural economics techniques to manipulate attackers' behaviour.Guest...
47:4529/05/2024
Trust vs Control – Is Zero Trust Inevitable?

Trust vs Control – Is Zero Trust Inevitable?

Welcome back to Razorwire, the podcast slicing through the tangled world of cybersecurity! I'm your host, Jim and in this episode we’re talking about the crucial balance between trusting your workforce and exerting control over your security ecosystem.&nbsp;Joining me are Iain Pye, sharing his insights into privacy roles, and David Higgins from CyberArk, who will discuss the challenges and strategies of effective cybersecurity. Whether you're managing remote teams or integrating third party services, this episode is packed with expert analysis and actionable advice.We discuss:&nbsp;1. Discover how ISO and SOC certifications are shaping the way organisations approach security, as David Higgins analyses the paradigm shift towards a consumer-empowered landscape within cybersecurity.2. Discussion on the interplay between trust and control in the era of remote work, with insights on the importance of effective incident response capabilities, even when resources are lean.3. Learn about pragmatic approaches to vendor risk assessment and understand why a tiered method for evaluating vendor criticality could be pivotal for your cybersecurity strategy.Prepare to challenge your perspectives on cybersecurity's conventional wisdom and join us on Razorwire, where we cut through complexity to bring clarity to the professionals on the digital frontlines.“We've got devices that we no longer own. We've got platforms that we no longer run. We've got data stored in locations we're not responsible for and we've got employees working in environments that would that we've got zero control over. So moving to zero trust so that was it a ‘never trust, always verify mindset’? Makes a lot of sense."David HigginsListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Adjusting Control to Criticality: The more critical the processing and servicing, the greater the expectation of control.- Certifications as Trust Indicators: The importance of obtaining certifications to demonstrate commitment and investment in establishing trust.- Consumer Empowerment Through Software as a Service: How the shift to SaaS models puts more power into consumers' hands, necessitating service providers to meet their security expectations.- Remote Work Security Challenges: How to tackle concerns about trust, control and security in home working environments.- Sensitive Data in Risk Zones: Identifying and dealing with risks associated with employees working in red-listed countries.- Cybersecurity Budgets and Risk Games: How to manage budgets and risk assessments effectively.- Third Party Risk Management: How to implement third party assurance programmes for managing risk and ensuring thorough vulnerability assessment with vendors.- The Evolving Cyber Threat Landscape: How to effectively deal with the rise in targeted phishing attacks through a balance of trust and control for detection and response.- Zero Trust and Continuous Authentication: Why we should focus on implementing zero trust architecture and continuous authentication methods like MFA and biometrics.- Economic Impact on Security Measures: Increasing costs and the economic downturn are major concerns affecting the budgets for security tools, certifications and overall organisational security measures.GUEST BIODavid HigginsDavid is the Senior Director – Field Technology Office at CyberArk. Since joining in 2010, Higgins has worked to help the world’s leading - and most complex - organizations secure and protect their privileged access. Today, he advises clients on threats associated with...
44:3715/05/2024
Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

On this week's edition of the Razorwire podcast, Jim sits down with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy brings her unique entrepreneurial perspective from a non-traditional background, transitioning into cybersecurity.The conversation provides valuable insights for security leaders as Amy candidly discusses her innovative approach to security awareness training through immersive, gamified escape room experiences. She shares her views on critical issues facing the industry today, such as combating AI-enabled disinformation campaigns, addressing the cybersecurity workforce shortage driven by unrealistic job requirements and improving strategic communication between security teams and business executives.Amy's experiences building her company and developing engaging training programmes make for a compelling discussion. Security professionals will gain new insights into creative methods for better educating end users and elevating cybersecurity's importance across the organisation. Her frank opinions and fresh mindset provide a thought provoking perspective for security leaders navigating the evolving threat landscape.Key Talking Points1. Innovative Security Training: Discover how Amy's company uses escape room experiences to teach important cybersecurity concepts, from phishing to insider threats, making learning engaging and memorable.2. Changing Threat Landscapes: Hear about the impact of ransomware on businesses big and small, the evolution of insider risks and how AI is shaping the future of information security.3. The Human Element in Cybersecurity: Gain insight into the importance of strategic leadership in cybersecurity roles and how businesses can navigate the challenges of educating teams and customers about the growing complexity of threats.Tune in for a fascinating discussion that sheds light on new methods of strengthening cybersecurity awareness and the vital role human factors play in protecting our digital worlds."I don't know many people that proactively undertake security awareness training, you know, sitting watching videos and animations and all that kind of thing. I genuinely don't know anyone that does that as a hobby, but I think it's something that's super important."Amy Stokes-WatersListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Cybersecurity Awareness via Escape Rooms: How immersive escape room experiences can be more beneficial than traditional methods utilised in cybersecurity education.- Insider Risk Management: Overcoming the challenges businesses face from internal threats and the risks of employees being exploited by ransomware attackers.- Impact of Cloud Migration on Security: How the shift to cloud computing during the lockdown affected the security of supply chains.- Artificial Intelligence and Disinformation: The dangers of AI in creating and spreading disinformation in geopolitical contexts and its potential risks in cybersecurity.- Cybersecurity in Small Businesses: We discuss the vulnerability of small businesses as integral parts of larger supply chains and the specific security challenges they face.- Career Reflections and Advice: Insights on personal growth in the cybersecurity field and the importance of reflecting on one’s mistakes and learning from them.- Evolving Role of CISOs: How the role of Chief Information Security Officers is changing.- Legal and Regulatory Aspects in Cybersecurity: Discussion on the emergence of cyber law, the importance of effective communication during security...
36:4101/05/2024
Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter

Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter

Welcome to Razorwire! In today’s episode, we take a look at the often-overlooked issue of professional burnout within the cybersecurity field. Joining us are two esteemed guests: Yanya Viskovich, a cyber resilience authority, and Eve Parmiter, a clinical traumatologist and consultant, both of whom bring their interdisciplinary insights to our discussion.Today's conversation uncovers the critical yet not-often-discussed crisis of burnout amongst our cyber defenders. Yanya shares her personal journey through the throes of burnout and her subsequent passion for addressing the human factors in cybersecurity and Eve gives us her clinical perspective, providing an in depth understanding of the steps that lead to burnout and how we can move towards prevention and recovery. Together, we explore strategies for cultivating an organisational culture that is resilient against burnout and the positive repercussions this can have on cybersecurity effectiveness.&nbsp;Key Talking PointsPersonal Insights from the Field: Yanya recounts her dynamic career path and the vulnerable moments of burnout she encountered during the global pandemic, offering listeners a glimpse into the human side of the cybersecurity equation.Clinical Wisdom for Cyber Warriors: Eve, with her therapeutic background, maps out the psychophysiological terrain of burnout and provides actionable tactics for information security professionals to identify and manage their stressors before they escalate.-Building a Burnout-Resilient Culture: Gain critical advice on creating strong, collaborative and health-focused workplace cultures that prioritise learning and vulnerability to fortify against cybersecurity threats as well as professional burnout.Don’t miss out on this conversation, which is more relevant now than ever. Tune in to unlock techniques that will not only defend your organisation’s digital assets but also safeguard the wellbeing of its most valuable guardians - its people.Embracing Failure for Cybersecurity Improvement:&nbsp;"We need to have a tolerance for failure, but an intolerance for incompetence. We need to invite cultures that invite questions and difficult ones, and that invites people to challenge the status quo, to invite people to say, ‘yeah, I've noticed that something's wrong here’, or ‘I see this as a potential risk and I'm raising it.’"Yanya ViskovichListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Appreciation of Crisis Management: A look into how the efforts of infosec professionals are often undervalued, especially when resolving critical issues during crises.- Post-Lockdown Loss of Mentorship: An exploration of the pandemic's impact leading to the exit of experienced professionals from the cybersecurity field and the subsequent loss of mentorship for up-and-comers.- Organisational Culture and Failure: The importance of creating supportive cultures within organisations that encourage learning from mistakes and destigmatising failure.- Human Factor in Cybersecurity: Highlights the crucial role of considering human behaviour and psychology in cybersecurity strategies, alongside technology and process optimisation.- Stress and High Burnout Rates: Insights into the abnormally high stress levels within the cybersecurity industry, leading to significant burnout among professionals.- Industry's Perception on the 'Department of No': Discusses the challenging perception of infosec teams as constructionistic.- Power of Recognition: We...
01:15:5717/04/2024
The Impact of FAIR on Risk Management with Jack Jones

The Impact of FAIR on Risk Management with Jack Jones

Welcome to Razorwire, the cutting-edge podcast where we slice through the complexity of cybersecurity and risk management to bring you insights from industry leaders. I’m your host, Jim and in today’s episode, we unravel the intricacies of FAIR (Factor Analysis of Information Risk) risk methodology with none other than its creator, Jack Jones. Jack’s groundbreaking approach has revolutionised how organisations perceive and approach information security risks. So, buckle up as we dive deep into the mind behind this transformative model.In a fascinating session, Jack shares his journey in developing the FAIR risk methodology and its impact on the business landscape. From facing initial industry scepticism to achieving global recognition, Jack's story is a testament to innovation and perseverance. Alongside the creation of the FAIR Institute and the adoption of his standards across various sectors, Jack also teases his upcoming book focused on the controls analytics model. We discuss the evolving landscape of risk management and the potential for FAIR to automate and improve cybersecurity practices. Get ready to have your perspective on risk quantification transformed!Key Talking Points:1. Demystifying FAIR - Discover how Jack Jones broke new ground with the FAIR risk methodology, demystifying risk management for businesses worldwide and why industry giants are adopting his model to navigate the complexities of cybersecurity.2. Resistance and Triumph - Hear the compelling tale of how Jack overcame industry resistance, with some even suggesting criminal negligence, to establish a new paradigm in risk assessment now embodied in the FAIR Institute and the Open FAIR standard.3. Risk Beyond Cybersecurity - Learn how the versatile FAIR model transcends cybersecurity, influencing financial product design, operational risk measurement and even natural disaster assessments - a testimony to its adaptability and Jack's vision for its future potential.For cybersecurity professionals eager to stay ahead of the curve and to refine their approach to risk management, this episode is not to be missed. Join us on Razorwire to hear the insights and backstories directly from the experts shaping the field.“I did get some positive reactions from people in the industry, but I also got an email from someone in the industry … with a significant following and they wrote me a letter saying that I should be prosecuted for criminal negligence for having published this, that in his view, the word risk should be stricken from the English language.”&nbsp;- Jack JonesListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Fair Risk Methodology Overview: A novel approach to risk assessment that simplifies risk management by addressing subjective probability factors and incorporating control efficacy.&nbsp;&nbsp;- Development and Inspiration: The origins of the methodology and how inspiration from physics led to a new model for measuring control effectiveness in risk management.&nbsp;&nbsp;- Industry Reaction and Growth: An exploration of the initial pushback against the methodology, followed by its adoption by the Open Group and the subsequent rapid expansion globally.&nbsp;&nbsp;- Founding of the FAIR Institute: The establishment of a dedicated institute to provide resources and community engagement around the FAIR methodology.&nbsp;&nbsp;- Advancement through Collaboration: How input from various industry professionals has contributed to the enhancement of the FAIR model, exemplified by the...
41:0603/04/2024
The Real Impact of the Lockbit Ransomware Takedown

