Épisodes

  • Ep. 30 - Google Cloud Next Recap - Security, AI Solutions
    Apr 22 2025

    Opening Summary:
    In this episode, Brad Bussie and Mark Aksel unpack the key security takeaways from Google Cloud Next 2025. From AI-powered threat detection to innovative SecOps integrations and game-changing cyber insurance developments, this episode gives enterprise security leaders the insights they need to stay ahead.

    Topics Covered:

    • Google’s Unified Security Platform: Merging Mandiant, Siemplify, Chronicle, and VirusTotal into a single, AI-powered SecOps ecosystem.
    • Agentic AI in Threat Detection: How Google is using AI agents to empower, not replace, analysts.
    • Security Posture & Insurance: Google's partnerships with Beazley and Chubb to reduce premiums based on real-time security posture.

    Key Takeaways:

    • Google's integration of acquisitions (Chronicle, Mandiant, etc.) under the GUS platform shows a clear focus on unifying threat detection and response.
    • Agentic AI is redefining how analysts work—augmenting, not replacing, human roles in security ops.
    • The addition of Mandiant Threat Defense directly into SecOps offers expert-level defense in-platform.
    • Google’s Data Security Posture Management tool will now monitor AI training data—crucial for model integrity and compliance.
    • The new Expanded Risk Protection Program may lower cyber insurance premiums by proving better security posture.

    Mentions & References:

    • Google Cloud Next 2025
    • Mandiant Threat Defense
    • Google Unified Security (GUS)
    • Gemini AI
    • Data Security Posture Management (DPSM)
    • Beazley and Chubb (Cyber Insurance)

    Time Stamps with Highlights:
    00:00 – Intro & The Gaming Interview Origin Story
    01:30 – Why IT security podcasting took a break & the value of seasonality
    03:10 – Google Cloud Next Overview – 244 announcements, only ~10-15 security focused
    05:00 – Partner Summit: Crowds, chaos, and how security tracks drew high attention
    06:00 – Google Unified Security (GUS): Combining Mandiant, Siemplify, Chronicle & more
    07:00 – AI-powered security suite using Gemini for threat detection & response
    08:30 – Agentic AI: Giving analysts superpowers, not replacing them
    11:00 – Agentic AI for reverse-engineering obfuscated scripts – live demo recap
    13:00 – Role of human enhancement with AI in SecOps
    15:00 – Mandiant Threat Defense: Bringing elite responders directly into Google SecOps
    19:30 – DPSM: Discover, govern, and monitor even AI training data—huge for security teams
    24:00 – Expanded Risk Protection Program: Cyber insurance discounts from Beazley & Chubb
    28:00 – How cyber insurance pricing is evolving with real-time posture scoring
    30:00 – Startup Hub insights: Best part of Google Next for spotting security innovation
    36:00 – Final thoughts: AI, security, and where Google is headed next

    Follow Us:

    • LinkedIn: https://www.linkedin.com/company/e360solutions
    • Facebook: https://www.facebook.com/e360solution
    • X (Twitter): https://twitter.com/e360_solutions
    • YouTube: https://www.youtube.com/@e360solutions

    About the Show:
    The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.

    About e360:
    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    Voir plus Voir moins
    38 min
  • EP. 29 - Unlocking the Future of Google SecOps: Automation, AI, and the Evolution of SIEM
    Oct 14 2024

    In this episode, Brad Bussie is joined by Svetla Yankova, CEO of Citreno, to discuss the evolution of Google SecOps. They dive deep into how automation, AI, and cloud-native solutions are transforming security operations and the promise (and limitations) of SIEM solutions.


    Topics Covered:

    • The evolution of Google SecOps and the role of Chronicle and Siemplify
    • What is SecOps? A Simplified Explanation
    • The Broken promise of SIEM and how SecOps is evolving
    • Best practices for implementing effective SecOps in modern enterprises
    • The Future of SecOps: AI and Cloud-Native Solutions

    Key Takeaways:

    • Google SecOps integrates advanced threat intel and automation to improve security efficiency.
    • SIEM tools have evolved, but many organizations still struggle with data hygiene and correlating meaningful alerts.
    • The future of SecOps lies in risk-based, cloud-native solutions, combining AI with human oversight for smarter, faster decision-making.

