CISO publiczne
[search 0]
Więcej
Download the App!
show episodes
 
Artwork

1
CISO Series Podcast

David Spark, Mike Johnson, and Andy Ellis

Unsubscribe
Unsubscribe
Co tydzień
 
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
  continue reading
 
Artwork

1
CISO Tradecraft®

G Mark Hardy & Ross Young

Unsubscribe
Unsubscribe
Co tydzień
 
Welcome to CISO Tradecraft®. A podcast designed to take you through the adventure of becoming a Chief Information Security Officer (CISO) and learning about cyber security. This podcast was started because G Mark Hardy and Ross Young felt impressed to help others take their Information Security Skills to an executive level. We are thrilled to be your guides to lead you through the various domains of becoming a competent and effective CISO.
  continue reading
 
SC Media, and our sponsor, VISO Trust, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
SC Media, and our sponsor, VISO Trust, are proud to present this month's CISO Stories program. Each month, the CISO Stories Program explores a cybersecurity topic selected by CyberRisk Alliance’s CISO Community and provides content that examines that topic from a variety of perspectives. Hosted by Todd Fitzgerald, best-selling author of CISO COMPASS, the CISO Stories weekly podcast features content powered by the 1,100+ members of CyberRisk Alliance’s CISO Community.
  continue reading
 
Artwork

1
The New CISO

Steve Moore

Unsubscribe
Unsubscribe
Miesięcznie
 
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Email greg.schaffer@secondchancebook.org. A Second Chance Publishing, LLC podcast.
  continue reading
 
Artwork

1
CISO insiders

GRSee Consulting

Unsubscribe
Unsubscribe
Miesięcznie
 
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Miesięcznie+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
Artwork

1
The CISO's Gambit

Zscaler, Inc.

Unsubscribe
Unsubscribe
Miesięcznie
 
The CISO's Gambit podcast is a pragmatic cyber risk dialogue between cyber security leaders from leading organizations, like Zscaler. Topics span technical and non-technical aspects of cyber risk, cybersecurity, privacy, transformational change management, and the evolving role of the CISO as a thought leader and change agent. The podcast covers current risks, what's on horizon, and how CISOs can help deliver business value that lowers risks, flattens the total cost of controls, and reduces ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Artwork
 
Insights into the people and the life lessons learned over the past 25+ years in Cybersecurity and as a Chief Information Security Officer (CISO). CISO Insights podcast with host Jaime C., Cybersecurity Futurist, Speaker, Author, Mentor. For over two decades, Jaime has served as a Trusted Advisor to Fortune Global 500 Companies and over 500 other Leading Organizations.
  continue reading
 
Artwork

1
CISO's Secrets

Check Point Software Technologies LTD

Unsubscribe
Unsubscribe
Miesięcznie
 
“CISO's Secrets” promises clear talk on cybersecurity’s burning topics, but not only; A series of 40 minutes weekly podcast hosting Telco industry CIOs and CISO’s, from global and leading companies. Podcast will share true stories, reveal real-life scenarios, and more. The host will lead discussions about Security trends, best practices, cloud, networks, data, employees, habits, and secrets while drifting between personal and professional life. Earn your CISO's Secrets membership badge at ht ...
  continue reading
 
Hier erhalten Führungskräfte regelmäßig komprimiertes Wissen von Experten zu aktuellen Themen aus der IT- Sicherheit. Spezialisten der Antago GmbH bereiten Informationen auf, bewerten Sie und stellen Sie hier zur Verfügung.
  continue reading
 
La compétence est un mélange de connaissance et d'expérience. Ce podcast transmet l'expérience de CISOs seniors à d'autres professionnels de la cyber sécurité, qui peuvent être des jeunes diplomés, ou des professionnels (de l'IT par exemple) en reconversion, qui ont un besoin impérieux de complémenter leurs connaissances théoriques (universitaires, formations certifiantes ou pas, etc.) par un développement de leur expérience. Ce podcast modernise le compagnonnage traditionnel des ouvriers à ...
  continue reading
 
Microsoft’s Chief Information Security Officer (CISO), Bret Arsenault, chats with his CISO peers and industry leaders about the biggest challenges in cybersecurity today, plus practical guidance for security practitioners. Be sure to listen in and follow us!Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Ciso - Il Podcat

