Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
In deze podcast deel ik talks die ik in het verleden heb gehouden, voor wie deze graag wil naluisteren.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Aphinia (https://www.aphinia.com) - a community of 1,500+ CISOs - is brining regular interviews with top information security executives who share their personal stories, actionable insights, helpful tactics to keep your enterprise safe and predictions for the future cybersecurity landscape.
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2024, National Security Corporation. All Rights Reserved
…
continue reading
The biggest threat to you and this country today is a cyber attack. Are you protected? Find out now with Dr. Eric Cole, former special agent for the CIA and current CEO of Secure Anchor.
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Welcome to CISO Insights, the official podcast of CISO Marketplace, where we dive deep into the latest trends, challenges, and innovations in cybersecurity. Each episode features expert commentary, practical advice, and cutting-edge insights to help Chief Information Security Officers (CISOs) navigate today’s complex threat landscape. From risk management and compliance to advanced threat detection and emerging technologies, CISO Insights delivers the knowledge you need to stay ahead in an e ...
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
…
continue reading
The official EC-Council CISO Forum podcast.
…
continue reading
Cybercrime Magazine's CISO Minute Podcast: One minute of wisdom every week for CISOs and from CISOs!
…
continue reading
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
…
continue reading
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
…
continue reading
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
…
continue reading
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
…
continue reading
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
…
continue reading
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
…
continue reading
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
China's Cyber Campaigns: Salt & Volt Typhoon and Beyond
37:45
37:45
Na później
Na później
Listy
Polub
Polubione
37:45Explore the cyber espionage campaigns of People's Republic of China (PRC)-affiliated threat actors, such as Volt Typhoon, targeting critical infrastructure.Understand their techniques, including living off the land (LOTL) tactics to maintain anonymity within IT infrastructures.Learn about recommended mitigations and best practices to strengthen net…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do's en don'ts in een cybercrisis (van een ander)
25:10
25:10
Na później
Na później
Listy
Polub
Polubione
25:10"Ze hadden vast hun BCM niet op orde!" "Hey, ik hoor net op het journaal dat jullie gehackt zijn. Wat is er aan de hand joh??" Sommige dingen kan je gewoon beter niet doen als een ander middenin een crisis verkeerd. En sommige dingen zijn juist goed om te doen. In deze aflevering alles over wat je wel en niet moet doen tijdens een cybercrisis (van …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Let Data Drive Decisions, Not Emotions
33:19
33:19
Na później
Na później
Listy
Polub
Polubione
33:19Being a Chief Information Security Officer (CISO) is not only stressful, but it can also feel isolating, especially as you move up in leadership. In this episode of Life of a CISO, Dr. Eric Cole discusses the unique challenges CISOs face as they transition from a technical role into executive leadership. He highlights how this shift often removes C…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Leadership & Professional Organizations: Evolution or Revolution?
56:54
56:54
Na później
Na później
Listy
Polub
Polubione
56:54The Professional CISO Show - Episode 52: The Future of Professional Organizations for CISOs 🎙️ Hook: Are the current professional organizations truly serving the needs of CISOs, or is it time for a new approach? In this episode of The Professional CISO Show, host David Malicoat takes a deep dive into the evolution of cybersecurity professional asso…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 148: Cloud Detection & Response
37:24
37:24
Na później
Na później
Listy
Polub
Polubione
37:24In this episode, John Verry interviews Eric Gumanofsky, Vice President for Product Innovation at Tenable Security, about the concept of Cloud Detection and Response (CDR). They discuss the similarities and differences between CDR and Endpoint Detection and Response (EDR), as well as the integration of CDR into a comprehensive Cloud Native Applicati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S7E6 - A Conversation with Alexander Bates
32:35
32:35
Na później
Na później
Listy
Polub
Polubione
32:35Alex Bates is the Director of Information Security at Sinch. He is a business-minded and strategic information security leader with 13+ years of experience in technology and cybersecurity, including 10+ years leading global teams of up to 30 professionals. He is known for bringing teams and ideas together to achieve strong results in high-pressure …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust Purple Team DevSecOps Mesh: A CASB Journey Through the Identity Fabric