The Real Impact of the Lockbit Ransomware Takedown

Welcome to Razorwire, the cutting-edge podcast for cybersecurity professionals, where we unravel the world of information security and peek into the future of technology. I'm your host, Jim, and in today's episode, we're joined by our esteemed guests, Richard Cassidy and Oliver Rochford. We’re taking a deep dive into the recent Lockbit takedown, dissecting the movements in the global cybercrime landscape, and analysing the ongoing conflicts within the commercial industry.&nbsp;Our guests, both veterans in the field, share their insight on the takedown of the notorious Lockbit ransomware group, raising critical questions about the efficacy of such law enforcement actions. We explore the pervasive issues of ransomware as a service, the evolving role of threat intelligence, and the significance of industry collaboration.&nbsp;Additionally, we take a look at the challenges of finding your niche within the hyper-competitive tech market, dissect the misconceptions surrounding threat intelligence and confront the stark realities of the cybersecurity industry's marketing frontlines.&nbsp;Whether you're well into your cybersecurity career or contemplating your next move in the field, this episode of Razorwire is tailored for you.Key Talking Points:1. Inside the Lockbit Takedown: What the headlines don't tell you about the resilience of ransomware groups and why we should remain cautious post-takedown efforts.2. Navigating Cyber Misinformation: Our guests tear apart the misleading marketing tactics in cybersecurity and advocate for a truth-centric industry approach.3. Collaborate to Fortify: Discover the vital importance of cross-organisation intelligence sharing in combating sophisticated cyber threats and promoting stronger defences across the board.Don’t miss out on this candid and informative discussion.&nbsp;"There's a cultural problem when half the industry beats up on someone who discloses a breach. There's a disincentive to disclose breaches or intelligence. And so we need a cultural change there."Oliver RochfordListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Education and Skills Gap: outdated courses and underscores the necessity for ongoing training and adaptability in the information security domain.- Misleading Marketing: the impact of hyperbolic marketing which often overstates the novelty and effectiveness of cybersecurity solutions.- Threat Intelligence: the significance of deriving context from intelligence data and promoting its exchange within the sector.- Cybersecurity Community Strength: the information-sharing culture and reciprocal support among information security professionals.- Understanding Ransomware Complexities: a general lack of awareness around ransomware intricacies, including legal repercussions of ransom payment refusals- Emphasis on Threat Modelling: the importance of businesses understanding their unique threat landscapes and preparing for worst-case scenarios.- Cybersecurity Startups Proliferation: the sheer number of startups entering the cybersecurity space and the concerns about their effectiveness.- Ransomware's Robust Ecosystem: the professional network that underpins ransomware operations, which includes a mix of criminals and nation-state involvement.Resources Mentioned<a href="https://www.nationalcrimeagency.gov.uk/news/nca-leads-international-investigation-targeting-worlds-most-harmful-ransomware-group" rel="noopener noreferrer"...
51:1820/03/2024
The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare

The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare

In this episode, we tackle some of the most pressing issues in the convergence of cyber warfare, information security and political strategy. Our guests, Iain and Chris, share their frontline insights on how the digital realm has become a playground for clandestine operations, where cyber mercenaries are the new knights, rooks and perhaps even the kings.&nbsp;We examine the repercussions and complexities of engaging third party cyber groups for state-sponsored operations, debate the seemingly lucrative appeal of cybercrime and look at real-world examples where the cyber realm has been militarised. Discussions range from the effect of bot networks on democracies, to the specific roles of organised criminal cyber divisions and the evolution of digital espionage.Talking Points:1. The Intricate Web of Cyber Mercenaries: Discover the hidden connections between governments, political factions and cyber mercenaries. We unravel the complex tactics and consequences of outsourcing cyber warfare and the ethical lines that get blurred along the way.&nbsp;2. The Business of Cyber Conflict: We talk about the paradoxical profitability of cybercrime versus the costs of robust defence. We discuss the art of balancing offensive strategies and cybersecurity defences, drawing comparisons between private sector incentives and government backed digital warfare. Professionals keen on risk assessment and cyber strategies will find this conversation particularly interesting.3. Navigating Cybersecurity Governance: Dive into a crucial debate on managing the cyber mercenary phenomenon, filtration in intelligence gathering, and the quintessential role of governance in preventing operational downfall. As we explore the undeniable need for quality defence mechanisms, the insights shared here are invaluable for any professional aiming to stay ahead of cyber threats.Join us on Razorwire, your go-to podcast for cutting through the digital noise, as we delve into a world where cyber conflict is omnipresent and the concept of warfare is forever altered. This is one episode you'll want to replay, decrypt and safeguard in your mental arsenal."It's not like a physical mercenary group where you can see them. They're not blowing anything up. Nothing's going to go bang so people actually notice. So unless a government gets hacked or something happens, unless they shut down the national grid, unless there’s collateral damage that comes with it - they can pretty much hide it away, can't they?"Chris DawsonListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Government and Media Control: Exploring the intersections of government ownership of media and its implications for information security and cyber warfare.Corporate Espionage and Cyber Warfare: Debating the ethical and strategic considerations of engaging in corporate espionage and cyber warfare.Cyber Mercenaries: Examining the rise of cyber mercenary groups willing to conduct cyber warfare operations for hire.Digital Infrastructure Security: Discussing the technical and strategic challenges associated with detecting and defending against compromises in digital infrastructures.Plausible Deniability and Cyber Attacks: Considering the strategy of plausible deniability and its potential to shield governments from the fallout of cyber operations.Monetisation of Cyber Crime: Analysing the profitability and incentives driving skilled cybercriminals and how crime pays in the cyber realm.Cyber Warfare and Political...
45:0606/03/2024
Trends in Identity and Access Management with Simon Moffatt

Trends in Identity and Access Management with Simon Moffatt

Hello Razorwire listeners! It's your host Jim here, and in today's fascinating episode, we sit down with cybersecurity veteran Simon Moffatt. With two decades under his belt in the dynamic field of identity and access management, Simon unpacks the complexities of cyber protection in our modern age. From the evolution of technology to the murky waters of liability and insurance in cybersecurity, Simon's insights shed light on the challenges and trends we face.&nbsp;As the founder of The Cyber Hut, Simon taps into his experience with giants like Oracle and ForgeRock and his startup stints to guide organisations through the labyrinth of cybersecurity strategies.&nbsp;We talk about the seismic shifts in industry practices, highlighting the advent of cloud technologies and "as a service" models and the post pandemic rise of remote work. We explore the forefront of passwordless technology, the challenges of IoT security, and the critical nature of defence in depth strategies.You’ll hear about a significant legal battle that a sizable organisation won against its insurers, highlighting the larger uncertainties in cyber liability insurance. Find out about Simon's predictions for the industry's trajectory, combined with his first hand accounts of working in various sectors of the tech world, to provide a rare glimpse into the past, present and future of cybersecurity.Key Talking Points:1. The Transformation of Cyber Liability Insurance: Discover why a major organisation's legal victory signals a critical juncture for cyber liability coverage and what this means for businesses navigating today's risk landscape.2. Passwordless Futures and Biometric Booms: Tune in as Simon forecasts the rise of biometric authentication over the next few years, discussing how behaviour tracking could redefine threat detection and response.3. Cloud Confusion and Shared Responsibilities: Uncover the intricacies of cloud service models and how shifting boundaries have resulted in complex challenges for CISOs and CIOs in pinpointing control and ownership amidst a virtual landscape.Ready for a deep dive into cybersecurity's evolving realm with Simon Moffatt? Join us on Razorwire to unravel the enigma of cyber protection in our interconnected world.“Cyber's a top priority, maybe even more so than it was 3 or 4 years ago. By that, I mean people are quite familiar with protecting their own identities, or PII protection. People are aware of hackers, you know, the bad guys, nation state threats."Simon MoffattListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Concerns and challenges surrounding data protection liabilityThe problems of uncertainty due to the constantly changing landscape of cyber liability insuranceIncomplete picture of cybersecurity with third party intelligence companiesThe limitations of third party intelligence companies in the cybersecurity space&nbsp;Trends in identity and access management&nbsp;Introduction to The Cyber Hut, a business focused on tracking cyber trends and aiding organisations in navigating the cybersecurity landscapeThe shift towards cloud technology, remote work and changes in software deliveryThe blurred lines of responsibility in cloud services are explored, raising questions about data ownership and controlThe need for agility, modularity and preparedness in systems following the pandemicGUEST BIOSimon MoffattSimon is a recognised expert in the fields of digital identity, access and information security who assists organisations in the...
45:5621/02/2024
Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.In this episode, our guests shed light on the challenges and intricacies of navigating the cyber security legislature, focusing on the impact on critical infrastructure and the evolving landscape of compliance. From managing connectivity safely to the complexities of integrating IT and OT in modern manufacturing, we explore the key factors influencing cyber security legislation and its practical implications.Key Talking Points:1. The importance of managing connectivity safely and ensuring proper segmentation and visibility in the Niz legislation.2. Challenges faced by organisations, such as Sellafield, in implementing controls and recognising legacy challenges in OT environments.3. The impact of conflicting regulations on consumers and the need for practical compliance requirements in cyber security legislation.“We can't let FUD be the guide, right? If every time we hear a thing, we start panicking and we deviate from our processes and start making a whole bunch of new mandates, even internally, all the people within a company that have to track that and follow it and meet with people, and it's a distraction, I think, from real security."Steve Applegate - DragosListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Managing Connectivity Safely: Emphasising the need to ensure proper segmentation and visibility in cyber security legislation.Challenges Faced by Organisations: Discussing the difficulties in implementing controls, recognising legacy challenges, and the importance of proportional controls.Conflicting Regulations and Consumer Impact: Raising concerns about conflicting regulations and the impact on consumers due to compliance costs.Information Exchange Hesitance: Discussing the hesitance of information exchange for cyber security purposes and its impact on managing threats.Reporting Dilemma: Describing the challenge of eradicating cyber events and the dilemma of reporting to the public versus mitigating further attacks.Third-Party Oversight Frustrations: Addressing the frustration with third-party involvement in security oversight and assessment processes.Transparency in Security Relationships: Advocating for transparent and trust-based relationships with third parties, emphasising actionable intelligence, and fostering transparency.Evolving Skill Set of Security Professionals: Describing the evolving skill set of security professionals, particularly the increasing specialisation and separation from GRC.Legislative Impact on OT Environments: Expressing concerns about the impact of legislation and compliance on operational technology environments and the difficulty of implementing changes in systems with old technology.Challenges of Sudden Legislative Changes: Discussing the challenges of sudden legislative changes, public outcry influencing legislation, and the need for realistic expectations of change in a legacy industry.Resources Mentioned- Dragos- Sellafield<a...
55:3607/02/2024
Cybersecurity in 2024: Expert Predictions You Need to Know

Cybersecurity in 2024: Expert Predictions You Need to Know

Welcome to Razorwire, the podcast for all things cybersecurity and information security. I'm your host, Jim, and today we have a thought-provoking discussion with industry experts Iain Pye and Chris Dawson about emerging cybersecurity threats and trends to watch out for in 2024.In this episode, we dive into three key talking points that are essential for cybersecurity professionals to listen in on:The accelerating risk of ransomware and data breaches, including the increasing need for continuous security testing and the challenges of balancing security tool costs with limited budgets and the speed required to adapt.The use, impact and potential threats of artificial intelligence on major global events including the elections coming up in 2024, in the context of societal and political manipulation, as well as the rising risks of identity theft, sophisticated disinformation and deep fake technology.The importance of operational resilience plans, the challenges of compliance and auditing processes, and the need for improved cybersecurity standards and training.Tune in to gain insights from leading experts in the field on how organisations can prepare for the cybersecurity challenges of 2024.&nbsp;"What's your operational resiliency plan? How is your organisation going to have to learn the hard truths? Take a really hard look at what you're doing and go: if that falls over or it gets breached, can we keep running our business?"Iain PyeListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Technology vs. training: security advancements outpacing public knowledge- Complex compliance: regulation challenges for smaller organisations- Cybersecurity testing shift: from annual to continuous- Offensive and defensive AI use anticipated to increase in 2024- Reviewing technical security solutions and policies- Budget struggles: balancing security tools and costs- Call for government prioritisation in security training- Importance of basic security measures- Mistrust in mainstream media and information sources- Artificial intelligence: potential risks and benefitsResources MentionedGDPRSECAICyber EssentialsCSFIOther episodes you'll enjoyThe Use Of AI In Cybersecurity – Consultants Roundtablehttps://www.razorthorn.com/the-use-of-ai-in-cybersecurity-consultants-roundtable/Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall<a href="https://www.razorthorn.com/lessons-from-an-infosec-icon-a-fireside-chat-with-pci-guru-jeff-hall/" rel="noopener noreferrer" target="_blank"...
58:3924/01/2024
Beyond Buzzwords: The Truth About AI

