CINXE.COM
FIRSTCON Podcast
<!doctype html><html lang="en" class="web tlp-clear" data-studio-config="eyJ4aHJDcmVkZW50aWFscyI6ZmFsc2UsInhockhlYWRlcnMiOnt9fQo="><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>FIRSTCON Podcast</title><link rel="alternate" type="application/rss+xml" href="https://www.first.org/newsroom/news/podcasts.xml" title="FIRSTCON Podcast" /> <meta property="og:title" content="FIRSTCON Podcast" /> <meta property="og:type" content="website" /> <meta property="og:image" content="https://www.first.org/_/img/1stcon-podcast.jpg" /> <meta property="og:url" content="https://www.first.org/newsroom/news/podcasts/" /> <meta property="og:site_name" content="FIRST — Forum of Incident Response and Security Teams" /> <meta property="fb:profile_id" content="296983660669109" /> <meta property="twitter:card" content="summary_large_image" /> <meta property="twitter:site" content="@FIRSTdotOrg" /> <meta property="twitter:image" content="https://www.first.org/_/img/1stcon-podcast.jpg" /><meta name="viewport" content="initial-scale=1,maximum-scale=1.0,user-scalable=no" /><link rel="icon" type="image/png" href="/1st.png" /><link rel="apple-touch-icon" sizes="128x128" href="/favicon.png" /><link rel="stylesheet" type="text/css" href="/_/web.css?20250324110510" /><link rel="stylesheet" type="text/css" href="/_/web.css?20250324110510" /></head><body><header><div id="header" data-studio="CU52CV1W8g"><div id="c3" data-studio="Yu8FjCC11g"><div id="topbar"> <div class="sites right"> <ul> <li><a href="https://support.first.org" class="kb-datalist"><img src="/_/img/icon-portal_support.svg" alt="FIRST Support" title="FIRST Support" /></a></li> <li><a href="https://portal.first.org" class="button"><span class="no-tiny">Member </span>Portal</a></li> </ul> </div> <div class="first-logo"> <p><a href="/"><img src="/_/img/first-org-simple-negative.svg" alt="FIRST.Org" title="FIRST" /></a></p> </div> <div class="nav"> <ul class="navbar"><li><a href="/about">About FIRST</a><ul><li><a href="/about/mission">Mission Statement</a></li><li><a href="/about/strategy/">Strategy Framework</a></li><li><a href="/about/history">History</a></li><li><a href="/about/sdg">Sustainable Development Goals</a></li><li><a href="/about/organization">Organization</a><ul><li><a href="/about/organization/directors">Board of Directors</a></li><li><a>Operations Team</a><ul><li><a href="/about/organization/ccb">Community & Capacity Building</a></li><li><a href="/about/organization/events">Event Office</a></li><li><a href="/about/organization/executive-director">Executive Director</a></li><li><a href="/about/organization/infrastructure">Infrastructure</a></li><li><a href="/about/organization/secretariat">Secretariat</a></li></ul></li><li><a href="/about/organization/committees">Committees</a><ul><li><a href="/about/organization/committees/compensation-committee">Compensation Committee</a></li><li><a href="/about/organization/committees/conference-program-committee">Conference Program Committee</a></li><li><a href="/about/organization/committees/membership-committee">Membership Committee</a></li><li><a href="/about/organization/committees/rules-committee">Rules Committee</a></li><li><a href="/about/organization/committees/standards">Standards Committee</a></li></ul></li><li><a href="/events/agm">Annual General Meeting</a></li><li><a href="/about/organization/reports">Annual Reports and Tax Filings</a></li></ul></li><li><a href="/about/policies">FIRST Policies</a><ul><li><a href="/about/policies/anti-corruption">Anti-Corruption Policy</a></li><li><a href="/about/policies/antitrust">Antitrust Policy</a></li><li><a href="/about/policies/bylaws">Bylaws</a></li><li><a href="/about/policies/board-duties">Board duties</a></li><li><a href="/about/bugs">Bug Bounty Program</a></li><li><a href="/about/policies/code-of-conduct">Code of Conduct</a></li><li><a href="/about/policies/conflict-policy">Conflict of Interest Policy</a></li><li><a href="/about/policies/doc-rec-retention-policy">Document Record Retention and Destruction Policy</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li><li><a href="/about/policies/gen-event-reg-refund-policy">General Event Registration Refund Policy</a></li><li><a href="/about/policies/event-site-selection">Guidelines for Site Selection for all FIRST events</a></li><li><a href="/identity">Identity & Logo Usage</a></li><li><a href="/about/policies/mailing-list">Mailing List Policy</a></li><li><a href="/about/policies/media">Media Policy</a></li><li><a href="/about/policies/privacy">Privacy Policy</a></li><li><a href="/about/policies/registration-terms-conditions">Registration Terms & Conditions</a></li><li><a href="/about/policies/terms">Services Terms of Use</a></li><li><a href="/about/policies/standards">Standards Policy</a></li><li><a href="/about/policies/diversity">Statement on Diversity & Inclusion</a></li><li><a href="/about/policies/translation-policy">Translation Policy</a></li><li><a href="/about/policies/travel-policy">Travel Policy</a></li><li><a href="/about/policies/uniform-ipr">Uniform IPR Policy</a></li><li><a href="/about/policies/whistleblower-policy">Whistleblower Protection Policy</a></li></ul></li><li><a href="/about/partners">Partnerships</a><ul><li><a href="/global/partners">Partners</a></li><li><a href="/global/friends">Friends of FIRST</a></li><li><a href="/global/supporters/">FIRST Supporters</a></li><li><a href="/about/sponsors">FIRST Sponsors</a></li></ul></li><li><a href="/newsroom">Newsroom</a><ul><li><a href="/newsroom/news">What's New</a></li><li><a href="/newsroom/releases">Press Releases</a></li><li><a href="/newsroom/news/media">In the News</a></li><li><a href="/podcasts">Podcasts</a><ul><li><a href="/newsroom/news/first-impressions/">FIRST Impressions Podcast</a></li><li><a href="/newsroom/news/podcasts/">FIRSTCON Podcast</a></li></ul></li><li><a href="/newsroom/newsletters">Newsletters</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li></ul></li><li><a href="/about/procurement">Procurement</a></li><li><a href="/about/jobs/">Jobs</a></li><li><a href="/contact">Contact</a></li></ul></li><li><a href="/members">Membership</a><ul><li><a href="/membership/">Becoming a Member</a><ul><li><a href="/membership/process">Membership Process for Teams</a></li><li><a href="/membership/process-associates">Membership Process for Associates</a></li><li><a href="/membership/process-liaisons">Membership Process for Liaisons</a></li><li><a href="/membership/#Fees">Membership Fees</a></li></ul></li><li><a href="/members/teams">FIRST Teams</a></li><li><a href="/members/liaisons">FIRST Liaisons</a></li><li><a href="/members/map">Members around the world</a></li></ul></li><li><a href="/global">Initiatives</a><ul><li><a href="/global/sigs">Special Interest Groups (SIGs)</a><ul><li><a href="/global/sigs/framework">SIGs Framework</a></li><li><a href="/global/sigs/academicsec" class="borderb">Academic Security SIG</a></li><li><a href="/global/sigs/ai-security">AI Security SIG</a></li><li><a href="/global/sigs/automation">Automation SIG</a></li><li><a href="/global/sigs/communications/">Cybersecurity Communications SIG</a></li><li><a href="/cvss">Common Vulnerability Scoring System (CVSS-SIG)</a><ul><li><a href="/cvss/calculator/4.0">Calculator</a></li><li><a href="/cvss/v4.0/specification-document">Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">User Guide</a></li><li><a href="/cvss/v4.0/examples">Examples</a></li><li><a href="/cvss/v4.0/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v4-0">CVSS v4.0 Documentation & Resources</a><ul><li><a href="/cvss/calculator/4.0">CVSS v4.0 Calculator</a></li><li><a href="/cvss/v4.0/specification-document">CVSS v4.0 Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">CVSS v4.0 User Guide</a></li><li><a href="/cvss/v4.0/examples">CVSS v4.0 Examples</a></li><li><a href="/cvss/v4.0/faq">CVSS v4.0 FAQ</a></li></ul></li><li><a href="/cvss/v3-1">CVSS v3.1 Archive</a><ul><li><a href="/cvss/calculator/3.1">CVSS v3.1 Calculator</a></li><li><a href="/cvss/v3.1/specification-document">CVSS v3.1 Specification Document</a></li><li><a href="/cvss/v3.1/user-guide">CVSS v3.1 User Guide</a></li><li><a href="/cvss/v3.1/examples">CVSS v3.1 Examples</a></li><li><a href="/cvss/v3.1/use-design">CVSS v3.1 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v3-0">CVSS v3.0 Archive</a><ul><li><a href="/cvss/calculator/3.0">CVSS v3.0 Calculator</a></li><li><a href="/cvss/v3.0/specification-document">CVSS v3.0 Specification Document</a></li><li><a href="/cvss/v3.0/user-guide">CVSS v3.0 User Guide</a></li><li><a href="/cvss/v3.0/examples">CVSS v3.0 Examples</a></li><li><a href="/cvss/v3.0/use-design">CVSS v3.0 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v2">CVSS v2 Archive</a><ul><li><a href="/cvss/v2/guide">CVSS v2 Complete Documentation</a></li><li><a href="/cvss/v2/history">CVSS v2 History</a></li><li><a href="/cvss/v2/team">CVSS-SIG team</a></li><li><a href="/cvss/v2/meetings">SIG Meetings</a></li><li><a href="/cvss/v2/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v2/adopters">CVSS Adopters</a></li><li><a href="/cvss/v2/links">CVSS Links</a></li></ul></li><li><a href="/cvss/v1">CVSS v1 Archive</a><ul><li><a href="/cvss/v1/intro">Introduction to CVSS</a></li><li><a href="/cvss/v1/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v1/guide">Complete CVSS v1 Guide</a></li></ul></li><li><a href="/cvss/data-representations">JSON & XML Data Representations</a></li><li><a href="/cvss/training">CVSS On-Line Training Course</a></li><li><a href="/cvss/identity">Identity & logo usage</a></li></ul></li><li><a href="/global/sigs/csirt">CSIRT Framework Development SIG</a></li><li><a href="/global/sigs/cyberinsurance">Cyber Insurance SIG</a><ul><li><a href="/global/sigs/cyberinsurance/events">Cyber Insurance SIG Webinars</a></li></ul></li><li><a href="/global/sigs/cti">Cyber Threat Intelligence SIG</a><ul><li><a href="/global/sigs/cti/curriculum/">Curriculum</a><ul><li><a href="/global/sigs/cti/curriculum/introduction">Introduction</a></li><li><a href="/global/sigs/cti/curriculum/cti-introduction">Introduction to CTI as a General topic</a></li><li><a href="/global/sigs/cti/curriculum/methods-methodology">Methods and Methodology</a></li><li><a href="/global/sigs/cti/curriculum/pir">Priority Intelligence Requirement (PIR)</a></li><li><a href="/global/sigs/cti/curriculum/source-evaluation">Source Evaluation and Information Reliability</a></li><li><a href="/global/sigs/cti/curriculum/machine-human">Machine and Human Analysis Techniques (and Intelligence Cycle)</a></li><li><a href="/global/sigs/cti/curriculum/threat-modelling">Threat Modelling</a></li><li><a href="/global/sigs/cti/curriculum/training">Training</a></li><li><a href="/global/sigs/cti/curriculum/standards">Standards</a></li><li><a href="/global/sigs/cti/curriculum/glossary">Glossary</a></li><li><a href="/global/sigs/cti/curriculum/cti-reporting/">Communicating Uncertainties in CTI Reporting</a></li></ul></li><li><a href="/global/sigs/cti/events/">Webinars and Online Training</a></li><li><a href="/global/sigs/cti/cti-program">Building a CTI program and team</a><ul><li><a href="/global/sigs/cti/cti-program/program-stages">Program maturity stages</a><ul><li><a href="/global/sigs/cti/cti-program/stage1">CTI Maturity model - Stage 1</a></li><li><a href="/global/sigs/cti/cti-program/stage2">CTI Maturity model - Stage 2</a></li><li><a href="/global/sigs/cti/cti-program/stage3">CTI Maturity model - Stage 3</a></li></ul></li><li><a href="/global/sigs/cti/cti-program/starter-kit">Program Starter Kit</a></li><li><a href="/global/sigs/cti/cti-program/resources">Resources and supporting materials</a></li></ul></li></ul></li><li><a href="/global/sigs/digital-safety">Digital Safety SIG</a></li><li><a href="/global/sigs/dns">DNS Abuse SIG</a><ul><li><a href="/global/sigs/dns/stakeholder-advice/">Stakeholder Advice</a><ul><li><a>Detection</a><ul><li><a href="/global/sigs/dns/stakeholder-advice/detection/cache-poisoning">Cache Poisoning</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dga">DGA Domains</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dns-as-a-vector-for-dos">DNS As a Vector for DoS</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dns-rebinding">DNS Rebinding</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dns-server-compromise">DNS Server Compromise</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dos-against-the-dns">DoS Against the DNS</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/domain-name-compromise">Domain Name Compromise</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/dynamic-dns-resolution-as-obfuscation-technique">Dynamic DNS (as obfuscation technique)</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/lame-delegations">Lame Delegations</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/local-resolver-hijacking">Local Resolver Hijacking</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/on-path-dns-attack">On-path DNS Attack</a></li><li><a href="/global/sigs/dns/stakeholder-advice/detection/stub-resolver-hijacking">Stub Resolver Hijacking</a></li></ul></li></ul></li><li><a href="/global/sigs/dns/policies">Code of Conduct & Other Policies</a></li><li><a href="/global/sigs/dns/dns-abuse-examples">Examples of DNS Abuse</a></li></ul></li><li><a href="/global/sigs/ethics">Ethics SIG</a><ul><li><a href="/global/sigs/ethics/ethics-first">Ethics for Incident Response Teams</a></li></ul></li><li><a href="/epss/">Exploit Prediction Scoring System (EPSS)</a><ul><li><a href="/epss/model">The EPSS Model</a></li><li><a href="/epss/data_stats">Data and Statistics</a></li><li><a href="/epss/user-guide">User Guide</a></li><li><a href="/epss/research">EPSS Research and Presentations</a></li><li><a href="/epss/faq">Frequently Asked Questions</a></li><li><a href="/epss/who_is_using">Who is using EPSS?