Discover401 Access Denied
401 Access Denied
Claim Ownership

401 Access Denied

Author: Delinea

Subscribed: 262Played: 7,194
Share

Description

Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet.

Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly.

Joe will be speaking with current leaders and experts in the IT and Cybersecurity fields discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent.

Whether you want to learn more about the latest hacking techniques, or navigate how to become a CISO, stay up to date with discussions and insight from the experts.
255 Episodes
Reverse
In this episode of 401 Access Denied, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through conferences to enhance compliance and reduce risks.Key Takeaways:Clear role definitions, audits, and training are key.Segregation of duties prevents errors and fraud.Community and conferences offer essential support and learning.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
H&R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack surface, including 10,000 retail locations and a seasonal workforce, Joshua has developed effective strategies for building highly collaborative teams, gaining executive buy-in, and driving adoption for security best practices.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Executive managing hacker at IBM X Force, known as Evil Mog, is a specialist in authentication security research and passwords. He joins Joe to discuss modern methods for abstracting passwords away from human decision-making and moving them into the background for stronger security. The two discuss how strategies for password management vary depending on your compliance needs, dependencies of legacy systems, and goals for user experience. You’ll learn best practices for managing enterprise passwords and other shared secrets to reduce user fatigue and avoid credential theft.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised?” And, of course, “How much are we willing to invest to protect it?” In this episode, Nathan Wenzler, field CISO and advisor, shares his perspective on the meaning of “Security-by-Design.” More than guiding how you implement security tools or write code, he views it as a mindset shift to view your security program through a risk lens, not purely a technical lens. He and Joe share recommendations for a risk-based security strategy and communicating metrics in the language of the business. Tune in to learn how you can build the case for security investments and a program that’s going to be successful in the long term.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategies for setting permissions and entitlements that avoid excess privileges and ensure every access request isn’t based on exceptions. They discuss a crawl-walk-run approach to adopting emerging technologies that leverage data and context for access controls that adapt dynamically.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and policy enforcement. Tune in to understand the shift towards dynamic access, the limitations of role-based access, and how event time data can enhance control models. Don’t miss this deep dive into achieving zero-standing privilege and the future of identity and access management!Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platforms benefit customers by streamlining the user experience with a set of shared services and a common interface. Learn how platforms bring together multiple use cases so that people get the information they need with context, so they can collaborate more effectively and make better decisions.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea X: https://x.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and practical advice!Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms, and business applications. Authentication, authorization, and governance work together to protect the identity framework across them all. Frank Vukovits, chief security scientist at Delinea, joins Joe to break down how each of these elements contributes to effective identity security. An experienced auditor, Frank shares the importance of compliant user provisioning for critical business applications such as Oracle, SAP, Netsuite, and Microsoft Dynamics, especially as employees join, change roles, and ultimately leave an organization. You'll see why permissions in these systems must be carefully managed through authentication, authorization, and governance to shrink your attack surface, avoid toxic conflicts, and reduce the potential for fraud.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Discover the importance of accuracy, transparency, and explainability in AI systems, and the balance needed between protecting citizens and fostering innovation.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expert on technology and organized crime joins Joe to share what he’s learned about the motives and techniques cyberattackers use to conduct their crimes. Listen in to learn their secrets. This is more than the typical discussion of phishing, social engineering and malware, as Geoff and Joe dig into the intricacies of cryptocurrency, money laundering, and diversionary tactics. The more you know about emerging techniques, the more prepared you’ll be to prevent, detect, and combat them.Rinsed: https://www.penguin.co.uk/books/455031/rinsed-by-white-geoff/9780241624838 Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authentication, authorization, and continuous monitoring. Don’t miss their expert advice on protecting credentials and staying ahead of evolving security threats.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine—can transform your risk management practices. Dive into his expert insights on the critical role of a CISO, effective third-party risk management, and the power of compelling storytelling to win stakeholder support. Plus, learn why Brent champions risk reduction over compliance and how Estonia's cutting-edge cybersecurity methods can inspire seamless, secure interactions.