D@R 06x05 - UNC CAUSE 2022 - Open Doors, Zero Trust
Data @ Rest
by UNC Chapel Hill and UNC Fayetteville State
9M ago
Recorded in front of a live audience at UNC CAUSE in October, 2022! The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are built on a philosophy of openness and enrichment of public understanding. How do we preserve the public's trust while securing our resources, and is there a philosophical discussion to have around doing so? Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License ht ..read more
Visit website
D@R 06x04 - Incident Handling Revisited (COBRAAAAAAAAAA!)
Data @ Rest
by UNC Chapel Hill and UNC Fayetteville State
9M ago
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted successfully by them, plus the importance of compassion and empathy in our field. There are also side discussions of Michael's history as an employee of COBRA. Remember, every career is a journey. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativeco ..read more
Visit website
D@R 06x03 - Privacy, Policy, and Privacy Policies
Data @ Rest
by UNC Chapel Hill and UNC Fayetteville State
1y ago
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the other. Charlie and Michael welcome Kim Stahl, Senior Policy and Process Lead for UNC Chapel Hill's Information Technology Services, to discuss privacy, policy, and privacy policies.  Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons ..read more
Visit website
D@R 06x02 - Communicating with Students & Young Users
Data @ Rest
by UNC Chapel Hill and UNC Fayetteville State
1y ago
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communications team to discuss things to consider when we do outreach focusing on students and others on the cusp of their professional lives.  Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website
D@R 06x01 - Security Vendors & You
Data @ Rest
by UNC Chapel Hill and UNC Fayetteville State
1y ago
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.  Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website
Data at Rest 01x00: Welcome & Introductions
Data @ Rest
by UNC Chapel Hill's Information Security Office
1y ago
Welcome to Episode Zero of Data at Rest, an information security podcast intended to present accessible, informed discussions of various topics in computer, network, and information security. If you're curious about what to do when you receive a phishing email, the history of threat detection, or pop culture representations of the industry overall, this is the podcast for you! Most episodes feature an expert guest, a history lesson, and a discussion of the current state of the topic. All episodes of Season One release on September 16th, 2019. We hope you enjoy listening! -The Data @ Rest Team ..read more
Visit website
Data at Rest 05x06 - Blockchain
Data @ Rest
by Data at Rest
1y ago
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology! Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website
Data at Rest 05x05 - A Security Refresher
Data @ Rest
by Data at Rest
1y ago
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website
Data at Rest 05x03 - Election Security
Data @ Rest
by Data at Rest
1y ago
There's been a lot of talk about election security for nearly two years now, most of it rife with conspiracy theories, misinformation, and disinformation. But what are the real risks to elections, and how do we mitigate them? Links: Election Security: Rumor vs. Reality (CISA.gov) North Carolina State Board of Elections Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website
Data at Rest 05x02 - Mobile Security with Jared Perdue
Data @ Rest
by Data at Rest
1y ago
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and in the future! Links: Wireless Security Trends/CISO Cheat Sheet (excerpt from Jennifer Minella's talk) https://lastpass.unc.edu How to Keep Your Mobile Devices Secure (article by Jared Perdue at its.unc.edu Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Visit website

Follow Data @ Rest on FeedSpot

Continue with Google
Continue with Apple
OR