Emanuele Cisotti

Unsubscribe
Unsubscribe
Miesięcznie
 
Il podcat è un modo per parlare senza filtri di qualsiasi cosa mi vada. Probabilmente ci sarà tanta tecnologia, ma non è detto che debba per forza essere così. È un podcat! Mica non vorrai mai parlare di gatti, no?
  continue reading
 
Artwork

1
The CISO Diaries

Syya Yasotornrat & Leah McLean

Unsubscribe
Unsubscribe
Miesięcznie
 
The path to cybersecurity leadership is not a direct route and it's those divergent routes that create the amazing stories and histories of leaders who are driving security to keep businesses and people safe. We’re Leah McLean and Syya Yasotornrat and we intend to give CISOs and cybersecurity professionals a place to be their authentic selves. These are the unedited stories told of how they got into cybersecurity, the real struggles they’ve persevered through, personal anecdotes that make th ...
  continue reading
 
Loading …
show series
 
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
  continue reading
 
Stanley Charles is the Founder of the Charles Technology Group and Senior Manager, Information Security and Compliance at Pixel United. I realized early in the discussion that we have similar career paths, from aircraft maintenance in the United States Air Force, to an early career in networking as a network engineer, to eventually land in the info…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is our guest, Shawn Bowen, svp and CISO, World Kinect Corporation. In this episode: Is it true that CISOs feel their jobs are har…
  continue reading
 
In this episode of CISO Tradecraft, host G. Mark Hardy delves into the crucial topic of the OWASP Top 10 Web Application Security Risks, offering insights on how attackers exploit vulnerabilities and practical advice on securing web applications. He introduces OWASP and its significant contributions to software security, then progresses to explain …
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus shifts from technical skills to mindset, highlighting the essential role of mindset in cybersecurity success. Dr. Cole emphasizes the importance of recognizing and challenging limiting beliefs, particularly in the context of transitioning from a security engineering background …
  continue reading
 
In this episode of The New CISO, host Steve is joined again by guest Ron Banks, CISO at Toyota Financial Services. In part two of his interview series, Ron shares his career advice for new cyber leaders. Listen to the episode to learn more about Ron’s take on China’s strategies, the importance of being inquisitive, and why we must be calm under cha…
  continue reading
 
Darin Hurd, EVP and CISO at Guaranteed Rate, explains the value of zero trust security in the financial sector. Lenders cannot control the federal funds interest rate or the state of the economy, which can change rapidly. However, they must respond and adapt to these variables and others while ensuring their infrastructure remains secure. Darin exp…
  continue reading
 
In this special episode of CISO Insiders, we welcome Jason Wolpow, the head of cybersecurity recruitment at Lawrence Harvey. Jason Wolpow, together with Ben Ben Aderet, tackle key challenges while sharing key insights on the recruitment side of the cybersecurity industry. This special episode will tackle the following topics: The need for more cybe…
  continue reading
 
CISO Talk finishes 2023 with a year-end review hosted by Mitch Ashley (Techstrong Research) and Jennifer Minella (Viszen Security), joined by Allison Miller (executive security leader) and Dan Glass (CISO, NTT DATA). Our cyber leaders reflect on the rapid rise of generative AI (and whether it lives up to its billing), the career and legal risks of …
  continue reading
 
Je ziet regelmatig de rollen CISO/Privacy Officer gecombineerd worden. Ik heb het zelf ook een tijd lang gecombineerd gedaan.Ondanks dat de twee onderwerpen overlap met elkaar hebben, zijn zij ook heel verschillend.Doordat de belangen (betrokkenen vs organisatie) uit elkaar liggen en tevens de reikwijdte verschilt van elkaar. De AVG gaat alleen ove…
  continue reading
 
Third-Party Risk Management is essential for safeguarding an organization's assets, reputation, and operations. By identifying, assessing, and managing risks associated with external partners, organizations can enhance their resilience, protect sensitive information, and maintain the trust of stakeholders in an increasingly interconnected business …
  continue reading
 
Nick Mullen is the Founder and Principal Consultant at Sanguine Security Solutions and is also a Cybersecurity Program Mentor at Kennesaw State University. He is a technology leader dedicated to enabling teams and facilitating achievement, and his expertise is in program/project management, information security, IT governance, and compliance in the…
  continue reading
 