    Mentions & References:

    • Google Chronicle and Siemplify (now part of Google SecOps)
    • Threat Intel through the Mandiant acquisition
    • VirusTotal integration for enhanced threat detection

    Time Stamps with Highlights:

    • 00:00 - Introduction to Enterprise IT Security
    • 01:04 - Meet the experts: Brad Bussie and Svetla Yankova
    • 02:00 - Exploring the evolving landscape of SecOps
    • 03:40 - The journey of Google SecOps: From secret moonshot project to powerful tool
    • 05:44 - Understanding SecOps: A simplified explanation
    • 07:17 - The rise of automation and AI in security operations
    • 10:24 - The evolution of SecOps technology and Google’s role
    • 15:18 - The broken promise of SIEM: Why many systems fall short
    • 20:00 - How SIEM is evolving with automation, SOAR, and AI
    • 26:30 - Best practices for effective SecOps implementation
    • 30:45 - The future of SecOps: AI, automation, and risk-aware solutions

    Follow Us:

    • LinkedIn: https://www.linkedin.com/company/e360solutions
    • Facebook: https://www.facebook.com/e360solution
    • X (Twitter): https://twitter.com/e360_solutions
    • YouTube: https://www.youtube.com/@e360solutions

    About the Show: The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity trends.

    About e360: e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises.

    Visit us: www.e360.com

    • (00:00) - Introduction to Enterprise IT Security
    • (01:04) - Meet the Experts: Brad Bussie and Svetla Yankova
    • (01:36) - Exploring the Evolving Landscape of SecOps
    • (02:58) - The Google SecOps Journey
    • (05:44) - Understanding SecOps: A Simplified Explanation
    • (08:22) - The Evolution of SecOps Technology
    • (15:18) - The Broken Promise of SIEM
    • (26:30) - Best Practices for Effective SecOps Implementation
    • (29:56) - The Future of SecOps: AI and Cloud-Native Solutions
    • (34:45) - Conclusion and Final Thoughts
    Voir plus Voir moins
    35 min
  • EP 28: AI is Moving Fast in Business—Security Teams Need to Move Faster
    Aug 19 2024

    In this episode, we explore the rapid rise of AI in businesses and the pressing need for security teams to stay ahead of the curve. As organizations increasingly adopt AI technologies, the potential for Shadow AI and other security risks grows. Brad Bussie, Chief Information Security Officer at e360, discusses how security leaders can navigate this wild west environment, protect their organizations from unseen threats, and ensure that AI innovations don't outpace security measures. Tune in to learn practical strategies for balancing AI adoption with robust security practices.

    Topics Covered:

    • The rapid adoption of AI in businesses and its implications for security.
    • What Shadow AI is and why it’s a growing concern.
    • How security teams can keep up with the fast-paced AI environment.
    • Practical tips for implementing AI governance and controls.
    • The changing dynamic between business users and security leaders.

    Key Takeaways:

    • AI adoption is accelerating across industries, making it crucial for security teams to adapt.
    • Shadow AI poses significant risks if not managed properly.
    • Security leaders must be proactive in implementing tools and strategies to protect their organizations.
    • Collaboration between business users and security teams is more important than ever.

    Time Stamps:

    • [00:00] Introduction and overview
    • [01:18] The current state of AI adoption in businesses
    • [10:34] The risks of Shadow AI and how to manage it
    • [16:44] How security teams can stay ahead in the AI era
    • [31:15] Real-world examples of AI transforming business practices
    • [32:44] The future of AI in business and the role of security teams

    Follow Us:

    • LinkedIn: https://www.linkedin.com/company/e360solutions
    • Facebook: https://www.facebook.com/e360solution
    • X (Twitter): https://twitter.com/e360_solutions
    • YouTube: https://www.youtube.com/@e360solutions

    About the Show:
    The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.

