show episodes
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization. Developed by Cisco, Security Stories is an interview-based podcast full of insights from those who are carving a path in this weird and wonderful industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Security Conversations is a cybersecurity podcast series curated by journalist and security strategist Ryan Naraine. These conversations with security practitioners cover a wide range of topics, including threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted threat activity. Connect with Ryan on Twitter (Open DMs). Disclosure: Ryan is a security strategist at Intel Corp. Ryan produces this podcast in hi ...
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. * ITSPmagazine is a free online publication that focuses on technology and the influence that it has ...
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real life scenarios and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at http ...
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
The CIO exchange podcast features technology and business leaders from around the world, discussing some of the hardest problems they've had to solve on a national and a global scale. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. ...
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe on Apple Podcasts, SoundCloud, or Google Podcasts to get new episodes as they become available.
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
 
GovCast, a production of GovernmentCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered.
 
Welcome to the Defense and Aerospace Report podcast, our weekly podcast on the global defense and aerospace business sponsored by Bell, and hosted by Defense & Aerospace Report Editor Vago Muradian. Each week, we’ll bring you interviews with industry leaders and the business’ best analysts to put events in context, identify trends and keep an eye on what’s next in a fast-moving world. Defense & Aerospace Report is your global source for national security and aerospace news, thought leadershi ...
 
The Linux Security Podcast covers key concepts in security, reviews some of the latest exploits and discusses the tools enterprises use to detect, prevent and recover from cyber attacks. The show features insights from Mike Shinn, co-founder and CEO of Atomicorp, and Scott Shinn, co-founder and CTO of Atomicorp as well as PM for OSSEC. Scott was also chief network manager at the White House and interim CISO at the Department of the Interior earlier in his career. Mike contributed to the firs ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
IT LEADERSHIP: Topics include - Cost Center vs Business Force Multiplier - End User Influence - Selling IT to Upper Management - Getting a Seat at the Table *****DISCLAIMER***** All views, opinions, and statements made by guests on this show do not represent the beliefs of Phil Howard, or any entity whatsoever with which I have been, am now, or will be affiliated. Any statements, views, random thoughts, or opinions expressed by myself do not necessarily reflect my personal beliefs (could eas ...
 
You've seen the cyber-attack stories on the news, but you may not be sure just how big of a threat cyber-attacks are to local companies right here in our community. The truth is, successful attacks are happening here all the time. We see them because we're the ones that get called in to assess the damage and clean it up. We started this podcast to help educate business and IT leaders on just how serious the threat of cyber-attack is so you can take control and protect the people and the busi ...
 
The age of the customer isn’t a tagline — it’s a fundamental shift in the market that is forcing companies and executives to change course. In Forrester’s What It Means podcast, we’ll examine those changes, what they mean, and what executives can do about them.
 
Loading …
show series
 
Sponsored by: www.crowdstrike.com/For more on cybersecurity, visit us at cybersecurityventures.com/For all of our podcasts, visit us at cybersecurityventures.com/podcasts/Follow Cybersecurity Ventures / Cybercrime Magazine here:LinkedIn: linkedin.com/company/cybercrime-magazine/Twitter: twitter.com/CybersecuritySF…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/security-is-suffering-from-devops-fomo/) Darn it. DevOps is having this awesome successful party and we want in! We've tried inserting ourselves in the middle (DevSecOps) and we launched a pre-party (shift left), but they still don't like us. This episode is h…
 
On today’s episode, we continue our conversation with Steve Katz, the first CISO, and discuss the importance of understanding yourself, your role, and the company for which you work. Marketing Yourself Within the Company One of the things that Steve stresses is that you need to be able to market yourself and the role of CISO to the rest of the comp…
 
Once upon a time —not that long ago—the Information Security field had no rules, definitions, tools, or framework, and it was a new frontier to be discovered and conquered. Now, looking back, we sure have come a long way. In this episode of the Business of Security channel, we travel in time with Matthew Rosenquist. Together we take a look back to …
 
On this week’s Cyber Report, sponsored by Northrop Grumman, we featured part 2 of our interview with Katie Arrington, the Chief Information Security Officer, CISO(A) to the Assistant Secretary of Defense for Acquisition, ASD(A). We continue the discussion on the urgent need to implement the DoD’s new Cybersecurity Maturity Model, the teeth behind t…
 