Beyond Buzzwords: The Truth About AI

Hey there, Razorwire listener! In this episode, we welcome back cybersecurity experts Richard Cassidy and Oliver Rochford to follow up on our AI podcast back in November. Join us for spirited debates on the current state of AI capabilities, their imminent impacts on society and business, and thought-provoking speculation on the future of AI and its existential promise and perils.We tackle AI topics ranging from innovations like large language models to the role of quantum computing, governance challenges and regulatory responses, workforce disruptions, and the potential for artificial general intelligence. You'll come away with an insider's perspective on AI progress and get beyond the hype to understand real-world limitations and applications.From actionable business advice to philosophical discussions on the human condition, the Razorwire podcast offers incredible insights from industry veterans Oliver and Richard. Learn about investments, cybersecurity issues, ethical considerations, the AI "arms race," and transhumanist ideals spanning neural implants to robot bodies.Whether you're making strategic decisions in your company, tracking public policy issues, or just want to sound informed on emerging tech, the Razorwire podcast delivers the context and perspectives needed to evaluate AI's present impact and future potential with wisdom. Tune in for enlightening analysis you won't get from sensationalised media reports. Every episode offers rare clarity to think smarter about technological forces shaping society."I don’t believe we know humanity is not ready for AGI. We haven’t evolved in the way that we think, and as I said, our colloquial, war-minded economics today to actually even have AGI benefit the planet." Richard CassidyListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:AI Development Accessibility: The current challenges of the development of AI technology.The future of artificial general intelligence (AGI): The conversation delves into the future of AGI and its potential impact on society.Ethical and Existential Concerns: AI's potential implications for society, humanity, and the labour force raise ethical and existential concerns.Business Responsibility: Business leaders are responsible for managing AI technology and should view it as augmenting the workforce.AI for Global Solutions: AI technology has the potential to address serious global problems if used responsibly.Advancements in Human Health: Some advocate for the use of AI to develop new technologies to improve human health and capabilities.Lack of Global Legislation for AI: Concerns are raised about the lack of global legislation for AI and its potential implications for businesses.AI in Military and Autonomous Robots: We discuss the potential implications and ethical concerns of AI technology for building autonomous robots and weapons.AI Regulation and Consequences: We explore the fear of and potential consequences of regulating AI technology.Resources MentionedMoore's LawNeuralinkFermi's Paradox<a href="https://chat.openai.com/" rel="noopener noreferrer" target="_blank"...
01:06:3910/01/2024
Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

Welcome to Razorwire, the podcast where we cut through the tangled web of cybersecurity to bring you the latest insights and expert analysis. Victor Acin and Oliver Rochford, two esteemed guests, are with me in today's episode.In this episode, we’re exploring the dangerous world of cybercrime as a service and its implications for individuals, organisations, and even nation-states.Join us this week as we unveil the dark side of cybercrime. Victor, the Head of Threat Intelligence at Outpost 24, shares his expertise on the rise of cybercrime as a service. Discover how cybercriminals have adapted their tactics, the motivations driving their actions, and the alarming ease with which they operate.Stay ahead of the game with insider knowledge from Oliver's research, where he discusses the striking similarities between cybercrime services and legitimate tech services. Learn about the techniques used by cybercriminals to infiltrate organisations and exploit their vulnerabilities.&nbsp;Whether you're a seasoned professional or just starting your cybersecurity journey, this episode offers some excellent, practical advice for strengthening your defences. We share some effective ways to protect against credential theft, insider threats, and targeted attacks. Hear about tried and trusted remedies recommended by our experts that can make a significant impact on securing your organisation.So, if you're a cybersecurity professional looking to expand your knowledge and sharpen your skills, join us on Razorwire as we unravel the intricate world of cybercrime as a service.Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following:The evolution of cybercrime into an as-a-service model, where specialised services and infrastructure are available to carry out different elements of cyberattacksThe low barriers to entry for new cybercriminals of this business-like modelThe recent rise in credential theft through the use of simple malware toolkits, which allow even unskilled cybercriminals to distribute malware and steal credentials at scaleEstablished cybercrime groups that offer ransomware and even entire cyberattack infrastructure in an as-a-service model. This comes complete with support services for affiliates conducting attacksThe flexibility offered to cybercriminals from a modular services model, which offers mix-and-match attack components from different providers specialising in access, malware, ransomware, money laundering, etc.&nbsp;How cybercriminals choose or decide against their victimsHow the rise of untraceable cryptocurrencies has removed obstacles to monetising and laundering profits from cybercrime, fueling growthWhether or not having easy access to cybercrime services could facilitate corporate espionage and what examples we haveThe importance of threat intelligence—understanding the motives, tools and trends in cybercrime—is vital context for effectively securing against the evolving threat landscapeGUEST BIOSOliver RochfordOliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and...
47:1820/12/2023
SolarWinds’ CISO Under SEC Scrutiny: The Impact On The Infosec Community

SolarWinds’ CISO Under SEC Scrutiny: The Impact On The Infosec Community

Welcome to Razorwire, the podcast where we cut through the noise to bring you incisive discussions on all things cybersecurity. I'm your host, Jim, and in today's episode, we delve into the SEC charges against SolarWinds CISO, a case that has sent shockwaves through the infosec community.In this episode, our guests Iain Pye and Chris Dawson discuss the hype surrounding the trial, its impact on the infosec community, and the potential consequences for all Chief Information Security Officers (CISOs).&nbsp;We also explore the uncertainties surrounding the CISO's responsibilities and actions within the organisation regarding addressing security vulnerabilities, as well as the potential implications of the SEC ruling on CISOs' risk aversion and self-interest.Lastly, we talk about the dynamics of security compliance certifications and the potential manipulation involved in obtaining them.If you're a cybersecurity professional, join us as we dissect the complexities of CISO responsibilities, the SEC's pursuit of individuals over organisations, and the implications of legal actions on the infosec landscape.&nbsp;Tune in for an insightful discussion that will challenge your perspectives and keep you on the cutting-edge of cybersecurity issues."Companies are now telling victimised organisations not to produce an incident response report or similar or any type of report. Any such report should be delivered verbally or kept off any electronic or paper documents as much as possible as they could be subpoenaed in future lawsuits and may reveal that the company to be at fault."Iain PyeListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we cover the following topics:- The aftermath of the SEC charges against SolarWinds CISO and the debate surrounding the implications for the infosec community- The challenges and potential issues surrounding auditors' understanding of risk management and cybersecurity processes- Discussion of internal messaging about cybersecurity vulnerabilities within SolarWinds and potential misrepresentation of cybersecurity practices- The impact of underfunding on information security departments and the challenges faced in training and securing environments- The potential for individuals to whistleblow on security vulnerabilities and the SEC's regulatory role to hold organisations accountable- The debate on the extent of the CISO's authority within the organisation and the support required from the board in addressing security vulnerabilities- The potential impact of the SEC ruling on CISO decision making and the resulting risk averse behaviour- The potential impact of pressure from insurance companies and the SEC's focus on shareholder rights and company ethics- Suspicions of misrepresentation and potential manipulation in obtaining security compliance certifications and ISO audits- The role of CEOs and senior management priorities in influencing cybersecurity practises and certificationsResources Mentioned- SolarWinds- SEC (U.S. Securities and Exchange Commission)- ISO 27,001<a href="https://www.comptia.org/blog/what-are-the-best-cybersecurity-certifications" rel="noopener noreferrer" target="_blank"...
01:07:1106/12/2023
Decoding Generative AI: Myths, Realities and Cybersecurity Insights

Decoding Generative AI: Myths, Realities and Cybersecurity Insights

In the latest episode of the Razorwire podcast, I am delighted to welcome back our esteemed cybersecurity professionals, Oliver Rochford and Richard Cassidy. Today, we delve into the fascinating realm of generative AI and its applications in the cybersecurity landscape.We kick the episode off with an overview of generative AI. We discuss how it works and its training on extensive datasets to infer statistical relationships between words and concepts. While major cybersecurity vendors such as Google, CrowdStrike, SentinelOne, and Microsoft have announced integrations with generative AI, Oliver issues a cautionary note, highlighting that its capabilities are often subject to overhype.We discuss the accuracy of generative AI's representation in the business community. Listen in to hear our consensus: Is it possible for generative AI to live up to the advanced AI depicted in science fiction?Delving into practical cybersecurity use cases and exploring risks associated with explainability, trustworthiness of outputs, and potential regulatory implicationsThe aim of this episode is to give you valuable advice for venturing into the realm of generative AI. Tune in to the Razorwire podcast for an in-depth exploration of this evolving technology.Andrés Horowitz has said that 80% of all of the investment in the generative AI startup goes on compute costs. They worked out that one training run on GPT, I think, 3.5 costs somewhere between half a million to $3,800,000. Is it even affordable?"&nbsp;Oliver RochfordListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- Big Tech's control over the conversation and concerns about AI- Inconsistencies in the guidelines and censorship policies of platforms like Spotify, Apple, and YouTube limit what can be discussed and criticised.- The limitations and potential dangers of Artificial Generative Intelligence&nbsp;- The different opinions and viewpoints surrounding NFT technology and its impact and significance- Importance of not overhyping NFTs and allowing for experimentation and exploration of new use cases- Limitations of Gen AI tools, particularly in terms of explainability, interpretability, and trustworthiness of data- Advising caution when utilising AI tools for security purposes and the importance of trust and verification- How AI tools can help with paralysis and confusion in data analysis- Examining the high valuation of OpenAI and people's unrealistic expectations of AI due to Hollywood portrayals- Exploring the potential of AI-powered language models like Chat GPT, their integration into various products, and the need to avoid false informationGUEST BIOSOliver RochfordOliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner,  Tenable and Securonix and is currently Chief Furitist at Tenzir, where he works on product strategy and marketing.&nbsp;&nbsp;Richard CassidyRichard Cassidy has been consulting to businesses on cyber security strategies and programs for more than two decades, working across...
50:2522/11/2023
Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall

Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall

Hello and welcome to Razorwire, the podcast where we delve into the world of cybersecurity with top experts and industry leaders. I'm your host, James Rees, and I can't wait to share this episode with you. As a PCI DSS QSA, I’m delighted to have PCI expert Jeff Hall as my guest today.This episode will give you a unique perspective on how security has evolved from early mainframe days to today's interconnected, risk-focused practises. Jeff tells us about his hard-won lessons and wisdom gathered over decades steering information security programmes, including the need for compliance to work alongside overall security and not hinder it, and why auditors should be viewed as allies, not adversaries.We give you some unique insights on the upcoming PCI DSS v4, the changes we can expect, and what we should be prepared for. We also talk about the issues that shortened CISO tenures create and how this can hinder long-term security progress. Learn why it’s important to focus on the big picture when it comes to security goals rather than getting distracted by minutiae.We cover a wide range of subjects throughout this episode, with some really useful takeaways. One of the key points, and I really must agree, is the importance of matching security priorities to business risk, not compliance checklists. Jeff gives us his advice on focusing on the appropriate controls for what you aim to protect.&nbsp;For CISOs, security leaders, and practitioners at all levels, you’ll gain insight into building effective programmes that deliver real protection. Tune in to level up your approach with advice from this industry luminary and compliance guru.So, if you're ready to up your cybersecurity game, join us on Razorwire. Stay informed, connected, and inspired. Together, we can build a safer digital world. Let's get started!Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:- The importance of cybersecurity in e-commerce- Identifying the main problems of managing website vulnerabilities- Discussing the need for implementing specific tools to comply with regulations- Exploring concerns about customer data security, effectively monitoring alerts and meeting requirements- How the increasing costs and complexity of audits could lead to organisations rejecting compliance requirements- How to streamline security programmes and focus on essentials- The challenges of security and deployment in cloud environments- How to prioritise the overall security programme and how not to get lost in minor details or problems- The lack of leadership in the information security industry and the short tenure of CISOs- The shortage of qualified infosec professionals and why we should be supporting mentorship and apprenticeshipGUEST BIOSJeff HallJeff Hall is a principal security consultant at Truvantis, Inc.&nbsp; Jeff has over 30 years of technology and compliance project experience.&nbsp; Jeff has done a significant amount of work in financial institutions, health care, manufacturing, and distribution industries, including security assessments, strategic technology planning, and application implementation.&nbsp; Jeff is part of the PCI Dream Team, a co-author of ‘The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management’ and the writer of the PCI Guru blog (http://pciguru.blog).Resources MentionedRazorthorn’s...
50:4108/11/2023
The Use Of AI In Cybersecurity - Consultants Roundtable

