show episodes
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome to CISO Tradecraft. A podcast designed to take you through the adventure of becoming a CISO. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
Want to learn what it takes to start, develop and build a successful career in the Information Technology industry? The IT Career Energizer podcast enables you to find out how. More than 250 IT and tech professionals, consultants and experts have shared their career experiences and insights to help you to succeed. Previous guests have included Jeff Atwood (Stack Overflow), Troy Hunt (Have I Been Pwned), Nicole Archambault (La Vie en Code), April Wensel (Compassionate Coding), Kent Beck (Agil ...
 
Our experts are excited to share insights, experience, and advice on all things IT. We are here to break down IT concepts and share best practices. We hope you find these episodes informative and helpful. If you would like to learn more about our company or see how we can help your business, visit us at mobiuspartners.com. Want to be a guest or have ideas for topics for us to cover? Please send to info@mobiuspartners.com.
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
 
Your hosts, Tom Meehan, CIO and CISO at CONTROLTEK and Shaun Ferrari, Global Cash Product Director at Currency Research share the latest information on the issues affecting the world of cash today. Featuring interviews with top industry experts and thought leaders, you’ll have a close look at trends, strategies, and technology influencing the world of cash. Stay informed on topics like cash security, payments technology, risks, the cash supply chain, and learn about strategies to support bet ...
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue with Zscaler's expert team of CISO security practitioners. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces security frict ...
 
Innovative Entrepreneur Podcast - Founder, Investor and Principal Partner, Benazeer Daruwalla talks about her first Entrepreneurial venture - CyberMinds Consulting, a boutique firm based out of Brooklyn, NY that specializes in Cyber Advisory Services for Mid-sized Enterprises across Industry sectors. In this series, she provides insights on her journey; the 21st century CISO challenges; and the unique approach to proactively address the Business-Technology-Cyber conundrum.
 
Welcome to the Cybrary Studios, home to Cybrarys three podcast series, including the award-winning 401 Access Denied voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021 Cybersecurity Excellence Awards.The Cybrary Podcast -In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Stay up to date with ...
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
The CIO exchange podcast features technology and business leaders from around the world, discussing what's working, what's not, and what's next. Through stories of failure, success, passion, and struggle, we explore the ways in which these tech executives have moved both their companies and their careers forward. Each episode is a conversation focusing on a unique topic intended to provide the insight and perspective needed to help others make progress. This podcast is produced by VMware, a ...
 
A podcast from the National Association of State Chief Information Officers (NASCIO). Amy Glasscock and Matt Pincus interview guests (state CIOs, NASCIO members, strategic partners and colleagues) to get their unique stories and perspectives on state information technology, leadership and lessons learned.
 
Welcome to Paying It Forward, Lessons From The C-Suite. This is the trailer that introduces you to the podcast. If you want to attain a C level position in your career, you need to understand what it takes to achieve that level of leadership. When you have access to successful entrepreneurs and senior executives who want to help you develop the skills and traits to become a great leader, it’s like having your own mastermind group to mentor and guide you. In a nutshell, that’s our podcast. Ea ...
 
Hosted by Tier4 Advisors' Founder & Chairman Jake Sherrill, The Download podcast features trending technology news, insights, and thought leadership from some of the best and brightest technology leaders. In addition to tech, be prepared for the occasional sports & movie reference as well. Tune in to stay up-to-date on the latest Data Center, Telecom, Managed Services, Cybersecurity, and Emerging Technology trends to assist your business with digital transformation - let's Tech about it!
 
Discover real people, overcoming security problems. 30-minute interviews with entrepreneurs, engineers, and leaders that explore modern security dilemmas and how we overcome them. A shame-free space to engage in open and honest discussions about what's really going on in Security. Interviews of about 30 minutes in length explore the dilemmas and opportunities faced by real entrepreneurs, operators, engineers, and leaders. Join us and catch a glimpse into the proven technologies and technique ...
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Avast is launching a new series, Avast Hacker Archives, that uncovers the “Aha!” moments that hackers and researchers have had over the course of their careers. Jaya Baloo, Avast CISO and the host of the series, will be chatting with renowned security experts about their backgrounds, education, and, of course, their toughest and funniest hack stories and projects — nitty-gritty and technical details included. Security professionals, hardware experts, threat intelligence leads, privacy advoca ...
 
