show episodes
 
The monthly podcast for security professionals by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
 
The Cyber Risk Management Podcast helps executives redefine cybersecurity from primarily a technology problem into a management opportunity. This podcast helps you learn how to manage cybersecurity in the same intelligent and thoughtful way you manage other areas of your business, including sales, order fulfillment, and accounts receivable. The Cyber Risk Management Podcast helps executives to become more proficient cyber risk managers. You will learn how to efficiently and effectively reduc ...
 
Welcome to Darnley's Cyber Cafe - cheers to a new smooth, bold podcast set on sailing you on this long journey of cybersecurity. Our host Darnley (Previously on Darn IT Podcast) will discuss topics about cybersecurity, business, IT, and everything in between. Sit back with your java (not script) and enjoy.
 
C
Cyber Task Force

1
Cyber Task Force

Paul C Dwyer - ICTTF International Cyber Threat Task Force

Unsubscribe
Unsubscribe
Monthly
 
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
 
M
Moody's Talks - Focus on Finance

1
Moody's Talks - Focus on Finance

Moody's Investors Service, Ana Arsov, Danielle Reed, Mark Wasden, Bruno Baretta, Donald Robertson

Unsubscribe
Unsubscribe
Monthly+
 
Hosted by Danielle Reed of Moody's Financial Institutions team, Focus on Finance helps you keep on top of developments within the banking, insurance and asset management sectors — from the impact of tech disrupters and cyber risk to the ongoing effects of ESG and lower-for-longer interest rates. Published by Moody's Investors Service.
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
 
On Moody’s Talks - Behind the Bonds, hosts Tania Hall and Jeff Pruzan join analysts from Moody’s corporate finance group worldwide to discuss the market forces shaping credit across industries - from airlines to telecoms and everything in between. These forces include the uneven recovery from the coronavirus pandemic, digital transformation, cyber risk, climate-change imperatives and much more. Please join us as we connect the dots on corporate credit quality.
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
 
The SurfWatch Cyber Chat podcast includes interviews with experts on all things related to cyber risk. Learn what cybercriminals are up to and how it’s impacting businesses from those in the trenches. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For more information, visit www.surfwatchlabs.com.
 
Michael Puldy, CEO of Puldy Resiliency Partners, has a thirty plus year career dealing with disasters, crisis’, and crazy adventures. In his business life, he has helped hundreds of companies navigate through business disruption, computer infrastructure failures and data loss, caused by a broad brush of reasons including human mistakes, natural disasters, and all out cyberattacks. Through work, adventure travel, and in everyday life, we face and confront risk every day and in all sorts of un ...
 
TrendsMD Welcome to TMLT’s podcast series that explores growing issues within the health care, technology, and medical liability arenas. Hosted by Tony Passalacqua of TMLT, TrendsMD attempts to bring greater focus to issues that face the health care community in Texas and beyond. We also identify industry trends and help policyholders navigate their medical liability coverage. Our episodes are dedicated to educating medical and administrative personnel on technology-based themes, including t ...
 
This is a weekly round-up of the most compelling cyber security intelligence originating from The Record and Recorded Future's research team — Insikt Group. Recorded Future is the global leader in security intelligence and every Friday we'll be highlighting the latest intelligence from criminal activity and nation state sponsored cyber campaigns to geo-political developments. Whether you're responsible for improving operational cyber security or strategically reducing risk, this podcast is f ...
 
Risk management is complex, and your time is limited. This podcast series helps you keep up on emerging issues in higher education and best risk management practices. Join URMIA leaders, peers, and insurance experts twice a month as they explore timely topics, URMIA member resources, and the profession.
 
Control Risks is a specialist global risk consultancy that helps organisations succeed in a volatile world. Through insight, intelligence and technology, we help you seize opportunities while remaining secure, compliant and resilient. When crises and complex issues arise, we help you recover. See acast.com/privacy for privacy and opt-out information.
 
Ann Johnson, Corporate Vice President, Business Development, Security, Compliance & Identity at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of tools and systems powered by AI, IoT, machine learning, and other emerging technology, as well as the impact on how humans work, communicate, ...
 
