Artwork

Contenido proporcionado por Jacob Garrison. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jacob Garrison o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Common Weaknesses Used By Cyber Attackers w/ David Ethington, Information Security Architect at Paramount

48:16
 
Compartir
 

Manage episode 360452492 series 3466455
Contenido proporcionado por Jacob Garrison. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jacob Garrison o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episodios

Artwork
iconCompartir
 
Manage episode 360452492 series 3466455
Contenido proporcionado por Jacob Garrison. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jacob Garrison o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida