Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/8e/5d/5b/8e5d5b37-3bba-55b6-baef-c675f4cc975f/mza_14177638430954617510.jpg/600x600bb.jpg
Secure Networks: Endace Packet Forensics Files
Michael Morris
61 episodes
1 day ago
Why NDR is Evolving—And What Enterprises Should Demand From It In this episode of the @Endace Packet Forensic Files, Michael Morris is joined by Jack Chan, VP of Product and Field CTO at Fortinet, to unpack what makes a truly effective Network Detection and Response (NDR) solution. Jack shares his perspective on why visibility, historical context, and deep threat hunting capabilities matter more than flashy features. They explore how AI and machine learning are transforming NDR—helping ...
Show more...
Technology
Business,
News,
Tech News
RSS
All content for Secure Networks: Endace Packet Forensics Files is the property of Michael Morris and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Why NDR is Evolving—And What Enterprises Should Demand From It In this episode of the @Endace Packet Forensic Files, Michael Morris is joined by Jack Chan, VP of Product and Field CTO at Fortinet, to unpack what makes a truly effective Network Detection and Response (NDR) solution. Jack shares his perspective on why visibility, historical context, and deep threat hunting capabilities matter more than flashy features. They explore how AI and machine learning are transforming NDR—helping ...
Show more...
Technology
Business,
News,
Tech News
Episodes (20/61)
Secure Networks: Endace Packet Forensics Files
Episode 63: Jack Chan, VP of Product and Field CTO at Fortinet
Why NDR is Evolving—And What Enterprises Should Demand From It In this episode of the @Endace Packet Forensic Files, Michael Morris is joined by Jack Chan, VP of Product and Field CTO at Fortinet, to unpack what makes a truly effective Network Detection and Response (NDR) solution. Jack shares his perspective on why visibility, historical context, and deep threat hunting capabilities matter more than flashy features. They explore how AI and machine learning are transforming NDR—helping ...
Show more...
1 month ago
25 minutes

Secure Networks: Endace Packet Forensics Files
Episode 62: Jessica (Bair) Oppenheimer, Cisco's Director of Security Operations
What does it take to run a world-class Security Operations Center (SOC) in today’s high-stakes, high-speed cybersecurity landscape? In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Jessica (Bair) Oppenheimer, Cisco's Director of Security Operations, for an in-depth look at next-generation Security Operations Centers (SOCs). Jessica shares her expertise from securing high-stakes events like the Paris 2024 Olympics, NFL Super Bowl, Black Hat, and RSAC Conf...
Show more...
2 months ago
27 minutes

Secure Networks: Endace Packet Forensics Files
Episode 61: Jean-Pierre Bergeaux - Federal CTO, GuidePoint Security
In this episode of the @Endace Packet Forensics Files, I talk to Jean-Paul Bergeaux, Federal CTO at GuidePoint Security. We unravel the complex world of federal cybersecurity and discuss the critical importance of certifications, the game-changing M-21-31 directives, and how packet capture data is revolutionizing threat detection. We also uncover the potential risks and opportunities presented by generative AI in the cybersecurity landscape. From SolarWinds lessons to the emerging...
Show more...
4 months ago
22 minutes

Secure Networks: Endace Packet Forensics Files
Episode 60: James Spiteri - Director of Product Management for Security Analytics at Elastic
How Generative AI and Machine Learning are Revolutionizing Cybersecurity In this episode of the Endace Packet Forensic Files, Michael Morris explores how advanced technologies like AI and machine learning are transforming security operations with James Spiteri. With extensive experience in cybersecurity and security operations, including leading SOC teams and developing innovative solutions for AI and machine learning, James offers unparalleled insights. He delves into the growing sophistica...
Show more...
8 months ago
31 minutes

Secure Networks: Endace Packet Forensics Files
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert
Unlock the Power of Network Packet Data in CybersecurityIn this episode of the Endace Packet Forensics Files, Michael Morris dives into the critical role of network packet data in cybersecurity with Matt Bromiley, a seasoned threat-hunting expert. Matt shares why robust detection systems and proactive threat hunting are essential, and how network data serves as the “glue” that ties together evidence in cybersecurity investigations.The challenges of managing large data volumes, the growing rol...
Show more...
12 months ago
38 minutes

