Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
Manage episode 445510167 series 3516169
In this episode of The Security Repo Podcast, we broach a wide variety of topics, ranging from The Theory of Constraints, source control horror stories, and using scorecards to drive cross-team success. We are joined by Justin Reock, the Head of Developer Relations for Cortex.io. He is an outspoken speaker, writer, and software practice evangelist. He has over 20 years of experience working in various software roles and has delivered enterprise solutions, technical leadership, and community education on a range of topics. We start by talking about how the work of Ed Deming translates into modern software workflow and what that means for security. Branching from there, we dip into how developer and build tooling can and should include security. The one thing all developers have in common is source control, and Justin's background lets him share a few stories that are not to be missed. We end with a new twist on Best Advice/Worst Advice that gives us deeper insight into our guest. Thanks for tuning into this episode. Links mentioned in this episode: https://www.linkedin.com/in/justinreock/ OpenRewrite and Modern https://www.moderne.ai/blog/overview-... Pre-frontal cortex podcast - https://podcasts.apple.com/us/podcast... IDPcon.com - https://idpcon.com/
93 episodes
Manage episode 445510167 series 3516169
In this episode of The Security Repo Podcast, we broach a wide variety of topics, ranging from The Theory of Constraints, source control horror stories, and using scorecards to drive cross-team success. We are joined by Justin Reock, the Head of Developer Relations for Cortex.io. He is an outspoken speaker, writer, and software practice evangelist. He has over 20 years of experience working in various software roles and has delivered enterprise solutions, technical leadership, and community education on a range of topics. We start by talking about how the work of Ed Deming translates into modern software workflow and what that means for security. Branching from there, we dip into how developer and build tooling can and should include security. The one thing all developers have in common is source control, and Justin's background lets him share a few stories that are not to be missed. We end with a new twist on Best Advice/Worst Advice that gives us deeper insight into our guest. Thanks for tuning into this episode. Links mentioned in this episode: https://www.linkedin.com/in/justinreock/ OpenRewrite and Modern https://www.moderne.ai/blog/overview-... Pre-frontal cortex podcast - https://podcasts.apple.com/us/podcast... IDPcon.com - https://idpcon.com/
93 episodes
All episodes
×
1 Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak 21:05

1 Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci 23:04

1 From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski 20:03

1 Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko 23:06

1 Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson 24:19

1 How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen 22:20

1 Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz 22:53

1 The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill 22:36

1 Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel 22:15

1 Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen 22:45

1 Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin 41:51

1 What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher 42:21

1 Understanding Security Champions and Making Human Connections - Dustin Lehr 48:29

1 Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett 37:54

1 Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee 30:59

1 The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore 36:39

1 Securing Workload Identities And Working On Conjure - Jody Hunt 43:31

1 The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan 42:37

1 Securing Flight Simulators And Other Operational Technology - Coburn Slay 45:02

1 Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison 36:03

1 Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley 37:37

1 Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer 41:39

1 Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker 33:14

1 Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer 33:58

1 Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez 27:13

1 STIR/SHAKEN and Password Policies- Per Thorsheim 34:14

1 Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne 31:05

1 From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock 44:36

1 Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough 35:29

1 Countering Shadow IT Through Nudging Intervention - Garret Gross 28:35

1 What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host 0:59

1 Data Loss Prevention and Stopping Breaches Before They Start 36:09

1 Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee 39:32

1 Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey 36:14

1 Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix 46:40

1 DeepCover & DART Academy: Fighting Scammers Through Educating Seniors 31:17

1 Mining for Vulnerabilities: Hidden Dangers of Open Buckets 42:48

1 The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri 44:38

1 Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen 41:00

1 Behind the Scenes of Offensive Security with Bobby Kuzma 33:56

1 Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy 36:32

1 Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot 37:02

1 Securing the Future - The Art of Threat Modeling with Paul McCarty 32:50

1 Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson 40:19

1 From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity 40:14
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.