Épisodes

  • S1E6_Radia_Perlman Spanning Tree Protocol SharkFest 2023 Network Security Quantum Blockchain
    May 25 2023

    Radia Perlman designed the Layer Two Spanning Tree algorithm used in near every network and is the keynote speaker at SharkFest 2023.  Her Network Security 3rd Edition just arriving on shelves offers updates on Blockchain and Quantum computing. 

    Welcome to an exclusive interview with a true networking pioneer and Visionary Radia Perlman, the renowned computer scientist and inventor of the spanning tree protocol. Keynote speaker for the upcoming Shark Fest Conference, Radia Perlman has made invaluable contributions to the field of computer networking.

    We have the privilege of diving in on her remarkable journey and gaining insights from her wealth of knowledge.

    Her new and clasical books can be purchased: 

    The Network Security book: https://www.informit.com/store/network-security-private-communication-in-a-public-9780136643609

    or at Amazon Network Security https://www.amazon.com/Network-Security-Charlie-Kaufman/dp/0136643604/ref=sr_1_1?crid=1ILOE8XEQDCWF&keywords=radia+perlman&qid=1684445649&sprefix=radia+perlman%2Caps%2C137&sr=8-1&ufe=app_do%3Aamzn1.fos.006c50ae-5d4c-4777-9bc0-4513d670b6bc

    As for Interconnections, I think it is cheaper on Amazon

    https://www.amazon.com/Interconnections-Bridges-Switches-Internetworking-Protocols/dp/0201634481/ref=sr_1_3?crid=1ILOE8XEQDCWF&keywords=radia+perlman&qid=1684445687&sprefix=radia+perlman%2Caps%2C137&sr=8-3

     

    SharkFest 2023 Conference

    https://sharkfest.wireshark.org/sfus/

     

     

     

    Voir plus Voir moins
    32 min
  • S1E5 Bank ATMs Down on Holiday Weekend
    Jan 23 2023

    Bill Alderson and Guest Bill Genovese discuss how a bank's ATM's go down on a holiday weekend disturbing an entire country. 

    Bill Genovese LinkedIn Profile

     

    Bill Genovese's team "parachuted" in to perform root cause analysis and workshops for the client team to improve resilience to prevent future disruptive events.  

    Here is a direct link to play the video for this Podcast https://customer-7ycaiddtws6ryn8x.cloudflarestream.com/4c54d33cac7e8c486acf4efd1a532aa4/watch 

    Link to Guest Introduction Videos and Alternate Distributions

    Guest: Nick Leghorn Director of Application Security at The New York Times offers a workshop on building effective Cyber Policies that aren't Miserable for Everyone. 

    https://customer-7ycaiddtws6ryn8x.cloudflarestream.com/9076eee7151e12ef0d223272333e5c49/watch 

    Podcast Website: https://Disaster.Stream 

    Voir plus Voir moins
    1 h et 12 min
  • S1 E3 US Digital War Biometric Watchlist Iraq Afgh
    Dec 19 2022

    First US digital war in Iraq Afgh uncovered insurgents using biometrics to create a Watchlist used to find insurgents from the general population. 

    The system failed to replicate between locations around the world impacting Iraq surge success. 

    Bill Alderson and his team were called upon by Pentagon Army G2 and Joint Chiefs to help USCENTCOM to diagnose and fix the problems related to biometric intelligence dossier replication. 

    Diagnosis was found and mitigations to rewrite and test the new software on a simulated war network at Fort Huachuca succeeded and soon the system was finding the worst insurgents speeding the saving of warfighter lives from IED's and other risks.  

    Here is a link to play the video for this Podcast

    https://customer-7ycaiddtws6ryn8x.cloudflarestream.com/02e790750b3e5349bea27378e53825cb/watch

    Link to Guest Videos and Alternate Distributions

    Guest: Jon DeMaggio Author of Art of Cyberwarfare full Video

    https://www.austincyber.show/post/the-art-of-cyberwarfare-insights-from-the-author-jon-dimaggio 

     

    Guest: Charlene Deaver-Vasquez Author of Mathematical Models for Forecasting Cyber Attacks

    https://www.austincyber.show/post/new-mathematical-models-for-forecasting-cyber-attacks 

     

    Podcast Website: https://Disaster.Stream 

    Voir plus Voir moins
    1 h
  • S1E2 911 Pentagon Disaster Recovery
    Dec 6 2022

    Actual responder story with exclusive exhibits from the 9/11 Pentagon disaster recovery transforming lessons-learned to best practices that can save you millions and months if implemented in your environment before a disaster. These best practices are actually free, but require advanced consideration and thought to reap the rewards. The biggest tragedy of a disaster are the simple things you can learn from other's disasters to obviate some disasters and recover faster. Bill Alderson's team of five experts were called to the Pentagon immediately following the disaster to lead the server and data communications systems rapidly. Bill will introduce you to two influential military and authors of CISO books.

    Links to Introductions 

    Intro to full session from Gary Hayslip Author CISO Primer

    https://customer-7ycaiddtws6ryn8x.cloudflarestream.com/e45cb28cdd06b16e1b699123ee977a66/watch

     

    Intro to full session from Col David Wills CENTCOM JOINT STAFF STRATCOM 

    https://customer-7ycaiddtws6ryn8x.cloudflarestream.com/ceaad7d26b4cfe163efba50cf929ab55/watch 

     

    Voir plus Voir moins
    1 h et 5 min
  • S1E1 Stock Market DDOS Attack
    Oct 28 2022

    US Stock Market DDOS Distributed Denial of Service Attack

    Responder Stories: Bill Alderson, Duke Tunstall 

    Consequential Organizations and People Introductions

    Vinton Cerf, Father of the Internet VP, Google

    Charlie Lewis: Expert Associate Partner, McKinsey & Company

    Jeffrey Caso, Associate Partner and Cyber Expert, McKinsey & Company

    Paul Barrett, Enterprise CTO, NetScout

    Debbie Gordon, Founder & CEO, Cloud Range Cyber

    Bryan Lares, VP of Product, ExtraHop 

    www.disaster.stream 

    Voir plus Voir moins
    48 min