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
  continue reading
 
Robert Hill is a visionary leader with over three decades of expertise in the cybersecurity industry. As the founder and CEO of Cyturus Technologies, Inc, a leading Compliance and Risk Management solution provider, Robert has played an instrumental role in shaping the landscape of cybersecurity and helping organizations, navigate the complex challe…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our sponsored guest, Nadav Lotan, product management team leader, Cisco. In this episode: How can security teams do their jobs without seeming like an im…
  continue reading
 
Schneider Electric has over 52,000 suppliers and sells hundreds of thousands of products of which 15,000 would be classified as intelligent products. To address risks stemming from third-party suppliers, and in recognition of the risks posed to customers, we have a holistic approach to value chain security, by implementing security controls at ever…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy delves into the critical subject of vulnerability management for cybersecurity leaders. The discussion begins with defining the scope and importance of vulnerability management, referencing Park Foreman's comprehensive approach beyond mere patching, to include identification, classification, pri…
  continue reading
 
In this episode of "Life of a CISO" with Dr. Eric Cole, he discusses the crucial role of mindset over technical skills in cybersecurity success. Dr. Cole emphasizes believing in one's worthiness for advancement and financial success. He also highlights the reality of cyber warfare, labeling it as World War Three due to the pervasive nature of cyber…
  continue reading
 
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
  continue reading
 
Breaches at software vendors used by many organizations have highlighted the external software supplier risk, requiring organizations to be even more diligent. Join us as we discuss the supply chain issues and their relationship to software supply chain issues and how organizations should approach environment with supplier software risk, geo-politi…
  continue reading
 
Nick Oles is an author, cybersecurity professional, and veteran. We cover many topics including his book How to Catch a Phish (available at https://lnkd.in/e35B8YHz) and career paths, including this preview where he reviews his beginnings in IT in college. I often say that working at a university is a great place to get foundational IT experience, …
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest, Jamil Farshchi, evp and CISO, Equifax. In this episode: Data leaks are hard enough to deal with when caused by threat actors, but how bad is a…
  continue reading
 
This episode of CISO Tradecraft, hosted by G Mark Hardy, delves into the concept, significance, and implementation of tabletop exercises in improving organizational security posture. Tabletop exercises are described as invaluable, informal training sessions that simulate hypothetical situations allowing teams to discuss and plan responses, thereby …
  continue reading
 
In this episode of "Life of a CISO," Dr. Eric Cole, the host and cybersecurity expert, delves into the crucial transition from a tactical mindset to a strategic one as professionals ascend to the role of Chief Information Security Officer. Dr. Cole emphasizes the need to shift from being detail-oriented and tactical, as typical of a security engine…
  continue reading
 
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
  continue reading
 
With CISA just putting out new “secure by design” guidance, Lexmark CISO Bryan Willett pulls the curtain back on the curtain back on how Lexmark is approaching secure-by-design in its products Lexmark is at the forefront of secure by design as their products constantly touch highly confidential information in regulated industries, along with an est…
  continue reading
 
Jonathan Mandell calls Chicago home and has worked across various tech roles, from Enterprise AE to Business Development. He was part of the founding team of Tiz, which later became Provi, a SaaS company reshaping the alcohol industry. He has worked in third party risk management (TPRM) for the past 5 years, and recently founded Teepee, a cybersecu…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our sponsored guest, Yoav Nathaniel, co-founder and CEO, Silk Security. In this episode: Why does it seem like securing APIs i…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy converses with Cassie Crossley, author of the book on software supply chain security. Hardy explores the importance of cybersecurity, the structure of software supply chains, and the potential risks they pose. Crossley shares her expert insights on different software source codes and the intrica…
  continue reading
 
Anton Chuvakin, security advisor at Office of the CISO at Google Cloud and former Gartner distinguished analyst, joins Mitch and JJ to discuss AI and its security implications, software supply chain security and moving and securing workloads in the cloud, including its similarities and differences from operating in traditional data centers.…
  continue reading
 
In this episode of "Life of a CISO" with Dr. Eric Cole, listeners are reminded that to reach the next level in their careers, they must embrace change and pivot from their current mindset. Dr. Cole emphasizes the importance of listening more than speaking, asking the right questions, and focusing on quality over quantity in interactions. He discuss…
  continue reading
 
In this episode of The New CISO, host Steve is joined by guest Ron Banks, CISO at Toyota Financial Services. In part one of his two-part interview, Ron shares how he transitioned from a fighter pilot to a cybersecurity leader. He also digs into what is required for a joint government, private industry, cyber offensive response. Listen to the episod…
  continue reading
 