37:33
37:33
Na później
Na później
Listy
Polub
Polubione
37:33All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Steve Zalewski. Joining us is our sponsored guest, Matt Muller, field CISO, Tines. In this episode: Seeking the early AI adopters Taking the SOC back to basics Changing our automation expectation…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Governance: Navigating Risks, Frameworks, and the Future - Rock Lambros - CSP #209
29:25
29:25
Na później
Na później
Listy
Polub
Polubione
29:25In this episode, we sit down with author and AI expert Rock Lambros to explore the evolving landscape of AI governance. We discuss the risks of AI chatbots, comparing OpenAI and DeepSeek, and examine current and emerging governance frameworks. As AI adoption accelerates, organizations must determine the right guardrails and critical questions to as…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#219 - The Professionalization of CISOs (with Steve Zalewski & Tyson Kopczynski)
41:15
41:15
Na później
Na później
Listy
Polub
Polubione
41:15This podcast episode discusses the formation of a professional association for CISOs, driven by increasing personal liability risks faced by these executives. The conversation centers on establishing a formal definition and accreditation process for the CISO role, moving beyond existing certifications to demonstrate operational and theoretical expe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The GC+CISO Connection, Ep. 3: Bridging the Gap: Discussing In-House Legal and Cyber Collaboration with the Queens of Badassery, attorneys Nicola Hobeiche and Shereen El Domeiri
31:41
31:41
Na później
Na później
Listy
Polub
Polubione
31:41In this episode of The GC+CISO Connection Show, host Shawn Tuma is joined by the Queens of Badassery, attorneys Nicola Hobeiche and Shereen El Domeiri, who bring decades of in-house legal experience to help dive deep into the vital relationship between in-house legal and security teams. Nicola and Shereen share their experiences, insights, and prac…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Daniel Chromek - Chief Information Security Officer - ESET
26:02
26:02
Na później
Na później
Listy
Polub
Polubione
26:02This is an interview with Daniel Chromek (Chief Information Security Officer, ESET) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only commu…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Take a Preemptive Strike on Your Career
45:08
45:08
Na później
Na później
Listy
Polub
Polubione
45:08In this insightful episode of The New CISO, host Steve Moore reconnects with Azzam Zahir to explore his career evolution, from cybersecurity leadership to his recent role as a vertical CIO at General Motors. Azzam shares candid reflections on his conscious decision to leave his 12-year tenure, embracing change, and navigating personal growth in lea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
State-Sponsored Cybercrime: When Nations Turn to Hackers
22:53
22:53
Na później
Na później
Listy
Polub
Polubione
22:53Uncover the disturbing trend of nation-states utilizing cybercriminals to achieve their strategic objectives. This episode examines how countries like Russia, Iran, China, and North Korea leverage cybercriminals for espionage, disruption, and revenue generation. Explore the various ways states collaborate with cybercriminals, from purchasing malwar…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Navigating Singapore's PDPA: Protecting Personal Data in the Digital Age
18:51
18:51
Na później
Na później
Listy
Polub
Polubione
18:51The podcast explores the key principles and obligations outlined in Singapore's Personal Data Protection Act (PDPA). It offers insights for organizations on how to comply with the PDPA's requirements for collecting, using, and disclosing personal data. It also examines individuals' rights to access and correct their personal data, ensuring a balanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Securing Canada's Digital Future: The National Cyber Security Strategy 2025
14:21
14:21
Na później
Na później
Listy
Polub
Polubione
14:21Dive into Canada's National Cyber Security Strategy for 2025 and explore how it aims to protect Canadians and businesses from evolving cyber threats.This podcast examines the strategy's key pillars, including forging partnerships, promoting innovation, and disrupting cyber threat actors.Discover how the government plans to engage with all levels of…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Phobos Ransomware: A Deep Dive into Tactics, Techniques, and Mitigation
22:32
22:32
Na później
Na później
Listy
Polub
Polubione