Secure Networks: Endace Packet Forensics Files
Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert
Ransomware has shifted from simple, isolated attacks to coordinated, human-operated campaigns that target entire organizations. In this episode of the Endace Packet Forensics Files, Michael Morris talks with Ryan Chapman, SANS Instructor and expert in Digital Forensic and Incident Response (DFIR) about these evolving threats. Ryan explains how attackers are becoming more methodical and sophisticated, focusing on disabling EDR/XDR solutions to evade detection and leaving organizati...
Show more...
1 year ago
28 minutes

Secure Networks: Endace Packet Forensics Files
Episode 55: Taran Singh - VP, Product Management at Keysight Technologies
In this episode, I chat with Taran Singh, VP of Product Management at Keysight Technologies, about network observability. Taran explains its importance within the zero-trust architecture and discusses the challenges organizations face in achieving clear network visibility. He highlights the role of historical data analysis in cybersecurity and outlines Keysight's approach to network visibility. Don’t miss this insightful discussion on network observability and its significan...
Show more...
1 year ago
17 minutes

Secure Networks: Endace Packet Forensics Files
Episode 54: Jake Williams - IANS faculty member, former SANS educator, computer science and information security expert and U.S. Army veteran.
In this episode of the Endace Packet Forensics Files, Michael chats with Jake Williams, aka @MalwareJake who delves into the concept of Zero Trust and its significance for organizations seeking to bolster their security defences.Discover how Zero Trust challenges traditional security models and learn about the crucial role of continuous verification and network visibility in mitigating threats. Gain valuable insights into networking fundamentals and the integration of cybersecurity principles...
Show more...
1 year ago
24 minutes

Secure Networks: Endace Packet Forensics Files
Episode 53: Tanya Janca - Head of Education and Community at Semgrep, Founder of WehackPurple, renowned cybersecurity expert, author and RSA Speaker.
In this episode of Secure Networks, Michael chats with Tanya Janka, aka SheHacksPurple, head of education and community at Semgrep and founder of We Hack Purple. Tanya discusses her transition from developer to security expert, the real issues behind the cybersecurity skills gap, and strategies for employee retention. She also dives into the implications of emerging technologies on security practices and the balance between automation and human expertise. Don’t miss these valuable insights.Vi...
Show more...
1 year ago
42 minutes

Secure Networks: Endace Packet Forensics Files
Episode 52: Caitlin Sarian - Cybersecurity Tiktok and Instagram influencer and CEO of Cybersecurity Girl LLC
In this episode of the Endace Packet Forensic Files, Michael Morris chats with Cybersecurity Tiktok and Instagram influencer Caitlin Sarian, CEO of Cybersecurity Girl LLC, who discusses her journey into the cybersecurity field and her mission to break down stigmas surrounding the industry.Caitlin highlights the need for continuous learning in the rapidly evolving cybersecurity landscape and recommends various channels for staying updated, including news alerts, newsletters, and professional g...
Show more...
1 year ago
25 minutes

Secure Networks: Endace Packet Forensics Files
Episode 51: Eric Buchaus, Director of Sales at Niagara Networks
Are SPAN ports sufficient to provide network traffic visibility for high-quality security (NDR) and network (NPM) investigations? What about cloud workloads? What do you need to gain insights into cloud network activity?In this episode of the Endace Packet Forensic Files, I talk with Eric Buchaus, Director of Sales at Niagara Networks. Eric outlines potential pitfalls and challenges associated with SPAN ports and highlights situations where they may fall short for network and security a...
Show more...
1 year ago
30 minutes

Secure Networks: Endace Packet Forensics Files
Episode 50: Martyn Crew - Senior Director, Solutions Marketing and Partner Technologies at Gigamon
In this episode of the Endace Packet Forensics Files, Michael Morris talks with Martyn Crew, Senior Director, Solutions Marketing and Partner Technologies at Gigamon, a 30-year veteran in the cyber security and network management space.Martyn shares his expertise on the limitations and risks associated with exclusively using log and meta-data as the primary resources for your security team's investigations. He discusses various use cases where network traffic and full packet data can play a c...
Show more...
1 year ago
29 minutes

Secure Networks: Endace Packet Forensics Files
Episode 49: ICS/SCADA security expert, Lionel Jacobs from Palo Alto Networks
In this Episode of Packet Forensics Files, Endace's Michael Morris talks to Lionel Jacobs, Senior Partner Engineer, ICS and SCADA security expert, at Palo Alto Networks. Lionel draws on his more than 25 years of experience in OT and almost a decade at Palo Alto Networks in discussing some of the challenges of securing OT, IoT and critical infrastructure from cyber-attack.Lionel talks about the challenge of detecting attacks in OT environments, how to spot unusual activity, and the importance ...
Show more...
2 years ago
29 minutes