Loading …
show series
 
In this episode we’re joined by Kevin Storli and Phil Venables to look at the changing role of the chief information security officer (CISO). We discuss:1. How they’ve seen the role of the CISO change over their careers.2.How CISOs can balance shutting down security risks with enabling their organisation to achieve its goals.3.Current areas of conc…
 
In this episode, Jake Sherrill and Joel Andersen are joined by the CSO of TierPoint Paul Mazzucco for a discussion on his evolution from Behavioral Marketing professional to CISO, the Business of Security, what it takes to secure IT talent, along with other trending topics. Hosted by Tier4 Advisors' Founder & Chairman Jake Sherrill, The Download po…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/how-cisos-make-it-worse-for-other-cisos/ Are CISOs inappropriately putting pressure on themselves and is that hurting the rep of all CISOs as a result? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our gue…
 
As threats to the nation’s security grow, there remains a substantial and increasing shortage of skilled cybersecurity professionals. The federal government and private sector can work together to fill their open positions and attract the next generation of motivated mission-driven cybersecurity leaders. This podcast discusses the Cybersecurity Tal…
 
Cybercrime Magazine CISO Minute host Theresa Payton, Former White House CIO weighs in on how winning the cyber talent war includes neurodiversity. The CISO Minute is sponsored by https://www.knowbe4.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/By Cybercrime Magazine
 
Part 3: Action items and actionable information; Give insights into how to support marginalized people and adopt better hiring practices. Sources: https://www.thisishowyoucan.com/post/__wheel_of_power_and_privilege https://www.forumone.com/ideas/why-and-how-to-prioritize-dei-at-your-organization/ http://greenlining.org/wp-content/uploads/2018/03/DE…
 
The Zscaler CISO team has been hearing the same question in their day-to-day interactions: should I deploy zero trust: at the edge or at the endpoint? In this podcast, they share their perspectives on why a layered defense is critically important to protect organizations from today's threats. SASE + EDR = “Better Together”, and the team clears up s…
 
On this episode of CISO Tradecraft, you can learn the 10 steps to Incident Response Planning: Establish a Cyber Incident Response Team Develop a 24/7 Contact list for Response Personnel Compile Key Documentation of Business-Critical Networks and Systems Identify Response Partners and Establish Mutual Assistance Agreements Develop Technical Response…
 
Kylie “KT” Boyle joins us in the latest episode of The New CISO, which is also the beginning of a new segment: The New CISO Foundations. Every security program is built off of a foundation; this episode will focus on KT’s mission and what building blocks his organization represents. Background KT Boyle leads Anubis Security Groups. He has been in t…
 
Introducing the audio edition of our teissTalk series. Each week we dive into the latest cyber security news with our expert panel and then deep dives into an issue that is vital to the cyber security industry. On this episode: Understand various reporting structures and scopes of responsibility for Information Security Leaders Examine the new “typ…
 
This week, in the Leadership and Communications section, CISOs Struggle to Cope with Mounting Job Stress, Corporate Compliance Strategies to Protect Data, Cybersecurity Metrics That Matter, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw218…
 
On today’s show our guest is Helen Patton, CISO Advisor for Cisco Duo. Previously, Helen was an Executive Director at JP Morgan Chase, and CISO for Ohio State University. Helen talks candidly about these two wildly different experiences—as well as how to know when it's time to leave a company, resilience in the age of Covid and killer hornets, and …
 