    About e360:
    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    • (00:00) - Introduction and Potential Risks of GenAI
    • (01:54) - Black Hat Insights and Shadow AI
    • (06:32) - AI Security Implementation Challenges
    • (17:58) - Live Demo: GenAI in Marketing
    • (24:43) - Security Considerations for AI
    • (40:25) - Future of AI and Closing
    Voir plus Voir moins
    42 min
  • Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue
    Jul 25 2024

    Ep. 27: From Updates to Outages: A Deep Dive into CrowdStrike's Recent Issue

    In this episode of "The State of Enterprise IT Security," Brad Bussie, Chief Information Security Officer at e360, is joined by Erin Carpenter, Sr. Director of Digital Marketing. They dive deep into the recent CrowdStrike incident, discussing its implications and broader cybersecurity themes.

    Topics Covered:

    • The CrowdStrike incident and its impact on organizations
    • Broader implications for other cybersecurity platforms
    • Strategies for ensuring cyber resiliency

    Key Takeaways:

    • Understand the details and scale of the CrowdStrike incident and how it affected organizations globally.
    • Learn about the broader implications for other cybersecurity platforms and the importance of cyber resiliency.
    • Gain insights into strategies for ensuring business continuity and preventing future widespread disruptions.

    Mentions & References:

    • CrowdStrike incident
    • Microsoft updates and blue screen issues
    • Strategies for IT resilience and redundancy

    Time Stamps with Highlights:

    • 00:00 - Introduction: Brad Bussie and Erin Carpenter discuss the episode's agenda
    • 01:37 - The CrowdStrike incident: Overview and impact
    • 04:00 - Broader implications for other cybersecurity platforms
    • 09:00 - Ensuring cyber resiliency: Lessons learned
    • 12:25 - Strategies for IT resilience and redundancy
    • 18:00 - Potential legal implications and GDPR considerations
    • 23:00 - Communicating with the board and stakeholders
    • 29:00 - Final thoughts and recommendations

    Follow Us:

    • LinkedIn https://www.linkedin.com/company/e360solutions
    • Facebook https://www.facebook.com/e360solution
    • X (Twitter) https://twitter.com/e360_solutions
    • YouTube https://www.youtube.com/@e360solutions

    About the Show:
    The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.

    About e360:
    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    Voir plus Voir moins
    36 min
  • Ep 26: Crime Reporter Identities Leaked, Cybersecurity Concerns in Automotive, Untrained Users Weaken Defense
    Jul 8 2024

    In this episode of the State of Enterprise IT Security Edition, Brad Bussie, Chief Information Security Officer at e360, discusses three critical topics affecting today's cybersecurity landscape.

    Topics Covered:

    • Data Breach in Baltimore: The identities of residents who reported crimes were leaked, highlighting severe risks to privacy and public safety. Brad explores the importance of protecting personal data, particularly in public services, and offers measures to prevent such breaches.
    • Cybersecurity in the Automotive Industry: A new study finds cybersecurity as the top concern among automotive manufacturers. With the rise of connected cars and autonomous driving, Brad delves into the vulnerabilities these technologies introduce and the steps manufacturers are taking to safeguard vehicles.
    • Untrained Users Weaken Cyber Defense: Untrained users are often the greatest weakness in a cyber defense plan. Brad explains how human error leads to significant security breaches and the importance of comprehensive cybersecurity training to mitigate these risks.

    Key Takeaways:

    • Robust data protection measures are essential for public services handling sensitive information.
    • The automotive industry's integration of digital technologies requires stringent cybersecurity practices.
    • Investing in cybersecurity training and fostering a security-aware culture can significantly reduce human error-related breaches.

    Mentions & References:

    • Baltimore City's 311 services data breach
    • High-profile automotive cybersecurity incidents (Jeep Cherokee and Tesla's autopilot system)
    • 2016 Democratic National Committee hack
    • Equifax data breach

    Time Stamps with Highlights:

    • [00:00] Introduction and Overview
    • [00:45] Data Breach in Baltimore: A Case Study
    • [05:44] Cybersecurity in the Automotive Industry
    • [11:08] Untrained Users Weaken Cyber Defense
    • [16:42] Conclusion and Final Thoughts

    Follow Us:

    • LinkedIn: https://www.linkedin.com/company/e360solutions
    • Facebook: https://www.facebook.com/e360solution
    • X (Twitter): https://twitter.com/e360_solutions
    • YouTube: https://www.youtube.com/@e360solutions

    About the Show:
    The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.

