Episode
91: webjedi
Description
What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka webjedi was there for one of these intrusions and tells us the story of what happened. You can find more talks from Amélie at her website webjedi.net. Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go. View all active sponsors. Sources https://www.foxnews.com/story/0,2933,435681,00.html https://w2.darkreading.com/risk-management/world-bank-(allegedly)-hacked/d/d-id/1072857 https://www.washingtonpost.com/nation/2020/05/18/missionary-pilot-death-coronavirus/ https://webjedi.net/ CLAIM=8f61b1a2cab60fab354cc5b111ea154705b363d3=CLAIM Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
DRATA is a cloud compliance software that provides continuous monitoring and visibility of risk, security controls, and audit readiness for various standards.
00:00 - 03:46 (03:46)
Summary
DRATA is a cloud compliance software that provides continuous monitoring and visibility of risk, security controls, and audit readiness for various standards. Listeners of Darknet Diaries are eligible for a 10% discount on DRATA and waived implementation fees by visiting drata.com/partner/darknetdiaries.
Episode91: webjedi
PodcastDarknet Diaries
A person recounts how he learned various technologies in the early days of the internet while creating a fan website and emphasizes the importance of being a less appetizing target for hackers.
03:46 - 09:02 (05:15)
Summary
A person recounts how he learned various technologies in the early days of the internet while creating a fan website and emphasizes the importance of being a less appetizing target for hackers.
Episode91: webjedi
PodcastDarknet Diaries
In 2005, Paul Wolfowitz was nominated as the president of the World Bank by President Bush.
09:02 - 15:35 (06:32)
Summary
In 2005, Paul Wolfowitz was nominated as the president of the World Bank by President Bush. However, his tenure was plagued by scandal when it was discovered that he had used his position to secure a job for his girlfriend, creating controversy around his leadership of an organization tasked with fighting poverty.
Episode91: webjedi
PodcastDarknet Diaries
This episode discusses note-taking practices pre-iPhone, and highlights the importance of encryption in securing sensitive data.
15:35 - 21:53 (06:18)
Summary
This episode discusses note-taking practices pre-iPhone, and highlights the importance of encryption in securing sensitive data.
Episode91: webjedi
PodcastDarknet Diaries
The World Bank called in Mandiant to help with incident response when they suffered a cyber incident that led to a leak of information to Fox News, including sensitive information that was only discussed in the war room meetings.
21:53 - 29:33 (07:39)
Summary
The World Bank called in Mandiant to help with incident response when they suffered a cyber incident that led to a leak of information to Fox News, including sensitive information that was only discussed in the war room meetings.
Episode91: webjedi
PodcastDarknet Diaries
With the help of linguistic analysis and remote forensic imaging, a leaker who was connected to the prior leadership was caught.
29:37 - 37:34 (07:57)
Summary
With the help of linguistic analysis and remote forensic imaging, a leaker who was connected to the prior leadership was caught. The suspect's hard drive was imaged, allowing access to their entire history of sent emails and connections to the leak incident.
Episode91: webjedi
PodcastDarknet Diaries
Despite the World Bank's wealth, their cybersecurity measures were inadequate, relying solely on user IDs and passwords.
37:34 - 45:50 (08:15)
Summary
Despite the World Bank's wealth, their cybersecurity measures were inadequate, relying solely on user IDs and passwords. When there was a security breach, it was surprising to find the hackers targeting HR, but it was due to obtaining password hashes and the enterprise admin’s password.
Episode91: webjedi
PodcastDarknet Diaries
The speaker discusses early attempts at being confident in mapping out Chinese threat actors in the early days of cybersecurity and the excitement that IT professionals feel in being able to "build back better".
45:50 - 58:04 (12:13)
Summary
The speaker discusses early attempts at being confident in mapping out Chinese threat actors in the early days of cybersecurity and the excitement that IT professionals feel in being able to "build back better".
Episode91: webjedi
PodcastDarknet Diaries
Laura Fucci, a technology advocate, discusses her experience as a Deputy CIO and a CTO in leading development efforts.
58:04 - 1:00:08 (02:04)
Summary
Laura Fucci, a technology advocate, discusses her experience as a Deputy CIO and a CTO in leading development efforts. She also highlights the importance of spreading knowledge and sharing ways to improve technology practices.