show episodes
 
G
Getting Into Infosec

1
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
EM Weekly is a weekly Emergency Management podcast hosted by Todd De Voe that brings news, interviews, discusses trends and issues that impact Emergency Management, first responders, military, education, public safety, communications, disaster volunteer organizations, public health, humanitarian groups, NGOs, professionals, students, and researchers. Produced by Sitch Radio Brian Colburn
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
A cybersecurity podcast helping you play defence in the digital universe. On this show we’ll be discussing everything from industry best practices to how to get the most out of your budget. We’ll be sitting down with industry experts, analysts and even CISOs from some of Australia’s largest organisations so you can learn how they’re playing defence in 2019.
 
Wise Monkey Security Podcast provides cybersecurity ideas and expertise in simple instructions for anyone to incorporate into their daily lives or professional career. This podcast describes how to reduce data collection, address censorship, and strengthen your right to privacy. Wise Monkey Security addresses cybersecurity Architecture, Engineering, Governance, Incident Response, Digital Forensics, and Personal Security.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
 
T
The West Block

1
The West Block

Global News / Curiouscast

Unsubscribe
Unsubscribe
Monthly+
 
The West Block reverses the convention of political talk shows, speaking directly with Canadians in communities across the country and bringing their concerns to Ottawa for answers. The Global journalists behind the West Block not only ask questions, but seek solutions. The end product is a show that doesn’t just follow the agenda, but helps set it.
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
 
Felicia King is known as the “Packet Whisperer” and considered to be one of the top network layer security strategists in the country. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on the current cybersecurity landscape and the security threats business owners need to be aware of. Learn about the most recent threats, what you can do to mitigate your risk, and how to protect your most valuable asset, your data.
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
 
The Cybersecurity Collaborative — in conjunction with Cybereason — is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.sec ...
 
Shots Fired Podcast is designed for all first responders around the country. We will be interviewing heroic people with amazing stories and their never quit attitudes. We will share with all of you our experience in law enforcement, fun times and WILD stories throughout our careers. We want to help break the stigma of post trauma and how it can affect first responders. Our goal is to humanize our profession, talk shop, share leadership ideas and debrief critical incidents so we can all learn ...
 
Learn how to make the most out of your nonprofit technology with this free podcast. Only 50% of nonprofit technology projects succeed. The technology moves forward, but the organization stays in place. Why? Because although new technology can be powerful, it can’t transform a nonprofit on its own. Technology change is organizational change. Change management is key. Build Consulting has extensive experience transforming nonprofit organizations. We combine deep data and information technology ...
 
P
Public Risk Management

1
Public Risk Management

Public Risk Management Association (PRIMA)

Unsubscribe
Unsubscribe
Monthly
 
Delve into the public sector risk management domain with PRIMA's Risk Management Podcast Series. This innovative, time-efficient, educational resource is designed to afford risk management professionals the opportunity to learn-on-the-go! Listen to PRIMA podcasts to remain cognizant of important issues affecting the public risk management community!
 
Join Zach Fuller, Mike Rotondo, and Lauro Chavez, three longtime cyber security professionals as they rant, rave, and tell you the nitty-gritty of cyber security that nobody talks about on their fancy website and tradeshow giveaways, all to help you protect your company from cyber criminals. Based on the international best-seller book "Cyber Rants: Forbidden Secrets and Slightly Embellished Truths About Corporate Cybersecurity Programs, Frameworks, and Best Practices", available now on Amazon.
 
Welcome to the AICPA Forensic and Valuation Services (FVS) podcast channel. Subscribe to receive unlimited access to free podcasts on technical guidance, resources, and events as well as valuable insights and updates on professional issues from nationally recognized forensic and valuation experts. Visit us online at www.aicpa.org/fvs to gain access to valuable member-only benefits.
 
Technically Legal is a podcast about legal tech, legal innovation and the impact of tech on the law and legal industry. In each episode we interview an innovator in the legal industry. Guests discuss how they are implementing legal technology and innovation into their legal departments and law firms and how listeners can too. The podcast is hosted by Chad Main, an attorney and founder of Percipient, a tech-enabled legal services provider. Chad launched Percipient on the belief that when tech ...
 
L
Leading Las Vegas

1
Leading Las Vegas

UNLV Emergency and Crisis Management Program

Unsubscribe
Unsubscribe
Daily
 
Leading Las Vegas is a podcast produced by the Emergency and Crisis Management Program at the University of Nevada, Las Vegas. Each season, students in a Leadership, Innovation and Adaptability class interview prominent leaders, who discuss their leadership approaches, and how they prepare for, respond to, and recover from shocks and stresses faced by the community. Las Vegas is known for being the entertainment capital of the world. However, it is also a complex environment, with a highly d ...
 
