A closer look at the notable stories inside
Information Security and why they matter.

S2:E3 Privacy

Privacy

In March 2017 Congress voted to roll back FCC privacy protections for Internet users passed during the Obama administration. The change comes just as data collection is hitting pervasive levels never seen before.

In this episode of Root Access, host Mike Storm and the team talk to Trevor Hughes, president and CEO of the International Association of Privacy Professionals, about the future of privacy in an age of mass data collection.

View Related Material

Massachusetts State Representative Mike Capuano’s rant against tracking of his underwear purchases.
https://www.youtube.com/watch?v=S2GzBTJioGc

Stanford Assistant Professor Michal Kosinski’s presentation on ‘The End of Privacy’:

https://www.youtube.com/watch?v=DYhAM34Hhzc

IAPP President and CEO J. Trevor Hughes’ presentation on ‘The Future of Privacy’ at RSA:

https://www.youtube.com/watch?v=AunBy3jI-FQ

S2:E2 Mirai

Mirai

In Autumn of 2016, two security researchers were tracking something big. Really big. Hundreds of thousands of Internet-connected devices were being scanned for open vulnerabilities and herded into a massive botnet. But why?

In this episode of Root Access, host Mike Storm and the team dig into the Mirai botnet, its lasting impact on the security industry, and the work of two researchers to find its target before it launched the largest DDoS event in history.

View Related Material

S2:E1 Active Measures

Active Measures

Just before New Year’s Eve 2016, staff at the Burlington Electric company in Vermont received a call. It was the Department of Homeland Security. The electrical grid was under siege by Russian hackers. Or was it?

On a new season of Root Access, host Mike Storm and the Root Access team dive into misinformation online, how fake news has become an industry, the security risks at play, and how social media bot armies play a huge role in its spread. Guests include Professor Fil Menzcer from Indiana University and Mark Pesce, honorary associate with the University of Sydney.

View Related Material

Below are related links to Season Two Episode One:

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK Clint Watts’ entire testimony

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK More info on Hoaxy

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK Facebook’s latest security report.

About R00T ACCESS

Root Access is a podcast focused on privacy and security. We take an in-depth look at the topics and events that are determining the course of the internet and its effect on people’s daily lives.

Cisco principal engineer Mike Storm is your host. Root Access is brought to you by Cisco.

Josh Pyorre

Josh is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible.

Past speaking engagements include:
2015: Derbycon, DeepSec (Vienna, Austria)
2015: NASA, Source (Boston, Seattle)
2015: BSides (Los Angeles, San Francisco, Chicago, Austin)
2010: Defcon (Las Vegas)

josh-image-3

Mike Storm

Mike Storm is a Cisco principal engineer and 10-year CCIE with more than 25 years in the networking and cybersecurity industry. He has an affinity for educating others on how to correctly build security solutions that successfully protect their business, data and themselves from modern threats.

© 2017 Cisco  Privacy Policy  Terms of Service

Supplier is a member of the DMA and adheres to their code and all relevant rules and regulations. They have a Privacy Policy and a process in place for managing opt outs in accordance with the CAN-SPAM Act of 2003 which includes maintaining a suppression file of all people who have opted out of being contacted. All new email mailing lists are “parsed” against these prior to any message being sent.