</a></li><li><a href="/epss/epss_tools">Open-source EPSS Tools</a></li><li><a href="/epss/api">API</a></li><li><a href="/epss/papers">Related Exploit Research</a></li><li><a>Blog</a><ul><li><a href="/epss/articles/prob_percentile_bins">Understanding EPSS Probabilities and Percentiles</a></li><li><a href="/epss/articles/log4shell">Log4Shell Use Case</a></li><li><a href="/epss/articles/estimating_old_cvss">Estimating CVSS v3 Scores for 100,000 Older Vulnerabilities</a></li></ul></li><li><a href="/epss/partners">Data Partners</a></li></ul></li><li><a href="/global/sigs/msr/">FIRST Multi-Stakeholder Ransomware SIG</a></li><li><a href="/global/sigs/hfs/">Human Factors in Security SIG</a></li><li><a href="/global/sigs/ics">Industrial Control Systems SIG (ICS-SIG)</a></li><li><a href="/global/sigs/iep">Information Exchange Policy SIG (IEP-SIG)</a></li><li><a href="/global/sigs/information-sharing">Information Sharing SIG</a><ul><li><a href="/global/sigs/information-sharing/misp">Malware Information Sharing Platform</a></li></ul></li><li><a href="/global/sigs/le">Law Enforcement SIG</a></li><li><a href="/global/sigs/malware">Malware Analysis SIG</a><ul><li><a href="/global/sigs/malware/ma-framework">Malware Analysis Framework</a></li><li><a href="/global/sigs/malware/ma-framework/malwaretools">Malware Analysis Tools</a></li></ul></li><li><a href="/global/sigs/metrics">Metrics SIG</a><ul><li><a href="/global/sigs/metrics/events">Metrics SIG Webinars</a></li></ul></li><li><a href="/global/sigs/netsec/">NETSEC SIG</a></li><li><a href="/global/sigs/passive-dns">Passive DNS Exchange</a></li><li><a href="/global/sigs/policy">Policy SIG</a></li><li><a href="/global/sigs/psirt">PSIRT SIG</a></li><li><a href="/global/sigs/red-team">Red Team SIG</a></li><li><a href="/global/sigs/cpg">Retail and Consumer Packaged Goods (CPG) SIG</a></li><li><a href="/global/sigs/ctf">Security Lounge SIG</a></li><li><a href="/global/sigs/soc/">Security Operations Center SIG</a></li><li><a href="/global/sigs/tic/">Threat Intel Coalition SIG</a><ul><li><a href="/global/sigs/tic/membership-rules">Membership Requirements and Veto Rules</a></li></ul></li><li><a href="/global/sigs/tlp">Traffic Light Protocol (TLP-SIG)</a></li><li><a href="/global/sigs/transport">Transportation and Mobility SIG</a></li><li><a href="/global/sigs/vulnerability-coordination">Vulnerability Coordination</a><ul><li><a href="/global/sigs/vulnerability-coordination/multiparty">Multi-Party Vulnerability Coordination and Disclosure</a></li><li><a href="/global/sigs/vulnerability-coordination/multiparty/guidelines">Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure</a></li></ul></li><li><a href="/global/sigs/vrdx">Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)</a><ul><li><a href="/global/sigs/vrdx/vdb-catalog">Vulnerability Database Catalog</a></li></ul></li><li><a href="/global/sigs/wof">Women of FIRST</a></li></ul></li><li><a href="/global/governance">Internet Governance</a></li><li><a href="/global/irt-database">IR Database</a></li><li><a href="/global/fellowship">Fellowship Program</a><ul><li><a href="https://portal.first.org/fellowship">Application Form</a></li></ul></li><li><a href="/global/mentorship">Mentorship Program</a></li><li><a href="/hof">IR Hall of Fame</a><ul><li><a href="/hof/inductees">Hall of Fame Inductees</a></li></ul></li><li><a href="/global/victim-notification">Victim Notification</a></li><li><a href="/volunteers/">Volunteers at FIRST</a><ul><li><a href="/volunteers/list">FIRST Volunteers</a></li><li><a href="/volunteers/participation">Volunteer Contribution Record</a></li></ul></li><li><a href="#new">Previous Activities</a><ul><li><a href="/global/practices">Best Practices Contest</a></li></ul></li></ul></li><li><a href="/standards">Standards & Publications</a><ul><li><a href="/standards">Standards</a><ul><li><a href="/cvss">Common Vulnerability Scoring System (CVSS-SIG)</a></li><li><a href="/tlp">Traffic Light Protocol (TLP)</a><ul><li><a href="/tlp/use-cases">TLP Use Cases</a></li></ul></li><li><a href="/standards/frameworks/">Service Frameworks</a><ul><li><a href="/standards/frameworks/csirts">CSIRT Services Framework</a></li><li><a href="/standards/frameworks/psirts">PSIRT Services Framework</a></li></ul></li><li><a href="/iep">Information Exchange Policy (IEP)</a><ul><li><a href="/iep/iep_framework_2_0">IEP 2.0 Framework</a></li><li><a href="/iep/iep-json-2_0">IEP 2.0 JSON Specification</a></li><li><a href="/iep/iep-polices">Standard IEP Policies</a><ul><li><a href="https://www.first.org/iep/2.0/first-tlp-iep.iepj">IEP TLP Policy File</a></li><li><a href="https://www.first.org/iep/2.0/first-unknown-iep.iepj">IEP Unknown Policy File</a></li></ul></li><li><a href="/iep/iep_v1_0">IEP 1.0 Archive</a></li></ul></li><li><a href="/global/sigs/passive-dns">Passive DNS Exchange</a></li><li><a href="/epss">Exploit Prediction Scoring System (EPSS)</a></li></ul></li><li><a href="/resources/papers">Publications</a></li></ul></li><li><a href="/events">Events</a></li><li><a href="/education">Education</a><ul><li><a href="/education/first-training">FIRST Training</a><ul><li><a href="/education/trainings">Training Courses</a></li><li><a href="/education/trainers">FIRST Trainers</a></li></ul></li></ul></li><li><a href="/blog">Blog</a></li></ul> </div> </div> <div id="home-buttons"> <p><a href="/join" data-title="Join"><img alt="Join" src="/_/img/icon-join.svg"><span class="tt-join">Join<span>Details about FIRST membership and joining as a full member or liaison.</span></span></a> <a href="/learn" data-title="Learn"><img alt="Learn" src="/_/img/icon-learn.svg"><span class="tt-learn">Learn<span>Training and workshop opportunities, and details about the FIRST learning platform.</span></span></a> <a href="/participate" data-title="Participate"><img alt="Participate" src="/_/img/icon-participate.svg"><span class="tt-participate">Participate<span>Read about upcoming events, SIGs, and know what is going on.</span></span></a></p> </div></div></div></header><div id="body" data-studio="CU52CV1W8g"><div id="c1" data-studio="Yu8FjCC11g" class="p"><div class="section p tags" data-paginate="10"><h1>FIRSTCON Podcast</h1> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Fischer.mp3">2019 Episode 9: Seeing Clearly and Communicating Effectively to Address Event Overload– Thomas Fisher, FVT SecOps Consulting</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-09-27T12:00:00+00:00">Fri, 27 Sep 2019 12:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Is content king? Fisher argues data alone can lead us astray, instead, it is the story we should focus on. With a presentation loaded with artwork and visuals, Fisher hopes to teach statistic savvy security responders to see the bigger picture. What patterns appear when we take a step back? What narrative does the evidence summon? Question your answers and dive into this discussion with Chris and Martin.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-Fischer.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Fischer.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Whitty.mp3">2019 Episode 8: Developing a Conceptual Model for Insider Threat – Monica Whitty, University of Melbourne</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-09-20T12:00:00+00:00">Fri, 20 Sep 2019 12:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Not EVERYONE who tweets from the toilet at 6 in the morning is a Narcissist.” In this episode, Chris and Martin dive into a discussion with data savvy Monica Whitty about how to spot and stop an insider threat. Unfortunately, most insider attacks we never see coming, but as Whitty explains, hindsight can be a tool. Realizing that not every perpetrator is evil or malicious, companies can begin to see the data for what it really is: people. Navigate psychological factors and learn to spot warning signs in this perceptive podcast! </p></div> <audio src="https://media.first.org/podcasts/FIRST2019-Whitty.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Whitty.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Matsuda.mp3">2019 Episode 7: Blue-Team vs. Red-Team Tabletop Exercise – Chiyuki Matsuda, DeNA Co., Ltd. </a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-09-13T12:00:00+00:00">Fri, 13 Sep 2019 12:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>No computers, no worries! After favorable feedback from the 2018 Conference, Chiyuki and her team returned this year with even more tabletop fun. Chris and Martin get the inside scoop on how a little friendly competition creates an international platform for learning. Without technology, red and blue teams ultimately work together to solve a handful of security scenarios in this Choose Your Own Adventure style exercise.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-Matsuda.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Matsuda.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-KenMonro.mp3">2019 Episode 6: Recorded Live from FIRST 2019 – Ken Munro, Partner and Founder of Pen Test Partners, LLP</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-07-18T12:00:00+00:00">Thu, 18 Jul 2019 12:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join Chris John Riley and Martin McKeay live from annual FIRST conference in Edinburgh, Scotland as they interview Ken Munro. Ken is a partner and founder at Pen Test Partners, LLP and was the opening keynote for the 31st Annual FIRST Conference. </p></div> <audio src="https://media.first.org/podcasts/FIRST2019-KenMonro.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-KenMonro.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Butler-Bradley.mp3">2019 Episode 5: How to Manage the Tangled Web of Dependencies, Lisa Bradley and Jessica Butler of NVIDIA</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-06-17T12:00:00+00:00">Mon, 17 Jun 2019 12:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Missing out on #FIRSTCON19 this week! No worries! Join the interview in progress. Martin chats with Lisa Bradley (Senior Manager, NVIDIA PSIRT) and Jessica Butler (Senior Application Developer, NVIDIA) about their presentation at FIRST 2019 happening Monday, June 17 from 16:45-17:45.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-Butler-Bradley.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-Butler-Bradley.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-DesireeSacher.mp3">2019 Episode 4: Fingerpointing False Positives, Desiree Sacher of Finanz Informatik</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-06-13T14:00:00+00:00">Thu, 13 Jun 2019 14:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Desiree is a SOC Security Architect at Finanz Informatik. Desiree and Chris John Riley discuss her upcoming presentation that focuses on how to better integrate improvements into your security monitoring. Desiree presents at the 31st Annual FIRST Conference on Monday, June 17 at 12:45 in Fintry.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-DesireeSacher.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-DesireeSacher.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-RalfHund.mp3">2019 Episode 3: Malware Detection Cat and Mouse - Interview with Ralf Hund, CTO at VMRay</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-06-05T18:00:00+00:00">Wed, 05 Jun 2019 18:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Chris John Riley chats with Ralf Hund, CTO at VMRay and a supporter of the annual FIRST conference since 2016. Ralf shares his thoughts on the ongoing game of cat and mouse the industry is faced with when dealing with malware detection and the new protection technologies VMRay is working on in order to provide incident responders with faster and greater visibility to threats.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-RalfHund.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-RalfHund.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference,podcast"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-RLelewsky-MMurray.mp3">2019 Episode 2: Top Common Tabletop Exercise Failures - Michael Murray and Robert Lelewski, Secureworks</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-05-30T14:00:00+00:00">Thu, 30 May 2019 14:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! The guys speak with presenters, Mike Murray (Senior Manager) and Robert Lelewski (Proactive Services Team Lead) of Secureworks. The duo are presenting on Thursday, June 20th from 11:00-12:00 and will be sharing their experiences and takeaways from conducting over hundreds of tabletops across various organizations. Get a primer of their upcoming session in this interview.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-RLelewsky-MMurray.