22:32The Phobos ransomware, operating under a Ransomware-as-a-Service (RaaS) model since 2019, targets various sectors, demanding millions in ransom. This episode explores Phobos's tactics, such as exploiting vulnerable RDP ports, phishing campaigns, and open-source tools like Smokeloader, to infiltrate networks. Discover practical mitigation strategies…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Smart Cities: Promises, Perils, and the Power of Governance
16:39
16:39
Na później
Na później
Listy
Polub
Polubione
16:39Dive into the transformative world of AI in urban environments, exploring both the exciting potential and the significant risks. From UN reports and cybersecurity concerns to real-world case studies, we uncover how AI is reshaping our cities. Join us as we discuss key questions about ethics, governance, and citizen empowerment in the age of AI-driv…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Column: De rol van de bestuurder verandert
7:04
7:04
Na później
Na później
Listy
Polub
Polubione
7:04Column oorspronkelijk gepubliceerd door Security Innovation Stories: [link volgt]
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding DORA: Navigating Digital Resilience in Finance
19:39
19:39
Na później
Na później
Listy
Polub
Polubione
19:39The Digital Operational Resilience Act (DORA) is a European regulation designed to ensure the financial sector can withstand, respond to, and recover from ICT-related disruptions. This episode breaks down the key pillars of DORA, including ICT risk management, incident reporting, digital resilience testing, and third-party risk management, offering…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISO's 20/20 Vision: Key Performance Indicators for Cybersecurity Success
24:14
24:14
Na później
Na później
Listy
Polub
Polubione
24:14Are you ready to get a 360° view of your organization’s cybersecurity posture?In this episode, we dive into the 20 Key Performance Indicators (KPIs) that CISOs use to measure and enhance their security programs.Learn how to track risk reduction, incident detection, patch compliance, and more to make data-driven decisions and demonstrate the value o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding NIS2: What It Means for Your Organization
41:15
41:15
Na później
Na później
Listy
Polub
Polubione
41:15The NIS2 Directive is here, and it's changing the cybersecurity landscape for EU businesses. This episode breaks down the complex requirements of NIS2, explaining who it affects and what steps organizations must take to comply. We'll explore key changes, risk management measures, incident reporting, and the crucial role of management accountability…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Auditing AI: Navigating Risks and Regulations
27:57
27:57
Na później
Na później
Listy
Polub
Polubione
27:57As AI becomes more prevalent, understanding its risks and ensuring compliance are critical. This episode explores the crucial role of internal audit in guiding organizations toward responsible AI implementation. We delve into key areas like risk assessment, data governance, and transparency, offering insights for auditors and business leaders alike…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding AI Risks: A Deep Dive into the MIT AI Risk Repository
21:26
21:26
Na później
Na później
Listy
Polub
Polubione
21:26Explore the complex landscape of artificial intelligence risks with the MIT AI Risk Repository. This podcast delves into the repository's comprehensive database, causal and domain taxonomies, and methodologies for identifying and classifying AI threats. Join experts as they discuss how policymakers, auditors, academics, and industry professionals c…
…
continue reading
In the latest episode of Life of a CISO, Dr. Eric Cole addresses a critical issue faced by many Chief Information Security Officers: the tendency to focus on treating symptoms rather than identifying and addressing the root causes of security problems. He emphasizes that many CISOs find themselves merely reacting to incidents rather than proactivel…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tractor Tech Tug-of-War: Farmers, Manufacturers, and the Right to Repair
20:00
20:00
Na później
Na później
Listy
Polub
Polubione
20:00This episode explores the growing conflict between farmers and agricultural equipment manufacturers over the right to repair their own machinery. We delve into how intellectual property laws and proprietary software limit farmers' access to repair tools and information, often creating a manufacturer monopoly. We also examine the ongoing legislative…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity Risks in Modern Machinery: From Construction Sites to Farm Fields and Beyond
14:01
14:01
Na później
Na później
Listy
Polub
Polubione
14:01This episode explores the growing cybersecurity risks associated with the increasing connectivity of modern equipment across industries. We examine how the integration of IoT devices and digital technologies in construction, agriculture, and transportation introduces vulnerabilities that can be exploited by malicious actors. We discuss the potentia…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
50 Episodes In: What We Learned About Building the Next Gen CISO
