show episodes
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
Nuix creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence. Using Nuix software, customers can overcome the challenges of litigation, investigation, risk, compliance, and security by asking the right questions and getting complete, timely answers. Our collaborative data analytics algorithms and ...
 
C
Conscious Governance

1
Conscious Governance

Conscious Governance that helps Boards & CEOs make the choices that create the future for the communities they serve

Unsubscribe
Unsubscribe
Monthly
 
Conscious Governance is an advisory service that helps Boards & CEOs make the choices that create the future for the communities they serve. We do this by creating clarity from complexity in governance, strategy, risk and leadership.
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors technologists debriefed by SPY Historian Hammond -(STOP)- stories secrets tradecraft and technology discussed -(STOP)- museum confirmed to have greatest collection of artifacts on the subject anywhere in the world -(STOP)- podcast rumored ...
 
Loading …
show series
 
The latest edition of the ISMG Security Report features an analysis of how organizations can reduce risk especially over holidays and weekends, when attackers are most likely to strike. Also featured: Highlights from Ireland's IRISSCON 2021 cybercrime conference; what's ahead for COVID-19 and the workplace?…
 
Infosec skills don't necessarily transfer to CISO skills, but CISO skills are 100% transferable to whatever your infosec career looks like. Growth begins outside of your comfort zones, so some of the CISO skills you can work on now include executive storytelling, internal coalition building, and how to be comfortable being uncomfortable… Show Notes…
 
Doug London is thoughtful and reflective – but he doesn’t pull his punches and he candidly shares his analysis of the contemporary intelligence landscape. In this second part, Doug reflects on the path taken after 9/11, the CIA at the crossroads, and why human intelligence (HUMINT) will remain central to the vast and increasingly technologically so…
 
Is there anything helpful in the US President’s “Improving the Nation’s Cybersecurity” Executive Order and the follow-on Ransomware Memo from the White House? Let’s find out with your hosts Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Sign up for our free ethics CLE on December 15, 2021: https://www.ev…
 
The latest edition of the ISMG Security Report features an analysis of how cybercriminals are turning to cryptomixing services to conceal the proceeds of ransomware activities from law enforcement officials. Also featured: Criminals exploit a misconfigured FBI server and the future of zero trust.By BankInfoSecurity.com
 
This is the second episode of "The Ransomware Files," a podcast miniseries focused on stories of resilience in the fight against ransomware. An Australian company, Matthews, saw its backups corrupted and attackers release its data. The company recovered however, and has greatly improved its IT security defenses.…
 
Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be present, but is this enough? Is it really security? Join this podcast as the differences between compliance and true se…
 
This week’s guest believes that espionage is about the “human soul…[it’s] a very intimate profession…the relationship between a case officer and an agent and the need to really have…a profound insight window into their life and their souls.” Doug London may be accused of many things, but you can’t say he’s shallow. His book, The Recruiter, is based…
 
He was a Soviet agent who was “turned” by Karl Marx after reading Das Kapital – which led him to give up the important operations, a host of MI6 agents and a treasure trove of secret intelligence… George Blake was a courier in the Dutch resistance, an MI6 intelligence officer, a language student at Cambridge, a “Vice-Consul” in South Korea, a priso…
 
He has worked as a counterintelligence analyst at the FBI and the DIA. He speaks Russian. He was personally supervised by Robert Hanssen. He has an obsession with Soviet Defectors… “Freedom has many difficulties,” said JFK in his Berlin Speech, “and democracy is not perfect, but we have never had to put a wall up to keep our people in.” What was it…
 
Managing the volume of security events and continuous threat intelligence can be daunting for the largest of organizations. How do you increase the effectiveness of a Security Operations Center (SOC) and share this information across the organization for greater efficiency and adoption? To view the article from the CISO COMPASS Book that sparked th…
 
If you’re not listening to the Darknet Diaries, you’re missing out on some relatable stories that will help you better tell your own cyber risk story to your senior decision makers. Find out how with the host of Darknet Diaries, Jack Rhysider, along with Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Sig…
 
The latest edition of the ISMG Security Report features insight from U.S. Sen. Angus King on why the federal government needs to declare a clear response to cybercriminals in order to deter them. Also featured: Ransomware affiliates gain power and promoting diversity of thought in cybersecurity.By BankInfoSecurity.com
 
Data is everywhere today as users are working remotely, storing information in the cloud, downloading to USB drives and so on. Join this podcast to learn from a Healthcare CISO and some of the typical common events which take place to expose sensitive information. To view the article from the CISO COMPASS Book that sparked this interview, please vi…
 
Nada Bakos is a former CIA analyst and Chief Targeting Officer, Mark Fallon was an NCIS Special Agent and Director of the Criminal Investigative Task Force at Guantanamo, Frank Snepp is a former chief analyst of North Vietnamese Strategy for the CIA during the Vietnam War. Mark Zaid - one of the nation’s top national security lawyers - joins Andrew…
 
Cyber insurance coverages are going down and prices are going up. Not everyone who wants to buy a policy will be able to get one. Why? Our guest Chris Brumfield, cyber insurance expert from brokerage Alliant, will explain. And if you’re an attorney, Jake Bernstein, Partner with K&L Gates explains why this matters to your firm and your clients (and …
 
