Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
1
S4S3 State of Ransomware in Cyber Security - Interview by AlgoSec
28:40
28:40
Na później
Na później
Listy
Polub
Polubione
28:40
Discussion with AlgoSec around ransomware based off of the Extrahop Cyber Confidence Index 2022. I cover numerous questions about what organizations are doing today and what they should change to improve cyber defenses. The crux of this study shows the cognitive dissonance of cyber security leaders and IT decision makers. They believe one thing whe…
…
continue reading
1
S4E10 Cyber Security Attacks in the News Summer 2022
16:11
16:11
Na później
Na później
Listy
Polub
Polubione
16:11
In this episode I discuss cyber-attacks in the Summer of 2022. I’ll review who was attacked, its impact, and the aftermath. While I would love to go into the technical details about the attacks, that data becomes harder and harder to find with each breach and news release. Victims are tight lipped and apparently being told more and more to not shar…
…
continue reading
1
S4E9 Online Cyber Security Tools and Building Lab Environments
17:31
17:31
Na później
Na później
Listy
Polub
Polubione
17:31
This episode covers online tools and lab environments that cyber security students and early professionals can use to learn and increase technical skills. While these environments are usually meant for those that want to get very deep with the technical side of cyber security, non-technical folks can certainly use these as well. The tools/trainings…
…
continue reading
1
S4E8 Interview with Adrianus Warmenhoven - Cyber Security and NordVPN
30:55
30:55
Na później
Na później
Listy
Polub
Polubione
30:55
In this episode I spend 30-minutes talking with Adrianus Warmenhoven, Defensive Strategist at Nordvpn. We dove into virtual private networks (VPN) and networking. Hear how VPN's work, when to use them and why. We discuss real-world examples and talk security stories as well as some cyber security history. Send comments, questions, and episode ideas…
…
continue reading
1
S4E7 Red Team, Blue Team, Purple Team in the Cyber Security Realm
24:41
24:41
Na później
Na później
Listy
Polub
Polubione
24:41
Here I talk about different avenues within cyber security. We use terms such as red team, blue team, and purple team when discussing offense, defense, and a merger of the two. I’ll go over different technologies, teams that cover each of these areas and jobs that involve each team. We have these teams and terms due to the size and complexity of the…
…
continue reading
1
S4E6 Getting More from Your Cyber Security Employer
26:02
26:02
Na później
Na później
Listy
Polub
Polubione
26:02
This episodes has me talking about how employees can get enhanced benefits from their employer. Most people figure salary is the only thing that matters from when it comes to the benefits of working. This is a major mistake. Healthcare alone can potentially bring thousands of dollars per year in additional compensation and companies vary greatly in…
…
continue reading
1
S4E5 Interview with Perry Carpenter of KnowBe4 - Cyber Security Awareness Training
30:39
30:39
Na później
Na później
Listy
Polub
Polubione
30:39
Conversation with Perry Carpenter, C | CISO, MSIA, who currently serves as chief evangelist and strategy officer for KnowBe4, the world’s most popular security awareness and simulated phishing platform. Perry and I talked about the history of KnowBe4, his journey in cyber security, what students and early professionals can study to succeed in socia…
…
continue reading
1
S4S2 AlgoSec Interview: Aplication Security for Cyber Security Professionals
20:26
20:26
Na później
Na później
Listy
Polub
Polubione
20:26
Podcast sponsored by AlgoSec where I discuss how applications impact network and security engineers. This was a 1:1 conversation between me as an SME with a marketing leader at AlgoSec. You can find the full video interview here. This topic provides detail on challenges experienced by network and security engineers related to applications and appli…
…
continue reading
1
S4E4 Getting Deep with Cyber Security Applications
19:25
19:25
Na później
Na później
Listy
Polub
Polubione
19:25
In this episode, I discuss the detail and complexity inherent with software solutions including specific jobs that relate to cyber security applications. Many of us tend to think that software is only skin deep. In reality, applications go from involved to intricate to MASSIVELY COMPLEX. Too often I’ve engaged with projects where I figure, oh, it’s…
…
continue reading
1
S4E3 Interview with W. Curtis Preston aka Mr. Backup - Backups, HA/DR and Cyber Security
28:00
28:00
Na później
Na później
Listy
Polub
Polubione
28:00
