show episodes
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Loading …
show series
 
Topic: Is he more secure than me? This week’s Tech Corner goes global with Jelle Wieringa, Security Awareness Advocate at KnowBe4, joins me to discuss how the European cybersecurity community views the US and I share our view of Europe and we came to some very interesting conclusions. We broke some stereotypes, discussed policy and discovered some …
 
This week's tools, tips and tricks goes through a few quotes from experts over the years. It also shows how things really haven't changed with the goals of cybersecurity from 40 years ago to today. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Sec…
 
On today’s episode, Jeff Schilling, the CISO for Teleperformance, joins us today to discuss the transition from a security career in the military to the private sector, the importance of relationships, and security in relation to the Cloud. Transition from the Army to Civilian Life Jeff recounts his career in CISO, first discussing Teleperformance,…
 
A few episodes ago I talked about the increased use of business issued comptuers for personal reasons. This epsiode talks about this from the employee's point of view and why you should think twice about what you should and should not do on business owned devices. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup o…
 
Today's Headlines: Microsoft’s SMBGhost Flaw Still Haunts 108K Windows Systems Critical Oracle WebLogic vulnerability exploited in the wild Russian Turla hackers breach European government organization U.S. Hospitals Warned of Imminent Ransomware Attacks From Russia To make sure you never miss a single Practitioner Brief sign up for our daily maili…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-securing-digital-transformations/) Digital transformation. It's definition is broad. Meaning securing it is also broad. But there are some principles that can be followed as companies undergo each step in a deeper dive to make more and more of…
 
Episode 7 - Security with Grace with special guest and InfoSec Leader, Charles Nwatu In this extraordinary episode, we chat with Engineering Manager, Corporate Security & Security Technology at Netflix, Charles Nwatu (@charles_nwatu) about all things DFIR, Risk, Communications and so much more. We talk about: His start in Digital Forensics and Inci…
 
This episode goes over the top breaches and their fines. This also talks about the average cost of a breach and if your company can handle the cost of being non-compliant. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Secur…
 
Today's Headlines: Microsoft releases update to remove Adobe Flash from Windows LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes FBI: Hackers stole government source code via SonarQube instances Elections 2020 cyber update To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/…
 
Phil Beyer - Bio (CISO at Etsy) Importance on books about behavioral science. “Thinking Fast and Slow”: https://smile.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 “Predictably irrational”: https://smile.amazon.com/Predictably-Irrational-Revised-Expanded-Decisions/dp/0061353248/ http://humanhow.com/list-of-cognitive-biases-with-exampl…
 
Mimecast released a report from a study they conducted about remote worker's behavior at home. This epsiode talks about the findings and what you can do to make your education more engaging and proactive to curb these behaviors. Source: https://www.mimecast.com/resources/ebooks/cybersecurity-awareness-company-issued-computers-survey/ Be aware, be s…
 
Today's Headlines: Containerd Bug Exposes Cloud Account Credentials Amazon sacks insiders over data leak, alerts customers IoT Device Takeovers Surge 100 Percent in 2020 To make sure you never miss a single Practitioner Brief sign up for our daily mailing list: https://mailchi.mp/1c199cd854f0/practitioners-brief **** James Azar Host of CyberHub Pod…
 
In this episode, we talk to cybersecurity leaders in the oil and natural gas industry. Experts from the ONG-ISAC (Oil and Natural Gas Information Sharing and Analysis Center) answer the following questions: • What does the cyber threat landscape look like for the petroleum industry, and what are the potential impacts? • What are barriers to sharing…
 
This episode talks about insider threats and a story out of New York on an employee hacking his former employer. Is your company and security controls sufficient to block these actions if an employee did this to you? Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Whe…
 
For the last 6+ years, I have matched excellent candidates with exceptional opportunities in the Information Security industry. I currently serve as Managing Partner at InfoSec Hires, where as the name might imply, our sole focus is recruitment, talent development, and retention within the Information Security Industry. InfoSec Hires has a vast net…
 
Spokesperson: Neil Patel (Sr. Technical Marketing Engineer) Topic: Zero trust and segmentation market http://brakeingsecurity.com/2020-023-jame-nelson-from-illumio-cyber-resilence-business-continuity What is Zero Trust and why should companies adopt a Zero Trust philosophy? Amanda: What are one of the more important steps someone should take when l…
 
This week's tools, tips and tricks talks about Microsoft Attack Surface Analyzer. This IT Admin took can help identify any security gaps as you build out or install new sofware on PCs. Source - https://github.com/Microsoft/AttackSurfaceAnalyzer/tree/release/v2.2 Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of …
 
Welcome to Episode 90 Main Topic What can you learn from participating in a CTF? What the heck is a ctf? Why would an OPS person care? Where can I participate in a CTF? Check out the sans holiday hack! https://holidayhackchallenge.com DC610 Pubcrawl (if you’re in the area) Hack The Box https://www.hackthebox.eu/ Announcements Patreon Update $84/mon…
 
North Carolina is the first in the country to open a hotline to report cybercrimes. This episode goes through the details of this hotline and what it could mean for the industry as a whole moving forward on the fight against cybercriminals. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Sec…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-leaked-secrets-in-code-repositories/) Secrets, such as passwords and credentials, are out in the open just sitting there in code repositories. Why do these secrets even exist in public? What's their danger? And how can they be found and remove…
 
Episode 6 - Security, Privacy, and a lot of ** with Tazin Khan Norelius. In episode 6, we're chatting with our first guest to the show, cybersecurity specialist, empath, and critical thinker Taz (@techwithtaz). With over 10 years in the security space, Taz works to bring mindfulness into Cyber Security while making noise around the lack of consumer…
 
British Airways was hit with a huge fine from a breach that they had in 2018. The size of the fine was actually reduced but still significant from how the breach happened. This epsiode goes into the security failures that let the hackers walk away with credit card details. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast wit…
 
Phil Beyer - Bio (CISO at Etsy) Importance on books about behavioral science. “Thinking Fast and Slow”: https://smile.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 “Predictably irrational”: https://smile.amazon.com/Predictably-Irrational-Revised-Expanded-Decisions/dp/0061353248/ http://humanhow.com/list-of-cognitive-biases-with-exampl…
 
This episode talks about research from Check Point on the most impersonated brands used in phishing attacks. Know what the hackers are using most can help you add a little more caution when seeing emails and ads around these brands. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In…
 
In this episode, we talk to James Goepel about the Cybersecurity Maturity Model Certification (CMMC). He discusses this important new certification for supply chain security within the U.S. Department of Defense (DoD) system, addressing the following: • Why was the CMMC created? • Who needs the CMMC? • How will the CMMC work? • Will the CMMC spread…
 
The Internet of Things Strikes Again. This episode talks about a hacking group that is selling access and footage from home security cameras and what you can do if you have these in your home. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login