Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
The Cybersecurity Collaborative is proud to present CISO Stories. Each week CISO Stories takes a deep dive on security leadership with one of the contributors to my latest book, the best-selling CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers. The Cybersecurity Collaborative is a unique membership community enabling cybersecurity leaders to work together in a trusted environment. To learn more, visit: https://www.securityweekly.com/csc.
B
Brakeing Down Security Podcast


1
Brakeing Down Security Podcast
Bryan Brake, Amanda Berlin, Brian Boettcher
A podcast all about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
InfoSecSync is an Information Security Broadcast that promotes Information Security Awareness to the masses as well as industry professionals.
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
Listen to Accenture’s own internal InfoSec and IT executives as they discuss what it takes to keep client, business partner, and enterprise data secure. Hosted by Kris Burkhardt, Accenture managing director responsible for its information security technology and operations.
The CISO Dojo podcast looks at various security leader topics and guests discuss their paths in information security that lead them to where they are at today.
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
The Command and Control podcast analyses a different information security topic each episode, interviewing leading figures in the IT Security industry to cover the threats, solutions and recommendations to help protect your organisation.
LeetSpeak with Alissa Knight, bridging the gap between all things information security. We’ll talk about the latest threats, vulnerabilities, security conferences, malware and exploits, as well as interview CIOs and CISOs from around the world about information security topics that matter most. Alissa Knight, one woman, one mission, one voice
R
Re-thinking The Human Factor with Bruce Hallas


1
Re-thinking The Human Factor with Bruce Hallas
Marmalade Box
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Marnie Wilking, CISO, Wayfair Thanks to today’s episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group…
Cloud email threats soar 101% in a year NHS warns of scam COVID-19 text messages Fancy Bear uses nuke threat lure to exploit 1-click bug Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, discusses w…
H
Hybrid Identity Protection Podcast


1
What You Should Know About Azure AD Security with Dr. Nestori Syynimaa
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44
The AADInternals toolkit is a powerful resource for administering and hacking Azure AD. In this episode of the HIP Podcast, Sean talks with Dr. Nestori Syynimaa, AADInternals creator and Sr Principal Security Researcher at Secureworks Counter Threat Unit (CTU). Join them as they discuss how red and blue teams can use the toolkit to explore and impr…
All links and images for this episode can be found on CISO Series Is it possible to position your security team as a profit center instead of the traditional cost center reporting to the CIO? Check out this post for the discussion that are the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of C…
Daycare apps found insecure Encryption flaws found in Mega Microsoft retires cloud facial recognition Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, discusses what challenges CISOs are facing in …
Cloudflare outage impacts crypto exchanges Biden signs a pair of cybersecurity bills 7-zip now supports Windows ‘Mark-of-the-Web’ security feature Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, d…
C
CISO Stories Podcast


1
CSP #75 - Attracting Talent Using The Nice Framework - Greg Witte
24:29
24:29
Play later
Play later
Lists
Like
Liked
24:29
As your organization increases the cybersecurity talent to protect and defend the information assets, how do you know what skills are needed? What tasks are to be performed and what knowledge is necessary to perform these functions? The NIST NICE Framework helps define the job and assist the CISO in hiring as well as measuring the capability along …
Windows downloads blocked in Russia The importance of receipts Chrome extensions can be used for fingerprinting Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the identity and access management (IAM) group for Optiv, discusses what challenges CISOs are …
US DoJ announces shut down of Russian RSOCKS Botnet Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS Mixed results for Russia's aggressive Ukraine information war, experts say Thanks to today's episode sponsor, Optiv Modernizing your identity control plane from AD to the cloud is complex. Ralph Martino, who is leading the ident…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Ariel Weintraub, CISO, MassMutual Thanks to today’s episode sponsor, Datadog Check out Datadog‘s on-demand fireside chat with CTO Cormac Brady. Over the course of his 20+ year career at Thomson Reuters, Cormac consistent…
S
Simply Cyber


