Secure Networks: Endace Packet Forensics Files
"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.
Episodes
57 episodes
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert
Unlock the Power of Network Packet Data in CybersecurityIn this episode of the Endace Packet Forensics Files, Michael Morris dives into the critical role of network packet data in cybersecurity with Matt Bromiley, a seasoned t...
•
Episode 59
•
38:59
Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert
Ransomware has shifted from simple, isolated attacks to coordinated, human-operated campaigns that target entire organizations. In this episode of the Endace Packet Forensics F...
•
Season 1
•
Episode 57
•
28:02
Episode 55: Taran Singh - VP, Product Management at Keysight Technologies
In this episode, I chat with Taran Singh, VP of Product Management at Keysight Technologies, about network observability. Taran explains its importance within the zero-trust architecture and discusses the challenges organizations f...
•
Season 1
•
Episode 55
•
17:59
Episode 54: Jake Williams - IANS faculty member, former SANS educator, computer science and information security expert and U.S. Army veteran.
In this episode of the Endace Packet Forensics Files, Michael chats with Jake Williams, aka @MalwareJake who delves into the concept of Zero Trust and its significance for organi...
•
Season 1
•
Episode 54
•
24:36
Episode 53: Tanya Janca - Head of Education and Community at Semgrep, Founder of WehackPurple, renowned cybersecurity expert, author and RSA Speaker.
In this episode of Secure Networks, Michael chats with Tanya Janka, aka SheHacksPurple, head of education and community at Semgrep and founder of We Hack Purple. Tanya discusses her transition from developer to security expert, the real issues ...
•
Season 1
•
Episode 53
•
42:43
Episode 52: Caitlin Sarian - Cybersecurity Tiktok and Instagram influencer and CEO of Cybersecurity Girl LLC
In this episode of the Endace Packet Forensic Files, Michael Morris chats with Cybersecurity Tiktok and Instagram influencer Cai...
•
Season 1
•
Episode 52
•
25:36
Episode 51: Eric Buchaus, Director of Sales at Niagara Networks
Are SPAN ports sufficient to provide network traffic visibility for high-quality security (NDR) and network (NPM) investigations? What about cloud workloads? What do you need to gain insights into cloud network activity?In t...
•
Season 1
•
Episode 51
•
30:58
Episode 50: Martyn Crew - Senior Director, Solutions Marketing and Partner Technologies at Gigamon
In this episode of the Endace Packet Forensics Files, Michael Morris talks with Martyn Crew, Senior Director, Solutions Marketing and Partner Technologies at Gigamon, a 30-year veteran in the cyber security and network mana...
•
Season 1
•
Episode 50
•
29:23
Episode 49: ICS/SCADA security expert, Lionel Jacobs from Palo Alto Networks
In this Episode of Packet Forensics Files, Endace's Michael Morris talks to Lionel Jacobs, Senior Partner Engineer, ICS and SCADA security expert, at Palo Alto Networks. Lionel draws on his more than 25 years of experience in OT and almost a de...
•
Season 1
•
Episode 49
•
29:38
Episode 48: Endace Security Manager, Al Edgar
In this Episode of Packet Forensics Files, Michael Morris asks Al Edgar, former Information Security Manager for Health Alliance - and now IT Security Manager at Endace - about some of the important areas a security leader needs t...
•
Season 1
•
Episode 48
•
26:00
Episode 47: Network forensics and incident response specialist, Jasper Bongertz
What are some of the challenges of responding to a serious incident – such as a ransomware attack or advanced persistent attack? Where do you start, and what are the critical things you need to do?In this episode we are lucky to welcome...
•
Season 1
•
Episode 47
•
23:19
Episode 46: Gerald Combs, Wireshark and Stephen Donnelly, Endace
How did Wireshark come to be, and what’s made it so successful – not just as the pre-eminent tool for analyzing network packet data, but as an open-source project in general?In this episode Michael Morris talks to
•
Season 1
•
Episode 46
•
25:20
Episode 45: Dimitri McKay, Splunk
Increasingly complex systems, expanding threat landscape, and explosion in the number of potential entry points all make managing security at scale a daunting prospect. So what can you do to implement effective security at scale and what are so...