Randall Frietzsche, CISO at Denver Health is our feature guest this week. News from: Blone Beard, Return Path, Empower Retirement, StackHawk, CyberGRX, Red Canary, zvelo, ManagedMethods and a lot more!Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colora…
 
Meeting the COVID crisis required healthcare organizations to extend their networks with never before seen scope and at previously unimaginable speed. But many IT professionals know this was done at the expense of security considerations. This session outlines practical approaches to security and networking for the post-pandemic healthcare industry…
 
Prologue: Because we can't get enough of Brandon Dunlap and Shawn Tuma over here on the podcast, here we go again. Last episode Brandon talked about responsibility and accountability - so when we saw the story about a CISO being indicted for being less-than-truthful to the FTC, we couldn't resist. This episode is powerful, and doesn't tiptoe around…
 
In episode 136 for August 31st 2020: Uber’s former security chief is charged over covering up a 2016 data breach, Facebook pushes for data portability legislation, and how a malicious iOS SDK breached the privacy of millions of mobile users. ** Links mentioned on the show ** Former Uber Security Chief Charged Over Covering Up 2016 Data Breach https…
 
New Zealand stock exchange halted by cyber-attack China may be the world's leading cyber power A Chrome feature is creating enormous load on global root DNS servers Elon Musk confirms Tesla was the target of a foiled ransomware attack A vulnerability tsunami is overwhelming security teams There's a big hurricane headed toward Texas, and it's a nigh…
 
Sponsored by: https://www.whoisxmlapi.com/For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/Twitter: https://twitter.com/Cybersec…
 
Sponsored by: https://www.bugcrowd.com/To learn more about Bugcrowd’s “2020 Inside the Mind of a Hacker” report visit: https://itmoah.bugcrowd.com/For more on cybersecurity, visit us at https://cybersecurityventures.com/ For all of our podcasts, visit us at https://cybersecurityventures.com/podcasts/Follow Cybersecurity Ventures / Cybercrime Magazi…
 
On this episode Jenny chats to Diversity and Inclusion advocate and male ally of the year Nathan Chung, about his career in infosec, his belief in the power of technology to overcome global challenges, and his continued support for women in leadership and in tech. Thanks to Nathan for a great interview. Guest(s) Nathan Chung This Episode’s Sponsors…
 
On this episode of the DefAero Report Daily Podcast, sponsored by Bell, our guest Dave Alexander, president of aviation systems at General Atomics, discusses COVID-19 lessons, the company's history of innovation and agility, the benefits of the company's structure and approach, as well as future goals.…
 
We asked our co-host, Theresa Payton, to bring a fantastic guest; she got one of the most badass guests you could ever find: Allison Levine. We tried to summarize in a few paragraphs the stories she recounted, but they are just too many — Furthermore, unless you hear them from her, you wouldn't believe us. Here, to get the story started, are some f…
 
Deadlines have a way of sneaking up on everyone, and the healthcare industry is finding itself only weeks away from the Nov. 2 start date for when federal rules governing information blocking go into effect. With trying to manage patient care during the COVID-19 pandemic, any oversight might be understandable – but absent any last-minute reprieve, …
 
Today we chat to Chris Leach, senior CISO Advisor at Cisco. From his background as an accountant (which he hated!) to venturing into cybersecurity ("I had to learn to speak in bits and bytes, after only speaking in 1s and 0s"), he has a fascinating story to share. Chris also has some brilliant insights into how to be a great leader and role model f…
 
Over 300,000 companies in the US could become subject to the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) soon. This new certification is required for companies that do business with the DoD, either directly or as a sub-contractor. Chris Saucier is the CMMC Lead for NetBrain Technologies and he shares his expertise …
 
Trump approves Oracle’s TikTok deal and delays app store ban ByteDance says it’s not aware of $5 billion education fund in TikTok deal California judge halts Trump’s WeChat ban HUGE thanks to our sponsor, Trusona Trusona enables enterprises to secure and simplify user access by removing passwords from the Windows 10 login experience. With a single …
 
In episode 139 for September 21st 2020: This week we take a break from the news to bring you our interview with Alex Kubiak, Senior Product Manager at StartPage.com. StartPage is a privacy focused search engine which uses Google’s search results but removes all trackers and logs. This makes StartPage very different than other privacy focused search…
 
