mnemonic security podcast
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
Episodes
125 episodes
Deviation Detection
In this episode, Robby is joined by Maximilian Heinemeyer, Chief Product Officer at Darktrace.The conversation focuses on Max's perspective on detection engineering and the use of machine learning. He shares his opinion on the limitation...
•
40:36
Infostealers
In this new episode of the mnemonic security podcast, Robby Peralta is joined by Leonid Rozenberg, a cybersecurity expert and dark web researcher at Hudson Rock, to discuss infostealers. Rozenberg provides a brief history of infostealers, which...
•
36:55
Prioritisation & Decision Making in Critical Infrastructure Defence
Joe Slowik, ATT&CK CTI Lead at MITRE, joins the latest episode of the mnemonic security podcast to share his insights on the complexities of securing critical infrastructure. With a background in cyber threat intelligence, incident response...
•
36:00
KraftCERT Threat Assessment 2024
KraftCERT trusselvurdering 2024 | In Norwegian onlyIn this episode, Robby is joined by Espen Endal and Bjørn Tore Hellesøy from KraftCERT/InfraCERT - the Norwegian CERT for the energy and petroleum sectors. The trio d...
•
41:26
Risk Forecast: Windy
In this episode, Robby speaks with Jens Christian Vedersø, Head of Cyber Risk Management at Vestas, one of the world’s largest wind turbine manufacturers.Jens is a former Navy and intelligence officer and recovering regulator. Before man...
•
33:20
Email and Human Centric Security
In this episode of the mnemonic security podcast, Robby is joined by Matt Cooke from Proofpoint. They discuss the evolving landscape of email security, emphasising the need for a multi-layered approach beyond traditional prevention...
•
38:35
Episode 100*!
In this special, celebratory 100th episode of the mnemonic security podcast, Robby speaks with author and industry legend - Jon DiMaggio.Jon is the Chief Security Strategist at Analyst1 and has over 15 years of experience hunting, resea...
•
46:32
Follow the Crypto
In this week's episode, Robby talks with his friend Keven Hendricks, a law enforcement veteran with extensive experience in dark web and cryptocurrency investigations. They explore topics like dark web forums, cryptocurrency's role in illegal a...
•
42:17
Black Teaming
Many are familiar with cybersecurity penetration testing – ethical hacking to uncover digital weaknesses. But what about the real-world threats to your company's physical security? How confident are you in your locks, cameras, and physical secu...
•
48:05
ML Engineers these days
Have you ever worked alongside a machine learning engineer? Or wondered how their world will overlap with ours in the "AI" era?In this episode of the podcast, Robby is joined by seasoned expert Kyle Gallatin from Handshake to enli...
•
26:46
Isolate first, Triage second, and the tools to help you do it.
Operationalising threat intelligence is back on topic for the mnemonic security podcast!Making a return to the podcast is Joe Slowik from MITRE Corporation, where he is the CTI Lead for MITRE ATT&CK and also Principal Engineer for Cr...
•
45:44
Guidance for High-Risk Individuals
When we talk about securing an organisation’s assets, we most often mean its data, devices, servers, or accounts, but are we doing enough to secure the group of people leading the company? Or the ones doing high risk work on behalf of the organ...
•
30:33
Models Always Lie
For this episode, Robby is once again joined by Eoin Wickens, Technical Research Director at HiddenLayer, an organisation doing security for Machine learning (ML) and Artificial Intelligence (AI). It is not too long ago since Eoin ...
•
38:53
Data Brokers and Removal Services
Data Brokers and Data Removal ServicesWhat does the process of removing your online presence look like? And how would you handle the data brokers that have collected your personal information with just a few clicks of the mouse to...
•
36:47
The Risk Business
For this episode, Robby is joined by Levi Gundert, Chief Security Officer at the cybersecurity company Recorded Future and author of the book The Risk Business – what leaders need to know about intelligence and risk-based security.Levi s...
•
40:51
Ethical Social Engineering
Ethical social engineeringEven the best pentesters out there can be fooled by a social engineering attempt under the right circumstances. But how do we treat the ones that have been tested and failed?Ragnhild «Bridget» Sage...
•
35:00
A student/mentor’s perspective on AI
How will AI impact the next generation of people working with computer science?This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help ...
•
27:06
When Ransomware Hits the Ranch
How does cybersecurity play a part in ensuring food security?As part of the ISACA series of the mnemonic security podcast, we’re welcoming Karianne Kjønås, Cyber & Privacy Associate at PwC Norway. Karianne recently won the ISACA mast...
•
25:44
Conflictual coexistence
Conflictual coexistenceToday’s guest, Raymond Andrè Hagen, holds over 20 years of experience in cybersecurity and information security, and is currently researching advanced persistent threats for his PhD in Computer and Informati...
•
33:27
From Russia with Ransomware
To join Robby for this episode on Russian cybercrime and ransomware, we’re welcoming Sam Flockhart, Cyber Threat Intelligence Manager at Santander UK.Sam has a background in military intelligence from the British army, where he has spent...
•
44:56
Metaverses
MetaversesHave you been to the metaverse yet? And are you among the 78% that believe the metaverse will provide a significant value to their organisation in the future?To join Robby for this episode, we’re welcoming Julia H...
•
37:18
Defending Cyber Space (EVE Online)
Defending EVE OnlineHow does combatting botting, hacking, and fraud in a virtual game relate to fighting real cybercrime?To share his take on this, Maksym Gryshchenko joins us to share how he works as a Security analyst at...
•
31:49
Digging into State Directed Cyber
Last year, threat researchers all over the world got a sneak peek into the inner workings of the Russian defence contractor NTC Vulkan. The Vulkan files leak provided an interesting behind the scenes look at Russian cyber capabilit...
•
49:58