show episodes
 
The Bid Picture podcast presents lessons we can learn from fascinating cybersecurity topics, news, events, and incidents, and how those lessons could influence our decisions, thoughts, opinions, and lifestyle choices, as well as how everything fits together to form the bigger picture of online security in this digital age. For listener questions to be addressed on podcast episodes, please email bidemi@thebidpicture.com or via Twitter @BidPicture.Thank you for your time.
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
 
Welcome to the Cyber Coalface a fortnightly Purple Team Cyber Podcast covering the whole cyber threat, hosted by myself David Tyler and JayJay Davey two UK Military Veterans who ended up in Cyber Security.Join us today as we cover aspects affecting Cyber Security from the perspective of a Red Teamer and Blue Teamer. This podcast is ideal for anyone in the Cyber or Infosec field, come and listen to those on the Cyber front lines!
 
The SurfWatch Cyber Chat podcast includes interviews with experts on all things related to cyber risk. Learn what cybercriminals are up to and how it’s impacting businesses from those in the trenches. SurfWatch Labs helps organizations and service providers quickly establish a strategic cyber threat intelligence operation that drives more effective use of their tactical defenses. For more information, visit www.surfwatchlabs.com.
 
Former acting Director of the CIA Michael Morell speaks with top leaders of the U.S. intelligence community as they reflect on their life, career and the critical roles they play in shaping national security policies. As a central figure in the most significant U.S. counter-terror efforts of the past two decades and a former CIA intelligence analyst, Morell is uniquely skilled at taking industry leading knowledge to make connections that provide deep insight into complex security events – he ...
 
C
Cyber Task Force

1
Cyber Task Force

Paul C Dwyer - ICTTF International Cyber Threat Task Force

Unsubscribe
Unsubscribe
Monthly
 
We live in two worlds, the real world and the cyber world. Both worlds are interconnected and interdependent but very different. Different rules apply. We have no choice but to exist in both worlds. As innovation and digitalization accelerates, we need to understand the risks, consequences and safeguards necessary to safely protect businesses, people and society.Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force hosts the “Cyber Task Force” podcast. In each show, Paul ...
 
A technology podcast and an engaging platform for real stories, discussions and opinions from renowned global experts on All Things Cyber. The podcast series is hosted by Monica Verma, a leading spokesperson for digitalization, cloud computing, innovation and security enabling technology and business. Winner of 2019-Outstanding Security Performance Awards, she is an acclaimed and well-known security expert and public speaker. On the podcast, she brings on different cybersecurity and privacy ...
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
 
Humanity is under serious threat. Individual identity and privacy is dead. Law in every jurisdiction has failed to provide security to identity of individual in Cyber age. Such is the failure of Governmental and democratic and corporate systems that even elections and electoral proceses are not secured. Not even a single election held at any level any part of the world is secure. Elections are easily manipulated with investments at fraction of costs. Election and electoral processes and syst ...
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue with Zscaler's expert team of CISO security practitioners. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces security frict ...
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
T
Threat Talks

1
Threat Talks

Kevin Golas & Jay Grant

Unsubscribe
Unsubscribe
Monthly
 
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant | Fabian Franco Send us suggestions for topics and feedback to: E:Mail: threattalks@gmail.com
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
I
ICT Pulse Podcast

1
ICT Pulse Podcast

ICT Pulse - tech blog and podcast

Unsubscribe
Unsubscribe
Weekly
 
A deep dive into topical Information and Communication Technology (ICT) issues from a Caribbean perspective, through interviews and group discussions with specialists, experts and people trying to make a difference in the tech space. New episodes are released every Wednesday. Show notes are available at ict-pulse.com
 
As breaches abound and cybercriminals up the ante, it’s more critical than ever that you stay plugged in to how the threat landscape is evolving. At Cybersecurity Unplugged we dive deep into the issues that matter. Guided by CyberTheory’s director, Steve King, we have candid conversations with experts on the frontlines of the cyber battlefield.
 
XSOC TechTalk interviews experts who will be sharing the latest and greatest in cyber news, cyber tips, cryptography, and all things technology to strengthen our cyber safety and reduce our risks of falling victim to cybercrimes. Hosted by podcast interviewer Nicole Evans, we talk all things technology in the cyber world to assure you're secure.
 