47:22
47:22
Na później
Na później
Listy
Polub
Polubione
47:22👉 Listen Now: A deep dive into the biggest cybersecurity lessons, trends, and leadership insights from 50 episodes of The Professional CISO Show! 🔍 Episode Summary In this Year in Review episode, host David Malicoat reflects on the biggest cybersecurity trends, challenges, and insights from 50 expert conversations in 2024. 🔥 What You’ll Learn: • Th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S7E5 - A Conversation with Adam Evans
25:27
25:27
Na później
Na później
Listy
Polub
Polubione
25:27Adam Evans is the AVP Information Security Officer for Generations Bank. He is a dedicated technologist with a passion for information security and 15+ years experience. He discusses AI, cybersecurity, IT infrastructure management or any related topics, and welcomes collaboration and networking opportunities with fellow professionals who share a pa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DeepSeek: AI Innovation vs. Global Scrutiny
22:37
22:37
Na później
Na później
Listy
Polub
Polubione
22:37This episode delves into the rapid rise of the Chinese AI startup DeepSeek, exploring its cutting-edge technology that rivals major competitors and its recent challenges including a cyberattack and mounting global scrutiny. We'll examine the concerns surrounding data privacy, censorship, and regulatory hurdles that DeepSeek faces in the wake of its…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Our Developers’ New Motto is “LLM Take the Wheel”
37:09
37:09
Na później
Na później
Listy
Polub
Polubione
37:09All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines. In this episode: Minding the gap Copilot overrelia…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Day to Breach: The 2024 Vulnerability Explosion
14:01
14:01
Na później
Na później
Listy
Polub
Polubione
14:01The cybersecurity landscape in 2024 saw a dramatic 20% surge in exploited vulnerabilities, with attackers increasingly targeting network edge devices and cloud infrastructure. This episode dives into the key statistics, trends, and major incidents, highlighting the critical need for proactive security measures like robust patch management and zero-…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Robert Former - Chief Information Security Officer - Acquia
34:15
34:15
Na później
Na później
Listy
Polub
Polubione
34:15This is an interview with Robert Former (Chief Information Security Officer, Acquia) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only comm…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
John Kiczek - Chief Information Security Officer - CapMetro
26:22
26:22
Na później
Na później
Listy
Polub
Polubione
26:22This is an interview with John Kiczek (Chief Information Security Officer, CapMetro) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only comm…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Time Rice - Chief Information Security Officer - Herc Rentals
26:53
26:53
Na później
Na później
Listy
Polub
Polubione
26:53This is an interview with Time Rice (Chief Information Security Officer, Herc Rentals) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sam Curry - Chief Information Security Officer - Zscaler
20:38
20:38
Na później
Na później
Listy
Polub
Polubione
20:38This is an interview with Sam Curry (Chief Information Security Officer, Zscaler) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only communi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Biran Franco - Co-Founder & Chief Product Officer - Cyclops
16:04
16:04
Na później
Na później
Listy
Polub
Polubione
16:04This is an interview with Biran Franco (Co-Founder & Chief Product Officer, Cyclops) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only comm…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sajan Gautam - Chief Information Security Officer - Arvest Bank
26:37
26:37
Na później
Na później
Listy
Polub
Polubione
26:37This is an interview with Sajan Gautam (Chief Information Security Officer, Arvest Bank) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sivan Tehila - CEO & Founder - Onyxia
24:26
24:26
Na później
Na później
Listy
Polub
Polubione
24:26This is an interview with Sivan Tehila (CEO & Founder, Onyxia) as a part of Aphinia (https://www.aphinia.com) CISO Interview Series - where name is sharing his advice for junior cybersecurity professionals, his actionable insights and views on the current and future cybersecurity landscape. Aphinia is a by-invitation-only community of 1,500+ C-, VP…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#218 - How AI Changes Talent Management (with Colleen Lennox)
23:49
23:49
Na później
Na później
Listy
Polub
Polubione
23:49In this episode of CISO Tradecraft, host G. Mark Hardy and special guest Colleen Lennox dive into the transformative power of AI in HR. Discover how AI can revolutionize identifying, attracting, and retaining cybersecurity talent. They discuss the challenges of finding the right personnel in the cybersecurity field, the innovative AI-driven solutio…
