Conf T with your SE

Cisco System Engineers

  • 1 hour 23 minutes
    Ep 65 - Day in the Life of a SOC Analyst
    Summary   This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC analyst. The conversation also delves into the tools and technologies used in a SOC, the career path of a SOC analyst, and the importance of passion and continuous learning in the IT industry. In this conversation, Bryan and Jordan discuss the qualities of a SOC analyst, the challenges and rewards of the job, significant threats and their mitigation, collaboration with other teams, the role of AI in the SOC, future threats such as quantum computing, and advice for aspiring SOC analysts. They also share funny incidents that have occurred in the SOC. Overall, the conversation highlights the importance of continuous learning, effective communication, and a passion for cybersecurity in the SOC role.   Takeaways
    • A SOC (Security Operations Center) is responsible for mitigating threats and analyzing network data to identify potential security breaches.
    • Communication and collaboration are crucial skills for SOC analysts, especially in a remote work environment.
    • SOC analysts need to prioritize and manage alerts effectively to differentiate between actual threats and false positives.
    • Key skills for SOC analysts include analytical thinking, programming knowledge, and incident handling.
    • Becoming a SOC analyst typically involves obtaining a degree in cybersecurity and gaining experience through tiered roles within a SOC team. SOC analysts should have a passion for cybersecurity and be coachable and willing to learn.
    • Challenges in the SOC can be mentally taxing, but the job is rewarding when able to identify and mitigate threats.
    • Collaboration with other teams, such as security engineers, is crucial for a cohesive and effective defense.
    • AI can play a role in automating certain aspects of the SOC, such as alerting and response.
    • Future threats, including quantum computing, should be considered and prepared for in the SOC.
    • Aspiring SOC analysts should be open to learning, ask questions, and embrace the challenges of the job.
    4 March 2024, 3:13 pm
  • 52 minutes 40 seconds
    Ep 64 - Pen Testing and Remediation
    Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity

    Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network Technologies. Dive deep with us as we explore the critical roles that penetration testing and remediation play in safeguarding organizations against digital threats.

    Main Themes:
    • The Importance of Penetration Testing: Our guests discuss how penetration tests are crucial for identifying weaknesses in a variety of infrastructural setups, from small businesses to large enterprises.

    • Cybersecurity Remediation: Learn about the steps that need to be taken once vulnerabilities are found, and the importance of timely and effective action to protect an organization’s data integrity.

    • Awareness of Cyber Risks: Megan and Ryan stress the need for organizations to be fully aware of the potential risks to their clients, suppliers, and internal operations. They also address the unique challenges faced by organizations without specialized IT teams or a Chief Information Security Officer (CISO).

    • Internal Collaboration: Drawing parallels with the development issues of the Ford Pinto, the discussion turns to the importance of internal collaboration within organizations to prevent and mitigate security risks.

    • Keeping Up with Evolving Threats: The ever-changing landscape of cybersecurity means constant vigilance and updates to security measures are necessary. The episode touches on the possibility of using automation to stay ahead of the game, especially with the emergence of state-sponsored cyber threats.

    • Partnership with Driven: Hear about Secure Network Technologies’ partnership with Driven and how it has helped in pinpointing security vulnerabilities.

    • Call to Action: Listeners are encouraged to visit the podcast’s website for more information and resources, and to share the episode with others who are interested in cybersecurity.

    Don’t miss this in-depth conversation that could help you better understand and improve your organization’s cyber defenses. Stay safe and stay informed!

    Remember to subscribe and share Episode 64 with your network. Until next time, keep your data secure and your systems checked!

    For additional resources and episode transcripts, please visit our website. If you have questions or topics you’d like us to cover in future episodes, reach out to us through our contact page.

    6 December 2023, 1:52 pm
  • 1 hour 3 minutes
    Ep 63 - Quantum Computing

    Episode Summary: In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena.

    Key Points Discussed:

    • Quantum computing's impact on current encryption standards.
    • How recorded encrypted data can be at risk in the future with advancements in quantum computing.
    • The urgency and challenges in transitioning to post-quantum cryptography.
    • The roles of NIST and NSA in standardizing new cryptographic measures.
    • The legal and personal implications for CISOs in the wake of cybersecurity breaches.
    • Global efforts towards developing quantum-resistant cryptographic standards.

    Notable Quotes:

    • "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols."
    • "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption."
    • "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology."

    Resources Mentioned:

    Call to Action:

    Closing Thoughts: Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.

    22 November 2023, 4:04 pm
  • 55 minutes 27 seconds
    Ep 62 - Empowering our Veterans in the Digital Age

    Show Notes: Episode 62 - Empowering Veterans in the Digital Age

     

    - Guest Introduction:    - Guests from Tech4Troops, an organization providing free computers and education programs to veterans.    - Guests share their military backgrounds, highlighting their experiences and challenges.