Loading …
show series
 
In this episode, host Bidemi Ologunde addressed two key questions regarding the return to the office. First, what constitutes the right balance of how many days per week to spend working from home and how many days per week to spend in the office. Secondly, on the opposite end of the return to office spectrum, do we really need to meet in person? T…
 
While the broader discussion of cyber-related incidents, events, and trends are contributed to by many different types of organizations and individuals, journalists play an important role in furthering our collective understanding of this space. Journalist Kim Zetter joins host Luke McNamara on Eye on Security to share her perspective in covering c…
 
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; The Most Dangerous Attack Techniques in 2021 https://www.infosecurity-magazine.com/news/imos21-dangerous-attack-techniques/ The panel discussion is tit…
 
Interview links Follow Michael on Twitter @CyAlliancePrez Learn more about the Cyber Threat Alliance Check out the Ransomware Task Force, which Michael co-chairs Read Jen's position piece on hack back Rapid Rundown links Read the full text of the Cyber Incident Reporting Act Refresh your memory on the SolarWinds data breach See who's on the House H…
 
Cyber crime is a constantly evolving game. As soon as new technology is introduced, attackers start figuring out how to exploit it for malicious purposes. No one understands this better than F-Secure Chief Technology Officer Christine Bejerasco. Christine joins Janne to discuss the changing world of cyber crime, and how companies can avoid having t…
 
This episode was recorded live on 10/06/2021Join us for another edition of FortiGuardLIVE with Aamir Lakhani and Jonas Walker from #FortiGuardLabs as they talk #CyberSecurityAwarenessMonth, the #cybersecurity skills gap, and how to get started in the industry. #BeCyberSafeWatch this episode on YouTube: https://www.youtube.com/watch?v=fc6lhjkVWKI…
 
Allan's guest is Samara Williams, Manager of Threat Operations at Cardinal Health, speaker, advocate and passionate member of the threat intelligence community.Samara broke into cyber via a rotational program, sampling many cyber jobs at many cyber companies in a short order - a fantastic start in cyber that turbocharged her maturity and experience…
 
The ACSC Annual Cyber Threat Report 2020–21, the second unclassified annual cyber threat report since ASD became a statutory agency in July 2018, highlights the key cyber threats affecting Australian systems and networks, and uses strategic assessments, statistics, trends analysis, and case studies to describe the nature, scale, scope and impact of…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
REvil’s troubles appear to be the work of an international law enforcement operation. Other gangs have noticed, and they’re looking a little spooked, even as they evolve their tactics in a maturing criminal-to-criminal market. Questions are raised about the efficacy of surveillance tool export controls. Caleb Barlow has cyber security consideration…
 
We’re delighted to be joined today by members of the Cisco Talos Threat Detection & Response Group, a group we haven’t chatted to on the podcast before, but hopefully this goes some way to making up for that error. Joining Hazel for a brilliant discussion, are Christopher Marshall (far better known as Marshall), Director of Talos threat detection a…
 
Agency Nation Radio Podcast Fireside chat with with host Heath Shearon and his guests Sydney Hedberg of Marsh McClennan and Isabelle Repinski of Lockton Companies and Marsh about attracting talent to the insurance industry. The insurance industry needs new talent and Sydney & Isabelle will share their thoughts and experience on how agencies need to…
 
Today we're joined by Cybersecurity Advisors Network (CyAN) International Vice President and Zero Day Legislative Project leader, Peter Coroneos. CyAN is a Paris-based global not-for-profit association representing cybersecurity professionals in 22 countries. They have announced the formation of a global partnership to secure legal protections for …
 
Andrew "AJ" Jarrett is Applied Cybersecurity Program Manager at the Cyber Readiness Center (CRC) and Texas A&M Engineering Extension Service (TEEX). He's been a wildland firefighter for more than a decade and believes Emergency Response frameworks that save lives can apply to cyber incident response and IT security to help protect organizations. He…
 
Evil Corp is identified as the operator behind the ransomware that hit the Sinclair Broadcast Group and Olympus. The US Defense Department complains of Russian toleration for ransomware gangs. The Fin7 gang has set up a front company to recruit talent. Betsy Carmelite from Booz Allen Hamilton on building mission-driven 5G security with zero trust. …
 
On this week’s Cyber Security Brief, Brigid O Gorman and Dick O’Brien discuss several new blogs that the Symantec Threat Hunter Team has published recently. Firstly, we uncovered a new ransomware threat that we dubbed Yanluowang, which appears to be deployed in a targeted fashion and is certainly a new threat as various indications point towards it…
 
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; The continuity lessons of the Facebook outage https://www.scmagazine.com/analysis/risk-management/the-continuity-lessons-of-the-facebook-outage The pan…
 
Sam Curry is the chief security officer at Cybereason. He has devoted his career to empowering defenders in cyber conflict and fulfilling the promise of security enabling a safe, reliable, connected world. In this episode of Cybersecurity Unplugged, Curry discusses: Financing and building up an agile cybersecurity company; Improving company recogni…
 
The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to d…
 
This episode was recorded live on 10/19/2021Join us for another edition of FortiGuardLIVE as Derek Manky and Aamir Lakhani from #FortiGuardLabs talk about recent threat landscape developments and how cyber adversaries continue to evolve their techniques.Watch this episode on YouTube: https://youtu.be/lxKhlWuMxZI…
 
Supply chain professionals are dealing with a lot today – unpredictable demand, material shortages, labor shortages, freight delays, political unrest, extreme weather … the list of troubles goes on and on. Yet, the best of the best are still filling orders and delivering on-time. ALOM’s VP of Client Success Fiona Lowbridge draws on two decades of s…
 