•
Season 1
•
Episode 45
•
27:21
Episode 44: David Monahan, Business Information Security Officer
Cyberthreats are something all organizations are facing. But Pharmaceutical and Healthcare Providers have some unique challenges and vulnerabilities and come in for more than their fair share of attention from threat actors. What can your SOC t...
•
Season 1
•
Episode 44
•
26:53
Episode 43: Jim Mandelbaum, Gigamon
In this episode of the Endace Packet Forensic files, Michael Morris talks to Jim Mandelbaum, Field CTO at Gigamon, about what “security at scale” means. Jim draws on more than a decade of experience as a CTO in the security indust...
•
Season 1
•
Episode 43
•
20:40
Episode 42: RoseAnn Guttierrez, IBM
In this episode of the Endace Packet Forensic files, Michael Morris talks with RoseAnn Guttierrez, Technical Enablement Specialist BM at IBM Security and a former SOC analyst.Rose shares her experience of what a day in the life of a SOC...
•
Season 1
•
Episode 42
•
19:19
Episode 41: Andrew Stewart, Senior National Security and Government Strategist, Cisco
In this episode of the Endace Packet Forensic files, Michael Morris talks with Andrew Stewart, Senior National Security and Government Strategist at Cisco. Andrew, CAPT, USN (Ret.) is a Senior Federal Strategist at Cisco where he implemen...
•
Season 1
•
Episode 41
•
19:39
Episode 40: Chris Greer, Packet Pioneer
Threat hunting is a critical cybersecurity activity that is growing in importance and prevalence around the globe. Are your SOC analysts developing the skills and toolsets they need to enable more efficient and effective threat hunting?&n...
•
Season 1
•
Episode 40
•
24:27
Episode 39: Justin Fier, VP Tactical Risk and Response, Darktrace
In this episode, Endace's Michael Morris welcomes back Justin Fier, VP Tactical Risk and Response at Darktrace (who was our very first guest in this series almost 40 episodes ago!) to talk about nation-state cyber, where he...
•
Season 1
•
Episode 39
•
18:38
Episode 38: Hakan Holmgren, EVP of Sales, Cubro
As data growth accelerates and distributed workloads increase, enterprises are prioritising cost efficiency and space minimization in modern datacenters. They are looking to leverage new technologies and use smaller, more cost-efficient applian...
•
Season 1
•
Episode 38
•
11:55
Episode 37: Rick Jenssen, VP of Global Operations, Plixer
In this episode of the Endace Packet Forensic files, Endace's Michael Morris talks with Rick Jenssen, VP of Global Operations for Plixer, who shares his ex...
•
Season 1
•
Episode 37
•
20:10
Episode 36: Neil Wilkins, Technical Director, EMEA, Garland Technology
What does it mean to have security at scale? For large infrastructures with rapid data growth have you maintained or improved your security posture as you have scaled?In this episode of the Endace Packet Forensic files Michael Mor...
•
Season 1
•
Episode 36
•
23:05
Episode 35: Timothy Wilson-Johnston, Value Chain Security Lead at Cisco
What did we learn from the recent Log4J 2 vulnerability? How are security holes like this changing the way organizations think about deploying enterprise software solutions?In this episode of the Endace Packet Forensic files Michael Mor...
•
Season 1
•
Episode 35
•
15:45
Episode 34: Rick Peters, CISO Operational Technology, Fortinet
Increasingly the security of Operational Technology (OT) - Industrial Control Systems - is a major focus of concern. These systems are used in many environments across industries such as manufacturing, transportation, energy, critical infrastru...
•
Season 1
•
Episode 34
•
24:03
Episode 33: Ron Ross, Fellow at NIST
In this episode of the Endace Packet Forensic files Michael Morris talks with Ron Ross, Fellow at NIST, who shares how cyber security standards are evolving to keep pace with new threats and challenges. Ron highlights where he see...
•
Season 1
•
Episode 33
•
22:51