…
continue reading
In this episode of Life of a CISO, Dr. Eric Cole dives deep into the journey of becoming a world-class Chief Information Security Officer (CISO). He emphasizes that this podcast goes beyond the role of a CISO—it’s about helping cybersecurity professionals unlock their full potential and discover the best version of themselves. Whether you’re a curr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Episode 147: Why vCISO Engagements Fail
59:02
59:02
Na później
Na później
Listy
Polub
Polubione
59:02In this episode, John Verry and Matt Webster discuss the evolving landscape of virtual CISO services, exploring the common pitfalls and failures associated with these projects. They emphasize the importance of clear expectations, the distinction between a virtual CISO and a virtual security team, and the necessity of executive buy-in for successful…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S7E4 - A Conversation with Jake McCoy
29:06
29:06
Na później
Na później
Listy
Polub
Polubione
29:06With over a decade of experience in the technology field, Jake McCoy, Founder of Hire A Geek Online, is passionate about learning and applying new software and hardware solutions to meet the needs of his clients. He has successfully completed multiple projects for small and medium businesses, as well as individual customers, delivering high-quality…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
As Long as We Keep Moving the Goalposts, We Have a Great Security Culture (LIVE in Dallas, TX)
42:18
42:18
Na później
Na później
Listy
Polub
Polubione
42:18All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Rinki Sethi, vp and CISO, BILL. Joining us is our sponsored guest, Lamont Orange, CISO, Cyera. This episode was recorded in front of a live audience at Cyera’s first DataSec conference (November …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI Security Deep Dive: Threats, Controls, and Red Teaming
20:34
20:34
Na później
Na później
Listy
Polub
Polubione
20:34This podcast explores the critical landscape of AI security, drawing on insights from leading experts and resources. We delve into the unique challenges and risks associated with AI systems, including both machine learning and heuristic models. We will discuss the various types of threats, such as those that occur during development, through use, a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#217 - Includes No Dirt (with Bill Dougherty)
44:59
44:59
Na później
Na później
Listy
Polub
Polubione
44:59In this episode of CISO Tradecraft, host G. Mark Hardy sits down with Bill Dougherty, CISO of Omada Health, to discuss a groundbreaking threat model called 'Includes No Dirt'. This comprehensive model integrates security, privacy, and compliance considerations, aiming to streamline and enhance threat modeling processes. The conversation covers the …
…
continue reading
In this compelling new episode of Life of a CISO, Dr. Eric Cole reflects on the transformative power of words and how they shape our lives and relationships. Kicking off the new year with a fresh outlook (and even a wardrobe change!), Dr. Cole emphasizes that words carry lasting impact, whether spoken to ourselves or others. Drawing from personal e…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
4th Party Data Breach? We Can Barely Catch the 1st Party Ones!
37:51
37:51
Na później
Na później
Listy
Polub
Polubione
37:51All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is George Finney, CISO, The University of Texas System and author of Project Zero Trust. In this episode: Aligning on privacy Bringing Zero Trust to OT Rest…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
S7E3 - A Conversation with Josh Bruyning
32:41
32:41
Na później
Na później
Listy
Polub
Polubione
32:41Josh Bruyning is the Executive Producer and Co-Founder at Bruyning Media, where creative storytelling transforms technical jargon into engaging podcasts that resonate with audiences. His educational foundation in English and Information Security Systems from the University of Minnesota and Metro State University, respectively, underpins my approach…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#216 - The TTPs of a Security Champions Program (with Dustin Lehr)
45:32
45:32
Na później
Na później
Listy
Polub
Polubione
45:32Join G. Mark Hardy in a riveting episode of CISO Tradecraft as he sits down with Dustin Lehr to uncover strategies for creating security champions among developers. Explore effective techniques to inspire culture change, leverage AI tools for security, and discover the difference between leadership and management. This insightful discussion include…
…
continue reading
Wat is een dreiging en wat is het verschil met een risico? Hoe maak je een dreigingsanalyse en waar is het nuttig voor? In deze aflevering vertel ik over dreigingen en het maken van dreigingsanalyses. === YouTube: https://youtu.be/EMyTC_KQ4uA En de coole All the Cyber Ladies hoodie die ik draag is te koop via https://docs.google.com/forms/d/e/1FAIp…
…
continue reading