<?xml version="1.0" encoding="utf-8"?>
<oembed>
  <version>1</version>
  <type>rich</type>
  <provider_name>Libsyn</provider_name>
  <provider_url>https://www.libsyn.com</provider_url>
  <height>90</height>
  <width>600</width>
  <title>John Aron, letters of marque, what does a &amp;quot;junior&amp;quot; job look like with AI?</title>
  <description>  Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change at any time, and do not represent views of past, present, or future employers. &amp;amp;nbsp;   Guest Bio:  John is the CEO of Aronetics. An avid climber and runner, John has spoken at many conferences about topics like ZeroTrust, BIOS/UEFI security, communication security, and malware. Aronetics is a technology-enabled service provider.&amp;amp;nbsp; &amp;amp;nbsp;   Youtube VOD: https://youtube.com/live/5dIVTwVZLAU   Linkedin VOD:   https://www.linkedin.com/video/live/urn:li:ugcPost:7101738254823030784     Show Topic Summary: &amp;amp;nbsp;   John joins us to discuss “letters of Marque” in an effort for hackers to ‘hack back’... the overreliance on automation, and communication siloes. We also talk about what a ‘junior position’ in infosec looks like with AI doing all the “Level 1 SOC Analyst” type roles normally given to someone fresh to the security industry. &amp;amp;nbsp;   Questions and topics:    Is infosec over reliant on automation? Automation comes with its own challenges.    Documentation woes      Automation is usually found in userland     &amp;amp;nbsp;   Aronetics’ Thor provides defense and counter-offense tamper-proof technology digitally tied to&amp;amp;nbsp; &amp;amp;nbsp;  Letter of Marque - good idea, or geopolitical disaster waiting to happen?  Siloes and communication -best ways to overcome those in an org and outside?  How do we overcome siloing? &amp;amp;nbsp;  Overcoming security challenges?Identity management - 2FA is everywhere, there’s already ways around 2FA, so what now? 3FA? Biometrics? Make everyone carry around physical tokens that we can lose? &amp;amp;nbsp;  Blog post:  https://www.aronetics.com/post-quantum-cryptography/   What do we need to protect against? Nation states with quantum computers? Rubber hose cryptography? &amp;amp;nbsp;  Crime thrives in areas of low visibility.  https://www.aronetics.com/unknown/&amp;amp;nbsp; &amp;amp;nbsp;  https://www.aronetics.com/inside-the-breach/  (threat detection - the crime thrives in low vis areas) &amp;amp;nbsp;   Show points of Contact:   Brakesec Website:  https://www.brakeingsecurity.com   Youtube channel:  https://youtube.com/c/BDSPodcast   Twitch Channel:  https://twitch.tv/brakesec   Amanda Berlin:  @infosystir@infosec.exchange (Mastodon) @hackershealth&amp;amp;nbsp;   Brian Boettcher: @boettcherpwned   Bryan Brake: @bryanbrake on Mastodon.social </description>
  <author_name>BrakeSec Education Podcast</author_name>
  <author_url>https://www.youtube.com/c/BDSPodcast</author_url>
  <html>&lt;iframe title="Libsyn Player" style="border: none" src="//html5-player.libsyn.com/embed/episode/id/27928935/height/90/theme/custom/thumbnail/yes/direction/forward/render-playlist/no/custom-color/88AA3C/" height="90" width="600" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen&gt;&lt;/iframe&gt;</html>
  <thumbnail_url>https://assets.libsyn.com/secure/content/159719148</thumbnail_url>
</oembed>