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-RLelewsky-MMurray.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-AndrewCormack.mp3">2019 Episode 1: Andrew Cormack, 2019 Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2019-05-17T18:30:00+00:00">Fri, 17 May 2019 18:30:00 +0000</p> <div class="p-summary" itemprop="description"><p>We’re kicking off the first episode of this year’s podcast with the man of the moment, Andrew Cormack, program chair of the 31st Annual FIRST Conference! Chris John Riley and Martin McKeay return as our podcast hosts once again and pick up where they left off almost a year ago during their last chat with Andrew. The guys touch on the program selection process, highlights of this year’s program, and what new things attendees will experience this year. Andrew is the Chief Regulatory Adviser at Jisc and a long time member and supporter of FIRST and the IR community.</p></div> <audio src="https://media.first.org/podcasts/FIRST2019-AndrewCormack.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2019-AndrewCormack.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-Cormack.mp3">2018 Episode 10: Live from FIRST | Andrew Cormack, 2019 FIRST Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-08-29T15:00:00+00:00">Wed, 29 Aug 2018 15:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! We’re closing out the 2018 podcast series with our 2019 program chair! Chris and Martin spend the last day of FIRST 2018 with a very well-known and very much appreciated active member of FIRST, Andrew Cormack. Andrew is the Chief Regulatory Adviser at Jisc Technologies and has graciously taken on the role of conference program chair for the 31st Annual FIRST Conference: Securing the Castle, June 16-21, 2019 in Edinburgh, Scotland. Take a listen and find out what Andrew has been up to and what he’ll be looking for to fill the 2019 program.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018-Cormack.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-Cormack.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-RobMcMillan.mp3">2018 Episode 9: Live from FIRST | How to Avoid Having a Really Bad Day...Rob McMillan, Research Director, Gartner</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-08-24T17:00:00+00:00">Fri, 24 Aug 2018 17:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Join Martin and Chris as they chat with Rob McMillan and discuss the evolution of incident response. Rob is the Research Director at Gartner and former co-founder and general manager of AusCERT. Rob was a featured keynote speaker at the 2018 annual conference.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018-RobMcMillan.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-RobMcMillan.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-BruceSchneier.mp3">2018 Episode 8: Live from FIRST | Bruce Schneier, CTO, IBM Resilient</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-08-09T14:00:00+00:00">Thu, 09 Aug 2018 14:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Chris John Riley interviews one of our favorites and a long-time supporter of FIRST, Bruce Schneier. Bruce is currently the CTO at IBM Resilient and lecturer at Harvard Kennedy School. While Bruce was not presenting at this year's conference, he stopped by to hang-out with the FIRST community to talk shop and talk about his new book, <em>"Click Here to Kill Everybody"</em>. Listen in to this fun and engaging interview. Special thanks to IBM Resilient for their continued support of FIRST and their sponsorship of the annual conference banquet.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018-BruceSchneier.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-BruceSchneier.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-TIME.mp3">2018 Episode 7: Live from FIRST | Paresh Khetani, Head of Enterprise Solution Evangelist, TIME Malaysia</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-07-30T20:00:00+00:00">Mon, 30 Jul 2018 20:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Each year, FIRST works with local teams to help locate an internet solutions provider willing to provide the conference with its own direct connectivity independent of the conference venue. This year with the championing of Cybersecurity Malaysia, FIRST was lucky enough to gain the support of TIME dotcom – one of Malaysia’s leading ISPs. Join the interview in progress as Chris chats with Paresh on the types of security challenges they face as an ISP and how they are planning for the future.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018-TIME.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018-TIME.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_Bryant_MSFT.mp3">2018 Episode 6: Jerry Bryant, Principal Security Program Manager, Microsoft Security Response Center</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-06-21T14:00:00+00:00">Thu, 21 Jun 2018 14:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Chris and Jerry discuss Microsoft’s involvement with FIRST over the past 15 years, new training materials, PSIRTs, threat information sharing, and more. Microsoft will be exhibiting at the 30th Annual FIRST Conference.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_Bryant_MSFT.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_Bryant_MSFT.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_Netflix.mp3">2018 Episode 5: Alex Maestretti and Swathi Joshi, Netflix…Learning from Chaos</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-06-21T13:00:00+00:00">Thu, 21 Jun 2018 13:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Chris and Martin interview the team from Netflix - Alex Maestretti (Security Intelligence and Response Team) and Swathi Joshi (Senior Technical Program Manager, SIRT). The duo will be presenting, “Learning from Chaos, Cloud and Scale: Netflix SIRT,” on 25 June @12:15 in the Sabah Ballroom.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_Netflix.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_Netflix.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,conference"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_VMray.mp3">2018 Episode 4: Chad Loeven, VP Sales & Marketing, VMRay</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-06-20T13:00:00+00:00">Wed, 20 Jun 2018 13:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join this week's interview in progress! Chris and Martin chat with Chad Loeven, VP of Sales & Marketing at VMRay. Chad talks VMRay, their mission, and why they got involved with FIRST and how it has become one of their favorite communities to be a part of. VMRay has been a supporter of the FIRST community and conference since 2016. Be sure to visit with them in the exhibit area.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_VMray.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_VMray.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcast,TLP,IEP"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_TomMillar.mp3">2018 Episode 3: Tom Millar, Technical Advisor, Office of the Under Secretary, NPPD, DHS</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-06-12T21:00:00+00:00">Tue, 12 Jun 2018 21:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring Tom Millar. Tom has been an active FIRST community member for years and is no stranger to the annual conference. This year, Tom will present on the following topics, “TLP to IEP Evolution: What, Why & How,” on 28 June and “Professionalizing the Field of Cybersecurity Incident Response,” on 29 June.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_TomMillar.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_TomMillar.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article" data-subject="podcasts,GDPR,privacy"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_ThomasFischer.mp3">2018 Episode 2: Thomas Fischer – Don’t Ignore GDPR; It Matters Now!</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-06-04T13:00:00+00:00">Mon, 04 Jun 2018 13:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>May 28th has come and gone…Thomas Fischer, independent data protection advocate talks GDPR. How do you define personal data? Who is accountable? What is actionable and fineable? Join the interview in progress and be sure to join Thomas on Thursday, June 28th from 11:00-12:00 in the Management/Privacy Track for what is sure to be a lively discussion.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_ThomasFischer.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_ThomasFischer.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_JeffreyCarpenter.mp3">2018 Episode 1: Jeffrey Carpenter, 2018 Conference Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2018-05-24T13:00:00+00:00">Thu, 24 May 2018 13:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Let's get things rolling with this season's podcast series! Chris John Riley and Martin McKeay return as our hosts. Episode 1 features 2018 Program Chair, Jeffrey Carpenter. Jeff is Senior Director of Threat Intelligence and Incident Response Consulting at SecureWorks and has been an active member, supporter, and all-around various hat-wearer of FIRST over the years. Jeff talks program goals, session insights, and things to expect at this year's 30th anniversary celebration event.</p></div> <audio src="https://media.first.org/podcasts/FIRST2018_JeffreyCarpenter.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2018_JeffreyCarpenter.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_AlexPinto.mp3">2017 Episode 5: Alex Pinto, Chief Data Scientist at Niddel and lead of the MLSec Project</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2017-06-06T10:00:00+00:00">Tue, 06 Jun 2017 10:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Martin chats with Alex Pinto, Chief Data Scientist at Niddel and lead of the MLSec Project on his upcoming presentation, “Beyond Matching: Applying Data Science Techniques to IOC-Based Detection.” Alex talks about the glamorous life of a data scientist and shares some of the key takeaways from his presentation. Alex presents on Monday, June 12 at 11:15-12:00. </p></div> <audio src="https://media.first.org/podcasts/FIRST2017_AlexPinto.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_AlexPinto.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_BenStock.mp3">2017 Episode 4: Ben Stock, Post-Doc researcher at CISPA, Saarland University</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2017-06-05T20:00:00+00:00">Mon, 05 Jun 2017 20:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring Ben Stock, post-doc researcher at CISPA, Saarland University as he discusses the highlights of his research regarding vulnerability notification. Ben and his colleague Christian Rossow, Professor of IT Security at CISPA, Saarland University will be presenting, “Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification,” on Tuesday, June 13th at 11:45-12:15.</p></div> <audio src="https://media.first.org/podcasts/FIRST2017_BenStock.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_BenStock.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_Surevine.mp3">2017 Episode 3: Lewis Philbey, Cyber-security Lead at Surevine</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2017-05-31T22:00:00+00:00">Wed, 31 May 2017 22:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join this week’s interview in progress as the guys talk TRUST. Lewis Philbey, Cyber-security Lead at Surevine shares his insight on issues that companies of all sizes face when sharing information. The guys also hit on some of the hurdles individuals new to the information security world face within group sharing and why organizations like FIRST exist to vet and foster trusted forums. Surevine is the official sponsor of the Sunday Ice Breaker Reception on June 11th. We’ll see you there!</p></div> <audio src="https://media.first.org/podcasts/FIRST2017_Surevine.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_Surevine.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_ChadTilbury.mp3">2017 Episode 2: Chad Tilbury, Technical Director at CrowdStrike and Senior Instructor at the SANS Institute</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2017-05-22T18:00:00+00:00">Mon, 22 May 2017 18:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring seasoned forensic investigator, Chad Tilbury. Chad is currently the Technical Director at CrowdStrike and a Senior Instructor at the SANS Institute. Windows credentials are arguably the largest vulnerability affecting the modern enterprise. Martin, Chris, and Chad talk common attacks, mitigation techniques, best practices, and what to attendees can expect to take away from Chad's workshop. Chad presents Monday, June 12 from 11:15-12:45 at the 29th Annual FIRST Conference at the Caribe Hilton, San Juan, Puerto Rico.</p></div> <audio src="https://media.first.org/podcasts/FIRST2017_ChadTilbury.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_ChadTilbury.