Allan is joined this week by Emilio Escobar, CISO at Data Dog and former VP of Information Security at Hulu. He is also a long-term developer of Ettercap, a comprehensive suite for man-in-the-middle attacks.Like many of us, Emilio started his journey in infosec as a hacker kid, exploring the world through modems and BBSs. Emilio is not a security v…
 
In the October 2021 Community Chat, and with members of the Caribbean tech community, Kerrie-Ann Vassall-Richards and Steven Williams, the panel discusses: Has the shrinking of the global marketplace made digital transformation mandatory in the Caribbean; and Have Caribbean businesses become overly dependent on social media for their business prese…
 
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; Microsoft brings passwordless security to consumer accounts https://www.itpro.co.uk/operating-systems/microsoft-windows/360900/microsoft-passwordless-u…
 
In this episode of Intelligence Matters, host Michael Morell speaks with David McCloskey, a former CIA analyst and author of "Damascus Station," a fictional spy novel centered on the civil war in Syria. Morell and McCloskey discuss the history of the Syrian conflict and the United States' engagement there, including key inflection points and how po…
 
A look at TA505, familiar yet adaptable. A US joint cybersecurity advisory outlines the BlackMatter threat to critical infrastructure. CISA asks industry for technical information on endpoint detection and response capabilities. Is REvil trying to run on reputation? The Sinclair Broadcasting ransomware incident seems to provide a case study in rapi…
 
Nearly every computer that runs Windows has Active Directory (AD). This structure helps organizations manage user identities, privileges, and much more. The power that AD has means threat actors are often targeting it to execute attacks. Our guest for the episode is Christopher Keller, who is Senior Security Engineer at Tenable. We cover the common…
 
The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of …
 
In this episode, host Bidemi Ologunde spoke with Paul O’Connor, a friend, brother, former colleague, and fellow cybersecurity professional. Paul shared how a professor’s lecture during a class in Accounting for Information Security Systems consolidated his interest in cybersecurity, the importance of having good mentors, the soft skills that have h…
 
ClearSale’s statistical technology and in-house fraud analysts have combined to create card-not-present (CNP) fraud prevention that reduces chargebacks and false positives. As the pandemic shifted consumers in many regions from in-store to online shopping and fraud attacks on ecommerce merchants increased, ClearSale’s 2020 net revenue grew by 65.7%…
 
Haven’t received your online shopping on time? Fareed talks to David Lynch, global economics correspondent for the Washington Post, about why the post-pandemic economy is seeing supply shortages and high prices for goods. What is causing these glitches in the global supply chain? One piece of the puzzle is the shake-up in the labor market, Heather …
 
Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love security at at BSides Conferenc…
 
In this episode, host Bidemi Ologunde provided new details and some plausible theories regarding the recent arrest of Ilya Sachkov, the Russian CEO of a leading cybersecurity company, Group-IB. Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, and the Clubhouse app (@bid). …
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
In this episode, Monica Verma talks to Marc Vael, CISO and risk management expert on cyber and systemic risks, cyber risk exposure, how to make your risks more tangible, visible and understandable, and key elements for effective risk management, integration and communication. Support the show (https://www.buymeacoffee.com/wetalkcyber)…
 
A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor o…
 
Welcome to a very special edition of Security Stories, as we go head to head with the Beers with Talos podcast team. Using a live game show format based on the British show 'Would I lie to you?' we present "facts" about significant moments in our security careers—but can the teams work out who is telling the truth, and who is bluffing? This episode…
 
Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to…
 
Allan is joined by Sounil Yu, one of cybersecurity's most well-known contributors. Sounil has a long history in cybersecurity, and is also the inventor of The Cyber Defense Matrix and the DIE Triad.Sounil and Allan discuss cyber resilience and contrast it with "antifragility", a notion introduced by Nassim Nicholas Taleb. Sounil argues that in cybe…
 
In this episode, host Bidemi Ologunde talked about the delicate balance between security and privacy, in terms of how geofence warrants are being used to arrest the rioters that breached the U.S. Capitol on January 6, 2021. A link to the Capitol Breach Cases. Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also…
 
A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service …
 
Ransomware infections have been rampant in recent months. But typically, we hear more about the aftermath then what leads to a successful attack. In this episode we get the other angle. Sophos VP of Managed Threat Operations Mat Gangwer shares the multi-week story of an attack, from unpatched vulnerability to execution. The responsible ransomware c…
 
Ed Cabrera is the former CISO of the United States Secret Service and current Chief Cybersecurity Officer at Trend Micro. He believes we are at an inflection point in cybersecurity and is cautiously optimistic. During this conversation with SecureWorld, Cabrera also discusses ransomware, cryptocurrency, threat intelligence, cyber insurance, and mor…
 
Girls In Tech Guyana is a chapter of the global non-profit, Girls in Tech, which is dedicated to eliminating the gender gap in tech. In this a new episode in our conversations with tech-based social enterprises, we speak with Evie Kanhai-Gurchuran, the Managing Director of Girls In Tech Guyana, on among other things: her journey to lead a tech non-…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login