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such as stealing secrets and abusing trusted relationships. His videos, demos, and training sessions are essential resources for IT security pros in cloud or hybrid organizations. Listen in as he shares his research on how cloud services are commonly misused and exploited and breaks down the latest strategies for maintaining a strong security posture.Carlos' book: https://book.hacktricks.xyz/ Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Evil Mog is the Chief Architect of IBM X-Force, IBM's Hacking Incident Response and Threat Intelligence division, and a renowned password security researcher. He studies the movements of access brokers across the criminal software supply chain and warns that credentials are being traded on the Dark Web for pennies on the dollar, stored in Github, and driving the growth of identity-based attacks. Meanwhile, shared passwords, reused passwords, legacy software, and the growth of AI applications makes effective authentication challenging. He and Joe discuss the latest research on the current state of passwords and how they’re evolving for layered authentication and authorization. You’ll learn how you can move manual password processes into the background and improve security through password managers, passkeys, MFA tokens, FIDO2 and other techniques. If you have questions about passwordless authentication, you’ll want to tune in.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Allan Friedman of the Cybersecurity and Infrastructure Security Agency (CISA) explains how creating a Software Bill of Materials (SBOM) for any application you build helps you improve quality control and proactively address your customers' security questions. You'll learn how to build SBOMs into your process and increase collaboration between vendors and buyers to improve the security of the global supply chain.Connect with Allan: Website: http://allan.friedmans.org/LinkedIn: https://www.linkedin.com/in/allanafriedman/Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
In this episode, Joseph Carson interviews Art Gilliland, CEO of Delinea, about the challenges and trends in identity security. They discuss the shift in identity security from infrastructure-centric to security-centric, driven by the move to cloud and SaaS products. They highlight the importance of visibility and security controls in a decentralized infrastructure. The conversation also covers the concepts of authentication, authorization, and governance in identity security. They explore the future of digital wallets and federated identity, as well as the need for consolidation and convergence in authorization. The episode concludes with a call to prioritize identity as a security asset.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
Joe Carson and Louis Zezeran explore why the ethos that drives gamers is so relevant for hackers. As they note, the culture and ideas attackers are using today often stem from the environment of retro gaming. Both groups use techniques such as reverse engineering, modifying signals, upscaling, and software emulation. Though most retro games simply want to improve their own experiences and keep playing the games they love, malicious hackers and criminal gangs are skirting restrictions and copyrights to stop sales. Joe and Louis share ideas on how gaming and hacking communities can learn from each other. Plus, their recollections of classic games will make you nostalgic for the early days of gaming and their recommendations for new games will get you reaching for the console.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
What do public sector organizations need to know about ransomware trends, identity-based attacks, and incident response? Hear from Dan Lohrmann, Field CISO for the public sector at Presidio and co-author of Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions. He and Joe discuss the reasons for ransomware’s decline in 2022 and subsequent acceleration in 2023, as threat agents leverage AI, social engineering, data exfiltration, and ransomware-as-a-service techniques. Dan shares the background of recent ransomware incidents that have impacted state, local, and educational organizations in Texas, Florida, and Michigan. You’ll get tactical recommendations on how to test your incident response plan with best practices for tabletop exercises and emergency communications.Connect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
As founding chief executive of the UK National Cyber Security Centre (NCSC), Ciaran Martin sits at the intersection of national security, law, and politics. In this episode, he and Joe discuss how the UK NCSC took on the challenge of understanding security concerns and best practices from the private sector and translating them into effective crisis communications and policy changes. They share stories of cyber threats and attacks on critical infrastructure, and the impact these incidents have on citizens financially, physically, and psychologically. You’ll get a look at what it took to update the UK’s cybersecurity posture, including understanding the severity of different types of cyberattacks and data breaches, incident response, and threat intelligence, to improve the country’s cyber resilience.Connect with Ciaran:Twitter: @ciaranmartinoxfLinkedIn: https://ie.linkedin.com/in/martinciaranConnect with Delinea:Delinea Website: https://delinea.com/Delinea LinkedIn: https://www.linkedin.com/company/delinea/Delinea Twitter: https://twitter.com/delineaincDelinea Facebook: https://www.facebook.com/delineaincDelinea YouTube: https://www.youtube.com/c/delinea
loading