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_Derrick_Scholl.mp3">2017 Episode 1: Derrick Scholl, Director of the Security Incident Response Team at Juniper, FIRST BoD and 2017 Conference Liaison</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2017-05-17T13:50:00+00:00">Wed, 17 May 2017 13:50:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! FIRST's official podcast team, Martin McKeay and Chris John Riley, are back! Martin and Chris kick off this year's series with FIRST Board of Director and 2017 Conference Liaison, Derrick Scholl. Amazing programming and new opportunities are abundant this year. Find out more about how you can make the most of your time at the 29th Annual FIRST Conference and what NOT to miss out.</p></div> <audio src="https://media.first.org/podcasts/FIRST2017_Derrick_Scholl.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2017_Derrick_Scholl.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016-Joao_Gouveia-Nuno_Vieira_da_Silva-AnubisNetworks.mp3">2016 Episode 9: AnubisNetworks Team Talks Asia-Pacific, Growth of Mobile</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-07-28T18:05:00+00:00">Thu, 28 Jul 2016 18:05:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! The discussion dives into the very relevant issues that the AnubisNetworks team has been researching and fighting that have been arising out of the Asia-Pacific region. Chris chats with Joao Gouveia, CTO at AnubisNetworks and Nuno Vieira da Silva, Head of Sales at AnubisNetworks. AnubisNetworks has been a supporter and sponsor of the Annual FIRST Conference since 2015.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016-Joao_Gouveia-Nuno_Vieira_da_Silva-AnubisNetworks.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016-Joao_Gouveia-Nuno_Vieira_da_Silva-AnubisNetworks.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016-Alex_Sierra-Alex_Pinto.mp3">2016 Episode 8: Sharing is Caring - Alex Sierra and Alex Pinto of Niddel</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-07-28T18:00:00+00:00">Thu, 28 Jul 2016 18:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Martin chats with Alex Sierra, CTO of Niddel and Alex Pinto, Chief Data Scientist at Niddel about their presentation, "Sharing is Caring: Understanding and Measuring Sharing Effectiveness." This presentation was delivered at the 28th Annual FIRST Conference in Seoul, South Korea, June 13, 2016.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016-Alex_Sierra-Alex_Pinto.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016-Alex_Sierra-Alex_Pinto.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_StuartMurdoch_Surevine.mp3">2016 Episode 7: A Global Perspective on Voluntary vs. Mandatory Information Sharing with Stuart Murdoch, Founder and CEO at Surevine</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-06-09T12:09:00+00:00">Thu, 09 Jun 2016 12:09:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Stuart Murdoch and Chris John Riley tackle the messy subject of breach disclosures and how different companies and countries are handling the information sharing process. Does mandating this type of information sharing actually reduce the amount of information being shared? What are the platforms/infrastructure available? Stuart is Founder and CEO of Surevine, an SME specializing in smart and secure collaboration technology. Surevine is the official sponsor of the Ice Breaker Reception at the 28th Annual FIRST Conference in Seoul, South Korea. Meet Surevine on Sunday evening, June 12th and then again Tuesday, June 14th-16th at FIRSTCON16.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_StuartMurdoch_Surevine.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_StuartMurdoch_Surevine.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_MoatazSalah.mp3">2016 Episode 6: How to Discover Cyber Security Talents – Moataz Salah of CyberTalents</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-06-09T12:08:00+00:00">Thu, 09 Jun 2016 12:08:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Founder of Bluekaizen (a company focused on cyber security education), Moataz joins Chris Jon Riley to discuss the global issue facing organizations today – identifying and hiring skilled cyber security professionals. Moataz presents his full presentation on Wednesday, June 15th @ 16:00-16:30 at the 28th Annual FIRST Conference in Seoul, South Korea.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_MoatazSalah.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_MoatazSalah.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_Adobe.mp3">2016 Episode 5: Decade of Change: Tom Cignarella & David Lenoe from Adobe</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-06-09T12:07:00+00:00">Thu, 09 Jun 2016 12:07:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Tom and Dave give insights on their upcoming presentation focusing on the lessons learned along the way at Adobe and the landscape to come. Tom and Dave present on Tuesday, June 14th @ 13:00-14:30 at the 28th Annual FIRST Conference in Seoul, South Korea.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_Adobe.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_Adobe.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_MarieMoeEireannLeverett_FINAL.mp3">2016 Episode 4: Does It Pay to be Cyber-Insured? Featuring Marie Moe (SINTEF) and Eireann Leverett (Concinnity Risks)</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-06-02T15:23:00+00:00">Thu, 02 Jun 2016 15:23:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! While cyber-insurance isn’t necessarily anything new, it has emerged as a hot topic amongst the C-suite and those in charge of mitigating corporate risk in recent years. Marie and Eireann discuss their thoughts and research on the area of cyber-insurance, real-life cases, and why CERTs should be collaborating with insurance companies. Join Marie and Eireann for their full presentation at FIRST 2016 Seoul on Tuesday, June 14th at 15:00.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_MarieMoeEireannLeverett_FINAL.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_MarieMoeEireannLeverett_FINAL.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_JasonJonesArborNetworks-FINAL.mp3">2016 Episode 3: An Interview with Jason Jones from Arbor Networks</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-05-26T14:40:00+00:00">Thu, 26 May 2016 14:40:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! This week’s podcast features Jason Jones, Senior Security Researcher for Arbor Networks’ ASERT team. Jason talks a little bit about his current research at Arbor that focuses on issues in South Korea as well as his upcoming presentation at FIRST 2016, “Tasty Malware Analysis with T.A.C.O.: Bringing Cuckoo Metadata into IDA Pro.” Jason presents on Monday, June 13th at 17:00.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_JasonJonesArborNetworks-FINAL.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_JasonJonesArborNetworks-FINAL.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_CERTCC_FINAL.mp3">2016 Episode 2: Art Manion and Chris King, CERT/CC | Coordinated Vulnerability Disclosure for Vendors</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-05-18T22:13:00+00:00">Wed, 18 May 2016 22:13:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! Art and Chris discuss their upcoming tutorial session at FIRST 2016, “Coordinate Vulnerability Disclosure for Vendors.” Their upcoming session is aimed to help vendors, providers, and CSIRTs grow their capability to handle vulnerability reports from external researchers. Art and Chris are both members of the Vulnerability Analysis Team at CERT/CC. Check their session on Monday, June 13 at 13:00 at the 28th Annual FIRST Conference.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_CERTCC_FINAL.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_CERTCC_FINAL.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_Sparky_FINAL.mp3">2016 Episode 1: Koichiro ‘Sparky’ Komiyama, Conference Liaison 2016</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2016-05-10T17:37:00+00:00">Tue, 10 May 2016 17:37:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress! FIRST’s podcast duo of Martin McKeay and Chris John Riley sit down with Sparky Komiyama (JPCERT/CC) and talk about his role as conference liaison, some hints on the annual banquet dinner, and what to expect in Seoul. Gain insights in to the upcoming conference program, keynotes, and some presentations that Sparky is looking forward to hearing at the 28th Annual FIRST Conference, June 12-17, 2016 in Seoul, South Korea.</p></div> <audio src="https://media.first.org/podcasts/FIRST2016_Sparky_FINAL.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2016_Sparky_FINAL.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_RayStanton.mp3">2015 Episode 7: Live from FIRST 2015, Sponsor Highlight – Ray Stanton, Executive VP, BT Advise</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-07-01T15:42:00+00:00">Wed, 01 Jul 2015 15:42:00 +0000</p> <div class="p-summary" itemprop="description"><p>Recorded live from the 27th Annual FIRST Conference in Berlin, Germany. Martin and Chris chat with long-time supporter of the FIRST community and annual conference, Ray Stanton about the growth of the organization, attendee profiles, and what to expect next. Ray is Executive Vice President with BT Advise and has more than 27 years or experience in information technology and security.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015_RayStanton.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_RayStanton.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_Huawei.mp3">2015 Episode 6: Live from FIRST 2015, Sponsor Highlight with Ulf Feger, CSO, Huawei Germany</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-06-29T17:25:00+00:00">Mon, 29 Jun 2015 17:25:00 +0000</p> <div class="p-summary" itemprop="description"><p>Recorded live from the 27th Annual FIRST Conference in Berlin, Germany. Martin and Chris chat with Ulf Feger, CSO of Huawei Germany to gain a better understanding of why organizations like Huawei sponsor and support FIRST’s incident response community.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015_Huawei.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_Huawei.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_Mikko.mp3">2015 Episode 5: Live from FIRST 2015, An Interview with Mikko Hypponen</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-06-26T14:47:00+00:00">Fri, 26 Jun 2015 14:47:00 +0000</p> <div class="p-summary" itemprop="description"><p>Recorded live from the 27th Annual FIRST Conference in Berlin, Germany. Martin and Chris interview keynote and long-time supporter of the FIRST community, Mikko Hypponen, Chief Risk Officer, F-Secure. Mikko presented, “Securing Our Future,” on Tuesday, June 16th.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015_Mikko.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_Mikko.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_SethHanford.mp3">2015 Episode 4: Interview with Seth Hanford, Update on CVSS</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-06-09T15:02:00+00:00">Tue, 09 Jun 2015 15:02:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring Seth Hanford, Manager of the Detection & Response Team at TIAA-CREF and chair of the CVSS Special Interest Group (SIG). Hear the latest updates on the specification and what to expect during conference week. Seth will be leading the CVSS v3 Hands-on Training session on Wednesday, June 17th at 10:30. There is also a scheduled CVSS Birds of a Feather session set for Monday, June 15th at 11am.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015_SethHanford.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_SethHanford.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_JKouns.mp3">2015 Episode 3: Interview with Jake Kouns, “Bring Your Own Internet of Things”</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-06-04T22:41:00+00:00">Thu, 04 Jun 2015 22:41:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring Jake Kouns of Risk Based Security. Coffee machines, HVAC systems… What are the present-day issues facing enterprise corporations as more and more of our daily devices become connected? Jake gives some brief insight on his upcoming presentation at FIRST 2015. Jake and co-presenter, Carsten Eiram (Risk Based Security) present, “Bring Your Own Internet of Things,” Tuesday, June 16th at 14:45.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015_JKouns.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015_JKouns.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015-LeverettMoe.mp3">2015 Episode 2: Interview with Dr. Marie Moe and Eireann Leverett - I’m Sorry to Inform You…</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-05-28T20:30:00+00:00">Thu, 28 May 2015 20:30:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress featuring Marie Moe and Eireann Leverett. Marie and Eireann discuss their upcoming presentation, “I’m Sorry to Inform You…,” focusing on last summer’s spear-phishing attacks on Norwegian Oil, Gas, and Energy sectors and the challenges of victim notification. “I’m Sorry to Inform You…,” is scheduled for Monday, June 15th at 13:00.’</p></div> <audio src="https://media.first.org/podcasts/FIRST2015-LeverettMoe.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015-LeverettMoe.