I
ISF Podcast

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
C
Click Here

4
Click Here

The Record Media

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. Click Here. Produced by The Record Media
 
R
Reduce Cyber Risk Podcast

1
Reduce Cyber Risk Podcast

Shon Gerber: CISO, Cyber Security Expert, and Online Entrepreneur

Unsubscribe
Unsubscribe
Weekly+
 
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon has over 19 years of experience in government and corporate cybersecurity providing you expertise that you will find value from the very first weekly podcast. Shon will provide you detailed CISSP training along with sample CISSP exam questions while utilizing colorful commentary to enhance the over ...
 
P
Public Risk Management

1
Public Risk Management

Public Risk Management Association (PRIMA)

Unsubscribe
Unsubscribe
Monthly+
 
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
 
The intent of this podcast is to have real and raw cyber risk dialogue with practitioners. Topics will span many technical and non-technical aspects of cyber risk, cyber security, privacy, and the ethics of the choices we make. Guests include CISOs, CIOs, CTOs, CPOs, and the occasional CEO. We will delve routinely into themes involving leadership. But the real focus will be on risks we have now and those on the horizon discussing the efforts we need to take to deliver real outcomes to lower ...
 
This podcast focuses on many non-technical aspects of cyber risk, cyber security and information security at the intersection of technology and managing to business expectations. Guests include CIOs, CEOs, and CISOs discussing the many facets of the information security industry, what matters, what needs to change and how to deal with modern-day challenges in this dynamic industry.
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
 
A technology podcast and an engaging platform for real stories, discussions and opinions from renowned global experts on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and security enabling technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity and privacy ...
 
Discover the latest information on 'what's hot' in the digital world, best practices and big concepts for innovation, disruption and pivoting in the Silicon Valley. Features: Innovation | Cyber Risk & Security | Bitcoin & Blockchain | Cross - Border Business | Silicon Valley Insider airs Friday's at 1:00 pm on AM 1220 KDOW and Saturday's 10:00 am 860 AM KTRB The Answer in the Silicon Valley / San Francisco Bay Area.
 
Loading …
show series
 
As we move towards a greener future, we may meet our demise anyway. Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter. In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed befor…
 
Even with the best cybersecurity tools and skills, a third-party cybersecurity incident can seriously disrupt your operations. Payroll service provider Kronos was ransomwared just recently. How does a business operate if it can’t pay its employees? (hint its not with a 0-day) What is REAL business continuity and how do YOU identify and advise on co…
 
Roderick Jones of Concentric talks about security risks facing content creators, influencers, gamers and streamers on Twitch, YouTube and elsewhere. Online harassment is often seen as “part of the package” if you’re going to work in a public-facing streamer community, but Jones knows that this isn’t inevitable, and it is fixable. A future without a…
 
Join guest host Ronna Papesh as she chats up Steve Stoeger-Moore, President of Districts Mutual Insurance and Risk Management Services about what 2019 hot topics look like with 2021 insight and what valuable resources are available for Technical and Small Colleges with offices of one. Check out these valuable insights, listen for words of wisdom, a…
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinfor…
 
Sometimes you can't patch systems for a number of reasons, but how do you determine what is acceptable and what is a 'come in on the weekend' and fix it NOW?? Guest Links: https://twitter.com/CyberCaffeinate https://www.linkedin.com/in/davidklein2/ https://cymulate.com/ https://www.linkedin.com/company/cymulate/ https://cymulate.com/ecademy https:/…
 
As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C mark…
 
Joining us this week is Jason Steer, principal security strategist at Recorded Future. Our conversation centers on the state of threat intelligence in a rapidly changing security environment, how organizations are adapting and evolving their threat intelligence strategies, as well as Jason Steer’s outlook on some of the security challenges professi…
 
Jonathan Root and Pete Trombetta discuss the recovery prospects for the airlines, cruise and lodging sectors globally in 2022 amid Omicron and other disruptions. And Sandra Beltran explains how increased travel will benefit a range of entities in Latin America and the Caribbean this year. Related content on Moodys.com (some content only available t…
 