In this episode I step away from my normal monologue style to interview a renowned guest, W. Curtis Preston. Curtis, the Chief Technical Evangalist at Druva, is also known as Mr. Backup. Curtis runs his own website, Backup Central dot com with his own Podcast called Restore It All. He also participates in the No Hardware Required Podcast for Druva.…
…
continue reading
1
S4E2 Cyber Security Con Game - Online Scam
18:29
18:29
Na później
Na później
Listy
Polub
Polubione
18:29
This episode goes into great detail about a timeshare scam that directly targeted me. I tell the story along with detailed steps the con artists took to try and make me their victim. I provide steps taken to PROVE they were liars and thieves. I conclude with 12 critical steps everyone should implement that will protect them from online scams. We ar…
…
continue reading
1
S4E1 Starting a New Cyber Security Job
21:20
21:20
Na później
Na później
Listy
Polub
Polubione
21:20
In this episode I discuss how to start a new cyber security job. I talk about emotions associated with starting over, fear, stress, anxiety, excitement, and joy, among others. I touch on topics around people, processes and technology at the company. This episode discusses change and how to deal with it. Starting a new job happens to nearly every em…
…
continue reading
1
S4S1 MSS Forum Phoenix - Understanding Today’s Network Security Challenges
32:33
32:33
Na później
Na później
Listy
Polub
Polubione
32:33
Brief introduction to Season 4 - July 2022-Sept 2022 and then the full session I presented at for the MSS Forum in Phoenix on May 12, 2022. The topic covers today's cyber security networking challenges. I offer recommendations for solutions and provide advice on where security professionals can focus. If you want a copy of the deck I used, send an …
…
continue reading
1
S3S4 A Job is Just a Job - The Vaccine Mandate
11:28
11:28
Na później
Na później
Listy
Polub
Polubione
11:28
Many people are threatened with losing their jobs or violating their conscience. This episode talks about how you are not alone. I talk about standing up for what you believe in. Swim upstream if that's for you. Do not "go along to get along" if that does not comport with your values. Stand up. Be strong. Leave your employer if they force you to vi…
…
continue reading
1
S3S3 Infosec Inspire Conference: Working with HR, L&D to drive training results
35:45
35:45
Na później
Na później
Listy
Polub
Polubione
35:45
Fireside chat with Garrettson Blight, Principal at Booz Allen Hamilton led by Kate Rodgers, Director of Brand at Infosec virtually on October 19, 2021. We discussed learning and development opportunities in our organizations and how important it is for employees. Salary is only a single benefit to employment. Learning and development along with hea…
…
continue reading
1
S3E10 Cyber Security Attacks in the News
21:19
21:19
Na później
Na później
Listy
Polub
Polubione
21:19
In this episode I talk about high profile cyber-attacks in the Spring and Summer of 2021. I’ll review who was attacked, what the attack involved, it’s impact, the aftermath, and how it affected the economy. Sign up for NewsBits from SANS at https://www.sans.org/newsletters/newsbites/ Review Security Intelligence periodically: https://securityintell…
…
continue reading
1
S3E9 Cyber Security Incident Response Planning
22:15
22:15
Na później
Na później
Listy
Polub
Polubione
22:15
In this episode I talk about incident response plans, what they are, why they are important and how to create one. NIST, the National Institute of Standards and Technology has a fabulous document entitled Computer Security Incident Handling Guide, Special Publication 800-61 Rev. 2. This document prescribes key data for incident response plans. In t…
…
continue reading
1
S3E8 Cyber Security Stories - Real World Examples
23:02
23:02
Na później
Na później
Listy
Polub
Polubione
23:02
In this episode I talk about real situations I’ve experienced. I won’t name companies, only industry and relative geography so as not to expose any entities. Some of these are more egregious than others, all are good learning experiences, for early as well as experienced professionals. Many look to join Cyber Security and wonder what it’s really li…
…
continue reading
1
S3E7 Interviewing and Presenting as a Cyber Security Professional
25:23
25:23
Na później
Na później
Listy
Polub
Polubione
25:23
While this podcast focuses on cyber security professionals, this episode provides general and wide-ranging interviewing and presentation tips. The discussion goes into detail about how and why we communicate and then provides examples and performance tips. Later there are examples, and recommendations for how to interview, present, and speak public…
…
continue reading
1
S3S2 Business and Emotional Skills for Tomorrow's CISO - Live at the MSS LA 2021
39:53
39:53