The Use Of AI In Cybersecurity - Consultants Roundtable

Hello, and welcome to Razorwire. This week, I've had a great time discussing the fascinating topic of artificial intelligence (AI) and its potential impact on our industry, with my esteemed Razorthorn consultants, Tom, Jamie and Michael. We explore the different types of AI, including machine learning and chatbots, and discuss the challenges of achieving a low false positive rate and high general application.You'll gain valuable insights into the evolution of AI and why we MUST take seriously the very real potential for malicious actors to use it for nefarious purposes. We'll also be highlighting the significance of incorporating security measures into AI development and the need for responsible implementation.By the end of this episode, you'll have a comprehensive overview of AI and its potential risks and benefits in the future of cybersecurity. So join me as we explore this exciting and important topic, and take away key insights that will help you stay ahead in the ever-changing world of cybersecurity."The reality of it is AI is a set of predefined algorithms for a compute standard to take in data, process that data, and then come out with a prediction, and that is impacted number one by the data that's being put into it but also the algorithms and controls that are set by the human factor programming that in."Tom MillsListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Overview of AI in Information SecurityMichael gives us an overview of different types of AI, including machine learning and chatbots, and how they are implemented in information security.Difference between True AI and Current State of AIWe talk about difference between true AI and machine learning.Challenges of Achieving Low False Positive Rate and High General Application and how to improve accuracy.AI ImplementationThe consultants discuss ways of reducing risk and false positives in data discovery and leakage solutions.Evolution of AIThe evolution of technology and the reality of whether AI will really replace jobs.AI and Malicious ActorsThe consultants discuss how AI has increased the pool of unsophisticated threat actors who can use AI engines to conduct successful attacks.Behavioural Analysis ToolsDiscussion on the use of behavioural analysis tools in detecting breaches and how they work.Chat GPT and its LimitationsDiscussion on the limitations of chat GPT and the potential for it to be used maliciously, as well as the potential for AI to develop biases based on the data it is trained on.Quality Data for AIThe importance of quality data for AI and the process of stripping out unnecessary information to train AI models.Ethics and Limitations of AIThe limitations of AI and the ethical considerations surrounding the data sets used to train AI models.Regulatory Compliance Standards for AIThe lack of regulatory compliance standards for controlling AI and the potential consequences of malicious actors using AI for cyber attacksThe need for a kill switchThe importance of having a kill switch in AI to prevent it from going rogue and causing harm.The possibility of true AIThe consultants talk about the possibility of achieving true AI, which is self-aware and can disable a kill...
52:4225/10/2023
Cyber Insurance - Does it Create More Problems than it Solves?

Cyber Insurance - Does it Create More Problems than it Solves?

Welcome to Razorwire, where we and our expert guests tackle the issues and opportunities in the world of cybersecurity. In this episode, we explore the challenges and issues faced by the cyber liability insurance industry.&nbsp;&nbsp;This podcast looks into the complex challenges surrounding cyber insurance, an increasingly crucial topic for security leaders and organisations. Join your host James Rees and cybersecurity specialists Chris and Iain, as they engage in an enlightening discussion about the problems with cyber insurance.&nbsp;&nbsp;Learn why the dynamic nature of cyber risk has left insurers playing catchup, leading to unfavourable policy terms, skyrocketing premiums and growing frustration for customers. Gain insights into the systemic impacts of ransomware attacks on insurers along with the immense stresses faced by CISOs navigating insurance responsibilities. Discover innovative ideas like continuous security ratings and improved regulations that could transform the broken cyber insurance model.&nbsp;&nbsp;Whether you're a business leader, security professional or just interested in staying informed, this podcast delivers an array of useful take aways to understand the cyber insurance quagmire. Expect an insightful and engaging discussion on this mission-critical topic. Tune in now to stay ahead of the game in the ever-evolving world of cybersecurity.&nbsp;And that’s why you’re better off insuring yourself!&nbsp;&nbsp;Iain Pye&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listen&nbsp;&nbsp;In this episode, we covered the following topics:&nbsp;&nbsp;The challenges insurance companies face in properly assessing and pricing cyber risk due to its constantly evolving nature.&nbsp;How restrictive policy terms around "acts of war" have made it difficult for companies to receive payouts after attacks.&nbsp;The lack of cybersecurity expertise and rigorous due diligence conducted by many insurance firms before issuing policies.&nbsp;The skyrocketing cost of cyber insurance premiums and difficulty obtaining comprehensive coverage.&nbsp;The problem of companies being unable to get insured after a breach has already occurred.&nbsp;How the increase in ransomware attacks creates systemic risk for insurers paying out multiple policies.&nbsp;The stress and burnout faced by CISOs and cybersecurity leaders related to insurance coverage responsibilities.&nbsp;The importance of cyber defence planning beyond just having an insurance policy.&nbsp;How continuous security assessment models could help provide better assurance to underwriters.&nbsp;The need for improved security regulations and standards for the insurance industry to base policies on.&nbsp;The benefits of self-insuring cyber risks versus relying solely on external insurance.&nbsp;&nbsp;&nbsp;GUEST BIOS&nbsp;&nbsp;Iain Pye&nbsp;Iain is a Cybersecurity, Data Protection and Risk Specialist with over 20 years of experience in the public and private sectors. Iain has worked in a range of industries from finance, legal, security and government. When Iain is not fighting fires or arguing personal data ethics, Iain likes exploring the world with his family and occasionally going for a run through the Fens with the dog. If the dog is up for it, which she is usually not.&nbsp;&nbsp;Chris Dawson&nbsp;Chris Dawson is a former Royal Marine of 11 years. He moved into the private security sector in
55:1311/10/2023
The Human Psychology Behind Cybersecurity With Bec McKeown

The Human Psychology Behind Cybersecurity With Bec McKeown

Welcome to Razorwire, the podcast that explores the intricate world of cybersecurity. I'm Jim, your host, and on this episode, we have a fascinating guest joining us: Bec McKeown, a renowned expert in the psychology behind security. This episode is a must-listen for cybersecurity professionals for three key reasons:Firstly, Bec delves into the challenges of conducting investigations and spotting deception in the cybersecurity field.&nbsp;Her&nbsp;insights will equip you with the tools to identify suspicious behaviour, such as stealing or leaking sensitive information.Secondly,&nbsp;she&nbsp;addresses&nbsp;the crucial skill of effectively communicating risks to higher-level executives without instilling fear. Understanding the psychology behind this communication is vital for cybersecurity professionals seeking to navigate the boardroom and gain support for their security measures.Lastly, Bec sheds light on building trust within the cybersecurity community, dispelling fears of punishment for reporting mistakes or risks.&nbsp;Her&nbsp;expertise in psychological techniques and team building will give you valuable strategies for fostering an environment of collaboration and trust.So, cybersecurity professionals, get ready to dive into the fascinating world of the psychology behind security with Bec McKeown on this episode of Razorwire.“… for me, it's all part of this cognitive fitness thing that you have the agile thinking and the cognitive techniques to do decision making and that sort of thing. But there's also understanding yourself. Where are you as a person? What are your strengths, what are your weaknesses, development needs or the areas where you're not so great at things.”&nbsp;Bec McKeown&nbsp;Listen to this episode on your favourite podcasting platform:&nbsp;https://razorwire.captivate.fm/listen&nbsp;In this episode, we covered the following topics:●&nbsp;Complex cybersecurity&nbsp;and&nbsp;agile thinking skills●&nbsp;Influence, language&nbsp;and understanding for effective communication●&nbsp;Investigation challenges, spotting deception&nbsp;and overcoming fear●&nbsp;Understanding different groups&nbsp;for effective&nbsp;collaboration●&nbsp;Learning&nbsp;how&nbsp;to engage with different individuals&nbsp;●&nbsp;The two ways in which the brain works: system one (fast, instinctive) and system two (rational)●&nbsp;How cognitive narrowing during&nbsp;a&nbsp;cybersecurity crisis affects confidence●&nbsp;Tips for managing and handling crises effectively●&nbsp;Burnout risks&nbsp;and how to avoid them&nbsp;in high-stress infosec careers●&nbsp;Building resilience: individual and organisational responsibilities●&nbsp;The importance of recognising symptoms, empathy&nbsp;and self-awareness●&nbsp;Teaching critical thinking and mentoring effectively●&nbsp;How to use stories&nbsp;for knowledge application and understanding.GUEST BIO&nbsp;Bec McKeownBec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes industries, including the UK Ministry of Defence.&nbsp;The knowledge and insights gained from this research have given Bec a unique perspective on the ways humans react in times&nbsp;of crisis, and she is an experienced speaker and thought leader on the psychology of human performance in cybersecurity.&nbsp;In 2019, Bec established Mind Science, an organisation dedicated to assisting companies at both operational and strategic levels. Her primary focus revolves around leveraging psychological principles to...
57:2127/09/2023
DORA Compliance Made Clear Essential Training for Safeguarding Financial Institutions w Paul Dwyer

DORA Compliance Made Clear Essential Training for Safeguarding Financial Institutions w Paul Dwyer

Welcome to Razorwire, the podcast that cuts through the noise and delivers the sharpest insights in the industry. I'm your host, Jim, and I am thrilled to have you join us for another episode packed with cutting-edge information.Now, I know you're constantly bombarded with countless podcasts and resources vying for your attention, but let me give you three compelling reasons why Razorwire should be at the top of your playlist.Firstly, we have a very special guest today: Paul C Dwyer. Paul is a leading expert in the field and will be sharing his expertise on DORA, the Digital Operational Resilience Act. He'll be diving deep into the testing requirements outlined in DORA, for organisations of different sizes. This is crucial information for staying ahead of the game and ensuring your organisation is resilient in the face of cyber threats.Secondly, we will shed light on the presence of "snake oil" salespeople in the security industry and the importance of credible expertise. With the ever-increasing complexity of cybersecurity, it's essential to navigate through the noise and rely on trustworthy guidance to meet DORA requirements effectively.And last but not least, Paul tells us about his own academy called DORA Training EU, offering non-technical, business-led training courses aligned with EU strategy. He tells us about the highly popular DORA Certified Compliance Specialist course and the bonus module that will equip you with practical implementation knowledge using the NIST cybersecurity framework. This is a fantastic opportunity to enhance your skill set and gain a competitive edge in the industry.So there you have it, cybersecurity professionals! Join us on Razorwire as we delve into the world of DORA, unravel the complexities of compliance, and equip you with the knowledge and skills needed to protect your organisation from data breaches and attacks. Get ready for an enlightening episode filled with actionable insights.&nbsp;“There needs to be a mindset change when it comes to this digital society and digital economy that we operate in. Cybersecurity and cyber risk management is an investment, not a cost.”Paul C DwyerListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:DORA testing requirements: Discussion on the testing requirements outlined in DORA for financial organisations.Differences for small organisations: How do the testing requirements differ for small organisations compared to larger ones?Importance of Resilience: Emphasis on the importance of resilience and the ability to identify and respond to data breaches and attacks.Opportunity for Improvement: What opportunities does DORA presents for the financial sector to improve and become more efficient?Beware of "Snake Oil" Salespeople: Warning about the presence of unreliable salespeople in the security industry and the need for credible expertise.Training Courses for DORA Compliance: Discussion on the training courses available, including the DORA Certified Compliance Specialist course.Online Delivery and Constant Updates: An explanation of how the training courses are delivered online and the importance of staying up to date.Leveraging the Cybersecurity Industry: Emphasising the importance of leveraging the expertise of the cybersecurity industry appropriately.Compliance is not Just Regulation: Discussion on how compliance is about protecting the business and its customers, not just...
43:3713/09/2023
Modern Cybersecurity: Post Pandemic Review Of Defence in Depth