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015-Robert-Floodeen-Derrick-Scholl.mp3">2015 Episode 1: 2015 Program Chair, Robert Floodeen & Conference Liaison/Board Member, Derrick Scholl</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2015-05-20T17:42:00+00:00">Wed, 20 May 2015 17:42:00 +0000</p> <div class="p-summary" itemprop="description"><p>Kicking it off with key 2015 players – Conference Liaison and Board Member, Derrick Scholl and 2015 Program Chair, Rob Floodeen. Gain insight on the creative process behind assembling and identifying conference content and the challenges of chairing a FIRST conference. Learn about our local hosts, events, and what to expect this June. *Please note that since the recording, there have been several program and keynote changes. For the latest program agenda, please be sure to view <a href="https://www.first.org/conference/2015/program">https://www.first.org/conference/2015/program</a>.</p></div> <audio src="https://media.first.org/podcasts/FIRST2015-Robert-Floodeen-Derrick-Scholl.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2015-Robert-Floodeen-Derrick-Scholl.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST_RajRajagopalan.mp3">2014 Episode 8: Live from FIRST2014 – “Using Anthropology to Study Security Incident Response”</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-07-16T15:07:00+00:00">Wed, 16 Jul 2014 15:07:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress featuring Raj Rajagopalan, Senior Principal Research Scientist at Honeywell; Simon Ou, Associate Professor of Computer Science at Kansas State University; and Dan Moor, Technical Lead, Digital Investigation Services at HP. Listen to the trio discuss the study, how they came up with the idea, and the importance of their findings in this ongoing study. The three presented their findings on June 25th at the 2014 FIRST Conference in Boston.</p></div> <audio src="https://media.first.org/podcasts/FIRST_RajRajagopalan.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST_RajRajagopalan.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_HollyStewart.mp3">2014 Episode 7: Live from FIRST2014 – Holly Stewart, Microsoft</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-06-27T16:37:00+00:00">Fri, 27 Jun 2014 16:37:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress featuring Holly Stewart, Senior Program Manager at the MMPC. Recorded live from the 26th Annual FIRST Conference in Boston, MA. Holly presented on Wednesday, June 25th on the “MMPC’s Coordinated Malware Eradication.”</p></div> <audio src="https://media.first.org/podcasts/FIRST2014_HollyStewart.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_HollyStewart.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_EugeneSpafford.mp3">2014 Episode 6: Live from FIRST2014 – Eugene Spafford</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-06-26T15:18:00+00:00">Thu, 26 Jun 2014 15:18:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress, live from the 26th Annual FIRST Conference in Boston, MA. Chris and Martin spend some quality time with the renowned Eugene Spafford of Purdue University.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014_EugeneSpafford.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_EugeneSpafford.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_TimSlaybaugh.mp3">2014 Episode 5: “Pass-the-Hash” – Tim Slaybaugh, Forensic/Malware Analyst, Northrup Grumman</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-06-17T16:36:00+00:00">Tue, 17 Jun 2014 16:36:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress featuring Tim Slaybaugh, Forensic/Malware Analyst at Northrup Grumman as he gives us some insight into his presentation, “Pass-the-Hash: Gaining Root Access to Your Network” at the 26th Annual FIRST Conference. Tim has presented at the Federal Law Enforcement Training Center and often speaks at national and international conferences on current topics in computer forensic analysis. Tim presents on June 24th 10-11:00 in the Terrace Ballroom at the Boston Park Plaza.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014_TimSlaybaugh.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_TimSlaybaugh.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_ArtManion.mp3">2014 Episode 4: Art Manion, Member of the Vulnerability & Analysis Team, CERT/CC – SEI</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-06-05T14:27:00+00:00">Thu, 05 Jun 2014 14:27:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress featuring Art Manion of CERT/CC. Art discusses his research findings, the trend of bug bounties, responsible disclosure and where he sees vulnerability markets going in the next 12-months. Art is a member of the vulnerability & analysis team at CERT where he analyzes, coordinates, and discloses vulnerabilities. He presents, “A Survey of Vulnerability Markets,” Thursday, June 26th at the Boston Park Plaza Hotel.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014_ArtManion.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_ArtManion.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014-KenVanWyk.mp3">2014 Episode 3: Ken van Wyk, FIRST Steering Committee & 2014 Conference Liaison</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-05-29T20:21:00+00:00">Thu, 29 May 2014 20:21:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interview in progress featuring FIRST Steering Committee member and 2014 Conference Liaison, Ken van Wyk. Learn some fun facts about FIRST firsts and the importance of this year’s theme to reflect on our past in order to move forward. Ken is an internationally recognized information security expert, author and one of the founders of the Computer Emergency Response Team (CERT). He has also served as Chairman of FIRST.Org.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014-KenVanWyk.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014-KenVanWyk.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_SethHanford.mp3">2014 Episode 2: Seth Hanford, Manager, Threat Research Analysis and Communications, Cisco</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-05-20T12:59:00+00:00">Tue, 20 May 2014 12:59:00 +0000</p> <div class="p-summary" itemprop="description"><p>Do you use CVSS; are you new to CVSS? Chris chats with Seth Hanford, Manager of Cisco’s Threat Research Analysis and Communications about the rollout of CVSS v3, the lessons learned and improvements made since the release of v2 and what to expect at the conference. The Common Vulnerability Scoring System assists incident responders through standard characteristic classification and severity scoring for software vulnerabilities. Seth presents on Monday, June 23rd at 11:00-12:00 in the Imperial Ballroom.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014_SethHanford.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014_SethHanford.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014-JeffBoerrio.mp3">2014 Episode 1: Getting Back to the Roots…Jeff Boerio, 2014 Program Chair, FIRST.Org</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2014-05-12T11:44:00+00:00">Mon, 12 May 2014 11:44:00 +0000</p> <div class="p-summary" itemprop="description"><p>Welcome back! Martin and Chris kick off our 2014 podcast series with this year’s Program Chair, Jeff Boerio of Intel. Gain insight into the program planning process, the roles and responsibilities of the program committee and find out what’s in store for attendees this June. Jeff is a Senior Information Security Specialist at Intel and has been a long-time supporter of FIRST. He has volunteered his time year-after-year as a member of the program committee and finally stepped up the challenge as chair for 2014.</p></div> <audio src="https://media.first.org/podcasts/FIRST2014-JeffBoerrio.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2014-JeffBoerrio.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013-Katie-Moussoris-Microsoft.mp3">2013.8: Live from FIRST2013 - Katie Moussouris</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-06-20T00:00:00+00:00">Thu, 20 Jun 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our interviewers in progress, Chris John Riley and Martin Mckeay at the 25th Annual FIRST Conference in Bangkok, Thailand as they talk to Katie Moussouris, Senior Security Strategist at Microsoft talk about the latest in happenings at Microsoft. Katie presents on Thursday of the conference, "Vulnerability Handling Processes: When Hackers Come A-Knockin."</p></div> <audio src="https://media.first.org/podcasts/FIRST2013-Katie-Moussoris-Microsoft.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013-Katie-Moussoris-Microsoft.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_mikejordon_final.mp3">2013.6: Interview with Michael Jordan, Head of Research at Context</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-06-13T00:00:00+00:00">Thu, 13 Jun 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress with Michael Jordan, Head of Research at Context. Michael briefs us on his upcoming FIRST presentation, "Intelligent defence: deriving malicious intent using domain registrar information." Michael has 12 years of experience within the IT security, software development and incident response fields, as well as having developed IT security tools such as the Context App Tool (CAT). Michael is slotted to present on Thursday, 20 June at 14:25 under the Deep Technical Dives track at the 25th Annual FIRST Conference – Incident Response: Sharing to Win.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_mikejordon_final.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_mikejordon_final.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013-NaoshiMatsushita.mp3">2013.7: Naoshi Matsushita - Cyber Security Trends in Japan</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-06-13T00:00:00+00:00">Thu, 13 Jun 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Listen in to the conversation between Martin McKeay and Naoshi Matsushita, Senior VP of the MSS Division and COO of the US branch at NRI SecureTechnologies. Naoshi covers some of the security trends featured in their 9th annual security trend report--the basis of his presentation, "Cyber Security Trend in Japan – Annual Review 2013." Naoshi will be presenting along with his co-presenter Kazuya Hiradate, Senior IT Security Analyst at NRI SecureTechnologies. Both Naoshi and Kazuya present on Wednesday, 29 June at 14:25 under the Technical Foundations track.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013-NaoshiMatsushita.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013-NaoshiMatsushita.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_JamesPichardo_DRGspecial.mp3">2013.5: 2013 DRG & FIRST Security Challenge - 2.0 - James Pichardo</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-06-07T00:00:00+00:00">Fri, 07 Jun 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>New to the FIRST Conference? Didn't attend Malta 2012? Be sure to listen in to this interview in progress with DRG's (Dragon Research Group) James Pichardo. James talks briefly about 2012's inaugural FIRST challenge and the challenge to be presented to our 2013 Bangkok attendees. The DRG is a volunteer research organization dedicated to further understanding of online criminality and to provide actionable intelligence for the benefit of the entire Internet community. Registration for the challenge starts onsite and they'll be headquartered in the Geek Lounge in London 2 at the Conrad Bangkok. Look for more information as you arrive for registration.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_JamesPichardo_DRGspecial.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_JamesPichardo_DRGspecial.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_Reid_final.mp3">2013.4: Gavin Reid & David Jones of Cisco..."Securing Windows"</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-05-31T00:00:00+00:00">Fri, 31 May 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Chris John Riley interviews a FIRST Program Chair Alumni – Gavin Reid, Manager, Information Security CSIRT at Cisco and David Jones, Senior Information Security Architect at Cisco. Just how difficult is it to secure the Windows OS? Is the system still suffering from legacy issues? The gentlemen jump straight into conversation and provide a preface of their presentation, "Secure Windows—Mitigating Windows Vulnerabilities to Deter APTs." David is a Senior Security Architect for Cisco's InfoSec team leading technical security strategy IT and across the entire enterprise. Gavin is a computer security specialist with more than two decades of experience. Gavin has worked with the gamut of individuals – from leaders in the vanguard of infosec to hackers in the computer underground. Gavin and David present Monday, 17 June @ 16:40 under the Technical Foundations track.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_Reid_final.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_Reid_final.