Loading …
show series
 
Every organization must be able to respond to an attack quickly. Join this podcast to learn key steps to implement in an incident response plan without breaking the bank. Sam approaches this issue by simplifying incident response into the 3 ‘P’s. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://secur…
 
This Week, in the Leadership and Communications section: Boards rethink incident response playbook as ransomware surges, How CISOs and CIOs should share cybersecurity ownership, How CISOs are Building a Modern Cybersecurity Partnership, & more! Show Notes: https://securityweekly.com/bsw232 Visit https://www.securityweekly.com/bsw for all the latest…
 
Rick discusses incident response as a best practice for the network defender community, talks briefly about Zoom and how well their communications plan worked earlier this year when the network defender community called their web conferencing app out on several security issues, and how poorly OPM handled their incident response when the Chinese sto…
 
Fiberplane, an Amsterdam-based early stage startup that is building collaborative notebooks for SREs (site reliability engineers) to collaborate around an incident in a similar manner to group editing in a Google Doc, announced a ​​€ 7.5M (approximately $8.8 million USD) seed round today. The round was co-led by Crane Venture Partners and Notion Ca…
 
Billy and Kyle sit down with Scott Savage, owner and founder of Savage Training Group. Scott has 22 years of law enforcement experience, has held several different assignments, to include: Sergeant, SWAT, full time Terrorism/Intelligence Task Force, Field Training Officer, Academy Instructor, Field Supervisor, and has put together a robust training…
 
On July 16, 2020, Build Consulting learned that Blackbaud experienced a significant, and extensive, theft of data and was the subject of a ransomware attack. As of July 22, much remains uncertain about the full scope of the attack, but Kyle Haines, Partner at Build Consulting, shares what we have learned thus far and what your organization should c…
 
Guest(s): Michael Tran Duff, Assistant Vice President, Chief Information Security Officer (CISO) and Chief Privacy Officer (CPO), Stanford University Doug Aguilera, CPA, CFF, CGMA, CFE Cybersecurity threats are one of the biggest risks to an organization with little to no margin for weaknesses. We discuss the types of cybersecurity threats, respons…
 
https://blog.teamascend.com/6-phases-of-incident-response https://www.securitymetrics.com/blog/6-phases-incident-response-plan Recent vulnerabilities got Bryan thinking about incident response. Are organizations speedy enough to keep up? If the spate of vulns continue, what can we do to ensure we are dealing with the most important issues? How do w…
 
Fivetran, the data connectivity startup, had a big day today. For starters it announced a $565 million investment on $5.6 billion valuation, but it didn’t stop there. It also announced its second acquisition this year, snagging HVR, a data integration competitor that had raised over $50M, for $700 million in cash and stock.…
 
It's no surprise that Zero Trust initiatives are increasing in importance in both the public and private sectors. New cybersecurity mandates and a boom in remote work due to COVID-19 are just two of the most common factors driving this demand. While the need for adopting Zero Trust is evident, the path to success is not. In this episode, we discuss…
 
Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security. Our guest is Padra…
 
Data breaches and other security incidents have become a frequent, severe problem for organizations. But with incident responders in short supply, there are fewer professionals available to help organizations in their hour of need. We're joined this episode by F-Secure incident response consultant Eliza Bolton, who successfully transitioned to cybe…
 
Chris Mandel, President and Managing Consultant of Excellence in Risk Management LLC, explains Environmental, Social and Governance (ESG) in Risk Management. Chris defines ESG and how it’s grown from sustainable development and now evolved to initiatives driving corporations and spheres of societies’ behaviors. Additionally, he discusses why ESG ma…
 
Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services. Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, pr…
 
How is it possible for the insurance industry to adapt to a cyber threat landscape that is continuously changing? To try to answer that, and explain the evolution the cyber insurance field has gone through the last few years, Robby is joined by Jens Zakarias and Paul Jæger from Riskpoint, a global insurance underwriter agency. They dive into how cy…
 
8 Steps to Better Security: A Simple Cyber Resilience Guide to Business is done all final editing and will be published by @WileyTech on October 5th. Pre-orders are available now via Amazon, Barnes & Noble, and other retailers. Sponsored Link: https://amzn.to/3k3pDAN Amazon teaser: “Harden your business against internal and external cybersecurity t…
 
The West Block's Political Panel weighs in on the highs and lows of the federal election campaign. And Ipsos CEO Darrell Bricker explains why he thinks this election is one of the most exciting in years. See omnystudio.com/listener for privacy information.By Global News / Curiouscast
 
Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow…
 
Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that…
 
Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 201…
 
Allow Vitor Ventura to take you on a journey of discovery, threat actors and attribution. He recently assisted with an investigation into a series of malware and spam campaigns using aviation-themed lures. These include fake flight itineraries, invoices and more. Vitor joins us on this week’s Talos Takes episode to discuss what he learned during th…
 
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/ https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/ https://threatpost.com/azure-zero-day-supply-chain/169508/ https://www.microsoft.com…
 
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; Study finds 97% of cloud apps used in the enterprise are shadow IT https://www.scmagazine.com/news/cloud-security/study-finds-97-of-cloud-apps-used-in-…
 
Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-part…
 
Blumira- Per crunchbase:“Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed …
 
International ShakeOut Day is always the third Thursday of October (this year: October 21). While COVID-19 has brought many uncertainties and challenges, one thing's for sure: ShakeOut is still happening this year! As always, you can hold your #ShakeOut drill when and where you want. You can choose another date or several dates, and include people …
 
Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed inves…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login