Security Nation

By Jen Ellis and Tod Beardsley

Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the latest developments in infosec that you should know about.

  1. 1.
    Craig Williams of Cisco Talos on Proxyware
    42:51
  2. 2.
    Jill Fraser and Deborah Blyth on Securing Colorado
    36:30
  3. 3.
    Daniel Crowley on running a cybersecurity internship
    38:53
  4. 4.
    Richard Kaufmann on Cybersecurity in Home Healthcare
    35:15
  5. 5.
    Philipp Amann on No More Ransomware
    43:32
  6. 6.
    Brian Honan on creating Ireland's first CERT
    54:00
  7. 7.
    Jonathan Cran on growing a cybersecurity startup
    43:41
  8. 8.
    Don Spies and Kim Grauer on tracking illicit Bitcoin transactions
    45:19
  1. 9.
    Jeff Man goes to bat for PCI DSS
    48:27
  2. 10.
    Robert Black discusses misdirecting and gaslighting attackers in your network
    55:22
  3. 11.
    Megan Stifel and Ciaran Martin discuss the sticky issue of ransomware payments
    56:10
  4. 12.
    Marina Ciavatta and int eighty Put the Fun into Hacking With Hacking Esports and Dual Core Music
    43:50
  5. 13.
    How Philip Reiner Created the Ransomware Task Force
    45:19
  6. 14.
    Beau Woods and Fotios Chantzis Discuss Their New Book, "Practical IoT Hacking"
    53:35
  7. 15.
    Nontraditional Paths into Cybersecurity, Part 3: Starburst Data's Katie Ledoux
    44:35
  8. 16.
    The CyberPeace Institute's Adrien Ogee Talks Launching a Nonprofit Amid COVID-19 and the Importance of Healthcare Security
    40:34
  9. 17.
    Datto’s Ryan Weeks Discusses a CISO’s Unique Role in Crafting a Pandemic Response
    44:45
  10. 18.
    Nontraditional Paths Into Security, Part 2: How Steve Ragan Innovates at the Intersection of Journalism and Tech
    38:02
  11. 19.
    How Santander’s Mark Carney and Daniel Cuthbert Are Working to Demystify Quantum Cryptography
    51:23
  12. 20.
    Nontraditional Paths Into Cybersecurity, Part 1: Akamai’s Kathryn Kun
    39:52
  13. 21.
    Cub Llewellyn-Davies Discusses the U.K.'s Cyber Aware Campaign and Quick Tips to Shore Up Security
    52:26
  14. 22.
    How Rick Holland's Diverse Experience Helps Him Find Security Talent in Unique Places
    46:14
  15. 23.
    How to Combat the Spread of Misinformation and Disinformation Ahead of the Election
    48:30
  16. 24.
    From the Dorm Room to the White House: How Researcher Jack Cable Works to Ensure Election Security
    45:14
  17. 25.
    How Entrepreneur Christian Wentz Takes On Identity Authentication and Data Integrity One Line of Code at a Time
    48:01
  18. 26.
    How Security Pro Dave Kennedy Keeps His InfoSec Skills Sharp While Telecommuting
    50:51
  19. 27.
    Joe FitzPatrick on the Future of Hardware Security Training Sessions
    46:54
  20. 28.
    Citizen Science and Medical Consumerism: Confronting the Tech Wisdom Gap in Modern Healthcare
    58:07
  21. 29.
    Advancements in Vulnerability Reporting in the Post-PGP Era: A Conversation with Art Manion
    54:22
  22. 30.
    Developing Sustainable Vulnerability Management with Katie Moussouris
    37:30
  23. 31.
    Advocating for Tech Literacy and Transparency: A Discussion with I Am The Calvary’s Josh Corman and Audra Hatch
    38:18
  24. 32.
    Where Tech Meets Legal: Discussing Crowdsourced Security Testing with Bugcrowd’s Casey Ellis
    46:11
  25. 33.
    How the MassCyberCenter Helps Elevate Cybersecurity Initiatives in Municipalities
    48:35
  26. 34.
    Shifting Security Conferences to Virtual: The New Face of Events in 2020 and Beyond with John Strand
    51:40
  27. 35.
    A Chat with Jonathan Cran About Intrigue and Security in the COVID-19 Pandemic
    41:34
  28. 36.
    Proactive Security Is the New Black: Lessons from the Trenches of Building a Security Product
    47:03
  29. 37.
    How Nick Percoco Built Chicago Security Conference THOTCON from the Ground Up
    45:27
  30. 38.
    How Chris Hadnagy and the Innocent Lives Foundation Use OSINT Skills to Bring Online Predators to Justice
    42:06
  31. 39.
    How Todd Beebe Used the MITRE ATT&CK Framework to Build His Own Automated Threat Simulation System
    39:04
  32. 40.
    Discovering a New Path in Asset Discovery: An Interview with Metasploit Founder HD Moore
    29:56
  33. 41.
    How to Get Your Engineering Team to Take On Security Initiatives (Without Even Realizing It)
    28:45
  34. 42.
    How to Create a Security Champion Program Within Your Organization
    35:42
  35. 43.
    From BlackICE to Typed Advice: Rob Graham Talks What It Takes to Write a Cybersecurity Textbook
    36:11
  36. 44.
    How MITRE and the Department of Homeland Security Collaborate to Validate Vulns
    34:02
  37. 45.
    Digitizing Cybersecurity in Healthcare with Richard Kaufmann
    37:15
  38. 46.
    How Wendy Nather Is Fighting Back Against the Security Poverty Line
    48:31
  39. 47.
    How Beau Woods and Meg King Promote Collaboration Between Policymakers and the Cybersecurity Community
    46:07
  40. 48.
    How David Rogers’ IoT Security Standards Earned Him Royal Recognition
    51:35
  41. 49.
    Episode 2: How to Start a Security Program from Scratch Without Your Initiatives Getting Cut
    34:25
  42. 50.
    Episode 1: Great Barrier Grief: How to Break Through Bottlenecks with Automated AppSec
    38:00

Listen to Security Nation now.

Listen to Security Nation in full in the Spotify app