Modern Cybersecurity: Post Pandemic Review Of Defence in Depth

Welcome to the Razorwire podcast, where we explore the latest trends and insights in the world of cybersecurity.In this episode, we delve into the topic of defence in the post pandemic world with our esteemed guests, Jonathan Care and Christopher Fielder. We talked about why it’s more important than ever for organisations to adequately adapt their cybersecurity capabilities to meet the requirements of remote working and why it’s essential to have multiple layers of security to detect and respond to threats before they reach critical endpoints.&nbsp;During our conversation, we discussed the importance of due diligence when considering a cloud-first approach or involving a detailed supply chain. We also highlighted the challenges faced by security teams and departments during the pandemic, as well as the rise of ransomware groups and the use of AI in cybersecurity.&nbsp;"The pandemic has really shown that we need to be more agile and more adaptable."Jonathan CareListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:The breakdown of the traditional network perimeter.Changes in management styles and the need for a radical reset.The impact of the pandemic on different sectors, such as retail and finance, and the dramatic shift in consumer behaviour.Transition to remote work [00:09:17] Discussion on the impact of the pandemic on the traditional network perimeter and the shift to remote work, including the subordinate relationship between security and IT teams.The focus on AI and machine learning to compensate for the lack of skilled infosec professionals.The impact of AI on defence in depth and the risks of implementing AI within an organisation without considering security.The flaws in relying solely on endpoint security&nbsp;How working from home has exposed flaws in security architectures and highlighted the rise of cyber threats.What is the traditional approach to defence in depth, and how has it been adapted to changes in technology and working environments.What are the difficulties organisations face when it comes to re-engineering defence in depth, such as budget, and how to overcome them.The importance of due diligence in cloud and supply chain security&nbsp;An example of a defence in depth breakdown.Asset-based security and the importance of 2FA.GUEST BIOSJonathan CareJonathan Care is a recognised expert in the field of cybersecurity &amp; fraud detection. A former top-rated Gartner analyst, Care was responsible for defining the Fraud market, and leading Gartner’s Insider Threat and Risk research. He regularly advises cybersecurity industry leaders on strategic growth and has worked with key figures in industry and government across the globe. He is a lead contributor for Dark Reading, an industry-defining publication. He has testified in court as an expert witness and forensic investigator and is a Fellow of the British Computer Society. He also fuels his creative passion as a composer of film/TV music.&nbsp;&nbsp;Social media: @jonathanhcare &amp; https://linkedin.com/in/computercrime&nbsp;&nbsp;Chris FielderChristopher Fielder has been in the cybersecurity world for over 20 years, with experience in a range of military, government, and corporate environments. From this background, Christopher holds 18 industry certifications along with a Master's Degree in...
43:1230/08/2023
The Effects On Cybersecurity & Infosec of Economic Downturns

The Effects On Cybersecurity & Infosec of Economic Downturns

Welcome to this episode of the Razorwire podcast, where my guest, renowned cyber security expert Oliver Rochford, and I explore the impact of economic downturns on the cybersecurity industry and how it affects professionals in the field.We discuss the current economic climate and the challenges it poses for the industry, with inflation on the rise and smaller banks struggling to keep up. We also examine the effects of previous economic downturns and how they impacted the industry, along with what we should have learned from them.We also discuss the trend of vendor consolidation in the industry, the shortage of cyber security professionals, and the emergence of financial operations, and how to turn these to your advantage.We also touch on the impact of COVID-19 on the industry and the importance of adapting to changing economic conditions.So, if you're a cybersecurity professional looking to stay ahead of the game, this episode is a must-listen."We've had a long period of really cheap money. We've had really high exits, and that money needs to seek a return. If you've just made a hundred million dollars and you put it in the bank, you're basically going to get eaten up by inflation. So you need to invest it into something, right?"Oliver Rochford&nbsp;&nbsp;&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listen&nbsp;&nbsp;In this episode, we covered the following topics:The impact of economic downturns on the cybersecurity industry&nbsp;&nbsp;The effects of a downturn in spending on cloud-related security: why many organisations are looking to reduce cloud and SaaS licencing spend&nbsp;What we should have learned from past economic crises, including the dot-com bubble and the 2007-2008 credit crunch&nbsp;&nbsp;Why organisations are consolidating vendors in this economic downturn&nbsp;&nbsp;The financial challenges faced by mid-size companies looking for cybersecurity solutions&nbsp;&nbsp;&nbsp;The shortage of experienced infosec professionals and the impact of the great recession on the industry during economic turmoil&nbsp;The opportunities that technological advancements offer to refocus your career and why you need to get ahead of the curve&nbsp;Seizing the opportunity to start your own company&nbsp;The benefits of standardisation in the industry and the shift towards more sustainable business models&nbsp;Advice on efficient budget allocation in a time where budgets are being squeezed, including consolidation and being smarter with technology&nbsp;How to overcome the challenges of complying with security standards on a smaller budget&nbsp;Embracing automation in cybersecurity&nbsp;&nbsp;GUEST BIOS&nbsp;&nbsp;Oliver Rochford&nbsp;Oliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online, and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation, and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner,  Tenable, and Securonix and is currently Chief...
38:0616/08/2023
Breaking Into Cybersecurity: Essential Tips for Newbies

Breaking Into Cybersecurity: Essential Tips for Newbies

Welcome to this episode of Razorwire, where my guest, Stefania Chaplin, and I jump into the topic of cybersecurity for newbies.Starting a new career in any industry can be a baptism of fire, but there are definitely certain things that can help you in cybersecurity. Today, we explore the key skills all good cyber recruits should be aware of as well as what constitutes a good security mindset. We highlight three key takeaways from the podcast that will be valuable for not only new recruits, but all cybersecurity professionals.&nbsp;&nbsp;We discuss the importance of effective communication with different audiences and how to gain buy-in from team members when implementing security policies.&nbsp;&nbsp;We also cover the changing landscape of work in the cybersecurity field, the importance of resilience and positivity in the face of rejection, and the potential consequences of losing credibility in the industry.&nbsp;&nbsp;We talk about the benefits of gaining experience and expertise in different areas of cybersecurity and the broad range of roles available beyond technical positions. Tune in to this episode to gain valuable insights and enhance your skills in the field of cybersecurity.&nbsp;I really struggled with it when I started out in my career as a young woman in IT. I was so hesitant and reluctant to make a mistake or to put myself out there because I'm like, but if I put myself out there and then I get it wrong, like my credibility is destroyed.&nbsp;Stefania Chaplin&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listen&nbsp;&nbsp;In this episode, we covered the following topics:&nbsp;&nbsp;Tips for Security Newbies - Discussing tips for those new to the infosec space, including what to watch out for and what you need to know to progress.&nbsp;&nbsp;Stefania's Journey into Cybersecurity – Stefania tells us about how she fell into the cybersecurity field and how she knew it was for her.&nbsp;&nbsp;Importance of Communication Skills in Cybersecurity – How to improve your communication skills and use them effectively with different teams/levels within the organisation.&nbsp;&nbsp;&nbsp;Understanding Psychology - we discuss the importance of understanding psychology in cybersecurity, including personality types, power dynamics, and how to spot who has the power in a room.&nbsp;&nbsp;Baby Steps: Advice for those new to cybersecurity, including the benefits of taking baby steps, finding bug bounty programmes and learning from your colleagues.&nbsp;&nbsp;How important are certifications? We discuss the pros and cons of certifications vs personal skills, along with identifying your motivations for pursuing certifications, such as for a specific skill or knowledge.&nbsp;&nbsp;Dealing with rejection - we share some tips for dealing with rejection in the job search process.&nbsp;&nbsp;Using LinkedIn to Find a Job - Sharing experience of using LinkedIn to get jobs and build a network in cybersecurity, emphasising the importance of being professional and engaging with industry leaders.&nbsp;&nbsp;Engaging Developers and IT Professionals: - We share some tips for engaging developers and IT professionals in cybersecurity projects.&nbsp;&nbsp;Credibility within the
40:0102/08/2023
What To Do If You Are A Victim Cybercrime: The Anatomy Of High Profile Incident

What To Do If You Are A Victim Cybercrime: The Anatomy Of High Profile Incident

Welcome to the latest episode of Razorwire, where we delve into the world of cybersecurity and the challenges faced by experts in the field. Our guests today, Joe Hancock, and Paul Hemmings, work together at Mishcon, and I’m delighted to be able to share their expertise with you today. We’re discussing high profile cybersecurity incidents and how they are handled by the experts.&nbsp;We talk about the best ways to prepare for these incidents and the best approach strategies to handle them along with what to include in your organisation’s procedure. We also discuss the changing tactics of malicious actors and what threats we need to be aware of.&nbsp;We talk about the many motivations behind cybercrime and how to prepare yourself for increasingly complex and strategic attacks from highly organised malicious actors and groups. We also discuss the best practice for the most effective incident response plans.&nbsp;Join us as we explore the world of cybersecurity and the challenges faced by experts in the field.&nbsp;&nbsp;I always believe that you want to be intelligence-led. To a certain degree, if you're looking for the needle in a haystack, it's good to have a really good idea of what needles look like, to kind of really stretch analogy.&nbsp;Joe Hancock&nbsp;&nbsp;&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listen&nbsp;&nbsp;In this episode, we covered the following topics:&nbsp;&nbsp;When High Profile Incidents Occur - we discuss the timing of high profile incidents, and what times of the day or year we tend to see the highest number of attacks taking place&nbsp;&nbsp;Dealing with Crisis Management – in crisis situations, who are the best people and what are the best skill sets to have immediately to hand?&nbsp;&nbsp;&nbsp;The Business Response – should the way we deal with high profile attacks differ depending on corporate priorities? What has been shown to be effective?&nbsp;&nbsp;The Importance of a Broad Skill Set – what skills are required when dealing with a cybersecurity incident and how can it help establish a strategy and a plan.&nbsp;&nbsp;Standard Playbooks and Approaches – why every organisation should have standard playbooks and approaches for different incident types and how to follow the standard model to analyse, contain, eradicate and recover.&nbsp;&nbsp;Threat Intelligence and Incident Response – we talk about why threat intelligence is essential in informing incident response and the criticality of early access to information.&nbsp;&nbsp;Dealing with Cyber Criminals – who exactly are we up against? The speakers talk about the different types of cyber criminals, organised and disorganised, and how to approach negotiations and payments, including the use of cryptocurrency.&nbsp;&nbsp;Malicious Insider Incidents - how do we deal with incidents involving malicious insiders that are still present within the organisation and potentially monitoring the response efforts?&nbsp;&nbsp;Increasingly Sophisticated Social Engineering - attackers are upping their game in social engineering, targeting individuals using social media – how can we avoid being played?&nbsp;&nbsp;The rise of organised cyber crime – what we should learn from this&nbsp;&nbsp;Interactions with cyber criminals – so you’ve been hacked. What’s it like dealing or negotiating with cyber...
54:3419/07/2023
The Reality Of Cyber Warfare