    About e360:
    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    • (00:00) - Introduction and Overview
    • (01:05) - Data Breach in Baltimore: A Case Study
    • (06:04) - Cybersecurity in the Automotive Industry
    • (11:28) - The Human Factor in Cybersecurity
    • (17:02) - Conclusion and Final Thoughts
    Voir plus Voir moins
    18 min
  • Ep. 25: Top Risks for CISOs in 2024, Recovering from AI Initiative Failures, and Benefits of Tuning Threat Intelligence to Your Business
    Jul 1 2024

    In this episode of The State of Enterprise IT Security, Brad Bussie dives into the crucial aspects and risks of being a Chief Information Security Officer (CISO). Explore why AI initiatives often fail and learn how to tailor threat intelligence to your business vertical for enhanced security.

    Topics Covered:

    • Risks involved with being a Chief Information Security Officer
    • Reasons behind the failure of AI initiatives and next steps
    • Benefits of tuning threat intelligence to your business vertical

    Key Takeaways:

    1. CISO Challenges: The immense responsibilities and pressures CISOs face, including legal, regulatory, and reputational risks.
    2. AI Initiative Failures: Common pitfalls in AI projects such as poor data governance, inadequate security measures, and integration challenges with legacy systems.
    3. Tailored Threat Intelligence: How tuning threat intelligence to specific business verticals can significantly enhance cybersecurity posture and proactive threat management.

    Mentions & References:

    • NIST AI Framework
    • OWASP Top 10 for LLM

    Time Stamps with Highlights:

    • [00:00:00] Introduction and Overview: High accountability and stress for CISOs.
    • [00:01:30] Risks of Being a CISO: High stakes, accountability, and evolving threat landscape.
    • [00:07:44] Challenges in AI Initiatives: Reasons AI initiatives fail and what steps to take next.
    • [00:13:31] Tuning Threat Intelligence: Benefits of tailored threat intelligence for different business verticals.
    • [00:22:01] Conclusion and Final Thoughts: Summarizing the importance of proactive security measures.

    Follow Us:

    • LinkedIn: https://www.linkedin.com/company/e360solutions
    • Facebook: https://www.facebook.com/e360solution
    • X (Twitter): https://twitter.com/e360_solutions
    • YouTube: https://www.youtube.com/@e360solutions

    About the Show:

    The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.

    About e360:

    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    • (00:00) - Introduction and Overview
    • (01:30) - Risks of Being a CISO
    • (07:44) - Challenges in AI Initiatives
    • (13:31) - Tuning Threat Intelligence to Your Business
    • (22:01) - Conclusion and Final Thoughts
    Voir plus Voir moins
    23 min
  • EP 24: Healthcare Edition: Securing Patient Data, AI vs. Traditional Cybersecurity, IoT Challenges in Healthcare
    Jun 17 2024

    In this FAQ-style episode of the State of Enterprise IT Security Podcast, Brad Bussie answers key questions in healthcare - securing patient data, the pros and cons of AI-based cybersecurity tools versus traditional methods, and how to tackle the complex challenges of securing IoT devices in patient care. Tune in to gain valuable insights that can help safeguard sensitive healthcare information.


    Topics Covered:

    • Best practices for securing patient data in healthcare settings
    • Advantages and disadvantages of AI-based cybersecurity tools versus traditional tools
    • Challenges and strategies for securing IoT devices used in patient care


    Key Takeaways:

    • Securing Patient Data: Implement encryption, establish access controls, conduct regular security training, and develop incident response plans.
    • AI vs. Traditional Cybersecurity Tools: AI tools offer real-time threat detection and adaptive learning but can be costly and prone to false positives. Traditional tools are more predictable but may struggle with new, sophisticated threats.
    • Securing IoT Devices: Use strong encryption, regularly update software, employ unique passwords, leverage multi-factor authentication, and segment networks to protect sensitive data.


    Mentions & References:

    • AES 256 Encryption
    • HIPAA compliance
    • Intrusion detection/prevention systems


    Time Stamps with Highlights:

    • [00:00] Introduction and overview of topics
    • [00:19] Brad Bussie introduces the episode and outlines the main topics
    • [01:16] Best practices for securing patient data
    • [07:06] AI-based cybersecurity tools vs. traditional tools
    • [13:36] Securing IoT devices in healthcare
    • [18:51] Closing remarks


    Follow Us:

    • LinkedIn: linkedin.com/company/e360solutions
    • Facebook: facebook.com/e360solution
    • X (Twitter): twitter.com/e360_solutions
    • YouTube: youtube.com/@e360solutions


    About the Show:
    The State of Enterprise IT Security podcast, hosted by e360, makes IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.