Na później
Na później
Listy
Polub
Polubione
39:53
Audio recording of session at MSS Forum LA on June 30th, 2021. Group discussion lead by Phelim Rowe of CTG Intelligence. We review the top "post holder" and go into depth around who has responsibility for cyber security in an organization. I was pleased to join Richard Staynings, Shawn Kohrman, Ashwin Krishnan, and Louis Arul-Doss on this round tab…
…
continue reading
1
S3S1 Conversation with a Cyber Security Early Professional
35:26
35:26
Na później
Na później
Listy
Polub
Polubione
35:26
In this special episode I'm sharing a real-world conversation I had with an early professional at my company. This individual worked for a couple of years in the healthcare field as an administrator and then moved to an extremely large company. He reached out wanting to know what to study and how and where to steer his career. Listen to this real l…
…
continue reading
Discussion on cyber security certifications. Which make sense. Where to focus. How to proceed. I cover certifications from GIAC, ISC2, ISACA, EC-Council, Amazon, Microsoft, Google, CompTIA, and others. This episode discusses areas to find training and recommendations before taking certification exams. These are recommendations only and based on my …
…
continue reading
1
S3E5 Cyber Security Grey Beard Information Security Book Reviews
21:41
21:41
Na później
Na później
Listy
Polub
Polubione
21:41
Book reviews of four cyber security books published between 2019-2020. Dark Mirror: Edward Snowden and the American Surveillance State by Barton Gellman 2020, The Hacker and The State by Ben Buchanan, 2020, Sandworm by Andy Greenberg, 2019 and The Coming Cyber War by Marc Crudgington, 2020. These books provide great insight to where we are in the c…
…
continue reading
1
S3E4 Cyber Security Grey Beard Financial Guidance
23:06
23:06
Na później
Na później
Listy
Polub
Polubione
23:06
Financial guidance based on my 30 years’ experience, economic degree, financial education, and wonderful direction from my father, a 40+ year professional financial advisor. I veer away from my standard cyber security talks in this episode to help students and early professionals learn, grow, and advance their financial well being. I see a critical…
…
continue reading
1
S3E3 - Own Your Cyber Security Career
17:11
17:11
Na później
Na później
Listy
Polub
Polubione
17:11
Advice and examples on how to own your career. While I focus on cyber security, these tips are valid for any profession. I give examples of my past as well as situations friends have experienced over the years. My advice includes tips such as be strong, be proud, track what you do, toot you own horn, and many more. This is a talk going back to the …
…
continue reading
1
S3E2 - What to Focus on at Work and Where to Steer Your Cyber Security Career
27:30
27:30
Na później
Na później
Listy
Polub
Polubione
27:30
What jobs are out there, what jobs interest you and/or fit best with your desires, abilities, and preferences. I talk about eight (8) practices, over a dozen jobs, and 12 markets/industries, for listeners to learn about. This talk came out of a 1:1 I had with an early professional at my company and I believe many listeners can benefit from this con…
…
continue reading
1
S3E1 - About the Upcoming Cyber Security Grey Beard Season
15:26
15:26
Na później
Na później
Listy
Polub
Polubione
15:26
Herein I talk about where I've been for the past 8 months, what's been going on, and what this season entails. I go over 7 specific topics I will cover and ask the audience for input on guest speakers and other topics. This is an exciting talk about the future and what to expect upcoming from Cyber Security Grey Beard. Support the show…
…
continue reading
1
S2S4 Remote Working in a Distributed Business Environment
28:02
28:02
Na później
Na później
Listy
Polub
Polubione
28:02
How are businesses, with focus on managed security service providers, dealing with remote working in a distributed work environment? This recording comes from a half hour panel discussion on this topic. Session from Third Annual MSS Forum Denver put on by CTG Intelligence and sponsored by KnowBe4, Hackdefnet, Fishtech Group and Stellar Cyber. Title…
…
continue reading
1
S2S3 Cyber Security Grey Beard's Professional Journey and Jobs for Students and Early Professionals
48:19
48:19
Na później
Na później
Listy
Polub
Polubione
48:19
Discussion around my professional journey with ties into what cyber security jobs exist for students and early professionals. I talk about specific jobs including network operations, security operations, forensic analysis and others. The class I spoke to was a Networking I class so I spend a bit of time discussing network technologies. I go over sp…
…
continue reading
1