In this episode of The Virtual CISO Podcast, your host, John Verry, engages in a conversation with guest Shauli Rozen, CEO and Co-Founder of ARMO, exploring the intricacies of Kubernetes, the orchestration tool that's reshaping how we deploy, scale, and manage containerized applications. Join us as we discuss: What a container is Implications of co…
  continue reading
 
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
  continue reading
 
Generative AI security and integrity. This is important to me because it's a cool new commercially available technology that promises efficiency and time savings--and therefore everyone wants to use it without a thorough understanding of how to secure data used with it or correcting model bias introduced through improper governance. The implication…
  continue reading
 
Matthew Meadows is an experienced Information Technology Security Specialist with a demonstrated history of working in the medical practice industry, and is currently an Information Security Engineer with Premier, Inc. Join us as he discusses a new approach to information security training for healthcare professionals. Learn more about the CyberSec…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is our sponsored guest, Jay Trinckes, director of compliance, Thoropass. In this episode: Why do credential stuffing attacks put …
  continue reading
 
In this episode of CISO Tradecraft, the host, G Mark Hardy, delves into the concepts of responsibility, accountability, and authority. These are considered critical domains in any leadership position but are also specifically applicable in the field of cybersecurity. The host emphasizes the need for a perfect balance between these areas to avoid pu…
  continue reading
 
Hackers zijn van onschatbare waarde voor jouw organisatie. Zij hebben de tijd en motivatie om oneindig lang aan een draadje te frutselen, tot de gehele trui is gereduceerd tot een hoopje garen. Waar pentesters maar beperkt de tijd hebben en per uur worden betaald, rekenen melders bij een CVD vaak helemaal niets. Ze willen alleen graag een T-shirt e…
  continue reading
 
In this episode of "Life of a CISO" with Dr. Eric Cole, the focus is on the importance of prioritizing foundational cybersecurity measures over chasing new technologies. Dr. Cole emphasizes the prevalence of companies getting caught up in the hype of artificial intelligence (AI) and other buzzwords, while neglecting simple yet effective security st…
  continue reading
 
Responsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald, T. 2019. Chapter 4: Emerging Technologies and Trends in…
  continue reading
 
Responsible use and governance of AI are key issues today, as training data limitations and data retention issues must be addressed. The risk of exposing PII or other confidential data, managing bias, hallucination, misinterpretation risks and other AI considerations are discussed. Fitzgerald, T. 2019. Chapter 4: Emerging Technologies and Trends in…
  continue reading
 
Chris Foulon, Founder and Principal Cybersecurity Strategist of CPF-Coaching, is a seasoned vCISO, IT, and Security leader with over 17 years of progressive experience. He is also the co-host Breaking into Cybersecurity with Renee Smalls where they interviewed individuals who have transitioned into the cybersecurity industry within the past 5 years…
  continue reading
 
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining me is our guest Kelly Haydu, vp, infosec, technology, and enterprise applications, CarGurus. In this episode: What other career fields are rife with talent tha…
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy discusses various mishaps that can occur with Multi-Factor Authentication (MFA) and how these can be exploited by attackers. The talk covers several scenarios such as the misuse of test servers, bypassing of MFA via malicious apps and phishing scams, violation of the Illinois Biometric Informati…
  continue reading
 
Oorspronkelijk een talk die ik heb gehouden tijdens een lunchbijeenkomst met verschillende zbo's. ZBO staat voor zelfstandig bestuursorgaan. Dit zijn overheidsorganisaties die een onafhankelijk bestuur hebben, maar wel horen bij een ministerie. Dat dit een complexe constructie is, zal je al begrijpen. Maar hoe werk je nou constructief samen met een…
  continue reading
 
In the latest episode of "Life of a CISO" with Dr. Eric Cole, the focus shifts to the essential strategies for CISOs aiming to excel in their roles. Dr. Cole emphasizes the significance of understanding the existing security infrastructure before implementing sweeping changes, cautioning against the common mistake of assuming everything is broken u…
  continue reading
 
Artificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversation? The goal is to engage in an action driven conver…
  continue reading
 
Artificial Intelligence: Currently these two words can mean a world of difference to different people. How do you bring this topic to the board, to executives, or to business partners, and help them understand the risks without the FUD or technical language that so often creeps into the conversation? The goal is to engage in an action driven conver…
  continue reading
 
Loading …

Skrócona instrukcja obsługi