The Reality Of Cyber Warfare

Welcome to the Razorwire podcast. In this episode, we explore cyber warfare. We discuss the challenges of defending against cyber attacks and the power imbalance between nations in the cyber domain. We have some fantastic guests on this week who know a thing or two about this: Oliver Rochford and Victor Acin shed some light on the issue of plausible deniability and the potential consequences of our lack of preparedness for defence in critical infrastructure. We also touch on the psychological and information manipulation aspects of cyber warfare and the difficulties of defending against cyber attacks in a commercial environment. We talk about what needs to be done to incentivise organisations to invest in better protection and if there’s anything that can be done to make the prospect of attacks less appealing to malicious actors. Join us as we explore the reality of cyber warfare!“No country is able to defend very well in the moment except if you're not very dependent on your digital infrastructure. Or if you start decoupling. And that, I think, is the thing that we're seeing with decoupling, and how that will impact future cyber wars is a completely different question as well.”Oliver RochfordListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:How warfare has developed through the ages, from primitive times to modern day, including the development of new weaponry and the inevitable rise of cyber warfareThe power imbalance within cyber warfare, which makes it easier for larger states to attack smaller onesPlausible deniability in cyber warfare and the difficulty in attributing attacks to specific nation states&nbsp;Cyber warfare vs. ground invasionThe potential for cyber attacks to destabilise a populace through social engineering and disinformation campaignsThe dangers of echo chambers and the manipulation of information through social mediaThe role of big tech in information manipulation and the lack of trust in media and technologyThe power of manipulating people and the issue of mistrust in motivating a population during the pandemicThe difficulty of gaining investment in national security from investors without an external mechanism to justify itThe legality of cyber insurance payouts and the responsibility of businesses in cyber warfare: we question what constitutes an act of war and what happens if the insurance won't pay outThe responsibility of the state to defend private companies from advanced nations in cyber warfare&nbsp;The need for a unified front between government and business, and the responsibility to provide guidance&nbsp;Disclaimer: Please be advised that in the course of our discussion, we would like to clarify that the company mentioned as being breached and subsequently acquired is Panopta, rather than Panoply as previously stated.GUEST BIOSOliver RochfordOliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for SecurityWeek, CSO Online and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. In past lives, Oliver worked for Qualys, Verizon, Gartner,  Tenable and Securonix and is currently Chief Furitist at Tenzir, where he works on product strategy and marketing.&nbsp;<p...
52:4405/07/2023
Security vs Privacy: The Ethics of Data Collection

Security vs Privacy: The Ethics of Data Collection

In this episode of Razorwire, we delve into the ongoing debate between privacy and security in the world of cyber security.&nbsp;Our guests this week, Iain Pye and Chris Dawson, offer different perspectives on this issue, exploring the meaning of privacy, the significance of security and the accumulation of data. Our discussion also touches on topics such as government surveillance, commercial tracking and the use of AI to compile reports. While we agree that technology is advancing too quickly for privacy, we also believe that it's crucial to strike a balance between privacy and security. Tune in to gain valuable insights into the ongoing tension between privacy and security in the digital age."I think the difference between privacy and security is that privacy involves how your data is used and security is there to protect that. One can live without the other, the other can't live without the other one. So security can exist without privacy but the reverse is not true in my eyes."Iain PyeListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:The difference between privacy and information privacy, and what cultural differences we encounter.&nbsp;Government surveillance and commercial tracking – are they necessary for security purposes? What role does AI play?Privacy and the Stifling Effect – does constant surveillance limit people's willingness to do anything controversial or experimental?The debate over government surveillance and the idea of having a backdoor through encryptionPrivacy rights and the use of CCTVThe potential for using AI to compile reports to prevent human operators having access to private dataThe privacy concerns surrounding facial recognition technologyThe use of AI for monitoring protests&nbsp;The debate over whether we need body cameras and CCTV for constant monitoring, for use in emergency situationsWhether we should use technology to monitor individuals to flag suspicious and dangerous patterns of behaviourHow we can prevent the misuse of informationGUEST BIOSIain PyeIain is a Cyber Security, Data Protection and Risk Specialist with over 20 years of experience in the public and private sectors. Iain has worked in a range of industries from finance, legal, security and government. When Iain is not fighting fires or arguing personal data ethics, Iain likes exploring the world with his family and occasionally going for a run through the Fens with the dog. If the dog is up for it, which she is usually not.&nbsp;Chris DawsonChris Dawson is a former Royal Marine of 11 years. He moved into the private security sector in 2012 taking up various roles across the globe, from hostile environments to the corporate world, advising and implementing security protocols in multiple sectors while gathering and learning as much as possible along the way. &nbsp;Resources MentionedEdward SnowdenAshley MadisonPalantirRing DoorbellICO...
54:3721/06/2023
Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics And AI

Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics And AI

Welcome to the Razorwire podcast. In this episode, I delve into the turbulent waters of cyber security with Razorwire favourite, Oliver Rochford. We'll be discussing a range of topics that are currently shaping the industry, including economic challenges, nationalism and the continuing impact of the pandemic.We'll also be exploring the use of acronyms, consolidation and rationalisation in the vendor space, and the development and potential dangers of AI. But that's not all! We'll also be taking a closer look at the weaponisation of security, the need for active security and moving target defence, and the potential for mergers and acquisitions in the industry.So sit back, relax and get ready for some valuable insights into the challenges and opportunities facing the cyber security industry.&nbsp;"Planning a security project over two years is far too long. It's ludicrous, you've missed the moving target by the time you're finished. What you've done - it’s outdated."Oliver Rochford&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered:The economic challenges in the information security space, including the waves of layoffs and the continuing impact of the pandemic on the industryThe overhype of cloud usage and companies spending their entire security budget on cloud and data costsThe impact of new legislation on security costs and the potential consequences of not securing to the required levelThe dangers of AI and the lack of global consensus on its developmentThe impact of nationalism on cyber security and the use of technology from certain countriesThe potential weaponisation of security and the impact on cyber insuranceThe economic challenges in the information security industryThe evolution of pen testing, combining automation and the need for continuous assuranceThe need for better standards in the industry to enable easier mixing and matching of technologiesHow the future of cyber operations would look if we have to go into a low power modeGUEST BIOSOliver RochfordOliver has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. He has been interviewed, cited, and quoted by the media, think tanks, and academia. He has written for Securityweek, CSO Online, and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation, and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP market. Prior to joining Securonix, Oliver worked for Qualys, Verizon, Gartner,&nbsp; Tenable, and Securonix. Oliver is the Chief Furitist at Tenzir, where he works on product strategy and marketing.&nbsp;&nbsp;Resources MentionedTenzirNSA Snowdon FilesChat GPTTiktok<a href="https://www.razorthorn.com/cyber-security-testing/next-gen-continuous-pen-testing/" rel="noopener noreferrer"...
50:2607/06/2023
ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses

ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses

Welcome to a special edition of Razorwire, where I had the pleasure of interviewing AI language model, ChatGPT. Our discussion revolved around various topics related to information security and cybersecurity. ChatGPT shared valuable insights on how AI can assist in securing organisations against cyber attacks but also emphasised that it should be considered just one tool in a broader cybersecurity strategy. We delved into the future of cybersecurity, key technologies for a defence in depth approach, and the advantages of continuous penetration testing. Our conversation highlighted the importance of being agile, adaptable and proactive in tackling cybersecurity challenges.&nbsp;So sit back and enjoy this enlightening episode of Razorwire.The collaboration between human cybersecurity professionals and AI technology has the potential to significantly improve the effectiveness and efficiency of cybersecurity operations and provide a more robust defence against cyber threats.ChatGPTListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:Importance of cybersecurity - ChatGPT explains the importance of cybersecurity for both public and private businesses today, based on industry reports and trendTop 5 cybersecurity concerns - ChatGPT lists the top 5 cybersecurity concerns that organisations should have, based on current trends and threats.Effectiveness of cybersecurity - ChatGPT suggests measures that businesses can take to improve their cybersecurity effectivenessAI in cybersecurity - how AI can help detect and respond to cyber threats, anticipate and prevent cyber attacks, detect and prevent fraud, monitor user behaviour and automate routine cybersecurity tasksHuman professionals vs AI -&nbsp; can AI replace human cybersecurity professionals? We discuss the collaboration between human cybersecurity professionals and AI technology and the potential to improve the effectiveness and efficiency of cybersecurity operationsSecuring AI systems – we discuss the recommendations ChatGPT makes for securing AI systemsThe future of cybersecurity - a discussion on the trends that will shape the future of cybersecurity, including the increasing use of AI and machine learning, the growing importance of data privacy and the shift towards a more holistic approach to cybersecurityChatGPT’s top tips for cybersecurity for organisations looking to secure themselves from cybercrimeContinuous penetration testing - the importance of regularly testing information security countermeasures, the benefits of continuous penetration testing, and how it can provide an extra layer of security for organisationsGUEST BIOSChatGPT v4ChatGPT is a sophisticated language model developed by OpenAI. Based on the groundbreaking GPT-4 architecture, ChatGPT has been trained on an extensive array of internet text, enabling it to generate intelligent, human-like text in response to a variety of prompts.A remarkable tool for a diverse range of applications, ChatGPT has proven its mettle in contexts ranging from drafting emails and writing code, to creative content generation and customer engagement. Although it doesn't possess beliefs or opinions, it leverages its training to provide factual information, answer queries and hold natural-sounding conversations.While ChatGPT showcases a fascinating instance of advanced AI capabilities, it...
36:0024/05/2023
Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer

Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer

Welcome to Razorwire, where I have the pleasure of interviewing cyber security legend Paul Dwyer, president of the International Cyber Threat Task Force and CEO of Cyber Risk International.&nbsp;In this episode, we delve into a variety of topics within cyber security. Paul shares his extensive background and experience in the industry, highlighting the need for a cultural shift towards cyber security.&nbsp;We discuss the challenges of regulating and controlling the metaverse, as well as the devastating effects of cybercrime on individuals and organisations. Throughout the interview, Paul emphasises the importance of trust in organisations and people, as well as the significance of education and policy in combating cyber threats.&nbsp;Whether you're a seasoned professional or just starting out in the industry, this episode provides valuable insights into the latest trends and developments in the world of cyber security.We need to get back to the basics. We need to make sure all our people understand the risks around security and cyber security so they can have that cyber savviness, that security savviness, to know what's dangerous what's not dangerous.Paul DwyerListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:The importance of having a generalist vs specific skill setThe need for ethics and morality to be built into AI development as well as the importance of quality code in preventing cyber attacksThe vulnerabilities of IoT devices and the lack of security standards and regulationsThe need for updated and practical cyber security education and training, and the lack of background checks for cyber security professionalsThe importance of policy in shaping the culture of cyber security, and the need for faster dissemination of information to governmentsThe potential security threats that may arise in the metaverse and the lack of regulation and control over itExploration of the criminal ecosystem that supports cybercrime and the lack of accountability for social networking sites and other businesses that enable itConcerns over the threat of disinformation and deep fakes, and the potential consequences of eroding trust in information sourcesThe control of information by companies like Facebook and the consequences of providing false information to peoplePredictions for the future of cyber security and the need for real leadership and trust in organisationsThe psychological impact of cybercrime on victims, especially in romance scams, and the importance of working together to defeat evil.GUEST BIOSPaul DwyerPaul C Dwyer stands among the world’s leading cybersecurity, risk, and compliance authorities. As CEO of Cyber Risk International, he excels in corporate and enterprise security, crafting cyber defence programs, and safeguarding business operations for clients. He also serves as the founder and President of the ICTTF International Cyber Threat Task Force, leading a community of over 30,000 professionals in their mission to combat cyber threats and promote industry diversity.Boasting over 30 years of experience, Paul has worked extensively with military, law enforcement, and commercial sectors across the globe. His impressive credentials include certifications from the International Information Security Certification Consortium (ISC2) and the Information...
49:1410/05/2023
Cyber security and Critical Infrastructure: Are We Prepared for the Worst?

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?