On this episode of the Business Podcast, sponsored by Bell, our guests include “Rocket Ron” Epstein, PhD, of Bank of America Merrill Lynch, Richard Aboulafia of the Teal Group consultancy and Sash Tusa of Agency Partners.Topics:— Implications of US Air Force acquisition chief Will Roper’s disclosure that the service’s Next Generation Air Dominance …
 
Matt Shufeldt, Practice Lead and Executive Advisor at EVOTEK is our feature guest this week. News from: CenturyLink, Sphero, Avertium, LogRhythm, Coalfire, Red Canary, Webroot and a lot more!Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Secur…
 
On this week’s Cyber Report, sponsored by Northrop Grumman, Jay Healey, senior research scholar at Columbia University and a senior fellow at the Atlantic Council think tank, discusses his recent article Could Trump Deploy US Cyber Command Against Protestors?, on discussion on setting better limits on the U.S. military’s ability to operate against …
 
Iranian Hackers Found Way Into Encrypted Apps Microsoft declares its underwater data center test was a success China plans new data policy in response to Trump admin's "bullying" Patient Passes away during a cyberattack on a hospital Ransomware has its first fatality Nvidia buys ARM Holdings from SoftBank for $40 billion Vue.js releases their 3.0 f…
 
Iranian Hackers Found Way Into Encrypted Apps Microsoft declares its underwater data center test was a success China plans new data policy in response to Trump admin's "bullying" Patient Passes away during a cyberattack on a hospital Ransomware has its first fatality Nvidia buys ARM Holdings from SoftBank for $40 billion Vue.js releases their 3.0 f…
 
We can't deny the value of the Red and Blue Teams. One tests the weaknesses of an environment and the other the controls and processes as they get attacked. However, things get better when you add a Purple Team. Does having a Red Team and a Blue Team mean that you automatically have a Purple Team too? The answer is no. But what is the material dema…
 
On this Roundtable episode of the Defense & Aerospace Report Podcast, sponsored by Bell, our guests are Dov Zakheim, PhD, former DoD comptroller, now with the Center for Strategic and International Studies, Gordon Adams, PhD, Non-Resident Fellow at the Quincy Institute, Mackenzie Eaglen of the American Enterprise Institute, Byron Callan of the inde…
 
In this Spotlight Podcast, sponsored by The Trusted Computing Group, we speak with Matthew Areno, a Principal Engineer in the Intel Product Assurance and Security (IPAS) group about the fast-changing landscape of cyber threats including attacks on hardware and software supply chains. The post Spotlight Podcast: Intel’s Matt Areno – Supply Chain is …
 
For a number of reasons, most CISOs agree that biomedical devices represent one of the most vulnerable points in their security landscape. Some of those reasons include the fact that manufacturers may not always embed the best security controls, patching of older devices may void warranties, and even getting a solid inventory of what's on the netwo…
 
On this episode of the DefAero Report Daily Podcast, sponsored by Bell, our guests Lt. Gen. Dave Deptula, USAF Ret., the dean of the Mitchell Institute for Aerospace Studies, Todd Harrison of the Center for Strategic and International Studies, John Tirpak of Air Force Magazine, and Steve Trimble of Aviation Week and Space Technology discuss key tak…
 
The Air Force’s initiative to modernize its network didn’t miss a beat over the last few months despite the pandemic and other related challenges. In fact, the Air Force expanded its test of network-as-a-service to move into the early stages of reaching full capacity, Maj. Gen. Kevin Kennedy, the Air Force’s assistant deputy chief information offic…
 
Today’s guest is Lucas Moody, Head of Security Innovation and Operations at Rubrik, here to talk about what being forward-thinking about security in 2020 looks like. We open with Lucas sketching out his impressive career in Silicon Valley and how his role as the first CISO at Palo Alto Networks is informing his current work at Rubrik. Here we explo…
 
One of the positives of having an integrated EHR platform? Rather than pushing back an implementation because of the pandemic, NewYork-Presbyterian was able to move theirs up, said CIO Daniel Barchi in a recent interview. Source: Podcast with NYP CIO Daniel Barchi, Part 1: “It’s a Testament to the Ability to Plan and Execute.” on healthsystemcio.co…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login