1
Active Ransomware Incident Response Day in the Life
1:02:58
1:02:58
Play later
Play later
Lists
Like
Liked
1:02:58
Want to know what its really like when you get called into a business that is fully owned by #Ransomware ? Who do you talk to first? What's the first question you'd ask? How do you deal with the adrenaline of being on the clock against cyber criminals? Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity …
House Armed Services chair calls national security software, systems 'too vulnerable' Microsoft Office 365 AutoSave can assist cloud ransomware attacks OMIGOD! There’s more to OMIGOD Thanks to today’s episode sponsor, Datadog Watch Datadog's on-demand webinar for a 30-minute discussion on driving DevSecOps best practices in the enterprise with CTO …
B
Brakeing Down Security Podcast


1
jon-dimaggio-part2-threat intel-hacking back-analyzing malware
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07
Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare) Topics: discusses his book, threat intel as a service, why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more …
T
The New CISO


1
Building The Right Relationships with Den Jones
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07
On this episode of The New CISO, Steve is joined by Den Jones, the Chief Security Officer at Banyan Security, to discuss the importance of trustworthy and transparent relationships in the cyber security field. Before joining the security intelligence industry, Den first worked as a postman walking the streets of his native Scotland and dreamed of b…
D
Defense in Depth


1
Getting Ahead of the Ongoing Malware Fight
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08
All links and images for this episode can be found on CISO Series For years we've been referring to malware protection as a cat and mouse game. The crooks come up with a new malware attack, and then the good guys figure out a way to stop it. And that keeps cycling over and over again. So where are we today with malware protection and is there any w…
Cloudflare repels another record DDoS Africa’s largest supermarket chain hit with ransomware Resurgence in travel not ignored by threat actors Thanks to today’s episode sponsor, Datadog Check out Datadog's on-demand fireside chat with CTO Cormac Brady. Over the course of his 20+ year career at Thomson Reuters, Cormac consistently built bridges betw…
US defense contractor discusses takeover of NSO spyware DoJ will no longer prosecute ethical hackers Attack on Kaiser Permanente exposes data of thousands of customers Thanks to today’s episode sponsor, Datadog Watch Datadog's on-demand webinar for a 30-minute discussion on driving DevSecOps best practices in the enterprise with CTO Cormac Brady. O…
C
CISO Stories Podcast


1
CSP #74 - Where Should the CISO Report? Guess Again! - Stephen Fried
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00
Where the CISO should report has been debated for many years, with the predominant view being “anywhere but the CIO”, while even in 2022, most CISOs are reporting to the CIO! Which reporting structure viewpoint is right? This podcast will examine the pros and cons of reporting to the CIO and other departments. Join Stephen as he shares his experien…
Leaky continuous integration logs Exchange servers used to deploy Black Cat Bluetooth can be used to track phones Thanks to today’s episode sponsor, Datadog Check out Datadog's on-demand fireside chat with CTO Cormac Brady. Over the course of his 20+ year career at Thomson Reuters, Cormac consistently built bridges between technical teams—and in th…
C
Cyber Security Sauna


1
SPHERE SESSION | Philip Ingram on nation-state threats
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39
Spymaster-turned-journalist Philip Ingram joined us in our cyber sauna recording booth at SPHERE22, the world's first co-security unconference, for a quick chat about nation-state threats.
Amazon’s chat app has a child sex abuse problem Ransomware decryptors now for sale on gaming platform China’s biggest online influencers go dark Thanks to today’s episode sponsor, Datadog Watch Datadog's on-demand webinar for a 30-minute discussion on driving DevSecOps best practices in the enterprise with CTO Cormac Brady. Over the course of his 2…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Upendra Mardikar, CSO, Snap Finance Thanks to our sponsor, PlexTrac PlexTrac is the platform that empowers your offensive security team to spend more time hacking and less time reporting. Build better reports in half the…
MFA could be long haul for some federal agencies says CISA official New Emotet variant stealing users' credit card information from Google Chrome Symantec: More malware operators moving in to exploit Follina Thanks to today’s episode sponsor, PlexTrac PlexTrac is the platform that empowers your offensive security team to spend more time hacking and…
I
Iron Sysadmin Podcast


1
Episode 122a - Rom Hacking and Retro Gaming
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12
Welcome to Episode 122a Main Topic yes it is i the boy - who am i even -son of unclemarc -stevens type kid -longtime mathematics enjoyer -"pro" gamer a quick personal history -first talk about how i got into older games -wii virtual console, snes emulator in 3rd grade (messing around with lunar magic, despite not knowing how to use it) -got into gb…
I
Iron Sysadmin Podcast


1
Episode 112b - Spotting conspiracies, duck duck go, and identifying mass shooters
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
Welcome to Episode 122b Announcements Patreon Update Z(ed)-Thor name_pending197 Jérémy Arinomi Andrew Tatro Bruce Robert Matt David S0l3mn Trooper_Ish LiNuXsys666 Mark The Mentor Marc Julius Andi J Charles 22532 Get your Iron Sysadmin Merch at Teespring! https://teespring.com/stores/ironsysadmin Support the Iron Sysadmin Podcast AND try out Riversi…
B
Brakeing Down Security Podcast


1
Jon DiMaggio_Art-of-cyberwarfare_hacking_back-insider-threat-messaging_P1
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25
Author of the #noStarch book "The Art of Cyberwarfare" (https://nostarch.com/art-cyberwarfare) Topics: discusses his book, threat intel as a service, why people enjoy malware analysis? Should people 'hack back' and what legal issues are around that? How do you soften the messaging if you have an insider threat team? www.infoseccampout.com for more …
D
Defense in Depth


1
Building a Security Awareness Training Program
28:14
28:14
Play later
Play later
Lists
Like
Liked
28:14
All links and images for this episode can be found on CISO Series We all know and have experienced bad security awareness training. People can learn, and should learn about being cyber aware. How do you build a security awareness training program that sticks? Check out this post for the discussions that are the basis of our conversation on this wee…
Lack of reporting hurting the ransomware fight CISA warns of China-linked network snooping Personal information marketplace taken down Thanks to today’s episode sponsor, PlexTrac PlexTrac is the platform that empowers your offensive security team to spend more time hacking and less time reporting. Build better reports in half the time, centralize y…
Passwords are finally dead Hackers steal credit cards from online gun shops Shields data breach affects 2 million patients Thanks to today’s episode sponsor, PlexTrac The best penetration tests begin and end with PlexTrac. PlexTrac can improve efficiency and effectiveness at every phase of your proactive assessments. By centralizing the data from a…
C
CISO Stories Podcast


1
CSP #73 - Educating Senior Management in Cybersecurity - Edward Amoroso
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42
Managing cybersecurity defense inside an organization is an enormously complex endeavor, considering the interconnections, vendor relationships, cloud, and mobile proliferation of the data. While many of these computing technologies have a clear purpose and usefulness, many times organizations minimize the complexity when presenting to the Board. S…
The once and future AlphaBay Karakurt adopts bill collector tactics China concludes its cybersecurity review of Didi Thanks to today’s episode sponsor, PlexTrac PlexTrac is the platform that empowers your offensive security team to spend more time hacking and less time reporting. Build better reports in half the time, centralize your data, maximize…
Evasive phishing mixes reverse tunnels and URL shortening services Exploit released for Atlassian Confluence RCE bug, patch now Lawmakers are racing to pass tech antitrust reforms before midterms Thanks to today’s episode sponsor, PlexTrac The best penetration tests begin and end with PlexTrac. PlexTrac can improve efficiency and effectiveness at e…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 30-June 3, is hosted by Rich Stroffolino with our guest, Steve Zalewski, Co-host, Defense in Depth Thanks to today’s episode sponsor, Feroot All links and the video of this episode can be found on CISO Series.com
Leaked Conti chats confirm gang’s ability to conduct firmware-based attacks Critical UNISOC chip vulnerability affects millions of Android smartphones ExpressVPN removes servers in India after refusing to comply with government order Thanks to today’s episode sponsor, Feroot Feroot secures client-side web applications so that businesses can deliver…
H
Hybrid Identity Protection Podcast