Security operations center (SOC) analysts are responsible for analyzing and monitoring network traffic, threats and vulnerabilities within an organization’s IT infrastructure. This includes monitoring, investigating and reporting security events and incidents from security information and event management (SIEM) systems. SOC analysts also monitor f…
 
An espresso shot covering a great idea Dave Tyson originally shared in his book and discussed during our 2021 interview on identifying where security can contribute to the business value chain and some strategies for selling the benefits. With thought leaders like Dave there are many more insights than time in each monthly episode, so in 2022 we'll…
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
Today, ISF CEO Steve Durbin and host Tavia Gilbert discuss research he’s been conducting during the fall of 2021 around The New World Order and the Race for Tech Dominance. This is the first of two episodes focusing on this theme. Read the transcript of this episode Subscribe to the ISF Podcast wherever you listen to podcasts Connect with us on Lin…
 
As organizations continue to follow through with and look to implement vaccine and testing mandates for COVID-19, considerations include processes, procedures, communication with employees and verification. Here, we sit down with Andrew Morton, CEO of Bloom Health partners to discuss the challenges and considerations.…
 
Do you store everything in the cloud? Is your entire business in the cloud? Do you trust Amazon/Google/Microsoft anymore? In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability th…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
Prologue Have you ever made a payment from your mobile device, wirelessly using NFC? Of course you have, most of us have by now. Did you know there are some (or at least were) fairly significant design flaws, otherwise known as "features", in the various platforms? On this show, we're interested in learning more about Timur's research and what he's…
 
This week the guys discuss some of the bigger cybersecurity struggles for mid-market and emerging companies. Developing an effective incident response plan is a major challenge and when done incorrectly, can cause a lot of damage. The guys also share struggles SaaS companies face when they're inundated with cybersecurity questionnaires that are hol…
 
Infosec’s Principal Security Researcher, instructor and cybersecurity renaissance man Keatron Evans returns to the show for the first in a series of once-quarterly episodes breaking down big stories in the news and cybersecurity trends for the future! We talk Solarwinds, Colonial Access Pipeline, Oldsmar, Keatron’s origin story and why, just like p…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
Are all your decisions, actions, and efforts what defines you, or can you reinvent yourself? If you have always been a stay-at-home parent, an accountant, or even an Offensive Security professional, does that mean thats all you can be? are you pigeon-holed? Guest Links: https://thehauntedhacker.com/ https://twitter.com/H4unt3dH/ https://www.youtube…
 
A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing)…
 
Security managers develop security strategies that align with the organization's goals and objectives. In addition, they direct and monitor security policies, regulations and rules that the technical team implements. Knowledge in areas like information security governance, program development and management, incident response and risk management ar…
 
The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Th…
 
Maureen Rush, who recently "semi-retired" from her role as Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania, discusses what it takes to be a successful security leader in higher education; the many facets of her more than four decades working in the security field; and opening doors for women in law en…
 
Frank Yuen and Laura Bazer explain why the outlook for life insurers worldwide is less bleak than it was a year ago. Plus, Bruce Ballentine and Benjamin Serra discuss the strengths that help insulate global property and casualty (P&C) insurers from higher claims as economies reopen. Related content on Moodys.com (some content only available to regi…
 
Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric …
 
In this episode, Michael talks with Belle Walker, founder of Belleview Consulting. Risks can be found in the darkest corners of a business. And, all too often organization dynamics, including poorly defined reporting structures, inefficient approval processes, and overly complicated product manufacturing programs act as silent killers -- quietly an…
 
Lauren Buitta, co-founder and CEO of Girl Security, shares how advancing girls, women, and gender minorities in national security leads to better cyber defense on today’s episode of Afternoon Cyber Tea with Ann Johnson. Lauren began as a policy analyst with the National Strategy Forum, a nonpartisan think tank, focusing on a wide range of national …
 
The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet's handbook? We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login