Description: It’s one of the most haunting murder cases you’ll ever hear about, and it takes place in a small town in Israel. Tair Rada was only 13-years-old when her body was found inside a locked bathroom stall. She was viciously murdered during a school day, and yet no one saw or heard a thing. The police arrested the janitor, Roman Zadorov, and…
 
Allison Miller, CISO at Reddit, discusses the challenges across stakeholders from end-users to service providers in addressing the nexus of Security, Privacy and Trust? Should they be equally weighted? In what circumstances does the need for one outweigh the need for the others? What does the future hold for our efforts to find the right balance be…
 
From the SpyCast Field of Dreams: to coincide with the first game of the 117th World Series, a special episode on the links – yes, there are many – between espionage and America’s Pastime with baseball fanatic and ex-spook (it’s a baseball special, not Halloween, so no pun intended) Marc Polymeropoulos. Baseball fans, welcome to espionage; espionag…
 
Is the Verizon Data Breach Investigations Report (DBIR) trustworthy enough for cyber risk managers to use it to choose new or improved mitigations? Our guest Suzanne Widup, one of the long-time authors of the report, will tell us how the report is made and why you can trust it. Your hosts are Kip Boyle, vCISO with Cyber Risk Opportunities, and Jake…
 
The latest edition of the ISMG Security Report features an analysis of whether businesses are stepping up their ransomware defenses in response to several warnings released by the U.S. and U.K. governments highlighting the threat posed to infrastructure. Also featured are the Thingiverse data breach and airline fraud trends.…
 
The interviewee created the landmark ‘gold standard’ policy guidance in the book Information Security Policies Made Easy, now in its 13th version, and has extensively researched and helped organizations develop relevant policies. This podcast discusses the 5 key mistakes individuals make in creating and delivering policies to the organization. To v…
 
On October 17, 2001, Team Alpha were dropped into the mountains of northern Afghanistan. Two of the eight appear in this week’s episode alongside the author of a new book telling the story of the first Americans behind enemy lines after 9/11 – and what a story it is. Justin Sapp was a Green Beret detailed to CIA, he would go on to be a commander in…
 
The breach of text message routing giant Syniverse revealed yet another supply chain attack involving a key supplier, exacerbated by outdated communications protocols desperately in need of a security revamp and better incentives for improvement, says mobile telephony security expert Karsten Nohl.By BankInfoSecurity.com
 
This is a big one, a very big one: our 500th episode & 15th anniversary We have come a long way since we began back in 2006 – it’s quite fitting then, that in this week’s episode I speak to our very first historian and curator, Alexis Albion, who is currently the Curator for Special Projects here at the Spy Museum Alexis actually left us way back w…
 
On this episode, podcast producer Dana Feeney hosts Maeve O'Connell, the head of partner programs and operations at Nuix. Dana and Maeve are discussing Maeve’s time within the Nuix partners organization, her objectives in collaborating with a life and career coach, and how she's learned to break out of the boxes and roles many of us find ourselves …
 
Learn how to prepare and reduce the risk of the next ransomware event. The guest walks through the lessons learned after managing out of a NotPetya ransomware attack. Will you be ready? Don’t miss this podcast for valuable insights from a real-life scenario. To view the article from the CISO COMPASS Book that sparked this interview, please visit: h…
 
October is Security Awareness Month! Security Awareness programs must grab the employee’s attention if they are to succeed. Join the interviewee as he explains how he successfully engaged the workforce through creative and visible security awareness methods! To view the article from the CISO COMPASS Book that sparked this interview, please visit: h…
 
From your Visa card to your Outlook account, and from the gas you pump into your Ford to your Windows operating system, a cyber struggle is taking place all around us. In this episode Andrew spoke to founder of Microsoft’s threat hunting intelligence center John Lambert, which tracks the world’s most dangerous cybercriminals and state-affiliated ha…
 
Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, and user identities. She explains how managing multi-cloud deployments impact this approach, and how organizations can ensure they have th…
 
He is the Horatio Alger of the CIA. His first job was punching paper. He went on to be a Station Chief. He worked for every directorate. He lived in several continents. He was in the Soviet Union for six years. He was caught up in the molehunt for Robert Hanssen. He survived to tell his tale. Christopher is genial, hearty and now lives in the other…
 
Brian Barnier, a director of analytics who is developing a course on critical and design thinking in cybersecurity for CyberEd.io, is a firm believer in the importance of critical thinking today. He discusses how that, plus systems and design thinking, can improve the way cybersecurity functions.By BankInfoSecurity.com
 
Every organization must be able to respond to an attack quickly. Join this podcast to learn key steps to implement in an incident response plan without breaking the bank. Sam approaches this issue by simplifying incident response into the 3 ‘P’s. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://secur…
 
What do you get if you cross a Greek Orthodox guy from Athens and a Jewish girl from Long Island; and then mix in two Ivy League degrees and a 26-year career in the Central Intelligence Agency? If you haven’t worked out that this refers to Marc, given that he is mentioned in the episode title, you can probably forget ever having a career in intelli…
 
All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them. Join this podcast to learn how to bring company groups together and form your own DEFCON-type event in-house or in partnership with other organizations. To…
 
As the 20th anniversary of 9/11 approached Peter Bergen sought to reevaluate the man responsible for precipitating America’s long wars with al-Qaeda and its descendants. Bergen produced the first television interview with bin Laden in 1997. He has had years to reflect on and study the man. In his new book The Rise and Fall of Osama bin Laden he cap…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login