In this episode of Razorwire, I had the pleasure of speaking with Phil Tonkin from Dragos about securing critical infrastructure. Phil and I delved into the definition of critical infrastructure, the fragility of supply chains and the importance of preparing for potential attacks. We also talked about the Colonial Pipeline incident and the inextricable link between IT and OT in critical infrastructure.Phil tells us how we should be advancing the development of defensive capabilities and safeguard civilisation as well as how to overcome the many challenges of managing risks and compliance, the changing perception of IT and cyber security within organisations and how to deal with the increasing sophistication of cyber attacks.Overall, it was a fascinating discussion that shed light on the critical importance of securing our infrastructure in the most suitable way given the challenges we are facing. I hope you enjoy listening to this episode of Razorwire as much as I enjoyed recording it."Don't just chase the newest and sexiest technology. Focus on actual risks and develop capabilities that can manage those risks."&nbsp;Phil TonkinListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:The evolution of critical infrastructure and how we can advance our defensive capabilities&nbsp;How the Colonial Pipeline incident changed the perception of critical infrastructure security, and how to prepare for future attacksThe decision-making processes of critical infrastructure companies during a cyber attack&nbsp;The factors that increase the likelihood of an attack, according to Dragos’ latest researchThe reduction of surplus reserves and the need for governments to identify what to subsidise to increase resilience&nbsp;What are the key concerns Dragos are seeing from customers in critical infrastructure and what do these organisations need to be mindful ofThe problems with securing an organisation simply to meet minimum compliance standards&nbsp;Cyber security budget limitations vs high expectations&nbsp;GUEST BIOPhil Tonkin&nbsp;Phil is the Senior Director of Strategy at Dragos and has worked in the power industry for over 20 years. In the last five years, Phil has led the cyber security efforts for operational technology in the UK and US, with experience in securing systems in electricity and gas control centres, communication networks and operational sites.&nbsp;Resources MentionedDragos IncSolarwinds Cyber AttackColonial Pipeline AttackOther episodes you'll enjoyData Protection and Ethical Standards in Cyber Securityhttps://www.razorthorn.com/the-business-of-biometrics-data-protection-and-ethical-standards-in-cyber-security/A Snapshot in Time: Why Penetration Testing Is Critical for Cyber Security<a...
43:2926/04/2023
Defence in Depth: Strengthening your Cyber Security Strategy

Defence in Depth: Strengthening your Cyber Security Strategy

Welcome back to the show! In this episode of the Razorwire podcast, I have the pleasure of discussing defence in depth with Razorthorn’s own illustrious consultants, Jamie Hayward and Tom Mills. During our conversation, we talked about the increasing number of tools and solutions available, the perils of ‘reactive’ budget allocation, as well as the changes we’re seeing in the industry and within our clients’ requirements.&nbsp;We also highlighted the need for a holistic approach to defence in depth, the importance of cyber threat intelligence, and the growing requirement for continuous security assurance.Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:The importance of defence in depth for security and the need to layer multiple technologies, processes and peopleThe plethora of security tools and solutions available and the importance of balancing these with processes and people for effective security.The disparity between investment in cyber security and the cost of cybercrime to the world's economy.The need for a proactive approach to cyber security budgets and the real cost of cybercrimeThe complexities and considerations of cyber warfare, including the lack of policies and procedures to protect international organisations and entities.The requirement for continuous scanning and testing, and the importance of being aware of vulnerabilities and threats as they occurThe shift towards ongoing security assurance and the requirement for intelligence in frameworks such as ISO 27001, as well as the need for organisations to update and move with the times.The role of threat intelligence as the first and last line of defence&nbsp;Updating the Defence in Depth model to include a bar of security assurance and intelligence that permeates through all layersThe issues surrounding supply chain securityResources MentionedCyber Security Ventures (Magazine)WEF - World Economic ForumCentre Of Army Leadership PodcastThe Grey Zone PodcastCIDER - organisation overseeing risk balance cases for third-party assurance chain in the militaryOther episodes you'll enjoyRansomware Sanctions: Exploring the Fallouthttps://www.razorthorn.com/ransomware-sanctions/Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential<a href="https://www.razorthorn.com/threat-intelligence-why-awareness-is-critical-and-collaboration-is-essential-razorwire-podcast/" rel="noopener noreferrer"...
47:3312/04/2023
A Snapshot in Time: Why Penetration Testing Is Critical for Cyber Security

A Snapshot in Time: Why Penetration Testing Is Critical for Cyber Security

When Megan Brown, Jonathan Care, and I explore the world of penetration testing, we uncover the missing links between the testing itself and having a secure organisation and patched vulnerabilities.In this episode, you will learn how to maximise the potential of your penetration tests and increase the depth of your organisation's cyber security.&nbsp;“Pen tests on their own don’t do anything if you don’t have a way of tracking the issues, resolving the issues.” Jonathan CareWe cover the following topics:How regularly penetration testing should be carried out to ensure that the organisation is secure as well as compliantDriving accountability and how to use the data from pen testingExpectations vs outcomes from pen testingWhat additional value do you get with a continuous pen testing (CPT) service?How does Razorthorn bridge the gaps between testing, tracking and resolving vulnerabilities with their CPT service, Razor’s Edge?How cyber insurance premiums can be reduced through CPTAre bug bounties complimentary to pen tests and what benefits and drawbacks do they have?&nbsp;How GRC can support a company following a pen test to increase internal and customer confidence by closing security gapsWhat challenges arise when recruiting and retaining qualified pen testers given the current market conditions?Megan, Jonathan, and I had an interesting discussion about the current trends in the penetration testing industry. We discuss the various ways organisations are utilising penetration testing, from quarterly snapshots in time to continuous pen testing, with reference to Razorthorn’s new CPT platform, Razor’s Edge.We talk about how difficult it is to find and retain skilled professionals, when better-paying jobs are dangled like carrots in an industry where there is a notable skills shortage.&nbsp;We also talk about how to use intelligence to find new threats on the dark web and how to combine vulnerability scanning with pen testing.&nbsp;Find out more about Razor’s Edge here: https://www.razorthorn.com/cyber-security-testing/next-gen-continuous-pen-testing/&nbsp;Listen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenGUEST BIOSMegan BrownMegan Brown has spent over 15 years in SAAS and technology leadership roles. For the past 5 years, she has worked alongside the founding team at LogicGate to help scale the Risk Cloud, a next gen GRC workflow automation SaaS platform, around the world. Megan currently works as the Head of International Sales after having developed the Strategic Alliances and Partner Function at LogicGate. Megan leads the international market expansion strategy and sales team covering global markets. In her free time, she loves podcasts and is a host herself - you can hear more from Megan on LogicGate's GRC &amp; Me podcast. She is a live music fan, marathon runner, and mom to a 3 year old daughter. Megan, her husband, and their daughter will be moving to Richmond, UK, this year, a long way from their previous home in Chicago, IL where the company has its US headquarters.&nbsp;Jonathan CareJonathan Care is a recognised expert in the field of Cybersecurity &amp; Fraud Detection. A former top-rated Gartner analyst, Care was responsible for defining the Fraud market, and leading Gartner’s Insider Threat and Risk research. He regularly advises cybersecurity industry leaders on strategic growth and has worked with key figures in industry and government across the...
50:0929/03/2023
Strengthening Cyber Security: The Impact of Compliance and Legislation

Strengthening Cyber Security: The Impact of Compliance and Legislation

Josh Davies, Keith Christie-Smith, and I dive into the world of legislation and compliance and explore the stark contrast between the need for rigorous security and the burden placed on businesses to comply.“One of the big problems we have in security is that you spend all this money pre-empting your defence in depth to try to protect you against things that you could perceive could happen to you." Josh DaviesListen to this episode on your favourite podcasting platform: https://razorwire.captivate.fm/listenIn this episode, we covered the following topics:What do the changing regulations and compliance requirements in the information security field mean for businesses?The advantages of a security first approachHow being compliant in itself doesn’t necessarily mean your organisation secureThe irony of having a cyber incident justifying the budget for adequate security measuresThe opposition of legislation vs growth and innovationThe concept of ‘legislation fatigue’ – is there a danger of having to comply with too many standards?The importance of understanding the intent behind the compliance requirementWhat is the difference between too much or too little legislation on security measures?The limitations of generic security frameworks vs frameworks targeted to specific industries such as PCI DSSThe challenges of creating universal standardsGUEST BIOSJosh DaviesJosh Davies is a Product Manager at Fortra by Alert Logic. Formerly a Security Analyst and Solutions Architect, Josh has hands on experience in incident response and threat hunting activities before working with organisations to identify appropriate security solutions. Josh continues to be closely involved with security operations and threat research.&nbsp;&nbsp;Keith Christie-SmithKeith is a sales director with Claroty, covering the Government, Defence and Healthcare verticals. Keith has worked in the cyber security field for both vendors and resellers. He has been in cyber security for over a decade having worked in IT managed services for almost a decade beforehand. &nbsp;Other episodes you'll enjoyRansomware Sanctions: Exploring the Fallouthttps://www.razorthorn.com/ransomware-sanctions/Threat Intelligence: Why Awareness is Critical, and Collaboration is Essentialhttps://www.razorthorn.com/threat-intelligence-why-awareness-is-critical-and-collaboration-is-essential-razorwire-podcast/Connect with your host James ReesHello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.Our guests bring you experience and expertise from a range of disciplines and from different career stages. We give you various viewpoints for improving your cyber security – from seasoned professionals with years of experience, triumphs and lessons learned under their belt, to those in relatively early stages of their careers offering fresh eyes and new insights.With new episodes every other Wednesday, Razorwire is a podcast for cyber security enthusiasts and professionals providing insights, news and fresh ideas on protecting your organisation from hackers.For more information about...
50:3915/03/2023
Ransomware Sanctions: Exploring the Fallout

Ransomware Sanctions: Exploring the Fallout

In this podcast episode, Jamie Hayward, Tom Mills, Michael Aguilera and I explore the perplexing irony of the UK government's recent proposal to ban payments to Russian ransomware groups. We debate the ethical, legal and financial implications of such a move and challenge organisations to pre-emptively defend against cyber attacks.&nbsp; &nbsp;"The best way to defeat exfiltration of your data - one of the best ways, there's a few - is using encryption." - Jamie Hayward&nbsp; &nbsp;We were discussing the recent news about new regulations on paying ransomware groups connected to Russia. We explored the implications of this ruling, how it may affect companies and the potential problems and risks it could cause.&nbsp;Through the discussion, we talk about the problem of reactive security and the proactive steps organisations can take to protect their data and be prepared for the worst case scenarios.&nbsp;While this law is designed to protect businesses, it is not, in itself, a solution to the ransomware problem.&nbsp; We discuss how likely it might be that ransomware payments may be made illegal across the board and the implications of similar rulings on public, private, national and international organisations.In this episode, you will learn the following:&nbsp;What are the implications for organisations when the so-called ‘safety net’ of paying a ransom is taken awayWhy reactive cyber security strategies are so riskyWhat proactive recommendations we would give for securing an organisationThe effect the ruling might have on cyber insuranceThe role of cyber education and training&nbsp;How can a universal set of regulations be created for information security?&nbsp; &nbsp;If you are a new listener to Razorwire, we would love to hear from you. For more information about us or if you have any questions you would like us to discuss on the podcast email [email protected]. &nbsp; &nbsp;Other episodes you'll enjoy:&nbsp;How to Negotiate with Ransomware Groups&nbsp;https://www.razorthorn.com/how-to-negotiate-with-ransomware-groups/&nbsp;Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential | Razorwire Podcast&nbsp;https://www.razorthorn.com/threat-intelligence-why-awareness-is-critical-and-collaboration-is-essential-razorwire-podcast/&nbsp; &nbsp;Connect with Your host James Rees&nbsp;&nbsp;Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.&nbsp;Our guests bring you experience and expertise from a range of disciplines and from different career stages. We give you various viewpoints for improving your cyber security – from seasoned professionals with years of experience, triumphs and lessons learned under their belt, to those in relatively early stages of their careers offering fresh eyes and new insights.&nbsp;With new episodes every other Wednesday, Razorwire is a podcast for cyber security enthusiasts and professionals providing insights, news and fresh ideas on protecting your organisation from hackers.&nbsp;<p...
55:1901/03/2023
How to Negotiate with Ransomware Groups