    - Importance of Supporting Veterans:    - Conversation emphasizes the significance of supporting veterans and addressing their unique needs.    - Tech4Troops' mission to bridge the digital divide for veterans is highlighted.

    - Role of Video Games:    - Guests discuss the positive impact of video games on their lives, aiding in relaxation and camaraderie.    - Highlight the therapeutic benefits of gaming for veterans.

    - Commitment to Sustainability:    - Tech4Troops' commitment to sustainability, data destruction, and recycling efforts are discussed.    - The environmental benefits of e-waste recycling are highlighted.

    - Educating Veterans:    - Tech4Troops' in-person programs across the US to educate veterans in computer usage are emphasized.    - The importance of providing education and skills to veterans for their successful transition is discussed.

    - Call to Action:    - Encourage listeners to donate their electronics to support Tech4Troops' initiatives.    - Highlight the significance of recycling e-waste for a sustainable future.    - Express desire for expansion, collaboration with an educational institution, and increased support for veterans nationwide.

    Links

    Tech for Troops - https://techfortroops.org/

    Donate to T4T - https://techfortroops.org/support/donate/

    T4T Discord - https://discord.gg/jkqNAg9bT9

    T4T Twitch - http://twitch.tv/tech4troops

    8 November 2023, 11:52 am
  • 54 minutes 57 seconds
    Ep 61 - Tales from the De-Crypt

    In this Halloween-themed episode, the hosts share several spooky and comical IT horror stories submitted by listeners. One mishap involved a prank wav file being mistakenly played on thousands of households. Another incident recounted a technician's struggle to fix power outages amid a tropical storm. Mistakes like wrong hard drive shipments and accidental data erasure are also shared. 

    The speaker highlights the impact of network configuration errors and the importance of thorough double-checking. Lessons from various IT professionals are shared, including stories about wrong interface deletions, eerie experiences like a basement full of satanic symbols, close calls, and being trapped in an elevator. Other tales involve humorous incidents, near-death experiences, a hacking incident, and dealing with flash floods.

    Data centers with outdated equipment and piles of wires, comical encounters like spilling beer on the boss, and intricate phone system repairs turned lawsuits are discussed. Finally, an intricate cable management disaster resulting in a severe power outage affecting thousands of people is shared. The speaker expresses gratitude, encourages listeners to connect on social media, and emphasizes the need to back up configurations.

    **Links:**

    - Follow Alexis - https://linktr.ee/digital.byte - Join the Discord - https://discord.conft.show - Driven - https://www.driven.tech

    Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

    31 October 2023, 1:01 pm
  • 1 hour 13 minutes
    Ep 60 - Safeguarding Bytes with Fortinet

    In this episode of Conf T with your SE, host Bryan Young welcomes special guest Steve Staurovsky from Fortinet. They start by discussing their previous meeting at the CT NUG event and the wide range of products in Fortinet's portfolio. The importance of interoperability and collaboration with other vendors in the industry is highlighted. Steve emphasizes the need for securing operational technology (OT) environments, especially in industrial and healthcare settings, where secure access and data transmission are crucial.

    The conversation then shifts to the challenges of securing and updating machines in the manufacturing industry that are connected to the network but cannot be easily updated due to their age. The speakers stress the importance of keeping these assets online and the difficulties in finding replacements or compatible hardware. They also discuss the lack of interaction between IT and OT, the vulnerabilities created by preventative maintenance schedules and legacy applications, and the increasing sophistication of ransomware attacks. Fortinet's EDR product is mentioned as a solution for securing legacy devices such as old versions of Windows.

    The need for legacy asset support is further emphasized through a story about a critical asset running on an outdated system. Fortinet's ability to run on unsupported assets and provide peace of mind is highlighted. The conversation then moves on to Fortinet's FortiLink feature, which enables traffic routing through the firewall, offering advantages in terms of defense in depth strategy and flexibility. The evolution of FortiGate firewall from separate boxes for different functions to a single integrated solution is discussed, along with the variety of hardware sizes, feature sets, and licensing options available.

    The speakers then delve into the cycle of expansion and contraction in IT, from mainframes and terminals to the current cloud services and multiple clouds. They touch on the increasing need for processing power and how the cloud addresses this demand. The conversation takes a nostalgic turn as they reminisce about gaming, specifically playing Unreal Tournament and attending a LAN party at the Rochester Institute of Technology. Fortinet's free training and certification program, offered during the pandemic, is mentioned, with praise for its high quality and polished production.

    The importance of using correct terminology in the IT industry is emphasized, along with a personal anecdote about using the correct terms with a doctor. The discussion briefly touches on Chromebooks and the speaker's experience with an original CR-48 Chromebook from Google. The speakers stress the significance of understanding and using the correct terminology in IT and networking, highlighting its impact on communication and professionalism. They also mention the benefits of having knowledge in electrical systems within the IT industry.