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_ELeverett_final.mp3">2013.3 Interview with Eireann Leverett, Security Researcher at IOActive</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-05-24T00:00:00+00:00">Fri, 24 May 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join our host Chris John Riley as he chats SCADA and ICS with Eireann Leverett, Security Researcher at IOActive. Integrity of data; security of data; what kind of threats await for us in the world of increasingly connected industrial control systems? Listen in to the interview in progress… Eireann has a BEng in Artificial Intelligence and Software Engineering from Edinburgh University and MPhil in Advanced Computer Science from Cambridge University. He presents regularly to academics and government agencies on the security of industrial systems on behalf of IOActive and has shared his research with ICS-CERT and other global CERT teams. Eireann presents, "Industrial Owner's Manual: Case studies in publicly accessible ICS," on Monday the 17th of June at 14:25.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_ELeverett_final.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_ELeverett_final.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_JKOUNS_final.mp3">2013.2 Interview with Jake Kouns, CEO of the Open Security Foundation</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-05-17T00:00:00+00:00">Fri, 17 May 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Jake joins our hosts Martin McKeay and Chris John Riley to discuss his amusingly titled presentation, "The Mayans were right! A new age of data breaches," and shares some background on his non-profit organization , the Open Security Foundation. Jake is the co-founder, CEO and CFO of the Open Security Foundation (OSF), a non-profit organization that oversees the operations of the Open Source Vulnerability Database (OSVDB.org) and Cloutage.org DataLossDB. Jake has presented at many well-known security conferences and can now add FIRST to his list. Join the interview in progress! Jake presents on Thursday, 20 June @ 14:25.</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_JKOUNS_final.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_JKOUNS_final.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_Adli_final.mp3">2013.1 FIRST 2013 Kick-off - Adli Wahid, Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2013-05-10T00:00:00+00:00">Fri, 10 May 2013 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>It's May and that means we're kicking off the 25th Annual FIRST Conference podcast series! Martin McKeay from the Network Security Podcast and Chris John Riley from the Eurotrash Security Podcast join us again as our podcast hosts. Episode 2013.1 features Adli Wahid, 2013 FIRST Program Chair. Adli discusses a bit about the speaker selection process and how he and the program committee designed the agenda to focus on the "Sharing to Win" theme. Adli is currently working in the Asia Systems Office at the Bank of Tokyo-Mitsubishi UFJ Ltd. He is responsible for regional cyber security activities and is a member of the MUFG-CERT. Adli was previously the Head of Malaysia CERT (MyCERT).</p></div> <audio src="https://media.first.org/podcasts/FIRST2013_Adli_final.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2013_Adli_final.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012_DRGChallenge.mp3">2012.7 Live with the Dragon Research Group from FIRSTCON Malta</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-21T00:00:00+00:00">Thu, 21 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>The latest on the DRG Challenge from the 24th Annual FIRST Conference, Malta!</p></div> <audio src="https://media.first.org/podcasts/FIRST2012_DRGChallenge.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012_DRGChallenge.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012_SteveAdegbite.mp3">2012.6 Live w/ Steve Adegbite FIRST Conference Liaison</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-20T00:00:00+00:00">Wed, 20 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Steve takes a few minutes to stop and chat with Martin &amp; Chris during the 24th Annual FIRST Conference in St. Julian's, Malta...</p></div> <audio src="https://media.first.org/podcasts/FIRST2012_SteveAdegbite.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012_SteveAdegbite.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-ScottVowel.mp3">2012.5 The DRG Security Challenge at FIRST Conference, Malta</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-14T00:00:00+00:00">Thu, 14 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>If you're attending FIRSTCON Malta, don't miss this podcast! Featuring Scott Vowels, a volunteer member with the Dragon Research Group (DRG) – get an understanding of what the DRG is about and their upcoming projects – including the Security Challenge. Gain insight on how to sign-up for the Security Challenge in Malta, the structure of the challenges and where to find the DRG crew at the conference for questions.</p></div> <audio src="https://media.first.org/podcasts/FIRST2012-ScottVowel.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-ScottVowel.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-PatrickCain.mp3">2012.4 Patrick Cain, Resident Research Fellow at APWG</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-12T00:00:00+00:00">Tue, 12 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Episode 4 features Patrick Cain, resident research fellow with the Anti-Phishing Working Group (APWG) and the President of The Cooper-Cain Group, Inc. in Boston, MA – a US-based computer and internet security consultancy. He's been associated with information security development and operations for over 25 years and drives the APWG's data collection and sharing initiatives. Martin and Chris talk to Patrick about his work with the APWG and his upcoming FIRST presentation, "Sharing Crime Data Across International Frontiers." Patrick presents on Tuesday, 19th June at 17:05 in the Policy & Management track.</p></div> <audio src="https://media.first.org/podcasts/FIRST2012-PatrickCain.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-PatrickCain.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-WesYoung.mp3">2012.3 Wes Young, Principal Security Engineer at REN-ISAC</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-11T00:00:00+00:00">Mon, 11 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Join the interview in progress... Wes is a security engineer, threat analyst and (primary) code-monkey with the Research and Education Networking Information Sharing and Analysis Center (REN-ISAC). He is the primary architect of the REN-ISAC Security Event System – a standard based information system that moves security intelligence messages throughout its diverse academic community. Wes presents on Friday at 14:25 under the Deep Technical Dives track – "Sharing data's hard, here's how we did it."</p></div> <audio src="https://media.first.org/podcasts/FIRST2012-WesYoung.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-WesYoung.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-LanceSpitzner.mp3">2012.2 Lance Spitzner, Training Director, SANS Securing the Human Program</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-06-05T00:00:00+00:00">Tue, 05 Jun 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Martin and Chris chat with Lance Spitzner, FIRST 2012 Keynote and Training Director for SANS Securing the Human Program at the SANS Institute. Lance is an internationally recognized leader in the field of cyber threat research and security training awareness. He has helped develop and implement numerous multi-cultural security awareness programs around the world. He's passionate about security awareness and the importance of understanding the human element. Don't miss Lance's keynote on Friday the 22nd at 09:45 in the Grandmaster Suite.</p></div> <audio src="https://media.first.org/podcasts/FIRST2012-LanceSpitzner.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-LanceSpitzner.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-JoseNazario.mp3">2012.1 Dr. Jose Nazario, 2012 Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2012-05-31T00:00:00+00:00">Thu, 31 May 2012 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Here we go! Kicking off the 24th Annual FIRST Conference podcast series, Martin McKeay and Chris John Riley talk to Dr. Jose Nazario, Senior Researcher at Arbor Networks and the 2012 Conference Program Chair. Learn how Jose got involved, his experience within the FIRST community and how this year's program agenda came together. Gain insight on this year's keynote presentations, plenaries, highlight sessions, and the overall uniqueness that defines FIRST as a premier global organization.</p></div> <audio src="https://media.first.org/podcasts/FIRST2012-JoseNazario.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2012-JoseNazario.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-JeffreyCarpenter.mp3">2011.8: Jeffrey Carpenter, Technical Manager at CERT Coordination Center</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-08-24T00:00:00+00:00">Wed, 24 Aug 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Jeffrey Carpenter, Technical Manager at CERT/CC, integral member and supporter of FIRST talks to Chris John Riley about the evolution of CSIRTs as well as the importance of networking among the international CSIRT communities. Jeff also talks briefly about the Annual National CSIRT meeting that is held post-FIRST conference.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-JeffreyCarpenter.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-JeffreyCarpenter.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-BrianKrebs.mp3">2011.9: Brian Krebs of KrebsOnSecurity.Com</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-08-24T00:00:00+00:00">Wed, 24 Aug 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Brian Krebs, freelance tech reporter, editor of KrebsOnSecurity.com and straight from the stage, takes time out in Vienna to speak to both Martin McKeay and Chris John Riley about his rogue-pharma-spam-focused presentation at FIRST 2011, "Funny Pharma: Inside the Web's Leading Rogue Pharmacies." Brian presented at FIRST 2011 Vienna on Tuesday, June 14, 2011.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-BrianKrebs.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-BrianKrebs.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-RobertSchischka.mp3">2011.10: Robert Schischka, FIRST Steering Committee & Manager at CERT.at</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-08-24T00:00:00+00:00">Wed, 24 Aug 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Martin chats with member of the FIRST Steering Committee and integral part of the 2011 conference planning team, Robert Schischka. Robert is head of CERT.at and has been an active member of FIRST for several years. Robert and Martin touch on several topics including the 2011 conference city selection, the process of establishing new FIRST teams and the importance of data sharing within the community.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-RobertSchischka.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-RobertSchischka.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-PatrickGray.mp3">2011.11: Patrick Gray, Principal Security Strategist, Cisco Systems</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-08-24T00:00:00+00:00">Wed, 24 Aug 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Patrick Gray is the Principal Security Strategist at Cisco Systems as well as a 20+ year veteran of the US Federal Bureau of Investigations. Patrick speaks to Martin post-presentation, "Data Security Challenges in the all too Public and not so Private Sectors" and extends on topics such as social media usage, the importance of education to the user community and how Patrick went from police officer-to-FBI agent-to-Security Strategist at Cisco. Patrick presented on Tuesday, June 14, 2011.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-PatrickGray.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-PatrickGray.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-MelissaHathaway.mp3">2011.7: Melissa Hathaway, President of Hathaway Global Strategies</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-07-06T00:00:00+00:00">Wed, 06 Jul 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Straight from the stage to the FIRST2011 press room, Martin McKeay and Melissa Hathaway expand on her keynote presentation and discuss global security challenges of 2011. What can government do; what can the private sector do? How do we faciliate better communication/interoperability? "[FIRST], the community is the master translator between the private sector where the technology is going, the civilian infrastructure of how to conduct homeland security or critical infrastructure protection...and can also act as security advisor to the ministries of defense." Melissa presented on Monday, 13th June at the 23rd Annual FIRST Conference, Vienna.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-MelissaHathaway.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-MelissaHathaway.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-FrankBreedijk_IanSoutham.mp3">2011.6: Frank Breedijk & Ian Southam of Schuberg Philis</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-06-16T00:00:00+00:00">Thu, 16 Jun 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Frank Breedijk and Ian Southam talk to Chris John Riley about their upcoming presentation, "The road to hell is paved with best practices." Do you achieve compliance through security or security through compliance? Frank and Ian are both mission critical engineers with Schuberg Philis. See their presentation on Friday, 17 June 2011 at 1330 in the Rock Track.