Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

You Don't Have to Out-Tech the Hacker

41:43
 
Share
 

Manage episode 525096749 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us a text

We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode.

Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows.

Listen as we discuss this strategy, as well:

  • How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.
  • Why manufactures shouldn't look to out-tech the hacker.
  • Strategies to help defenders from having to keep playing catch-up.
  • How cybersecurity can be utilized as an operational tool.
  • The ongoing challenges created by Zero Day vulnerabilities.
  • Creating a culture that goes beyond just "spending for the cyber nerd."
  • New ways to calculate ROI in advancing cybersecurity priorities.
  • The cost benefits of investing in cyber talent.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...

Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

Chapters

1. You Don't Have to Out-Tech the Hacker (00:00:00)

2. [Ad] How Hacks Happen (00:17:43)

3. (Cont.) You Don't Have to Out-Tech the Hacker (00:18:33)

147 episodes

Artwork

You Don't Have to Out-Tech the Hacker

Security Breach

0-10 subscribers

published

iconShare
 
Manage episode 525096749 series 3352216
Content provided by Eric Sorensen. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Eric Sorensen or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us a text

We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for today’s episode.

Evan Dornbush is the CEO of Desired Effect. A former DoD-trained state hacker, he’s now working with cyber researchers to help promote their findings and get the vulnerabilities they detect into the hands of the software, network or equipment suppliers before hackers can leverage these findings, and wreak havoc on industrial control systems and production workflows.

Listen as we discuss this strategy, as well:

  • How to define roles and responsibilities in pushing Secure-by-Design initiatives forward.
  • Why manufactures shouldn't look to out-tech the hacker.
  • Strategies to help defenders from having to keep playing catch-up.
  • How cybersecurity can be utilized as an operational tool.
  • The ongoing challenges created by Zero Day vulnerabilities.
  • Creating a culture that goes beyond just "spending for the cyber nerd."
  • New ways to calculate ROI in advancing cybersecurity priorities.
  • The cost benefits of investing in cyber talent.

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

How Hacks Happen
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented...

Listen on: Apple Podcasts Spotify

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.
If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

  continue reading

Chapters

1. You Don't Have to Out-Tech the Hacker (00:00:00)

2. [Ad] How Hacks Happen (00:17:43)

3. (Cont.) You Don't Have to Out-Tech the Hacker (00:18:33)

147 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play