Douglas A. Brush | Weekly Interviews w/ InfoSec Pros public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

Unsubscribe
Unsubscribe
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Loading …
show series
 
This is the 5th part of the podcast's return after a brief hiatus. Daniel Ayala continues his interview of me. In this fifth part, we will discuss the start-up resources we provided in our Hang Out A Shingle presentation, what I am doing with Accel Consulting, selling to CISOs, tips to avoid when presenting cyber services, the selling to CISOs Mast…
  continue reading
 
This is the 4th part of the podcast's return after a brief hiatus. Daniel Ayala continues his interview of me. In this fourth part, we will discuss my first forensic litigation case, the importance of data governance, the myth of cyber, why I am tired of cybersecurity conferences, and so much more!By Douglas A. Brush | Weekly Interviews w/ InfoSec Pros
  continue reading
 
This is the 3rd part of the podcast's return after a brief hiatus. Daniel Ayala continues his interview of me. In this third part, we will discuss what I am doing as a Special Master and Court Appointed Neutral, the reasons I think there will be a continued convergence of legal, cybersecurity, and data privacy, why I decided to start another consul…
  continue reading
 
This is the 2nd part of the return of the podcast after a brief hiatus. Daniel Ayala continues his interview of me. In this second part, we will discuss how I got started in the industry, defining moments of my career, my first computer, early entrepreneurship, characteristics I look for in professionals, the toxic cybersecurity gatekeeping, and so…
  continue reading
 
After a hiatus, the Cyber Security Interviews podcast is back! A lot has happened in my life over the past 18 months. I have endured death, despair, divorce, and car theft, to name a few traumatic events that made me take a break from several endeavors. However, it has allowed me to reprioritize many things to understand where I am now and where I …
  continue reading
 
Leeann Nicolo is the Incident Response lead at The Coalition and specializes in digital forensics and cyber investigations. She has conducted investigations into ransomware, phishing, hacking, data breaches, trade secret theft, and employee malfeasance. Leeann has investigated thousands of digital devices and has extensive subject matter expertise …
  continue reading
 
Shannon Brazil is a Senior Cyber Security Specialist working within a CIRT of a Canadian Fortune 500. She has been in IT for over 12 years, with the last three years in Cybercrime investigations with law enforcement and recently moving into the private sector to focus on Digital Forensic analysis and investigations and Incident Response. As a hobby…
  continue reading
 
Cimone Wright-Hamor works at Pacific Northwest National Laboratory (PNNL) as a cybersecurity researcher while pursuing a Ph.D. in Computer Engineering at Iowa State University. She has spent the last decade of her life interning at a variety of organizations. She has had ten internships at more than six different organizations, including public and…
  continue reading
 
Jenna Waters is a Cybersecurity Consultant at True Digital Security where she specializes in information security program development, industry compliance assessments, threat intelligence, and cloud security controls. She is an experienced professional who consults with companies across multiple industries in achieving security-related best practic…
  continue reading
 
Nato Riley is an Integrations Engineer at Blumira and the Co-founder of Cloud Underground. Nato provides infrastructure, code, and security across all his efforts and is focused on helping Blumira build the most effective and efficient SIEM on the market for small to mid-sized businesses. He is the host of the “Nato as Code” and the "Cloud Undergro…
  continue reading
 
Sara Avery is a Regional Sales Manager at Zscaler. She has held various positions over the past 20 years in the Information Technology field and discovered her passion for information security 15 years ago. Her career has largely been spent in sales and account management with a laser focus on my customer's success. Sara's tenured experience in cyb…
  continue reading
 
Jennifer Brown is an award-winning entrepreneur, speaker, diversity and inclusion consultant, and author. As the successful founder, president, and CEO of Jennifer Brown Consulting, headquartered in New York City, Jennifer is responsible for designing workplace strategies that have been implemented by some of the biggest companies and nonprofits in…
  continue reading
 
Alyssa Miller leads the security strategy for S&P Global Ratings as Business Information Security Officer (BISO), connecting corporate security objectives to business initiatives. She blends a unique mix of technical expertise and executive presence to bridge the gap that can often form between security practitioners and business leaders. Her goal …
  continue reading
 
Chloé Messdaghi is the Chief Strategist at Point3 Security. In addition to her passion for keeping people safe and empowered both on and offline, she is also interested in increasing the numbers of marginalized genders in information security. She is the Co-Founder of Women of Security (WoSEC) and Hacking is NOT a Crime and the Founder of WeAreHack…
  continue reading
 
Julian Waits is the general manager of cybersecurity at Devo Technology. He has over 30 years of experience in senior leadership roles at technology companies, specializing in security, risk, and threat detection. He serves on several industry boards, including the International Consortium of Minority Cybersecurity Professionals (ICMCP) and Nationa…
  continue reading
 
This is the last episode in the five-part series on mental health, self-care, and neurodiversity. This will not be the last time I speak about these issues on the podcast. I encourage everyone to take these issues seriously and help remove stigmas and champion differences in the way our brains work. Cybersecurity professionals spend most of their d…
  continue reading
 
Danny Akacki is just a storyteller perpetually looking for a stage. He loves nothing more than attending conferences, giving talks, writing blogs, and finding new ways to reach as many people as he can to educate about cybersecurity. For him, there is no greater satisfaction than community building. Danny has been fortunate enough to spend his care…
  continue reading
 
Loading …

Quick Reference Guide