S2S2 Business Leadership and Cyber Security Integration
48:18
48:18
Na później
Na później
Listy
Polub
Polubione
48:18
45 minute presentation delivered to the Long Island ISC2 chapter on October 20, 2020. I created this content for IIA/ISACA Chicago and launched for ISC2 as the content has wide appeal throughout the Cyber Security spectrum. This talk focuses on leadership and the need for engagement throughout organizations. We are, in many ways, the same in Cyber …
…
continue reading
1
S2E10 Cyber Security Offensive Tools
17:29
17:29
Na później
Na później
Listy
Polub
Polubione
17:29
NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY! I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES. Herein I provide key offensive testing tools along with clear description of what they do, when and why to use them and the impact these tools have on target systems. I discuss or mention the following produ…
…
continue reading
1
S2E9 Cyber Security Offensive Actions
13:21
13:21
Na później
Na później
Listy
Polub
Polubione
13:21
NOTE: THIS INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY! I DO NOT CONDONE OR ENDORSE USING THIS INFORMATION FOR ILLEGAL OR NEFARIOUS PURPOSES. Ethical hacking discussion on offensive actions. I go through standard hacker methodology and actions performed in a breach. I mention jobs associated with these skills and discuss defensive mechanism in ass…
…
continue reading
1
S2S1 Interview by Chris Seinko, Host of Cyber Work Podcast
52:41
52:41
Na później
Na później
Listy
Polub
Polubione
52:41
Interview on my background and journey along with discussion on the cyber security profession. Chris Seinko of Cyber Work hosts the Infosec Institute cyber security podcast and we discuss how to help students and early professionals grow in Cyber Security. Catch the video version recorded on YouTube at: https://www.youtube.com/watch?v=iis7WCWV4Z4 R…
…
continue reading
1
S2E8 Cyber Security Greybeardians Questions Answered
19:06
19:06
Na później
Na później
Listy
Polub
Polubione
19:06
Episode responding to Greybeardian questions. I’ve heard from a number of listeners and want to share their experiences along with my suggestions and recommendations to their common situations. I know many listeners find themselves in the same position as these individuals, let’s all learn from one another and grow together. Examples of questions a…
…
continue reading
1
S2E7 Cyber Security Defensive Actions
17:44
17:44
Na później
Na później
Listy
Polub
Polubione
17:44
Discussion surrounding critical defensive actions all information security users must utilize. I talk about managing and maintaining personal devices and how this directly relates to professions involving cyber security. Network security, system administration, endpoint protection, identity and access management as well as other jobs deal with dail…
…
continue reading
Tools and recommendations to enhance personal and understand corporate cyber security defense. I go over endpoint protection including anti-virus, anti-spyware, and anti-malware discussing how this ties into a SIEM in the corporate world. I spend a bit of time on VPN's and what the network sees and how these enhance privacy and security. I discuss …
…
continue reading
1
S2E5 Cyber Security Threats in Remote Work and School Environments
15:50
15:50
Na później
Na później
Listy
Polub
Polubione
15:50
Today's remote work and school environments enhance cyber security risks. I discuss real attacks and technologies now bypassed due to work at home policies. With so many new devices, and millions of additional individuals working and going to school remotely, there are increased and enhanced threats impacting anyone utilizing devices to access the …
…
continue reading
1
S2E4 Cyber Security Governance and Compliance
15:38
15:38
Na później
Na później
Listy
Polub
Polubione
15:38
Discussion around cyber security governance and compliance. What they are, the professions that perform these roles and what they do and how they differ. I go over key regulations including SOX, HIPAA, GDPR and others explaining what they cover and why it matters to cyber security professionals. cybergreybeard@gmail.com Sarbanes Oxley: https://www.…
…
continue reading
Detailed talk around cyber security and privacy. I provide examples around IOT devices such as RING and Echo as well as GPS, social media and other areas involving privacy today. I give real world stories involving court cases and tales where people had and /or could have their privacy violated by others using certain technologies. I provide corpor…
…
continue reading
Discussion around a handful of key cyber security trends including IOT/IOMT, AI/ML, Mobile, Social Engineering and Threat Hunting. Back to the roots of Cyber Security Grey Beard, I take 13 minutes to help students, early professionals and job changers understand a handful of areas requiring knowledge and skill based on today's trends. I provide exa…
