Episode 18: Who Watches The Watchmen?

If you notice the team being a little bit more careful with their words than usual, it's because the topic of this episode is...a SANSitive one.

We'll leave it like that, shall we?

We also chat about the NCC/CREST/GitHub debacle, which sparks debate over how valuable certifications are when they can be played with 'leaked' step-by-step guides. Is there any real-world value in simply learning how to pass an exam? Does a certification truly indicate aptitude?

The topic turns next to facial recognition in law enforcement, following the news that Liberty won the first international case banning the use of facial recognition technology for policing. It's a serious debate – that gets a bit dystopian at times – and we take a look at it from every angle.

***

About Cyber Humanity

The podcast taking cybersecurity personally
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg.

These weekly podcasts come in two main flavors. We’re either ranting about themes close to the heart of us security types, or we’re discussing threats and vulnerabilities that have hit headlines – or slipped under the radar – in recent weeks.

Join Chris Pace (tech advocate and keeper of the coloring pencils), Kev Breen (pro blue teamer, also known as 'Mr Nothing to CVE here...'), Max Vetter (former dark web detective and pretty cool guy), and Paul Bentham (ex-gov. type and Immersive Labs product guru) as they wend their way through the murky world of Cyber Humanity.

Catch up on previous episodes of Cyber Humanity
TOPICS
Podcast
PUBLISHED

2 September 2020

We help businesses to increase and evidence human capability in every part of cybersecurity.

Legal