Armed Services, Social Engineering and Sensationalist Reporting — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Michel Huffaker, director of threat intelligence at ThreatQuotient, talks about cybersecurity issues facing the armed services, recent issues in the news and her thoughts on sensationalized security reporting.

In the podcast, Huffaker and host Chris Sienko discuss:

  •  What are some of the biggest security issues facing the armed services? (1:00)
  • Are there any attack vectors or social engineering techniques specific to the military? (1:55)
  • What are some of the more surprising phishing attacks that have actually worked? (2:25)
  • Are there any specific educational initiatives to combat these issues? (3:45)
  • What are your thoughts on the creation of the Cyber Defense Initiative? (5:00)
  • What are some laws or regulations you would put in place to combat these security issues? (7:25)
  • Is there a behavior change that could be put in place to reduce the danger of phishing and cybercrime? (8:20)
  • What roles have threat hunting, threat intelligence and deception played in countermeasures against these threats? (8:50)
  • How are topics like hacking pacemakers being distorted by sensationalist reporting? (10:45)
  • Are there other high-profile stories you think are being sensationalized? (13:30)
  • What security issues should we worry about less — or worry about more? (14:50)

Learn more about security awareness:

See special offers for CyberSpeak with InfoSec Institute listeners:

You can watch a video version of the discussion below:

About CyberSpeak with InfoSec Institute

Get security awareness and IT training insight direct from the trenches in this weekly podcast hosted by InfoSec Institute’s Chris Sienko. Each week on CyberSpeak with InfoSec Institute, IT and security practitioners share their insights into a new topic, including security awareness, IT and security careers and (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Jeff Peters. Read the original post at: