Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
…
continue reading
SC Media, and our sponsor, VISO Trust, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
SC Media, and our sponsor, VISO Trust, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading
1
Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167
23:00
23:00
Na później
Na później
Listy
Polub
Polubione
23:00
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
…
continue reading
1
S6E17 - A Conversation with Stanley Charles
27:13
27:13
Na później
Na później
Listy
Polub
Polubione
27:13
Stanley Charles is the Founder of the Charles Technology Group and Senior Manager, Information Security and Compliance at Pixel United. I realized early in the discussion that we have similar career paths, from aircraft maintenance in the United States Air Force, to an early career in networking as a network engineer, to eventually land in the info…
…
continue reading
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Shawn Bowen, svp and CISO, World Kinect Corporation. In this episode: Is it true that CISOs feel their jobs are har…
…
continue reading
1
#174 - OWASP Top 10 Web Application Attacks
44:23
44:23
Na później
Na później
Listy
Polub
Polubione
44:23
In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain …
…
continue reading
1
CISO CHALLENGE (Mindset Not Skillset)
30:46
30:46
Na później
Na później
Listy
Polub
Polubione
30:46
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus shifts from technical skills to mindset, highlighting the essential role of mindset in cybersecurity success. Dr. Cole emphasizes the importance of recognizing and challenging limiting beliefs, particularly in the context of transitioning from a security engineering background …
…
continue reading
1
Keep Calm and Communicate Better: Advice for Young Managers
30:21
30:21
Na później
Na później
Listy
Polub
Polubione
30:21
In this episode of The New CISO, host Steve is joined again by guest Ron Banks, CISO at Toyota Financial Services. In part two of his interview series, Ron shares his career advice for new cyber leaders. Listen to the episode to learn more about Ron’s take on China’s strategies, the importance of being inquisitive, and why we must be calm under cha…
…
continue reading
1
Leading with Grit: Zero Trust in the Finance Sector with Darin Hurd, CISO at Guaranteed Rate
42:17
42:17
Na później
Na później
Listy
Polub
Polubione
42:17
Darin Hurd, EVP and CISO at Guaranteed Rate, explains the value of zero trust security in the financial sector. Lenders cannot control the federal funds interest rate or the state of the economy, which can change rapidly. However, they must respond and adapt to these variables and others while ensuring their infrastructure remains secure. Darin exp…
…
continue reading
1
Episode 134: Understanding TISAX w/ Alexander Häusler
49:47
49:47
Na później
Na później
Listy
Polub
Polubione
49:47
Autor: John Verry
…
continue reading
1
CISO Insiders with Jason Wolpow | Head of Cybersecurity Recruitment at Lawrence Harvey | Episode 80
35:43
35:43
Na później
Na później
Listy
Polub
Polubione
35:43
In this special episode of CISO Insiders, we welcome Jason Wolpow, the head of cybersecurity recruitment at Lawrence Harvey. Jason Wolpow, together with Ben Ben Aderet, tackle key challenges while sharing key insights on the recruitment side of the cybersecurity industry. This special episode will tackle the following topics: The need for more cybe…
…
continue reading
1
The Year In Review - So Much to Cover, So Little Time! - CISO Talk EP 43
43:19
43:19
Na później
Na później
Listy
Polub
Polubione
43:19
CISO Talk finishes 2023 with a year-end review hosted by Mitch Ashley (Techstrong Research) and Jennifer Minella (Viszen Security), joined by Allison Miller (executive security leader) and Dan Glass (CISO, NTT DATA). Our cyber leaders reflect on the rapid rise of generative AI (and whether it lives up to its billing), the career and legal risks of …
…
continue reading
Je ziet regelmatig de rollen CISO/Privacy Officer gecombineerd worden. Ik heb het zelf ook een tijd lang gecombineerd gedaan.Ondanks dat de twee onderwerpen overlap met elkaar hebben, zijn zij ook heel verschillend.Doordat de belangen (betrokkenen vs organisatie) uit elkaar liggen en tevens de reikwijdte verschilt van elkaar. De AVG gaat alleen ove…
…
continue reading
1
Third-Party Risk Management - BEC Compromises and the Cloud - Michael Swinarski - CSP #167
23:00
23:00
Na później
Na później
Listy
Polub
Polubione
23:00
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
…
continue reading
1
S6E16 - A Conversation with Nick Mullen
27:03
27:03
Na później
Na później
Listy
Polub
Polubione
27:03
Nick Mullen is the Founder and Principal Consultant at Sanguine Security Solutions and is also a Cybersecurity Program Mentor at Kennesaw State University. He is a technology leader dedicated to enabling teams and facilitating achievement, and his expertise is in program/project management, information security, IT governance, and compliance in the…
…
continue reading
1
52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166
30:13
30:13
Na później
Na później
Listy
Polub
Polubione
30:13
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
…
continue reading
1
S6E15 - A Conversation with Robert Hill
33:07
33:07
Na później
Na później
Listy
Polub
Polubione
33:07
Robert Hill is a visionary leader with over three decades of expertise in the cybersecurity industry. As the founder and CEO of Cyturus Technologies, Inc, a leading Compliance and Risk Management solution provider, Robert has played an instrumental role in shaping the landscape of cybersecurity and helping organizations, navigate the complex challe…
…
continue reading
1
BREAKING: “Department of No” Upgraded to “Department of Slow”
36:47
36:47
Na później
Na później
Listy
Polub
Polubione
36:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Nadav Lotan, product management team leader, Cisco. In this episode: How can security teams do their jobs without seeming like an im…
…
continue reading
1
52,000 Suppliers:Third-Party Supply Chain CyberRisk Approach - Cassie Crossley - CSP #166
30:13
30:13
Na później
Na później
Listy
Polub
Polubione
30:13
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
…
continue reading
1
#173 - Mastering Vulnerability Management
22:16
22:16
Na później
Na później
Listy
Polub
Polubione
22:16
In this episode of CISO Tradecraft, host G Mark Hardy delves into the critical subject of vulnerability management for cybersecurity leaders. The discussion begins with defining the scope and importance of vulnerability management, referencing Park Foreman's comprehensive approach beyond mere patching, to include identification, classification, pri…
…
continue reading
In this episode of "Life of a CISO" with Dr. Eric Cole, he discusses the crucial role of mindset over technical skills in cybersecurity success. Dr. Cole emphasizes believing in one's worthiness for advancement and financial success. He also highlights the reality of cyber warfare, labeling it as World War Three due to the pervasive nature of cyber…
…
continue reading
1
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
30:49
30:49
Na później
Na później
Listy
Polub
Polubione
30:49
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
…
continue reading
1
Securing Connections: 3rd Party Risk Mgmt Expert Insights - Charles Spence - CSP #165
30:49
30:49
Na później
Na później
Listy
Polub
Polubione
30:49
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
…
continue reading
1
S6E14 - A Conversation with Nick Oles
26:39
26:39
Na później
Na później
Listy
Polub
Polubione
26:39
Nick Oles is an author, cybersecurity professional, and veteran. We cover many topics including his book How to Catch a Phish (available at https://lnkd.in/e35B8YHz) and career paths, including this preview where he reviews his beginnings in IT in college. I often say that working at a university is a great place to get foundational IT experience, …
…
continue reading
1
A Threat Actor Just “Liked” My Dashboard Screenshot
35:21
35:21
Na później
Na później
Listy
Polub
Polubione
35:21
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest, Jamil Farshchi, evp and CISO, Equifax. In this episode: Data leaks are hard enough to deal with when caused by threat actors, but how bad is a…
…
continue reading
This episode of CISO Tradecraft, hosted by G Mark Hardy, delves into the concept, significance, and implementation of tabletop exercises in improving organizational security posture. Tabletop exercises are described as invaluable, informal training sessions that simulate hypothetical situations allowing teams to discuss and plan responses, thereby …
…
continue reading
In this episode of "Life of a CISO," Dr. Eric Cole, the host and cybersecurity expert, delves into the crucial transition from a tactical mindset to a strategic one as professionals ascend to the role of Chief Information Security Officer. Dr. Cole emphasizes the need to shift from being detail-oriented and tactical, as typical of a security engine…
…
continue reading
1
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
24:14
24:14
Na później
Na później
Listy
Polub
Polubione
24:14
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
…
continue reading
1
A Printout on Secure by Design When Utilizing 3rd Parties - Bryan Willett - CSP #164
24:14
24:14
Na później
Na później
Listy
Polub
Polubione
24:14
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
…
continue reading
1
S6E13 - A Conversation with Jonathan Mandell
28:28
28:28
Na później
Na później
Listy
Polub
Polubione
28:28
Jonathan Mandell calls Chicago home and has worked across various tech roles, from Enterprise AE to Business Development. He was part of the founding team of Tiz, which later became Provi, a SaaS company reshaping the alcohol industry. He has worked in third party risk management (TPRM) for the past 5 years, and recently founded Teepee, a cybersecu…
…
continue reading
1
We Can’t Fail at API Security If We Never Even Try
35:23
35:23
Na później
Na później
Listy
Polub
Polubione
35:23
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our sponsored guest, Yoav Nathaniel, co-founder and CEO, Silk Security. In this episode: Why does it seem like securing APIs i…
…
continue reading
1
#171 - Navigating Software Supply Chain Security (with Cassie Crossley)
46:57
46:57
Na później
Na później
Listy
Polub
Polubione
46:57
In this episode of CISO Tradecraft, host G Mark Hardy converses with Cassie Crossley, author of the book on software supply chain security. Hardy explores the importance of cybersecurity, the structure of software supply chains, and the potential risks they pose. Crossley shares her expert insights on different software source codes and the intrica…
…
continue reading
1
Exploring AI and Cloud Security: Insights on Software Supply Chain and Workload Security - CISO Talk EP 42
43:19
43:19
Na później
Na później
Listy
Polub
Polubione
43:19
Anton Chuvakin, security advisor at Office of the CISO at Google Cloud and former Gartner distinguished analyst, joins Mitch and JJ to discuss AI and its security implications, software supply chain security and moving and securing workloads in the cloud, including its similarities and differences from operating in traditional data centers.…
…
continue reading
In this episode of "Life of a CISO" with Dr. Eric Cole, listeners are reminded that to reach the next level in their careers, they must embrace change and pivot from their current mindset. Dr. Cole emphasizes the importance of listening more than speaking, asking the right questions, and focusing on quality over quantity in interactions. He discuss…
…
continue reading
1
Public-Private Partnership: How to Punish Bad Actors, Not Organizations
35:13
35:13
Na później
Na później
Listy
Polub
Polubione
35:13
In this episode of The New CISO, host Steve is joined by guest Ron Banks, CISO at Toyota Financial Services. In part one of his two-part interview, Ron shares how he transitioned from a fighter pilot to a cybersecurity leader. He also digs into what is required for a joint government, private industry, cyber offensive response. Listen to the episod…
…
continue reading
1
Kubernetes Security – Simplified Shauli Rozen, CEO of ARMO
48:12
48:12
Na później
Na później
Listy
Polub
Polubione
48:12
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Shauli Rozen, CEO and Co-Founder of ARMO, exploring the intricacies of Kubernetes, the orchestration tool that's reshaping how we deploy, scale, and manage containerized applications. Join us as we discuss: What a container is Implications of co…
…
continue reading
1
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
26:01
26:01
Na później
Na później
Listy
Polub
Polubione
26:01
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
…
continue reading
1
Intelligent Generative AI Handling - Aaron Weismann - CSP #163
26:01
26:01
Na później
Na później
Listy
Polub
Polubione
26:01
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
…
continue reading
1
S6E12 - A Conversation with Matthew Meadows
26:32
26:32
Na później
Na później
Listy
Polub
Polubione
26:32
Matthew Meadows is an experienced Information Technology Security Specialist with a demonstrated history of working in the medical practice industry, and is currently an Information Security Engineer with Premier, Inc. Join us as he discusses a new approach to information security training for healthcare professionals. Learn more about the CyberSec…
…
continue reading
1
I’m Stuffed, I Just Couldn’t Take Another Credential
38:41
38:41
Na później
Na później
Listy
Polub
Polubione
38:41
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our sponsored guest, Jay Trinckes, director of compliance, Thoropass. In this episode: Why do credential stuffing attacks put …
…
continue reading
1
#170 - Responsibility, Accountability, and Authority
46:41
46:41
Na później
Na później
Listy
Polub
Polubione
46:41
In this episode of CISO Tradecraft, the host, G Mark Hardy, delves into the concepts of responsibility, accountability, and authority. These are considered critical domains in any leadership position but are also specifically applicable in the field of cybersecurity. The host emphasizes the need for a perfect balance between these areas to avoid pu…
…
continue reading
1
Hackers are friends, not food - hoe hackers je kunnen helpen
31:47
31:47
Na później
Na później
Listy
Polub
Polubione
31:47
Hackers zijn van onschatbare waarde voor jouw organisatie. Zij hebben de tijd en motivatie om oneindig lang aan een draadje te frutselen, tot de gehele trui is gereduceerd tot een hoopje garen. Waar pentesters maar beperkt de tijd hebben en per uur worden betaald, rekenen melders bij een CVD vaak helemaal niets. Ze willen alleen graag een T-shirt e…
…
continue reading
In this episode of "Life of a CISO" with Dr. Eric Cole, the focus is on the importance of prioritizing foundational cybersecurity measures over chasing new technologies. Dr. Cole emphasizes the prevalence of companies getting caught up in the hype of artificial intelligence (AI) and other buzzwords, while neglecting simple yet effective security st…
…
continue reading
1
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
33:02
33:02
Na później
Na później
Listy
Polub
Polubione
33:02
Responsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald, T. 2019. Chapter 4: Emerging Technologies and Trends in…
…
continue reading
1
Responsible Use and Vetting of AI Solutions - Jon Washburn - CSP #162
32:58
32:58
Na później
Na później
Listy
Polub
Polubione
32:58
Responsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald, T. 2019. Chapter 4: Emerging Technologies and Trends in…
…
continue reading
1
S6E11 - A Conversation with Chris Foulon
31:29
31:29
Na później
Na później
Listy
Polub
Polubione
31:29
Chris Foulon, Founder and Principal Cybersecurity Strategist of CPF-Coaching, is a seasoned vCISO, IT, and Security leader with over 17 years of progressive experience. He is also the co-host Breaking into Cybersecurity with Renee Smalls where they interviewed individuals who have transitioned into the cybersecurity industry within the past 5 years…
…
continue reading
1
Is There a Konami Code For Cyber Talent?
38:30
38:30
Na później
Na później
Listy
Polub
Polubione
38:30
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest Kelly Haydu, vp, infosec, technology, and enterprise applications, CarGurus. In this episode: What other career fields are rife with talent tha…
…
continue reading
In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Informati…
…
continue reading
Oorspronkelijk een talk die ik heb gehouden tijdens een lunchbijeenkomst met verschillende zbo's. ZBO staat voor zelfstandig bestuursorgaan. Dit zijn overheidsorganisaties die een onafhankelijk bestuur hebben, maar wel horen bij een ministerie. Dat dit een complexe constructie is, zal je al begrijpen. Maar hoe werk je nou constructief samen met een…
…
continue reading
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus shifts to the essential strategies for CISOs aiming to excel in their roles. Dr. Cole emphasizes the significance of understanding the existing security infrastructure before implementing sweeping changes, cautioning against the common mistake of assuming everything is broken u…
…
continue reading
1
The Business Side of AI - Edward Contreras - CSP #161
23:58
23:58
Na później
Na później
Listy
Polub
Polubione
23:58
Artificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversation? The goal is to engage in an action driven conver…
…
continue reading
1
The Business Side of AI - Edward Contreras - CSP #161
23:58
23:58
Na później
Na później
Listy
Polub
Polubione
23:58
Artificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversation? The goal is to engage in an action driven conver…
…
continue reading