Artwork

Content provided by Cyber Crime Junkies-David Mauro. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies-David Mauro or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.
Player FM - Aplicație Podcast
Treceți offline cu aplicația Player FM !

UBER Crime Story 2. How Security Leaders Can be Liable.

1:01:21
 
Distribuie
 

Manage episode 406133418 series 3370503
Content provided by Cyber Crime Junkies-David Mauro. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies-David Mauro or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

NEW! Text Us Direct Here!

This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.

Takeaways

  • · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
  • · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
  • · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.

Chapters PART 2

  • 1:01 Trial of Joseph Sullivan
  • 2:01 Uber's Awareness of the Breach
  • 3:00 Hacker's Access and Screenshots
  • 4:19 How the Hacker Gained Access
  • 7:15 Understanding Hackers
  • 13:40 Multifactor Authentication Fatigue
  • 15:34 Moving Laterally and Pivoting
  • 17:26 Access to Uber's Systems
  • 18:23 Access to Cloud Services
  • 23:20 Bug Bounty Program
  • 25:14 Hacker's Boastful Behavior
  • 26:12 Prevention and Penetration Testing
  • 29:02 Ongoing Trial of Joseph Sullivan
  • 30:28 Previou

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

188 episoade

Artwork
iconDistribuie
 
Manage episode 406133418 series 3370503
Content provided by Cyber Crime Junkies-David Mauro. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies-David Mauro or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ro.player.fm/legal.

NEW! Text Us Direct Here!

This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.

Takeaways

  • · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
  • · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
  • · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.

Chapters PART 2

  • 1:01 Trial of Joseph Sullivan
  • 2:01 Uber's Awareness of the Breach
  • 3:00 Hacker's Access and Screenshots
  • 4:19 How the Hacker Gained Access
  • 7:15 Understanding Hackers
  • 13:40 Multifactor Authentication Fatigue
  • 15:34 Moving Laterally and Pivoting
  • 17:26 Access to Uber's Systems
  • 18:23 Access to Cloud Services
  • 23:20 Bug Bounty Program
  • 25:14 Hacker's Boastful Behavior
  • 26:12 Prevention and Penetration Testing
  • 29:02 Ongoing Trial of Joseph Sullivan
  • 30:28 Previou

Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!

Click the link above or text 904-867-4468, 2014652: and leave your message!
You can now text our Podcast Studio direct. Ask questions, suggest guests and stories.
We Look Forward To Hearing From You!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.

Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.


  continue reading

188 episoade

Toate episoadele

×
 
Loading …

Bun venit la Player FM!

Player FM scanează web-ul pentru podcast-uri de înaltă calitate pentru a vă putea bucura acum. Este cea mai bună aplicație pentru podcast și funcționează pe Android, iPhone și pe web. Înscrieți-vă pentru a sincroniza abonamentele pe toate dispozitivele.

 

Ghid rapid de referință