    About e360:
    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.

    Visit us: www.e360.com

    Voir plus Voir moins
    19 min
  • Ep. 23: Healthcare Edition: Hidden Costs of Upgrading Legacy Systems, Top Cybersecurity Solutions, Common Cybersecurity Challenges
    Jun 10 2024

    Healthcare organizations face a unique set of cybersecurity challenges, from protecting patient privacy under regulations like HIPAA to managing the hidden costs of upgrading legacy systems. In this episode, Brad Bussie dives into these critical issues and offers actionable insights for healthcare providers.

    Topics Covered:

    • Hidden Costs of Upgrading Legacy Systems
    • Highly Rated Cybersecurity Solutions for Healthcare Organizations
    • Common Cybersecurity Challenges in Healthcare


    Key Takeaways:

    Hidden Costs of Upgrading Legacy Systems:

    • Compatibility issues between new security solutions and older software.
    • Potential downtime and learning curves impacting day-to-day operations.
    • Integration challenges and risks of data loss during migration.
    • Financial costs including new software licenses, hardware, and ongoing maintenance.
    • Risks of vendor lock-in and hidden security vulnerabilities in legacy data.

    Highly Rated Cybersecurity Solutions for Healthcare:

    • Endpoint security for devices including medical equipment.
    • Threat and vulnerability management through regular scans and updates.
    • Network security using firewalls, intrusion detection/prevention systems, and secure VPNs.
    • Incident management and response through drills and tabletop exercises.
    • Data encryption at rest and in transit to protect patient information.
    • Identity and Access Management (IAM) to control access and prevent insider threats.
    • Regular security awareness training to mitigate human error.
    • Compliance management to adhere to regulations like HIPAA.

    Common Cybersecurity Challenges in Healthcare:

    • Protecting patient privacy and maintaining HIPAA compliance.
    • Dealing with outdated legacy systems that are vulnerable to cyber attacks.
    • The growing threat of ransomware and malware attacks.
    • Shortage of skilled cybersecurity professionals in the healthcare sector.
    • Security issues with Internet of Medical Things (IoMT) devices.
    • Financial constraints limiting investments in cybersecurity.
    • Managing third-party risks from numerous vendors.


    Time Stamps with Highlights:

    • [00:00:00] Introduction: Overview of healthcare cybersecurity challenges and importance of protecting patient privacy under HIPAA.
    • [00:01:17] Hidden Costs of Upgrading Legacy Systems: Discussing compatibility issues, potential downtime, and financial costs.
    • [00:06:00] Top Cybersecurity Solutions for Healthcare: Importance of endpoint security, threat management, network security, and incident response.
    • [00:10:23] Common Cybersecurity Challenges: Issues with legacy systems, ransomware threats, and shortage of skilled professionals.
    • [00:13:26] IoMT Device Security and Financial Constraints: New vulnerabilities from IoT devices and financial limitations post-pandemic.
    • [00:14:25] Third-Party Risks and Compliance Management: Managing risks from third-party vendors and maintaining regulatory compliance.
    • [00:15:15] Conclusion: Importance of a comprehensive approach to addressing cybersecurity challenges in healthcare.


    Follow Us:

    • LinkedIn: e360 Solutions https://www.linkedin.com/company/e360solutions
    • Facebook: e360 Solutions https://www.facebook.com/e360solution
    • X (Twitter): e360 Solutions https://twitter.com/e360_solutions
    • YouTube: e360 Solutions https://www.youtube.com/@e360solutions


    About the Show:

    The State of Enterprise IT Security podcast, hosted by e360, is your go-to source for making IT security approachable and actionable for technology leaders. Join us for insightful discussions and expert analysis on the latest cybersecurity topics and trends.


    About e360:

    e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services, driving digital transformation for global and national enterprises with top-tier expertise.


    Visit us:
    www.e360.com

    Voir plus Voir moins
    15 min