How to Negotiate with Ransomware Groups

Are you concerned about the recent ransomware attacks? Listen to this episode to learn important things about how hard it is to talk to a ransomware group.&nbsp;&nbsp;In this episode, I am joined by cyber security experts, Richard Cassidy and Oliver Rochford, to share their experiences and knowledge to help you understand the impact of ransomware and how best to respond to ransomware groups if you find yourself in that situation.&nbsp;&nbsp;&nbsp;In this episode, we covered the following topics:&nbsp;How ransomware became both a technological and economic problem&nbsp;The rise of ransomware in relation to cryptocurrency&nbsp;Examples of a ransomware attacks&nbsp;What to look out for to protect your company from ransomware&nbsp;The measures to take when dealing with a ransomware attack&nbsp;How the government can further improve the authorities’ response to ransomware attacks&nbsp;The preferred skill sets to successfully mitigate the impact of a ransomware attack&nbsp;Having the right people to negotiate with ransomware groups&nbsp;&nbsp;&nbsp;Oliver argues that ransomware is not just a technological issue but also a human and economic problem. Richard concurs, noting that having a team with the technical skills to confront ransomware groups is not enough and that it also requires a different type of training and capability.&nbsp;&nbsp;This highlights the need to look at ransomware from different angles and to invest in developing skill sets to tackle the problem from all sides. With the right combination of technological, human, and economic skills, the fight against ransomware can be successful.&nbsp;&nbsp;Listen to this episode on your favourite podcasting platform.&nbsp;&nbsp;&nbsp;If you are a new listener to the Razorwire, we would love to hear from you. For more information about us or if you have any questions you would like us to discuss on the podcast email [email protected].&nbsp;&nbsp;&nbsp;GUEST BIOS&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Richard Cassidy&nbsp;Richard Cassidy has been consulting to businesses on cyber security strategies and programs for more than two decades, working across highly regulated industries including finance, insurance, retail, manufacturing, government and military. During his career Richard has been heavily engaged in the design and implementation of infrastructure &amp; cyber security solutions, helping organisations in evolving security, compliance, risk management, data assurance, automation, orchestration &amp; breach response practices.&nbsp;&nbsp;&nbsp;Richard’s security operations experience includes managing Computer Emergency Response Teams (CERT), breach response teams, threat intelligence and hunting teams, as well as educating the industry on how data and assets are targeted by cyber-criminal groups, which in return supports effective security practices and mitigation strategies. Richard has led major breach investigations across CNI (Critical National...
56:2215/02/2023
The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security

The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security

In this episode, I am joined by Chris Dawson and Iain Pye to talk about the biometric technology, what can be done to improve it,&nbsp; and how it might be utilised in the future.&nbsp;In this episode, we covered the following topics:How biometrics has been altered and adapted since its early daysHow biometric data are being storedWhat damage can a personal data breach cause to consumersIs personal data at risk of deepfake technology?What do we as consumers really know about how our data is stored and secured?&nbsp;The lack of clear guidelines and framework for the use of biometric dataWho actually owns our biometric data? Individuals or the company collecting it?We discuss biometrics and the security and management of the data collected, and how the data has been collected and used by the government, the military, and corporations. We also talk about the moral and legal issues of how biometric data is used and stored, and how individuals can be put at risk.Biometrics is a technology that has always been surrounded by questions about data security and misuse, even though it is undeniably useful. The technology offers many benefits in terms of security, ease of use, and access to different services. However, it also raises important ethical and legal questions. As biometric data is used more and more, we discuss the need for a clear set of rules and guidelines to ensure people's privacy and civil liberties are respected and protected.&nbsp;We talk about the potential for abuse or manipulation of personal data as a key reason for the need for advancements in both biometrics as a technology and the management of the data.Listen to this episode on your favourite podcasting platform.&nbsp;If you are a new listener to Razorwire, we would love to hear from you. For more information about us or if you have any questions you would like us to discuss on the podcast email [email protected] BIOS -&nbsp;Iain PyeIain is a Cyber Security, Data Protection and Risk Specialist with over 20 years of experience in the public and private sectors. Iain has worked in a range of industries from finance, legal, security and government. When Iain is not fighting fires or arguing personal data ethics, Iain likes exploring the world with his family and occasionally going for a run through the Fens with the dog. If the dog is up for it, which she is usually not.&nbsp;Connect with Your host James ReesHello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.Our guests bring you experience and expertise from a range of disciplines and from different career stages. We give you various viewpoints for improving your cyber security – from seasoned professionals with years of experience, triumphs and lessons learned under their belt, to those in relatively early stages of their careers offering fresh eyes and new insights.With new episodes every other Wednesday, Razorwire is a podcast for cyber security enthusiasts and professionals providing insights, news and fresh ideas on protecting your organisation from hackers.Listen to this episode on your favourite podcasting platform and for more information about us or if you have any questions you would like us to discuss on the podcast email [email protected] you need consultation, visit www.razorthorn.com, We give our...
46:0901/02/2023
Ex-Military Cyber Security Experts: How Military Training Prepares You for a Successful Career in Cybersecurity

Ex-Military Cyber Security Experts: How Military Training Prepares You for a Successful Career in Cybersecurity

Today we discuss recruiting in the cyber security field from a forces perspective - what to expect coming out of the military, recruiting people from the forces, and how we can bring people into this particular field to address the cyber security skills gap.&nbsp;In this episode, we cover:The experience of veterans and services leavers when they came out of the military – what can a leaver expect?How to prepare yourself, mentally and practically, for leaving the militaryCauses of underemployment among people from the forcesWho are TechVets and how does their programme help the forces communityCrafting a CV that shows your skills for corporate/non-military employmentTranslating experience and soft skills from military training into desirable corporate skillsRecruitment of people from the forces into the field of cyber securityHow veterans and service leavers can help fill the skills shortage in information securityAll our guests in this episode are ex-forces themselves – I’m joined by James Murphy, Claire Davies and Tom Mills to discuss their experiences after leaving the military, as well as how the qualities and skills they gained from their military training can help fill the cyber security skills gap.Claire talks about how she went from a senior position in the military to a role in commercial security. Tom talks about some of the problems he ran into as he moved from the military to the business world. James tells us about hiring veterans and service members and helping them get jobs after they leave the military.&nbsp;When people leave the military and go into business, they often find it easy to port across the skills they learned there. There is a lack of skilled information security people in the job market, so tapping into the potential of veterans and helping them find a place in this field is an excellent way to make use of the skills honed in the forces.&nbsp;This episode gives a great guide to moving from the forces into the world of commerce from people who have been through the process themselves.Listen to this episode on your favourite podcasting platform.&nbsp;If you are a new listener to Razorwire, we would love to hear from you. For more information about us or if you have any questions you would like us to discuss on the podcast, email [email protected] BIOS&nbsp;&nbsp;&nbsp;James MurphyJames joined TechVets from GDS, where he was employed as the Head of Threat Intelligence.&nbsp;&nbsp;James served for 19 years in the British Military, deploying to Northern Ireland, East Africa and Afghanistan with the Infantry, receiving lifelong injuries as a result of enemy action. James then served until 2018 in intelligence, delivering support to global Joint Military operations.&nbsp;Since becoming CEO, he has used his military experience to build an unrivalled programme of professional tech training, resources, and support for UK veterans and their families. He is an excellent ambassador for the military and has proven his commercial prowess and business excellence by securing strategic partnerships with some of the world's leading tech companies.&nbsp;—Claire Davies MBE&nbsp;Claire has over 30 years of experience in the field of intelligence and security. &nbsp; She cut her teeth within the UK military where she enjoyed a globe-trotting career identifying, assessing, exploiting and ultimately defeating the threat to the security of assets posed by those engaged in terrorism, espionage, sabotage and subversion.&nbsp; In more recent times, she leads...
46:1518/01/2023
Closing the Cybersecurity Skills Gap: Strategies for Finding and Developing Talent

Closing the Cybersecurity Skills Gap: Strategies for Finding and Developing Talent

Whether you are training to become an information security professional or if you are more seasoned in the cyber security industry, this is an episode you don’t want to miss.In this episode, I am joined by Josh Davies and Keith Christie-Smith to talk about what the cyber security skills shortage means for the industry and how we can address this.&nbsp;Josh explains how the pandemic affected the problem while Keith emphasises how essential people, policies and procedures are in cyber security in addition to the technological tools. We talk about the current situation in the industry and what we can do to bring more talent into it.&nbsp;Ultimately, we can begin to address the cyber security skills shortage by actually talking about it. Help us close the skills gap in cyber security by listening to this episode.&nbsp;In this episode, we covered the following topics:Defining cyber security skills shortage and how to address itThe current situation in the cyber security industry&nbsp;What to expect if you want to be an information security professionalThe importance of people, policies and procedures in cyber security&nbsp;The effect of the pandemic on the cyber security industryClosing the knowledge and skills gap in cyber securityHow sparking discussion on addressing the skills shortage and leveraging remote work setup can bring more people into the industryIntroducing the idea of cyber security in schools and universities with support from the governmentIf you are a new listener to Razorwire, we would love to hear from you. For more information about us or if you have any questions you would like us to discuss on the podcast email [email protected] BIOS -&nbsp;Josh DaviesJosh Davies is a Product Manager at Fortra by Alert Logic. Formerly a Security Analyst and Solutions Engineer, Josh has hands-on experience in incident response and threat-hunting activities before working with organisations to identify appropriate security solutions. Josh continues to be closely involved with security operations and threat research.&nbsp;Keith Christie-SmithKeith is a sales director with Claroty, covering the Government, Defence and Healthcare verticals. Keith has worked in the cyber security field for both vendors and resellers. He has been in cyber security for over a decade having worked in IT-managed services for almost a decade beforehand.&nbsp;Connect with Your host James ReesHello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.Our guests bring you experience and expertise from a range of disciplines and from different career stages. We give you various viewpoints for improving your cyber security – from seasoned professionals with years of experience, triumphs and lessons learned under their belt, to those in relatively early stages of their careers offering fresh eyes and new insights.With new episodes every other Wednesday, Razorwire is a podcast for cyber security enthusiasts and professionals providing insights, news and fresh ideas on protecting your organisation from hackers.Listen to this episode on your favourite podcasting platform and for more information about us or if you have any questions you would like us to discuss on the podcast email [email protected] you need consultation, visit www.razorthorn.com, We give our...
01:05:0107/12/2022
Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential

Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential

Collecting information on cyber threats and analysing data on a regular basis is essential to ensure your defences are tight and to allow you to pre-empt potential attacks.&nbsp;&nbsp;Richard Cassidy and Josh Davies, experts in the cyber threat intelligence field, join us today to discuss how collaboration between cyber professionals when it comes to data and intelligence is essential for keeping your environment secure in a world where threats evolve on a daily basis.&nbsp;&nbsp;&nbsp;&nbsp;Hear from the experts on the benefits of ‘tribal’ (or shared) or threat intelligence, how it can help your enterprise defend against cyber threats while also giving you better value from your security tools, and why information silos still exist when we know that sharing information makes us stronger.&nbsp;&nbsp;&nbsp;What do we cover in this episode?&nbsp;The application and utilisation of threat intelligence in decision making&nbsp;How to use intelligence and threat data to get the most out of your security tools&nbsp;The difficulties of getting threat intelligence and why we are reluctant to share information&nbsp;Great examples of collaboration in fighting threats, e.g. Log4j&nbsp;The importance of the Intelligence Cycle&nbsp;&nbsp;Platforms for intelligence sharing and collaboration&nbsp;&nbsp;&nbsp;Have comments about the show?&nbsp;Thank you for listening to today’s episode of the Razorwire podcast. Be sure you subscribe to Razorwire and leave a review! Use the social media buttons below and share them with your connections. For topic ideas you want to hear, I’d love to hear from you at [email protected].&nbsp;&nbsp;&nbsp;Guest Bio(s):&nbsp;&nbsp;Richard Cassidy&nbsp;&nbsp;Richard Cassidy has been consulting businesses on cyber security strategies and programs for over two decades, working across highly regulated industries, including finance, insurance, retail, manufacturing, government, and military. Richard Cassidy has been consulting businesses on cyber security strategies and programs for over two decades, working across highly regulated industries, including finance, insurance, retail, manufacturing, government, and military.&nbsp;&nbsp;&nbsp;Josh Davies&nbsp;&nbsp;&nbsp;Josh Davies is a Product Manager at Fortra by Alert Logic. Formerly a Security Analyst and Solutions Architect, Josh has hands-on experience in incident response and threat-hunting activities before working with organisations to identify appropriate security solutions. Josh continues to be closely involved with security operations and threat research.&nbsp;&nbsp;Connect with Your host James Rees&nbsp;Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings insights from leading cyber security professionals who dedicate their careers to making a hacker’s life much more difficult.&nbsp;Our guests bring you experience and expertise from various disciplines and career stages. We give you various viewpoints for improving your...
59:4123/11/2022