Secure Networks: Endace Packet Forensics Files
Episode 48: Endace Security Manager, Al Edgar
In this Episode of Packet Forensics Files, Michael Morris asks Al Edgar, former Information Security Manager for Health Alliance - and now IT Security Manager at Endace - about some of the important areas a security leader needs to focus on and what new challenges they are facing.Firstly, Al says, it’s important to take an holistic approach to cybersecurity, by looking at the three critical components for robust security: people, processes, and technology. He stresses the importance of ...
Show more...
2 years ago
26 minutes

Secure Networks: Endace Packet Forensics Files
Episode 47: Network forensics and incident response specialist, Jasper Bongertz
What are some of the challenges of responding to a serious incident – such as a ransomware attack or advanced persistent attack? Where do you start, and what are the critical things you need to do?In this episode we are lucky to welcome Jasper Bongertz, Head of Digital Forensics and Incident Response at G DATA Advanced Analytics in Germany. Jasper has a wealth of experience from working in the front line of incident response at G DATA as well as in his previous role at Airbus. He also has a l...
Show more...
2 years ago
23 minutes

Secure Networks: Endace Packet Forensics Files
Episode 46: Gerald Combs, Wireshark and Stephen Donnelly, Endace
How did Wireshark come to be, and what’s made it so successful – not just as the pre-eminent tool for analyzing network packet data, but as an open-source project in general?In this episode Michael Morris talks to Wireshark founder, Gerald Combs, and Endace CTO, Stephen Donnelly, about the origins of Wireshark, and why packet capture data is so crucial for investigating and resolving network security threats and network or application performance issues.Gerald talks about the early days of Et...
Show more...
2 years ago
25 minutes

Secure Networks: Endace Packet Forensics Files
Episode 45: Dimitri McKay, Splunk
Increasingly complex systems, expanding threat landscape, and explosion in the number of potential entry points all make managing security at scale a daunting prospect. So what can you do to implement effective security at scale and what are some of the pitfalls to avoid?In this episode Michael Morris talks with Dimitri McKay, Principal Security Strategist and CISO Advisor at Splunk, about where to start addressing the challenges of security at scale. He highlights the importance of robust ri...
Show more...
2 years ago
27 minutes

Secure Networks: Endace Packet Forensics Files
Episode 44: David Monahan, Business Information Security Officer
Cyberthreats are something all organizations are facing. But Pharmaceutical and Healthcare Providers have some unique challenges and vulnerabilities and come in for more than their fair share of attention from threat actors. What can your SOC team learn from some of the best practices these organizations are implementing? Are you architecting your environment to separate IOT devices from other critical assets and are you managing them with the same level of scrutiny?In this episode I talk wit...
Show more...
2 years ago
26 minutes

Secure Networks: Endace Packet Forensics Files
Episode 43: Jim Mandelbaum, Gigamon
In this episode of the Endace Packet Forensic files, Michael Morris talks to Jim Mandelbaum, Field CTO at Gigamon, about what “security at scale” means. Jim draws on more than a decade of experience as a CTO in the security industry, and shares best-practise tips to ensure that as your infrastructure evolves, your security posture keeps pace.Jim highlights the importance of leveraging automation to help deal with the increasingly complex network environment. Key to this is having visibility i...
Show more...
2 years ago
20 minutes

Secure Networks: Endace Packet Forensics Files
Episode 42: RoseAnn Guttierrez, IBM
In this episode of the Endace Packet Forensic files, Michael Morris talks with RoseAnn Guttierrez, Technical Enablement Specialist BM at IBM Security and a former SOC analyst.Rose shares her experience of what a day in the life of a SOC engineer is really like. She discusses the best practices she and her team put in place to manage the day-to-day challenges and improve their security posture. She also highlights some of the tools that were most valued in their daily operations and the critic...
Show more...
2 years ago
19 minutes

Secure Networks: Endace Packet Forensics Files
Why NDR is Evolving—And What Enterprises Should Demand From It In this episode of the @Endace Packet Forensic Files, Michael Morris is joined by Jack Chan, VP of Product and Field CTO at Fortinet, to unpack what makes a truly effective Network Detection and Response (NDR) solution. Jack shares his perspective on why visibility, historical context, and deep threat hunting capabilities matter more than flashy features. They explore how AI and machine learning are transforming NDR—helping ...