    The conversation veers towards programming and its integration into networking, mentioning the use of Postman and sharing their experiences with programming tasks. They conclude by briefly mentioning upcoming merchandise related to their podcast and recommending checking out Fortinet's training and certification at training.fortinet.com. The features of FortiGates, including the use of custom ASICs for better performance and lower power requirements, are discussed. The issues with the supply chain and its impact on product availability are touched upon, with an overall optimistic outlook for improvement.

    The cloud management capabilities of Fortinet's products are then explored, with a focus on FortiManager. The speaker explains how FortiManager allows centralized management and logging of devices, making changes and ensuring synchronization across multiple devices easier. The ability to templatize network configurations for scalability and automation is mentioned, along with the advantages of using FortiManager compared to manual device configuration. The availability of an Ansible playbook for automation is highlighted, and the importance of training to fully utilize Fortinet's offerings is emphasized. The diverse portfolio of Fortinet beyond the well-known FortiGate firewall is mentioned, and listeners are encouraged to explore their products. The episode concludes with an invitation to join the CT Network Users Group's Discord channel and to review and share the show.

     

    Links

    Discord: https://discord.conft.show

    Fortinet Training: https://training.fortinet.com

    11 October 2023, 4:35 pm
  • 1 hour 10 minutes
    Ep 59 - Redefining Storage with Pure Storage

    Show Notes: Episode 59 - Redefining Storage with Pure Storage | Conf T with your SE

    Overview In this episode of Conf T with your SE, Bryan Young welcomes Chandler Bassett from Pure Storage. Together, they explore the groundbreaking world of affordable SSD storage and discuss the history and evolution of Pure Storage. Tune in to learn about the company's innovative solutions to Flash reliability concerns, its execution pipeline, and its advanced technology for enhancing storage performance and efficiency.

    Topics Covered

    • Introduction to Pure Storage, a pioneer in redefining the storage array industry.
    • Insight into Pure Storage's software-driven approach and its impact on Flash reliability.
    • Pure Storage's execution pipeline and commitment to projections.
    • Introduction to Purity, Pure Storage's technology for managing wear leveling and cell health degradation.
    • Discussion on different features of Pure Storage arrays depending on the product family.
    • Analysis of the shift from traditional hard drives to SSDs and its implications.

    In-Depth Conversations

    • Examination of NAND flash storage, Pure arrays, Pure One, and SSDs.
    • Addressing concerns regarding supply chain disruptions due to factory fires and natural disasters.
    • Understanding the long-term benefits and future-proofing of investing in advanced storage solutions.
    • Exploring the Evergreen concept as a foundational model for Pure Storage.

    Pure Storage Products

    • Flash Arrays for legacy workloads, offering various data services and feature sets.
    • FlashBlade, originally built for analytics, now used primarily for data protection.
    • Portworx, a tool that simplifies microservices or Kubernetes-based architecture.
    • Collaboration with Cohesity to enhance data protection software.

    Concluding Thoughts

    • Reiteration of the importance of Evergreen and its role in keeping Pure's fleet modern.
    • Discussion on the environmental benefits and efficiencies of using Pure's technologies.
    • Chandler’s passion for Pure's product and platform, and his commitment to helping customers.
    • Invitation for listeners to join the discussion on Discord and to explore Pure's innovative solutions.

    Connect with Us

    • Join the conversation on Discord.
    • Reach out to Bryan Young for more insights.
    • Discover more about Pure Storage with Chandler Bassett.

    Don't miss out on this in-depth exploration of Pure Storage and the redefinition of storage solutions in the modern age. Tune in now!

    27 September 2023, 10:00 am
  • 1 hour 36 minutes
    Ep 58 - Demystifying NaaS with Nile Secure

    **Show Notes:**

    In this episode, Bryan sits down with experts Austin Hawthorne and Michael Kowal from Nile to unpack the intriguing topic of networking as a service. Dive into the discussions that span from defining the technology to its market implications and challenges.