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-FrankBreedijk_IanSoutham.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-FrankBreedijk_IanSoutham.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-KenVanWyk.mp3">2011.5: Ken van Wyk, FIRST Vice Chair & President of KRvW</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-06-14T00:00:00+00:00">Tue, 14 Jun 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Chris chats with Ken about his presentation, "Developing and testing secure iPhone apps" scheduled for Wednesday the 15th of June. In addition to presenting during conference week, Ken will be launching his new OWASP iGoat project at the conference along with a live demo! Ken is CERT certified computer security incident handler and an internationally recognized security expert. Ken is also on the FIRST Steering Committee and holds the title of FIRST Vice Chair.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-KenVanWyk.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-KenVanWyk.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-IftachIanAmit.mp3">2011.4: Iftach 'Ian' Amit, VP, Business Development at Security-Art</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-06-08T00:00:00+00:00">Wed, 08 Jun 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Iftach 'Ian' Amit returns to FIRST2011 and talks to Chris John Riley about his presentation while also touching on the importance of making connections at conferences such as FIRST and his uphill struggle with pulling together a non-government CERT team in Israel. Amit first presented at the FIRST Conference in 2010. He has over a decade of experience in the information security industry and has presented at leading industry conferences such as BlackHat, DefCon, Infosec, Hacker-Halted, BruCon and SOURCE. Join him on Monday, 13th of June in the Scissors Track at 16:00.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-IftachIanAmit.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-IftachIanAmit.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-MikkoHyponen.mp3">2011.3: Mikko Hypponen, Chief Research Officer, F-Secure</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-06-01T00:00:00+00:00">Wed, 01 Jun 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Wed, 01 Jun 2011 : : </p> <p>Chris John Riley talks to Friday Keynote, Mikko Hypponen about his upcoming presentation, "State of the Net" - 25 years and what have we got? This is a great chat covering such topics as the Brain virus to Stuxnet. Mikko is the Chief Research Officer at F-Secure (Finland) and has been with the company since 1991. Mikko has assisted law enforcement in the US, Europe and Asia on cybercrime cases. Mikko was most recently labeled an infosec rock star - according to information leaked by Wikileaks. Check out his talk at FIRST2011 on Friday, 17 June at 09:45.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-MikkoHyponen.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-MikkoHyponen.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-KurtSauer.mp3">2011.2: Kurt Sauer, Conference Liaison, FIRST.Org</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2011-05-25T00:00:00+00:00">Wed, 25 May 2011 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Kurt Sauer, Head of Information Security - Asia/Pacific at PayPal and FIRST Conference Liaison & Steering Committee Member, has a candid conversation with Chris John Riley about the upcoming 2011 conference, the conference site selection process and Kurt's personal experience during the April Japan earthquake and tsunami disaster.</p></div> <audio src="https://media.first.org/podcasts/FIRST2011-KurtSauer.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2011-KurtSauer.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-StevenAdair.mp3">2010.6: Steven Adair of The Shadowserver Foundation</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-06-25T00:00:00+00:00">Fri, 25 Jun 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Martin sits down with Steven Adair at the conference to discuss a bit about The Shadowserver Foundation and his presentation, "Targeted Intrusions & Cyber Espionage-Wake up!" Steven is a security researcher at the Shadowserver Foundation and a principal architect at eTouch Federal Systems. Steven spoke at the 22nd Annual FIRST conference on Monday, June 14 @1330.</p></div> <audio src="https://media.first.org/podcasts/FIRST2010-StevenAdair.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-StevenAdair.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-RandyTrzeciak.mp3">2010.5: Randy Trzeciak of CERT/CC</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-06-09T00:00:00+00:00">Wed, 09 Jun 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Randy Trzeciak is a senior member of the technical staff at CERT/CC. He leads the insider threat team, focusing on insider threat research, threat analysis and modeling. Randy has over 19 years of experience in the field of information security and is an adjunct professor at Carnegie Mellon's Heinz College, School of Information Systems and Management. Randy presents at Annual FIRST Conference on Monday, June 16th @14:30.</p></div> <audio src="https://media.first.org/podcasts/FIRST2010-RandyTrzeciak.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-RandyTrzeciak.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST-2010JasonLarsen.mp3">2010.4: Jason Larsen of Idaho National Laboratory</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-06-07T00:00:00+00:00">Mon, 07 Jun 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Jason Larsen is a cyber security researcher at the Idaho National Laboratory. He specializes in the technical details of testing and exploiting industrial control systems. He has a wide range of publications on control systems including SCADA, AMI, Wireless Sensor Networks, and good old-fashioned software exploitation. He is a sought after speaker in both the United States and Internationally. Jason will be presenting Wednesday, June 16 @10:00AM.</p></div> <audio src="https://media.first.org/podcasts/FIRST-2010JasonLarsen.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST-2010JasonLarsen.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-AndrewCushman.mp3">2010.3: 2010 Program Chair, Andrew Cushman of Microsoft</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-06-03T00:00:00+00:00">Thu, 03 Jun 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Martin talks with FIRST Program Chair, Andrew Cushman, Director of Security Response and Outreach at Microsoft's Trustworthy Computing. Andrew is a driving force behind the company's security researcher outreach strategy and execution efforts, formulating the Responsible Disclosure Initiative and initiating the BlueHat security conference franchise. Andrew will be in Miami all week and moderating the panel, "Implications of the Cloud" on Thursday, June 17 @11:00.</p></div> <audio src="https://media.first.org/podcasts/FIRST2010-AndrewCushman.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-AndrewCushman.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-PhilReitinger.mp3">2010.2: DUS Reitinger, U.S. Department of Homeland Security</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-05-17T00:00:00+00:00">Mon, 17 May 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>In this episode, Martin McKeay talks to Philip R. Reitinger, Deputy Under Secretary for the National Protection Programs Directorate (NPPD) and Director of the National Cybersecurity Center (NCSC). DUS Reitinger provides strategic direction to the Department's cybersecurity efforts while ensuring preparedness and response capabilities across all US federal computer systems. DUS Reitinger kicks off the 2010 FIRST Conference with his Keynote, Monday, June 14th @0900.</p></div> <audio src="https://media.first.org/podcasts/FIRST2010-PhilReitinger.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-PhilReitinger.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-RamsesMartinez.mp3">2010.1: Ramses Martinez, VeriSign</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2010-05-05T00:00:00+00:00">Wed, 05 May 2010 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Ramses Martinez is Director of Information Security for VeriSign and leads a team that is responsible for all aspects of information security of global DNS, PKI and SSL infrastructure operated by VeriSign. Ramses talks about his presentation "Incident Response to Social Engineering Attacks." He is scheduled to present on Monday, June 14 from 1330-1430.</p></div> <audio src="https://media.first.org/podcasts/FIRST2010-RamsesMartinez.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2010-RamsesMartinez.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-HamDavidoff.mp3">2009.11: Sherri Davidoff and Jonathan Ham, Proprietary Data Leaks</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-08-10T00:00:00+00:00">Mon, 10 Aug 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>In this at-the-conference interview, Sherri and Jonathan recap their presentation, add insight and talk about their new SANS course being offered. Sherri Davidoff is a longtime information security consultant specializing in forensics, penetration testing and incident response. Jonathan Ham is an independent consultant who specializes in large-scale enterprise security issues.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-HamDavidoff.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-HamDavidoff.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-KurtSauer.mp3">2009.10: Kurt Sauer, Spinlock Technologies</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-08-03T00:00:00+00:00">Mon, 03 Aug 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>As a principal consultant for Spinlock Technologies LLC, Kurt Sauer works with researchers from Kyushu University and the National University of Singapore to analyze security vulnerabilities of critical infrastructure components, currently focusing on power and communications systems in Asia. Kurt joins the FIRST Steering Committee as a newly elected member.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-KurtSauer.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-KurtSauer.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-Japanese.mp3">2009.7b: At the Conference: Dr. Suguru Yamaguchi - JAPANESE</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-07-27T00:00:00+00:00">Mon, 27 Jul 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>At the conference interview with the conference's opening keynote, Dr. Suguru Yamaguchi. Japanese-speaking version.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-Japanese.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-Japanese.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-English.mp3">2009.7a: At the Conference: Dr. Suguru Yamaguchi - ENGLISH</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-06-30T00:00:00+00:00">Tue, 30 Jun 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>At the conference interview with the conference's opening keynote, Dr. Suguru Yamaguchi. English-speaking version.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-English.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-Dr-Yamaguchi-English.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-TobyWeirJones.mp3">2009.9: Toby Weir-Jones, BT</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-06-13T00:00:00+00:00">Sat, 13 Jun 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Toby is VP of Product Development, Managed Security Solutions Group (MSSG) at BT. Toby is BT MSSG's longest-serving employee and was one of the founding members of Counterpane (aquired by BT in late 2006) in the summer of 1999. Toby's involvement in the cyber security field began in 1995 with his initial work in cryptography and security policy, and he has been involved in a number of technical and strategic roles since then. Toby is a named inventor for five patents, and holds a BA cum laude in engineering ethics from Cornell University in Ithaca, New York.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-TobyWeirJones.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-TobyWeirJones.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-PeterAllor.mp3">2009.8: Peter Allor, FIRST SC and Conference Liaison</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-06-13T00:00:00+00:00">Sat, 13 Jun 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>At the conference interview with Peter Allor. As member of the FIRST Steering Committee, Pete's primary role is Conference Liaison. As Conference Liaison, Pete manages all aspects of the conference from assisting the program chair with the program to working with the event staff.</p></div> <audio src="https://media.first.org/podcasts/FIRST2009-PeterAllor.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST2009-PeterAllor.