1
Achieving Operational Resilience with Simon Hodgkinson
23:46
23:46
Play later
Play later
Lists
Like
Liked
23:46
Hopefully, your organization has a disaster recovery plan. But do you have a plan for operational resilience? In this HIP Podcast session, Simon Hodgkinson, former CISO at bp and a strategic advisor at Semperis, explains why organizations that focus on operational resilience and disaster recovery are better prepared to weather cyberattacks—and wher…
D
Defense in Depth


1
Onboarding Cyber Professionals with No Experience
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44
All links and images for this episode can be found on CISO Series You want to bring on entry level personal, But green employees, who are not well versed in security, IT, or your data introduce risk once they have access to it. What are ways to bring these people on while also managing risk? Check out this post for the discussions that are the basi…
Europol shuts down FluBot Hive ransomware kicks Costa Rica when its down CISA issues advisory on voting machine vulnerabilities Thanks to today’s episode sponsor, Feroot Feroot secures client-side web applications so that businesses can deliver a flawless and safe digital user experience to their customers. Inspector and Pageguard, Feroot’s automat…
T
The New CISO


1
Don’t Be Afraid to Break Things with David Lingenfelter
45:47
45:47
Play later
Play later
Lists
Like
Liked
45:47
On this episode of The New CISO, Steve is joined by David Lingenfelter, the Vice President of Information Security at Penn National Gaming, to discuss the requirement to constantly learn and evolve in the IT security field. After falling into his passion for IT, David quickly realized just how far his knowledge could take him if he constantly built…
Follina vulnerability under active exploitation Tension inside Google over conduct of fired researcher IBM to pay $1.6 billion for poaching customer account Thanks to today’s episode sponsor, Feroot Feroot secures client-side web applications so that businesses can deliver a flawless and safe digital user experience to their customers. Inspector an…
C
CISO Stories Podcast


1
CSP #72 - Moving From a Techie to a CISO - Shaun Cavanaugh
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33
Careers can just happen, or they can be planned. Join us as we discuss making the decision to become a CISO and then taking the steps necessary to develop the skills to attain the job and thrive in the role. To view the article from the CISO COMPASS Book that sparked this interview, please visit: https://securityweekly.com/wp-content/uploads/2022/0…
China censoring open-source code Follina zero-day hits Office EnemyBot botnet acts fast Thanks to today’s episode sponsor, Feroot Feroot secures client-side web applications so that businesses can deliver a flawless and safe digital user experience to their customers. Inspector and Pageguard, Feroot’s automated data protection solutions, increase c…
Pro-Russian hacker group KillNet plans to attack Italy today Microsoft warns that hackers are using more advanced techniques to steal credit card data China makes offer to ten nations help to run their cyber-defenses Thanks to today’s episode sponsor, Feroot Feroot secures client-side web applications so that businesses can deliver a flawless and s…
Up to 83% of known compromised passwords would satisfy regulatory requirements Broadcom confirms deal to acquire VMware Experts warn of rise in ChromeLoader malware Thanks to today’s episode sponsor, Optiv Up for a Zero Trust Crash Course? Join our expert, Jerry Chapman, Engineering Fellow at Optiv and author of "Zero Trust Security: An Enterprise …
All links and images for this episode can be found on CISO Series Zero trust is a hollow buzzword. In any form of security, there exist critical points where we have to trust. What we need is a move away from implicit trust to explicit trust, or identity that can be verified. Check out this post for the discussion that is the basis of our conversat…