How at Risk Are Our Healthcare Networks? Civilian hospitals organized to give care to the wounded and sick, the infirm and maternity cases, may in no circumstances be the object of attack, but shall at all times be respected and protected by the Parties to the conflict. -- Geneva Conventions; Article 18, Section 3, Fourth Geneva Convention Even at …
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Euros-Driven Football Fever Nets Dumb Passwords Ukraine arrests Clop ransomware gang members, seizes servers Security Flaw Found in 2G Mobile Data Encryption Standard Kaspersky Details Iranian Domestic Cyber-Surveillance Operation Molerats Hackers Return With New Attacks Target…
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/defense-in-depth-cloud-configuration-fails/ Why do we hear so many stories about incidents related to poor or misconfigured cloud services? Check out this post and this post for the basis for our conversation on this week’s episode which features me, David Spar…
 
Join this segment with Danny Akacki to learn about educating both practitioners and executives on security topics of the day and helping to build community initiatives like trust groups and community groups like local DEF CON chapters. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securityweekly.com/scw76…
 
Biden gives Putin a no-hacking list Facebook’s Oversight Board accepts policy opinion Researchers reverse engineer deepfakes Thanks to our episode sponsor, Keyavi Worried about being the next ransomware victim, like Colonial Pipeline? Cyber criminals stole gigabytes of data before their first extortion attempt, demanding payment to decrypt Colonial…
 
Join this segment with Danny Akacki to learn about educating both practitioners and executives on security topics of the day and helping to build community initiatives like trust groups and community groups like local DEF CON chapters. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securityweekly.com/scw76…
 
In this episode, Jake Sherrill and Joel Andersen are joined by Josh Siddon, VP of IT at Old Time Pottery, for a discussion on supersonic jets, Commodore 64s, and how CIO's make great COO's and CEO's along the best thing they saw all week, and other trending topics. Hosted by Tier4 Advisors' Founder & Chairman Jake Sherrill, The Download podcast fea…
 
In this episode, Jake Sherrill and Joel Andersen are joined by Shawn Mills, Founder & President of Lunavi (formerly Green House Data) for a discussion on Founding, Running, and Growing a business, the best thing they saw all week, and other trending topics. Hosted by Tier4 Advisors' Founder & Chairman Jake Sherrill, The Download podcast features tr…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Booming Cyber-Underground Market for Initial-Access Brokers Avaddon ransomware's exit sheds light on victim landscape Largest US propane distributor discloses '8-second' data breach EU Court Leaves Facebook More Exposed to Privacy Challenges Malware Attack on South Korean Entit…
 
With us today is Taylor Lehmann, former ciso several times over in the healthcare sector, and currently Americas leader for security, networking, identity, and compliance solution architecture at AWS. Taylor and Allan talk about application security: why it's important, who are the personas, the value of threat modeling, infrastructure as code, how…
 
Robert Johnson, III, President & CEO at Cimcor, Inc., and his special guests, sit down with Cybercrime Magazine to share data security best practices, trends, and more. Cimcor is the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com…
 
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/…
 
This week, In the Leadership & Communications articles: Attracting Talent During a Worker Shortage, CISOs Say Application Security is Broken, Three Steps to Harden Your Active Directory in Light of Recent Attacks, Demystifying RockYou2021, & more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweek…
 
Windows 11 leaked “Face of Anonymous” suspect deported from Mexico to face US hacking charges Apple reveals two iOS zero-day vulnerabilities that allow attackers to access fully patched devices Thanks to our episode sponsor, Keyavi Ransomware is big business. This nightmare usually gives cyber criminals multiple opportunities to hold your data host…
 
Today we're joined by John Gates, a Lead IT Security Operations Analyst for a global food brand. John has always liked to know how do things work - and that has proven to be a beneficial trait - from his first job as a car mechanic to IT consultancy and education to his current role. He’s also an advisor and former board member at OpsecEdu, an orga…
 
Are Secure Web Gateways doing their job to keep businesses safe in 2021? Recent survey results from ESG reveal 1 in 10 are not happy with their secure web gateway (SWG) and/or web security. Yet by 2024, the SWG market is projected to grow to 10.9 billion. As this year continues to twist and turn, complexity for an IT security professional continues…
 