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep6.mp3">2009.6: Slawomir Ligier, VeriSign</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-05-31T00:00:00+00:00">Sun, 31 May 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Slawomir "Slawek" Ligier is Vice President of Identity and Authentication Serviecs Engineering at VeriSign. Slawek oversees an effort to develop multiple layers of internet security, including Public Key Infrastructure (PKI) Certificates, Second Factor Authentication, and Fraud Detection Service. Slawek is presenting "On-Line Fraud Prevention and Detection-Multiple Layers of Security" on Monday, June 29th at 16:00.</p></div> <audio src="https://media.first.org/podcasts/first_podcast_ep6.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep6.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep5.mp3">2009.5: Jeff Crume, IBM Tivoli Compliance Solutions</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-05-26T00:00:00+00:00">Tue, 26 May 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Jeff Crume is an Executive IT Security Architect for IBM Tivoli Compliance Solutions with over 25 years experience in the IT industry. He is also the author of "Inside Internet Security: What Hackers Don't Want You To Know" and will be presenting "What Hackers Don't Want You To Know" at the 2009 conference.</p></div> <audio src="https://media.first.org/podcasts/first_podcast_ep5.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep5.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep4.mp3">2009.4: Conference Coordinator, Traci Wei Talks Briefly About CPEs</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-05-19T00:00:00+00:00">Tue, 19 May 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Quick interview with one of FIRST's Conference Coordinators about Continuing Professional Education credits (CPEs).</p></div> <audio src="https://media.first.org/podcasts/first_podcast_ep4.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep4.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep3.mp3">2009.3: Gib Sorebo, SAIC</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-05-04T00:00:00+00:00">Mon, 04 May 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Episode 3 features Gib Sorebo of SAIC. Gib Sorebo is Chief Security Engineer and Assistant Vice President for Technology for SAIC where he assists government and private sector organizations in complying with legal and regulatory requirements related to information security and privacy. Gib leads the SAIC-IRT and is also presenting at this year's conference.</p></div> <audio src="https://media.first.org/podcasts/first_podcast_ep3.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep3.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep2.mp3">2009.2: Jeffrey Carpenter, CERT/CC, Best Practices Sponsor</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-04-20T00:00:00+00:00">Mon, 20 Apr 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>Jeff Carpenter is technical manager at CERT Coordination Center and one of the people responsible for organizing the FIRST Best Practices Contest.</p></div> <audio src="https://media.first.org/podcasts/first_podcast_ep2.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/first_podcast_ep2.mp3">Download MP3</a></audio></article> <article class="h-entry search-item visible" itemscope itemtype="http://schema.org/Article"> <h3 class="p-name" itemprop="name"><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST_podcast_ep1.mp3">2009.1: Mick Creane, 2009 Program Chair</a></h3> <p class="dt-published" itemprop="datePublished" datetime="2009-04-13T00:00:00+00:00">Mon, 13 Apr 2009 00:00:00 +0000</p> <div class="p-summary" itemprop="description"><p>The first FIRST podcast is an interview with Mick Creane who is the 2009 FIRST Conference Program Chair. Mick's job has been to organize the conference overall and find interesting people to come speak at the event. He gives us a litttle background into why this year's topic is "Aftermath: crafts and lessons of incident recovery". Many of us think of 'incident response' as a computer security issue, but as Mick points out in the podcast, it's at least as much about the physical recovery after an incident as it is the virtual recovery. He also talks about some of the folks who'll be speaking and why it's so important that an event like this continues to be international, not just US or north american.</p></div> <audio src="https://media.first.org/podcasts/FIRST_podcast_ep1.mp3" preload="none" controls><a class="p-url" itemprop="url" href="https://media.first.org/podcasts/FIRST_podcast_ep1.mp3">Download MP3</a></audio></article> </div> <ul class="years page-control"> <li><a href="/newsroom/news/podcasts/2019">2019</a></li> <li><a href="/newsroom/news/podcasts/2018">2018</a></li> <li><a href="/newsroom/news/podcasts/2017">2017</a></li> <li><a href="/newsroom/news/podcasts/2016">2016</a></li> <li><a href="/newsroom/news/podcasts/2015">2015</a></li> <li><a href="/newsroom/news/podcasts/2014">2014</a></li> <li><a href="/newsroom/news/podcasts/2013">2013</a></li> <li><a href="/newsroom/news/podcasts/2012">2012</a></li> <li><a href="/newsroom/news/podcasts/2011">2011</a></li> <li><a href="/newsroom/news/podcasts/2010">2010</a></li> <li><a href="/newsroom/news/podcasts/2009">2009</a></li> </ul></div></div><div id="navbar" data-studio="CU52CV1W8g"><div id="c4" data-studio="Yu8FjCC11g"><ul class="navbar"><li><a href="/about">About FIRST</a><ul><li><a href="/about/mission">Mission Statement</a></li><li><a href="/about/strategy/">Strategy Framework</a></li><li><a href="/about/history">History</a></li><li><a href="/about/sdg">Sustainable Development Goals</a></li><li><a href="/about/organization">Organization</a><ul><li><a href="/about/organization/directors">Board of Directors</a></li><li><a>Operations Team</a><ul><li><a href="/about/organization/ccb">Community & Capacity Building</a></li><li><a href="/about/organization/events">Event Office</a></li><li><a href="/about/organization/executive-director">Executive Director</a></li><li><a href="/about/organization/infrastructure">Infrastructure</a></li><li><a href="/about/organization/secretariat">Secretariat</a></li></ul></li><li><a href="/about/organization/committees">Committees</a><ul><li><a href="/about/organization/committees/compensation-committee">Compensation Committee</a></li><li><a href="/about/organization/committees/conference-program-committee">Conference Program Committee</a></li><li><a href="/about/organization/committees/membership-committee">Membership Committee</a></li><li><a href="/about/organization/committees/rules-committee">Rules Committee</a></li><li><a href="/about/organization/committees/standards">Standards Committee</a></li></ul></li><li><a href="/events/agm">Annual General Meeting</a></li><li><a href="/about/organization/reports">Annual Reports and Tax Filings</a></li></ul></li><li><a href="/about/policies">FIRST Policies</a><ul><li><a href="/about/policies/anti-corruption">Anti-Corruption Policy</a></li><li><a href="/about/policies/antitrust">Antitrust Policy</a></li><li><a href="/about/policies/bylaws">Bylaws</a></li><li><a href="/about/policies/board-duties">Board duties</a></li><li><a href="/about/bugs">Bug Bounty Program</a></li><li><a href="/about/policies/code-of-conduct">Code of Conduct</a></li><li><a href="/about/policies/conflict-policy">Conflict of Interest Policy</a></li><li><a href="/about/policies/doc-rec-retention-policy">Document Record Retention and Destruction Policy</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li><li><a href="/about/policies/gen-event-reg-refund-policy">General Event Registration Refund Policy</a></li><li><a href="/about/policies/event-site-selection">Guidelines for Site Selection for all FIRST events</a></li><li><a href="/identity">Identity & Logo Usage</a></li><li><a href="/about/policies/mailing-list">Mailing List Policy</a></li><li><a href="/about/policies/media">Media Policy</a></li><li><a href="/about/policies/privacy">Privacy Policy</a></li><li><a href="/about/policies/registration-terms-conditions">Registration Terms & Conditions</a></li><li><a href="/about/policies/terms">Services Terms of Use</a></li><li><a href="/about/policies/standards">Standards Policy</a></li><li><a href="/about/policies/diversity">Statement on Diversity & Inclusion</a></li><li><a href="/about/policies/translation-policy">Translation Policy</a></li><li><a href="/about/policies/travel-policy">Travel Policy</a></li><li><a href="/about/policies/uniform-ipr">Uniform IPR Policy</a></li><li><a href="/about/policies/whistleblower-policy">Whistleblower Protection Policy</a></li></ul></li><li><a href="/about/partners">Partnerships</a><ul><li><a href="/global/partners">Partners</a></li><li><a href="/global/friends">Friends of FIRST</a></li><li><a href="/global/supporters/">FIRST Supporters</a></li><li><a href="/about/sponsors">FIRST Sponsors</a></li></ul></li><li><a href="/newsroom">Newsroom</a><ul><li><a href="/newsroom/news">What's New</a></li><li><a href="/newsroom/releases">Press Releases</a></li><li><a href="/newsroom/news/media">In the News</a></li><li><a href="/podcasts">Podcasts</a><ul><li><a href="/newsroom/news/first-impressions/">FIRST Impressions Podcast</a></li><li><a href="/newsroom/news/podcasts/">FIRSTCON Podcast</a></li></ul></li><li><a href="/newsroom/newsletters">Newsletters</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li></ul></li><li><a href="/about/procurement">Procurement</a></li><li><a href="/about/jobs/">Jobs</a></li><li><a href="/contact">Contact</a></li></ul></li></ul></div><div id="c5" data-studio="Yu8FjCC11g" class="list-banner"><p><img src="/_/img/1stcon-podcast.png" alt="FIRSTCON Podcast" /></p> <h4 id="Also-available-on">Also available on</h4> <ul> <li><a href="https://podcasts.apple.com/us/podcast/first-org-podcasts/id1482433188?l=en"><img src="/_/img/apple-podcast.png" alt="FIRSTCON Podcast Apple" /></a></li> <li><a href="https://podcasts.google.com/?feed=aHR0cDovL3d3dy5maXJzdC5vcmcvbmV3c3Jvb20vbmV3cy9hYm91dC54bWw"><img src="/_/img/google-podcast.png" alt="FIRSTCON Podcast Google" /></a></li> <li><a href="https://open.spotify.com/show/6wMCW3oGDOVjr10WDFlx6g?si=3Jo33RvGRMWQ1uXwTr0l1g"><img src="/_/img/spotify-podcast.png" alt="FIRSTCON Podcast Spotify" /></a></li> <li><a href="https://www.stitcher.com/s?fid=470775&refid=asa"><img src="/_/img/stitcher-podcast.png" alt="FIRSTCON Podcast Stitcher" /></a></li> <li><a href="http://tun.in/pjzCu"><img src="/_/img/tunein-podcast.png" alt="FIRSTCON Podcast TuneIn" /></a></li> </ul></div></div><div id="sidebar" data-studio="CU52CV1W8g"><div id="c6" data-studio="Yu8FjCC11g" class="h3labels orange subbox"><h3 id="Subscribe-via-RSS">Subscribe via RSS</h3> <p>RDF Site Summary (RSS) is a lightweight multipurpose extensible metadata description and syndication format.</p> <p>Subscribe to the <strong>FIRSTCON Podcast</strong> using our RSS feed:<br /> <a href="/newsroom/news/podcasts.xml"><span class="icon-feed"></span> RSS 2.0</a></p></div><div id="c7" data-studio="Yu8FjCC11g"><div id="tag-cloud" data-url="/newsroom/news/podcasts/"><a href="#conference" class="l5">conference</a> <a href="#gdpr" class="l-1">GDPR</a> <a href="#iep" class="l-1">IEP</a> <a href="#podcast" class="l5">podcast</a> <a href="#podcasts" class="l-1">podcasts</a> <a href="#privacy" class="l-1">privacy</a> <a href="#tlp" class="l-1">TLP</a> </div></div></div><footer><div id="footer" data-studio="CU52CV1W8g"><div id="c2" data-studio="Yu8FjCC11g"><div class="content"> <div class="support"> <div class="kbsearch bottom"> <p><a href="https://support.first.org"><img src="/_/img/icon-portal_support.svg" alt="FIRST Support" title="FIRST Support" /></a> <input class="kb-search" type="search" placeholder="Do you need help?"></p> </div> </div> <div id="socialnetworks"><a href="/about/sdg" title="FIRST Supported Sustainable Development Goals (SDG)" class="icon-sdg"></a><a rel="me" href="https://bsky.app/profile/first.org" target="_blank" title="BlueSky @first.org" class="icon-bluesky"></a><a rel="me" href="https://infosec.exchange/@firstdotorg" target="_blank" title="@FIRSTdotOrg@infosec.exchange" class="icon-mastodon"></a><a href="https://twitter.com/FIRSTdotOrg" target="_blank" title="Twitter @FIRSTdotOrg" class="icon-tw"></a><a href="https://www.linkedin.com/company/firstdotorg" target="_blank" title="FIRST.Org at LinkedIn" class="icon-linkedin"></a><a href="https://www.facebook.com/FIRSTdotorg" target="_blank" title="FIRST.Org at Facebook" class="icon-fb"></a><a href="https://github.com/FIRSTdotorg" target="_blank" title="FIRST.Org at Github" class="icon-github"></a><a href="https://www.youtube.com/c/FIRSTdotorg" target="_blank" title="FIRST.Org at Youtube" class="icon-youtube"></a><a href="/podcasts" title="FIRST.Org Podcasts" class="icon-podcast"></a></div> <p><a href="/copyright">Copyright</a> © 2015—2025 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved.</p> </div> <p><span class="tlp"></span></p></div></div></footer><script nonce="KScua6K6A0zXmA80Co1spQ" async="async" src="/_/web.js?20250311211113"></script><script nonce="KScua6K6A0zXmA80Co1spQ" async="async" src="/_/web.js?20250311211113"></script><script nonce="KScua6K6A0zXmA80Co1spQ" async="async" src="/_/s.js?20250311-211120"></script></body></html>