Artwork

Kandungan disediakan oleh Jacob Garrison. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Garrison atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !

Common Weaknesses Used By Cyber Attackers w/ David Ethington, Information Security Architect at Paramount

48:16
 
Kongsi
 

Manage episode 360452492 series 3466455
Kandungan disediakan oleh Jacob Garrison. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Garrison atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episod

Artwork
iconKongsi
 
Manage episode 360452492 series 3466455
Kandungan disediakan oleh Jacob Garrison. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Garrison atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

In Episode 3 of Champions of Security, Jacob Garrison interviews David Ethington, Information Security Architect at Paramount.

David has more than 20 years of experience as an IT Security Manager, intelligence officer, cybersecurity team leader, and senior security consultant, and IT Security Manager. David served in the United States Army, specializing in intelligence operations and cybersecurity. He was also a senior information security consultant, with extensive experience in penetration testing and auditing financial institutions. He was also previously the Security Manager for 3Degrees. He is currently working at Paramount as a Security Engineer. David has experience in both offensive and defensive cybersecurity, as well as systems administration and programming. He holds a bachelor’s degree in IT, and a master’s degree in Information Systems Engineering, as well as certifications such as CISSP, PNPT, Certified Ethical Hacker ITIL, and Project+. Previous certifications include Security+ and CCNA.

David and Jacob talk about:

↳ If you want to be in security, pick one specific branch and start learning the technical skills.

↳ Attackers look for common weaknesses - most attacks rely on simple mistakes.

↳ Companies must plan for compromise and adjust their permissions accordingly.

And so much more.

Be sure to listen to this episode, and so many of our other great episodes by hitting the follow button. Make sure to like and subscribe.

We hope you enjoy it!

  continue reading

16 episod

Todos los episodios

×
 
Loading …

Selamat datang ke Player FM

Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.

 

Panduan Rujukan Pantas

Podcast Teratas