    **Topics Covered:**

    - Introduction to Networking as a Service:   - Defined as tech always ready for business needs without complexities and costs.   - Other definitions including broadband, outsourcing IT, and managed services.    - Market Expectations:   - Influence of cloud adoption disrupting the market.   - Need for alignment of spend based on business performance.    - Challenges:   - For incumbent vendors to adjust due to tech debt, customer, and market demands.   - Complexity of delivering network as-a-service compared to other as-a-service offerings.    - Speed Benefits:   - Frequent software upgrades, faster fixes, and reduced failure radius.    - Network Deployment:   - Standardizing approaches for predictive outcomes.   - Secure networking involving zero trust and RADIUS.    - Automation & Configuration:   - Addressing underlying complexities before introducing automation.   - Reducing bugs through streamlined testing and the concept of a digital twin.    - Vendor Challenges:   - Existing codebase sizes, feature support, and delay in fixes and new features.   - Documenting profiles for new QS features and identifying bug dependencies.    - Security Aspects:   - Approaches to network edge security.   - Challenges between security and network teams.   - The trade-off between risk, complexity, and cybersecurity insurance.    - Zero-Trust Principles:   - Challenges with implementing dynamic ACLs, roles, and more.   - Importance of encryption, authorization, and enforcement.   - Limitations of traditional networking setups using VLANs.    - Firewalls:   - Machine-to-machine traffic and security benefits.   - Local switching and RADIUS and DHCP server roles.    - Network Access Control (NAC):   - Definition and implementations.   - SSO as a form of NAC and Zero Trust constructs for the network layer.    - Nile Network:   - Payment models and Proof of Value (POV) offerings.    - Network Implementation & Automation:   - Benefits of automation over manual approaches.   - Introduction of soft bots and Nile service block.    - Closing Notes:   - Visit the show's website, rate, and review the episodes, and reach out with questions, comments, or suggestions.

    ---

    **Links:**

    - Nile Secure - www.nilesecure.com - Join the Discord - discord.conft.show - Driven - www.driven.tech

    Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

    13 September 2023, 10:00 am
  • 19 minutes 37 seconds
    Ep 57 - The Next Chapter

    Bryan and Tom share some big announcements around the future of the podcast.

     

    Connect With Bryan: https://www.linkedin.com/in/bryyoung/

    Connect With Tom: https://www.linkedin.com/in/thomas-porto-6a97b05a/

    28 July 2023, 10:00 am
  • 1 hour 9 minutes
    Ep 56 - Cisco Live '23 Recap

    Welcome to Episode 56 of Conf T with your SE, where we do a complete recap of Cisco Live '23. Bryan Young and Tom Porto are joined by Sal Limura and Alexis Bertholf for a full discussion.

    In this episode, we dive into all the latest announcements from Cisco Live '23, including:

    1. Enterprise Networking: A deep dive into the evolution and future of enterprise networking.
    2. New Branding for Enterprise Networking Gear: An overview of the exciting rebrand and what it means for Cisco's product line.
    3. Pervasive AI with AI Enhanced RRM: Explore how AI is revolutionizing Radio Resource Management.
    4. MultiCloud Defense: Discuss the expanding role of multicloud strategies in today's rapidly evolving digital landscape.
    5. New Firewall Hardware: Discover the latest updates to Cisco's firewall hardware and the potential implications for cybersecurity.
    6. New Industrial Switches and Wireless APs: A look at the newest industrial switches and access points, and the benefits they bring to various industries.
    7. Data Center Enhancements with the Nexus Dashboard: An inside look at the new enhancements to the Nexus Dashboard that optimize data center operations.
    8. New Hardware and Innovations for Webex: Learn about the latest Webex hardware and innovations that are improving communication and collaboration.

    And much more!

    Links:

    12 July 2023, 10:00 am
  • 1 hour 3 minutes
    Ep 55 - E-mail Threat Defense

    Welcome to the latest episode of Conf T with your SE, hosted by Bryan Young and Tom Porto. In this insightful episode, we welcomed the delightfully eloquent British guest, Paul Jones, to discuss an ever-pervading issue in today's tech landscape - email security.

    1. To kick off the discussion, we dove into why email security remains a significant concern today, despite advancements in tech. It turns out, email is still the number one attack vector.

    2. We explored the evolution of email security, shifting from gateway devices to our cutting-edge cloud-based API-driven email security solution.

    3. This transformation begs the question - is the era of the email gateway over?

    4. We learned about ETD (Email Threat Detection) - a powerful email security tool fortified by AI. What's the secret sauce behind its efficacy?

    5. Paul shared some fascinating insights into the history of ETD, tracing its roots and growth.

    6. The conversation navigated towards Microsoft's email security. Is it sufficient, or should users look elsewhere?

    7. We learned about heuristic engines and their role in email security. These engines analyze message content, the number of recipients, and included links to identify malicious messages.

    8. The use of search capabilities to locate and take action on messages within your environment was another enlightening segment.

    9. Aside from tech, we got a sneak peek into Paul's passion - woodworking. Check out his exquisite craftsmanship at BeesBoardsMA.com.

    This episode was a deep dive into the nuances of email security, its importance, and the future of email protection tools. Tune in and get to know more about the world of cybersecurity.

    28 June 2023, 10:00 am
  • More Episodes? Get the App
About Conf T with your SE
© MoonFM 2024. All rights reserved.