…
continue reading
With the dreariness of the world today between COVID-19, riots, lock downs, and increased crime in certain areas, I thought it would be nice to have a positive pep talk for my listeners. Herein I discuss focusing on a North Star and driving to success. Take responsibility for yourself, don't blame others. Understand that everyone falls down and tha…
…
continue reading
Times are tough and layoffs are imminent. Here I talk about my experiences getting laid off and having to lay off employees (friends). I spend a substantial amount of time discussing signs to watch for and actions companies take that precede layoffs. I explain that it's a scary time filled with a lock of control and unknowns. You are not alone and …
…
continue reading
Many people want it all right now. Life is a journey, both personally and professionally. This 10-minute podcast discusses that it's okay to be where you are and finding happiness along the journey should take precedence over everything else. Plan, prepare, progress, patience, these factors enable success and happiness throughout the journey. Under…
…
continue reading
1
S1S1 Proactive Defense in Lieu of a Panicked Response
42:39
42:39
Na później
Na później
Listy
Polub
Polubione
42:39
A replay of the presentation I delivered on October 29,2019, at the Swissotel in Chicago, IL for the IIA/ISACA 6th Annual Cyber Security and Hacking Conference. The topic covers a handful of well-known hacks, how they happened and what could've and should've been done to prevent them. I continue talking about people, processes and technologies that…
…
continue reading
1
S1E9 Cyber Security: Professional Tips and Personal Growth
10:52
10:52
Na później
Na później
Listy
Polub
Polubione
10:52
A serious conversation about the difficulty of being 18-27 and that finding a path is hard. You are not alone. I talk about the "fog of war," what it is and how it impacts life, business, and family. I continue discussing our inner self vs. outer self and how what we do today matters for the next job we set out to get. Send comments, questions and …
…
continue reading
1
S1E8 Cyber Security Projects, Deployments, Infrastructure and Architecture
15:31
15:31
Na później
Na później
Listy
Polub
Polubione
15:31
Details on the complexity of cyber security projects including talks about cloud, on-premise and hybrid deployments. Examples of basic to complex real-world cyber security implementations. Discussion regarding teams and staff involved with cyber security deployments. Some talk around requests for proposal, quotes, and information (RFP, RFI, RFQ, RF…
…
continue reading
1
S1E7 Cyber Security Job Technologies: WAF, IAM, Forensics, IDS/IPS
12:00
12:00
Na później
Na później
Listy
Polub
Polubione
12:00
Cyber Security Job information for students, early professionals, and experienced staff retraining or switching roles. Herein I cover what the following technologies are and what professionals use them: Web Application Firewall (WAF), Identity and Access Management (IAM), Forensics, Intrusion Detection System (IDS) and Intrusion Prevention System (…
…
continue reading
1
S1E6 Cyber Security Jobs: Proxy/NAT, MFA, MDM, Asset and Patch Management
13:27
13:27
Na później
Na później
Listy
Polub
Polubione
13:27
Talk around key cyber security technologies. Detailed explanations on each with job descriptions and roles helping prospects decide how and where to apply these technologies in the cyber security field. In part 2, I talk about Proxy/NAT, Multi-Factor Authentication (MFA), Mobile Device Management (MDM), Asset Management and Patch Management. Cyber …
…
continue reading
1
S1E5 Cyber Security Technologies: Anti Virus, Anti Spyware, Spam Protection, Firewalls
14:13
14:13
Na później
Na później
Listy
Polub
Polubione
14:13
Talk around key cyber security technologies. Detailed explanations on each with job descriptions and roles helping prospects decide how and where to apply these technologies in the cyber security field. This is part 1 where I talk about encryption, anti-virus, anti-malware/spyware, spam protection and firewalls. Cyber Security Job guidance for stud…
…
continue reading
1
S1E4 Getting Started as Cyber Security Professional
10:05
10:05
Na później
Na później
Listy
Polub
Polubione
10:05
Talk explaining how to start in cyber security. I go into detail on parts of cyber and technologies and jobs to focus on. I give different paths depending on background and educational desire and ability. Not all cyber security professionals need four-year degrees. Cyber Security Job guidance for students, early professionals and experienced indivi…
…
continue reading