Find James Azar Host of CyberHub Podcast, CISO Talk, Goodbye Privacy, Tech Town Square, Other Side of Cyber and CISOs Secrets James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ James on Parler: @realjamesazar Telegram: CyberHub Podcast ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once …
 
Bruce Schneier is an internationally renowned security technologist, author, fellow at the Berkman Klein Center for Internet and Society at Harvard University, and a lecturer in public policy at the Harvard Kennedy School. In this episode, he joins host Hillarie McClure to discuss his latest research and paper "The Coming AI Hackers." To learn more…
 
There are a lot of myths about what pen testing or red-teaming really are. DJ Fuller, COO of Pathfynder joins us today to share what companies should expect when they engage a third-party to help them with cyber security and how to establish a good incident response program. Get the low down on the common mistakes that organizations make when hirin…
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Apple Hurries Patches for Safari Bugs Under Active Attack SEO poisoning used to backdoor targets with malware Scammers bypass Office 365 MFA in BEC attacks Critical Entities Targeted in Suspected Chinese Cyber Spying Story Links: https://threatpost.com/apple-patch-safari-active…
 
In the final stages of attack, attackers exfiltrate your critical data for profit. While many of the ways are known, there are other ways that they often use to elude us. Come listen to Avihai Ben-Youssef, CTO and Co-Founder of Cymulate, as he discusses some of these techniques and shows how Breach and Attack Simulation can be used to discover if t…
 
This week, In the Leadership & Communications articles: Attracting Talent During a Worker Shortage, CISOs Say Application Security is Broken, Three Steps to Harden Your Active Directory in Light of Recent Attacks, Demystifying RockYou2021, & more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweek…
 
This week in the AppSec News, Mike and John talk: ALPACA surveys protocol confusion, lessons from the EA breach, forgotten lessons about sprintf, Go fuzzing goes beta, security lessons from Kubernetes Goat, basic lessons for OT from CISA, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekl…
 
As the cyberthreat landscape grows exponentially more complicated, the insurance industry is trying to keep pace. Yet, many organizations still lack cybersecurity insurance. Lynn Peachey, director of business development at Arete Incident Response, breaks down the basics of these insurance policies.By BankInfoSecurity.com
 
Are Secure Web Gateways doing their job to keep businesses safe in 2021? Recent survey results from ESG reveal 1 in 10 are not happy with their secure web gateway (SWG) and/or web security. Yet by 2024, the SWG market is projected to grow to 10.9 billion. As this year continues to twist and turn, complexity for an IT security professional continues…
 
We will provide a short introduction to OWASP SAMM, which is a flagship OWASP project allowing organizations to bootstrap and iteratively improve their secure software practice in a measurable way. Seba will explain the SAMM model, consisting of 15 security practices. Every security practice contains a set of activities, structured into 3 maturity …
 
There's no "right way" to get started in cybersecurity but there are a lot of different paths. This week, the guys talk about their career paths starting from the ancient IT world and moving into modern day cybersecurity disciplines. They share some of the most important skill sets that you rarely hear about, plus tips and tricks to succeed. Pick u…
 
Stuart Winter-Tear is the Director of Strategy & Solutions at ThreatModeler. In this Cybercrime Radio episode, he joins host Hillarie McClure to discuss how we can improve threat modeling through better story telling and better messaging. This episode is brought to you by ThreatModeler, an automated threat modeling solution that secures and scales …
 
Today's Headlines and the latest #cybernews from the desk of the #CISO: Chinese Hackers Believed to be Behind Second Cyberattack on Air India REvil Hits US Nuclear Weapons Contractor Codecov ditches Bash Uploader for a NodeJS executable Russia told to tackle cyber criminals operating from within its borders COO of Security Company Charged for Cyber…
 
In this episode with Doug Witschi, the Assistant Director for Cybercrime Threat Response at Interpol, we talked about the current issues with cybercrime, observations and stories of recent cases that Interpol was involved in, including the role we can play as an ecosystem. Doug Witschi - https://www.linkedin.com/in/doug-witschi-b0b7a190 Shamane Tan…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login